IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v13y2011i4d10.1007_s10796-010-9232-6.html
   My bibliography  Save this article

Information systems resources and information security

Author

Listed:
  • Kuo-chung Chang

    (Yuan Ze University)

  • Chih-ping Wang

    (Yuan Ze University)

Abstract

Recent studies suggest that the number of information security incidents has increased dramatically and has caused significant economic loss worldwide. Awareness of the significance of information security is evidenced by a rapid increase in information security investments. Despite the fact that information security has taken on a new level of importance, academic research on this subject is still in its infancy. A review of literature indicated that past studies largely took a resource based view, suggesting that organizations invest and develop a variety of IS resources so as to ease potential threats caused by information security breaches. However, the resource-based perspective as used in previous studies was somewhat limited. Based on and extending from previous work, this study employed the resource-based view as a theoretical lens to examine the role that IS resources play in determining the level of information security. A field study was conducted to test the hypotheses. The results of the model testing show that IT human, relational, and infrastructure resources have significant impacts on information security.

Suggested Citation

  • Kuo-chung Chang & Chih-ping Wang, 2011. "Information systems resources and information security," Information Systems Frontiers, Springer, vol. 13(4), pages 579-593, September.
  • Handle: RePEc:spr:infosf:v:13:y:2011:i:4:d:10.1007_s10796-010-9232-6
    DOI: 10.1007/s10796-010-9232-6
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-010-9232-6
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-010-9232-6?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Curtis P. Armstrong & V. Sambamurthy, 1999. "Information Technology Assimilation in Firms: The Influence of Senior Leadership and IT Infrastructures," Information Systems Research, INFORMS, vol. 10(4), pages 304-327, December.
    2. Huseyin Cavusoglu & Birendra Mishra & Srinivasan Raghunathan, 2005. "The Value of Intrusion Detection Systems in Information Technology Security Architecture," Information Systems Research, INFORMS, vol. 16(1), pages 28-46, March.
    3. Detmar W. Straub, 1990. "Effective IS Security: An Empirical Study," Information Systems Research, INFORMS, vol. 1(3), pages 255-276, September.
    4. Mun Y. Yi & Fred D. Davis, 2003. "Developing and Validating an Observational Learning Model of Computer Software Training and Skill Acquisition," Information Systems Research, INFORMS, vol. 14(2), pages 146-169, June.
    5. E. Burton Swanson, 1994. "Information Systems Innovation Among Organizations," Management Science, INFORMS, vol. 40(9), pages 1069-1092, September.
    6. Sirkka L. Jarvenpaa & Dorothy E. Leidner, 1998. "An Information Company in Mexico: Extending the Resource-Based View of the Firm to a Developing Country Context," Information Systems Research, INFORMS, vol. 9(4), pages 342-361, December.
    7. Terry Anthony Byrd & Bruce R. Lewis & Douglas E. Turner, 2004. "The Impact of IT Personnel Skills on IS Infrastructure and Competitive IS," Information Resources Management Journal (IRMJ), IGI Global, vol. 17(2), pages 38-62, April.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Margareta Heidt & Jin P. Gerlach & Peter Buxmann, 2019. "Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments," Information Systems Frontiers, Springer, vol. 21(6), pages 1285-1305, December.
    2. Hwee-Joo Kam & Thomas Mattson & Sanjay Goel, 0. "A Cross Industry Study of Institutional Pressures on Organizational Effort to Raise Information Security Awareness," Information Systems Frontiers, Springer, vol. 0, pages 1-24.
    3. Saini Das & Arunabha Mukhopadhyay & Debashis Saha & Samir Sadhukhan, 2019. "A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs," Information Systems Frontiers, Springer, vol. 21(5), pages 959-977, October.
    4. Hwee-Joo Kam & Thomas Mattson & Sanjay Goel, 2020. "A Cross Industry Study of Institutional Pressures on Organizational Effort to Raise Information Security Awareness," Information Systems Frontiers, Springer, vol. 22(5), pages 1241-1264, October.
    5. Humayun Zafar & Myung S. Ko & Kweku-Muata Osei-Bryson, 2016. "The value of the CIO in the top management team on performance in the case of information security breaches," Information Systems Frontiers, Springer, vol. 18(6), pages 1205-1215, December.
    6. Tejaswini C. Herath & Hemantha S. B. Herath & David Cullum, 2023. "An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks," Information Systems Frontiers, Springer, vol. 25(2), pages 681-721, April.
    7. R. Ramesh & H. Raghav Rao, 2011. "Editorial," Information Systems Frontiers, Springer, vol. 13(4), pages 451-452, September.
