Impacts of Sustainable Information Technology Capabilities on Information Security Assimilation: The Moderating Effects of Policy—Technology Balance
Abstract
:1. Introduction
2. Literature Review
2.1. Resource-Based View (RBV)
2.2. Sustainable Information Technology Capability
2.3. Policy-to-Technology Balance
2.4. Prior Studies in Information Security Management Assimilation
3. Research Model and Hypotheses
3.1. Research Model
3.2. Hypotheses Development
3.2.1. Sustainable IT Capabilities
3.2.2. Impacts of Policy-to-Technology Balance
4. Research Methodology
4.1. Participants and Data Collection
4.2. Measurement Development
5. Analysis Results
5.1. Validity and Reliability: First-Order Hierarchy
5.2. Validity and Reliability: Second-Order Hierarchy
5.3. Structural Model Assessment (Direct Model)
5.4. Assessment of Moderation Effects (H4a to H4c)
6. Conclusions
6.1. Summary of Findings and Discussion
6.2. Implications and Conclusion
6.3. Limitations and Future Direction
Author Contributions
Funding
Conflicts of Interest
References
- Yoon, H.-S. Internal surveillance and control system for information security and information system asset management. Inf. Syst. Rev. 2007, 9, 121–137. [Google Scholar]
- Baker, W.H.; Wallace, L. Is information security under control? Investigating quality in information security management. IEEE Secur. Priv. 2007, 5, 36–44. [Google Scholar] [CrossRef]
- Brancheau, J.C.; Janz, B.D.; Wetherbe, J.C. Key issues in information systems management: 1994-95 SIM Delphi results. MIS Q. 1996, 20, 225–242. [Google Scholar] [CrossRef] [Green Version]
- Lohmeyer, D.F.; McCrory, J.; Pogreb, S. Managing information security. Mckinsey Q. 2002, 2, 12–16. [Google Scholar]
- Ransbotham, S.; Mitra, S. Choice and chance: A conceptual model of paths to information security compromise. Inf. Syst. Res. 2009, 20, 121–139. [Google Scholar] [CrossRef]
- Cavusoglu, H.; Cavusoglu, H.; Son, J.Y.; Benbasat, I. Information Security Control Resources in Organizations: A Multidimensional View and Their Key Drivers; Working paper; Sauder School of Business, University of British Columbia: Vancouver, Canada, 2009. [Google Scholar]
- Bishop, M. What is computer security? IEEE Secur. Priv. 2003, 1, 67–69. [Google Scholar] [CrossRef]
- Ryan, S.D.; Bordoloi, B. Evaluating security threats in mainframe and client/server environments. Inf. Manag. 1997, 32, 137–146. [Google Scholar] [CrossRef]
- Chou, D.C.; Yen, D.C.; Lin, B.; Cheng, P.H.L. Cyberspace security management. Ind. Manag. Data Syst. 1999, 99, 353–361. [Google Scholar] [CrossRef]
- Chang, S.E.; Ho, C.B. Organizational factors to the effectiveness of implementing information security management. Ind. Manag. Data Syst. 2006, 106, 345–361. [Google Scholar] [CrossRef]
- Sanderson, E.; Forcht, K.A. Information security in business environment. Inf. Manag. Comput. Sec. 1996, 4, 32–37. [Google Scholar] [CrossRef]
- Kankanhalli, A.; Teo, H.H.; Tan, B.C.Y.; Wei, K.K. An integrative study of information systems security effectiveness. Int. J. Inf. Manag. 2003, 23, 139–154. [Google Scholar] [CrossRef]
- Doherty, N.F.; Fulford, H. Do information security policies reduce the incidence of security breaches: An exploratory analysis. Inf. Res. Manage. J. 2005, 18, 21–39. [Google Scholar] [CrossRef]
- Jahner, S.; Krcmar, H. Beyond technical aspects of information security: Risk culture as a success factor for IT risk management. In Proceedings of the 11th Americas Conference on Information Systems AMCIS 2005, Omaha, NE, USA, 11–14 August 2005. [Google Scholar]
- Straub, D.W.; Welke, R. Coping with systems risk: Security planning models for management decision making. MIS Q. 1998, 22, 441–469. [Google Scholar] [CrossRef]
- Von Solms, B.; von Solms, R. The 10 deadly sins of information security management. Comput. Secur. 2004, 23, 371–376. [Google Scholar] [CrossRef]
- Dhillon, G.; Backhouse, J. Current directions in IS security research: Towards socio-organizational perspectives. Inf. Syst. J. 2001, 11, 127–153. [Google Scholar] [CrossRef]
- Siponen, M.T. Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods. Inf. Organ. 2005, 15, 339–375. [Google Scholar] [CrossRef]
- Dutta, A.; McCrohan, K. Management’s role in information security in a cyber economy. Calif. Manag. Rev. 2002, 45, 67–87. [Google Scholar] [CrossRef]
- Barney, J.B. Firm resources and sustained competitive advantage. J. Manag. 1991, 17, 99–120. [Google Scholar] [CrossRef]
- Grant, R.M. The resource-based theory of competitive advantage: Implications for strategy formulation. Calif. Manag. Rev. 1991, 33, 114–135. [Google Scholar] [CrossRef] [Green Version]
- Wernerfelt, B. A resource-based view of the firm. Strat. Manag. J. 1984, 5, 171–180. [Google Scholar] [CrossRef]
- Feeny, D.; Ives, B. In search of sustainability: Reaping long-term advantage from investment in information technology. J. Manag. Inf. Syst. 1990, 7, 27–46. [Google Scholar] [CrossRef]
- Teece, D. Capturing value from technological innovation: Integration, strategic partnering and licensing decisions. Interfaces 1988, 18, 46–61. [Google Scholar] [CrossRef]
- Bhatt, G.; Grover, V. Types of information technology capabilities and their role in competitive advantage: An empirical study. J. Manag. Inf. Syst. 2005, 22, 253–277. [Google Scholar] [CrossRef]
- Bharadwaj, A.S. A resource-based perspective on information technology capability and firm performance: An empirical investigation. MIS Q. 2000, 24, 169–196. [Google Scholar] [CrossRef]
- Tippins, M.J.; Sohi, R.S. IT competency and firm performance: Is organizational learning a missing link? Strat. Manag. J. 2003, 24, 745–761. [Google Scholar] [CrossRef] [Green Version]
- Li, E.Y.; Chen, J.S.; Huang, Y.H. A framework for investigating the impact of it capability and organizational capability on firm performance in the late industrializing context. Int. J. Technol. Manag. 2006, 36, 206–229. [Google Scholar] [CrossRef] [Green Version]
- Brown, J.S.; Hagel, J. Does IT matter? Harv. Bus. Rev. 2003, 81, 109–112. [Google Scholar]
- Han, H.S.; Lee, J.N.; Seo, Y.W. Analyzing the impact of a firm’s capability on outsourcing success: A process perspective. Inf. Manage. 2008, 45, 31–42. [Google Scholar] [CrossRef]
- Keen, P.G. Shaping the Future: Business Design through Information Technology; Harvard Business Press: Cambridge, MA, USA, 1991. [Google Scholar]
- Ravichandran, T.; Lertwongsatien, C. Effect of information systems resources and capabilities on firm performance: A resource-based perspective. J. Manag. Inform. Syst 2005, 21, 237–276. [Google Scholar] [CrossRef]
- Ravichandran, T.; Rai, A. Quality management in systems development: An organizational system perspective. MIS Q. 2000, 24, 381–416. [Google Scholar] [CrossRef] [Green Version]
- Teece, D.J.; Pisano, G.; Shuen, A. Dynamic capabilities and strategic management. Strat. Manag. J. 1997, 18, 509–533. [Google Scholar] [CrossRef]
- Sambamurthy, V.; Bharadwaj, A.; Grover, V. Shaping agility through digital options: Reconceptualizing the role of information technology in contemporary firms. MIS Q. 2003, 27, 237–263. [Google Scholar] [CrossRef] [Green Version]
- Tornatzky, L.G.; Klein, K.J. Innovation characteristics and innovation adoption-implementation: A meta analysis of findings. IEEE Trans. Eng. Manag. 1982, 29, 28–45. [Google Scholar] [CrossRef]
- Delone, W.R.; McLean, E.R. Information systems success: The quest for the dependent variable. Inf. Syst. Res. 1992, 3, 60–95. [Google Scholar] [CrossRef]
- Goodhue, D.L.; Thompson, R.L. Task-technology fit and individual performance. MIS Q. 1995, 19, 213–236. [Google Scholar] [CrossRef]
- Dehning, B.; Stratopoulos, T. Determinants of a sustainable competitive advantage due to an IT-enabled strategy. J. Strat. Inf. Syst. 2003, 12, 7–28. [Google Scholar] [CrossRef]