    8. Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Kevin Zhu & Kenneth L. Kraemer, 2005. "Post-Adoption Variations in Usage and Value of E-Business by Organizations: Cross-Country Evidence from the Retail Industry," Information Systems Research, INFORMS, vol. 16(1), pages 61-84, March.
    2. V. S. Prakash Attili & Saji K. Mathew & Vijayan Sugumaran, 2022. "Information Privacy Assimilation in IT Organizations," Information Systems Frontiers, Springer, vol. 24(5), pages 1497-1513, October.
    3. Elbashir, Mohamed Z. & Collier, Philip A. & Davern, Michael J., 2008. "Measuring the effects of business intelligence systems: The relationship between business process and organizational performance," International Journal of Accounting Information Systems, Elsevier, vol. 9(3), pages 135-153.
    4. Debabrata Dey & Abhijeet Ghoshal & Atanu Lahiri, 2022. "Circumventing Circumvention: An Economic Analysis of the Role of Education and Enforcement," Management Science, INFORMS, vol. 68(4), pages 2914-2931, April.
    5. Prasad, Acklesh & Heales, Jon, 2010. "On IT and business value in developing countries: A complementarities-based approach," International Journal of Accounting Information Systems, Elsevier, vol. 11(4), pages 314-335.
    6. Eun Hee Park & Jongwoo Kim & Lynn Wiles, 2023. "The role of collectivism and moderating effect of IT proficiency on intention to disclose protected health information," Information Technology and Management, Springer, vol. 24(2), pages 177-193, June.
    7. Fang Fang & Manoj Parameswaran & Xia Zhao & Andrew B. Whinston, 2014. "An economic mechanism to manage operational security risks for inter-organizational information systems," Information Systems Frontiers, Springer, vol. 16(3), pages 399-416, July.
    8. Abhay Nath Mishra & Ritu Agarwal, 2010. "Technological Frames, Organizational Capabilities, and IT Use: An Empirical Investigation of Electronic Procurement," Information Systems Research, INFORMS, vol. 21(2), pages 249-270, June.
    9. Derrick Huang, C. & Hu, Qing & Behara, Ravi S., 2008. "An economic analysis of the optimal information security investment in the case of a risk-averse firm," International Journal of Production Economics, Elsevier, vol. 114(2), pages 793-804, August.
    10. William J. Kettinger & Chen Zhang & Kuo-Chung Chang, 2013. "Research Note —A View from the Top: Integrated Information Delivery and Effective Information Use from the Senior Executive's Perspective," Information Systems Research, INFORMS, vol. 24(3), pages 842-860, September.
    11. Zhang, Cheng & Dhaliwal, Jasbir, 2009. "An investigation of resource-based and institutional theoretic factors in technology adoption for operations and supply chain management," International Journal of Production Economics, Elsevier, vol. 120(1), pages 252-269, July.
    12. Kevin Zhu & Kenneth L. Kraemer & Sean Xu, 2006. "The Process of Innovation Assimilation by Firms in Different Countries: A Technology Diffusion Perspective on E-Business," Management Science, INFORMS, vol. 52(10), pages 1557-1576, October.
    13. Robert G. Fichman, 2004. "Real Options and IT Platform Adoption: Implications for Theory and Practice," Information Systems Research, INFORMS, vol. 15(2), pages 132-154, June.
    14. Sam Ransbotham & Sabyasachi Mitra, 2009. "Choice and Chance: A Conceptual Model of Paths to Information Security Compromise," Information Systems Research, INFORMS, vol. 20(1), pages 121-139, March.
    15. ÇakanyIldIrIm, Metin & Yue, Wei T. & Ryu, Young U., 2009. "The management of intrusion detection: Configuration, inspection, and investment," European Journal of Operational Research, Elsevier, vol. 195(1), pages 186-204, May.
    16. Hilal Atasoy & Rajiv D. Banker & Paul A. Pavlou, 2016. "On the Longitudinal Effects of IT Use on Firm-Level Employment," Information Systems Research, INFORMS, vol. 27(1), pages 6-26, March.
    17. Xuan Yang & Xiao Li & Daning Hu & Harry Jiannan Wang, 2021. "Differential impacts of social influence on initial and sustained participation in open source software projects," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 72(9), pages 1133-1147, September.
    18. Severin Oesterle & Arne Buchwald & Nils Urbach, 2022. "Investigating the co-creation of IT consulting service value: empirical findings of a matched pair analysis," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(2), pages 571-597, June.
    19. Gediminas Adomavicius & Jesse Bockstedt & Alok Gupta, 2012. "Modeling Supply-Side Dynamics of IT Components, Products, and Infrastructure: An Empirical Analysis Using Vector Autoregression," Information Systems Research, INFORMS, vol. 23(2), pages 397-417, June.
    20. Lin Jia & Xiuwei Song & Dianne Hall, 2022. "Influence of Habits on Mobile Payment Acceptance: An Ecosystem Perspective," Information Systems Frontiers, Springer, vol. 24(1), pages 247-266, February.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:13:y:2011:i:4:d:10.1007_s10796-010-9232-6. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.