- Massey, A.P.; Montoya-Weiss, M.; Hung, C.; Ramesh, V. Cultural perceptions of task-technology fit. Commun. ACM 2001, 44, 83–84. [Google Scholar] [CrossRef]
- Ramamurthy, K.; Premkumar, G.; Crum, M.R. Organizational and interorganizational determinants of EDI diffusion and organizational performance: A causal model. J. Organ. Comp. Electron. Commer. 1999, 9, 253–285. [Google Scholar] [CrossRef]
- Banerjee, S.; Golhar, D.Y. EDI implementation in JIT and non-JIT manufacturing firms: A comparative study. Int. J. Oper. Prod. Manag. 1993, 13, 25–37. [Google Scholar] [CrossRef]
- Ferguson, D.M.; Hill, N.C. The state of U.S. EDI in 1989. EDI Forum 1989, 2, 1–26. [Google Scholar]
- Raymond, L.; Bergeron, B. EDI success in small and medium sized enterprises: A field study. J. Organ. Comp. Electron. Commer. 1996, 6, 161–172. [Google Scholar] [CrossRef]
- Zahra, S.; Bogner, W. Technology strategy and software new ventures’ performance: Exploring the moderating effect of the competitive environment. J. Bus. Ventur. 2000, 15, 135–173. [Google Scholar] [CrossRef]
- Hinton, H.M.; Lee, E.S. The compatibility of policies. In Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, VA, USA, 2–4 November 1994; pp. 258–269. [Google Scholar]
- Gordon, L.A.; Loeb, M.P. The economics of information security investment. ACM Transa. Inf. Syst. Secur. 2002, 5, 438–457. [Google Scholar] [CrossRef]
- Hsu, C.; Lee, J.N.; Straub, D.W. Institutional influences on information systems security innovations. Inf. Sys. Res. 2012, 23, 918–939. [Google Scholar] [CrossRef]
- Kotulic, A.C.; Clark, J.G. Why there aren’t more information security research studies. Inf. Manag. 2004, 41, 597–607. [Google Scholar] [CrossRef]
- Spears, J.L.; Barki, H. User participation in information systems security risk management. MIS Q. 2010, 34, 503–522. [Google Scholar] [CrossRef] [Green Version]
- Overby, E.; Bharadwaj, A.; Sambamurthy, V. Enterprise agility and the enabling role of information technology. Eur. J. Inf. Syst. 2006, 15, 120–131. [Google Scholar] [CrossRef]
- Eisenhardt, K.M. Making fast strategic decisions in high-velocity environments. Acad. Manag. J. 1989, 32, 543–576. [Google Scholar]
- Kohli, A.K.; Jaworski, B.J. Market orientation: The construct, research propositions, and managerial implications. J. Mark. 1990, 54, 1–18. [Google Scholar] [CrossRef] [Green Version]
- Hansen, M.T.; Nohria, N.; Tierney, T. What’s your strategy for managing knowledge? Har. Bus. Rev. 1999, 77, 106–116. [Google Scholar]
- Broadbent, M.; Weill, P.; Neo, B.S. Strategic context and patterns of IT infrastructure capability. J. Strat. Inf. Syst. 1999, 8, 157–187. [Google Scholar] [CrossRef]
- Weill, P.; Subramani, M.; Broadbent, M. Building IT infrastructure for strategic agility. MIT Sloan Manag. Rev. 2002, 44, 57–65. [Google Scholar]
- Weill, P.; Broadbent, M. Leveraging the New Infrastructure: How Market Leaders Capitalize on Information Technology; Harvard Business School Press: Boston, MA, USA, 1998. [Google Scholar]
- Dewar, R.D.; Dutton, J.E. The adoption of radical and incremental innovations: An empirical investigation. Manag. Sci. 1986, 32, 1422–1433. [Google Scholar] [CrossRef]
- Damanpour, F. The adoption of technological, administrative and ancillary innovations: Impact of organizational factors. J. Manag. 1987, 13, 675–688. [Google Scholar] [CrossRef]
- Sambamurthy, V.; Zmud, R.W. At the heart of success: Organization wide management competencies. In Steps to the Future: Fresh Thinking on the Management of IT-Based Organizational Transformation; Sauer, C., Yetton, P.W., Eds.; Jossey-Bass Publishers: San Francisco, CA, USA, 1997; pp. 143–164. [Google Scholar]
- Elbashir, M.Z.; Collier, P.A.; Sutton, S.G. The role of organizational absorptive capacity in strategic use of business intelligence to support integrated management control systems. Account. Rev. 2011, 86, 155–184. [Google Scholar] [CrossRef]
- Wade, M.; Hulland, J. The resource-based view and information systems research: Review, extension and suggestions for future research. MIS Q. 2004, 28, 107–142. [Google Scholar] [CrossRef]
- Weill, P.; Ross, J. IT Governance: How Top Performers Manage IT Decision Rights for Superior Results; Harvard Business School Press: Boston, MA, USA, 2004. [Google Scholar]
- Boynton, A.C.; Zmud, R.W.; Jacobs, G.C. The influence of IT management practice on IT use in large organizations. MIS Q. 1994, 18, 299–318. [Google Scholar] [CrossRef]
- Armstrong, C.P.; Sambamurthy, V. Information technology assimilation in firms: The influence of senior leadership and it infrastructures. Inf. Syst. Res. 1999, 10, 304–327. [Google Scholar] [CrossRef]
- Reich, B.H.; Benbasat, I. Factors that influence the social dimension of alignment between business and information technology objectives. MIS Q. 2000, 24, 81–111. [Google Scholar] [CrossRef]
- Chan, Y.; Sabherwal, R.; Thatcher, J.B. Antecedents and outcomes of strategic is alignment: An empirical investigation. IEEE Trans. Eng. Manag. 2006, 53, 27–47. [Google Scholar] [CrossRef]
- Mitchell, V.L.; Zmud, R.W. The effects of coupling IT and work process strategies in redesign projects. Organ. Sci. 1999, 10, 424–438. [Google Scholar] [CrossRef]
- Brown, S.; Eisenhardt, K. The art of continuous change: Linking complexity theory and time-paced evolution in relentlessly shifting organizations. Adm. Sci. Q. 1997, 42, 1–34. [Google Scholar] [CrossRef] [Green Version]
- Ferdows, K.; Lewis, M.A.; Machuca, J.A.D. Rapid-fire fulfillment. Harv. Bus. Rev. 2004, 82, 104–110. [Google Scholar]
- Swanson, E.B.; Ramiller, N.C. Innovating mindfully with information technology. MIS Q. 2004, 28, 553–583. [Google Scholar] [CrossRef]
- Fichman, R.G. Real options and it platform adoption: Implications for theory and practice. Inf. Syst. Res. 2004, 15, 132–154. [Google Scholar] [CrossRef] [Green Version]
- Zaheer, A.; Zaheer, S. Catching the wave: Alertness, responsiveness and market influence in global electronic networks. Manag. Sci. 1997, 43, 1493–1509. [Google Scholar] [CrossRef]
- Galliers, R. Strategizing for Agility: Confronting Information Systems Inflexibility in Dynamic Environments. In Agile Information Systems; DeSouza, K., Ed.; Butterworth-Heinemann: Burlington, Canada, 2007; pp. 1–15. [Google Scholar]
- Haeckel, S.H. Adaptive Enterprise: Creating and Leading Sense-and-Respond Organizations; Harvard Business School Press: Boston, MA, USA, 1999. [Google Scholar]
- O’Callaghan, R.; Kaufman, P.J.; Kronsynski, B. Adoption correlates and share effects of electronic data interchange in marketing channels. J. Mark. 1992, 5, 9–19. [Google Scholar]
- Rogers, E.M. Diffusion of Innovations, 4th ed.; Free Press: New York, NY, USA, 1995. [Google Scholar]
- Choi, M. An exploring study on relation between maturity levels of organizations and factors affecting information security policy. Korean J. Bus. Admin. 2009, 22, 1729–1748. [Google Scholar]
- Mata, F.J.; Fuerst, W.L.; Barney, J.B. Information technology and sustained competitive advantage: A resource-based analysis. MIS Q. 1995, 19, 487–505. [Google Scholar] [CrossRef]
- Fichman, R.G.; Kemerer, C.F. The illusory diffusion of innovation: An examination of assimilation gaps. Inf. Syst. Res. 1999, 10, 255–275. [Google Scholar] [CrossRef] [Green Version]
- Beatty, R.C.; Shim, J.P.; Jones, M.C. Factors influencing corporate web site adoption: A time-based assessment. Inf. Manag. 2001, 38, 337–354. [Google Scholar] [CrossRef]
- Ranganathan, C.; Dhaliwal, J.S.; Teo, T.S.H. Assimilation and diffusion of web technologies in supply-chain management: An examination of key drivers and performance impacts. Int. Electron. Commer. 2004, 9, 127–161. [Google Scholar] [CrossRef]
- Bentler, P.M. Comparative fit indexes in structural models. Psychol. Bull. 1990, 107, 238–246. [Google Scholar] [CrossRef] [PubMed]
- Fornell, C.; Larcker, D.F. Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 1981, 18, 39–50. [Google Scholar] [CrossRef]
- Nunnally, J.C. Psychometric Theory, 2nd ed.; McGraw-Hill: New York, NY, USA, 1978; ISBN 9780070474659. [Google Scholar]
- Carte, T.A.; Russell, C.J. In pursuit of moderation: Nine common errors and their solutions. MIS Q. 2003, 27, 479–501. [Google Scholar] [CrossRef] [Green Version]
- Wixom, B.H.; Watson, H.J. An empirical investigation of the factors affecting data warehousing success. MIS Q. 1981, 25, 17–41. [Google Scholar]
- Kohli, R.; Grover, V. Business value of it: An essay on expanding research directions to keep up with the times. J. Assoc. Inf. Syst. 2008, 9, 23–39. [Google Scholar] [CrossRef]
- Rai, A.; Patnayakuni, R.; Seth, N. Firm performance impacts of digitally-enabled supply chain integration capabilities. MIS Q. 2006, 30, 225–246. [Google Scholar] [CrossRef] [Green Version]
- Mitchell, V.L. Knowledge integration and information technology project performance. MIS Q. 2006, 30, 919–939. [Google Scholar] [CrossRef]
- Ba, S.; Stallaert, J.; Whinston, A.B. Research commentary: Introducing a third dimension in the information systems design—The Case for Incentive Alignment. Inf. Syst. Res. 2001, 12, 225–239. [Google Scholar] [CrossRef] [Green Version]
Demographic Category | Frequency | Percentage (%) | |
---|---|---|---|
Gender | Male | 171 | 73.71 |
Female | 61 | 26.29 | |
Age (years) | <40 | 79 | 34.05 |
40–49 | 95 | 40.95 | |
50–59 | 36 | 15.52 | |
>60 | 22 | 9.48 | |
Educational level | High school | 31 | 13.36 |
College/university | 127 | 54.74 | |
Post-graduate study | 68 | 29.31 | |
Others | 6 | 2.59 | |
Current position | CEO | 49 | 21.12 |
CIO/CFO | 33 | 14.22 | |
Head of department | 79 | 34.05 | |
Managers | 51 | 21.98 | |
Others | 20 | 8.62 | |
Industry | Manufacturing/service | 43 | 18.53 |
Distribution/retailing | 29 | 12.50 | |
IT | 70 | 30.17 | |
Finance/banking | 82 | 35.34 | |
Others | 8 | 3.45 | |
Information Security Management Period | Less than 3 years | 17 | 7.33 |
3–5 years | 44 | 18.97 | |
5–7 years | 65 | 28.02 | |
7–10 years | 78 | 33.62 | |
More than 10 years | 28 | 12.07 | |
Activities for Information Security Management (multiple response) | Implement strong security policies such as penalty | 53 | 22.84 |
Implement user access control and monitoring/detection systems | 158 | 68.10 | |
Use powerful security HW/SW | 185 | 79.74 | |
Consistent investment in information security | 93 | 40.09 | |
Consistent employee education and training for information security | 201 | 86.64 | |
Others | 12 | 5.17 |
Variable | Items | Related Studies | |
---|---|---|---|
IT Infrastructure | Data Management | Our organization has/manages
| Bharadwaj [26], Weill et al. [56] |
Network | Our organization has/manages
| ||
HW/SW Capability | Our organization has/manages
| ||
IT Business Spanning Capability | IT Management | Our organization uses/performs/has
| Mata et al. [79], Overby et al. [51] |
IT Vision | Our organization has
| ||
IT Plan | Our organization presents/considers/develops
| ||
IT Proactive Stance | IT Learning Culture | Our organization provides
| Mata et al. [79], Fichman and Kemerer [80] |
IT Investment | Our organization invests
| ||
IT Innovation | Our organization maintains/has
| ||
Policy-to-Technology Balance | Our organization’s information security policy is
| O’Callaghan et al. [76], Beatty et al. [81] | |
Information Security Management Assimilation |
| Fichman and Kemerer [80], Ramamurthy et al. [41]; Ranganathan et al. [82] |
Second-Order Variable | First-Order Variable | Item | Loadings | Cronbach’s Alpha | CR | AVE |
---|---|---|---|---|---|---|
IT Infrastructure | Data Management | dm1 | 0.821 | 0.868 | 0.843 | 0.642 |
dm2 | 0.779 | |||||
dm3 | 0.803 | |||||
dm4 | delete | |||||
Network | net1 | 0.799 | 0799 | 0.875 | 0.636 | |
net2 | 0.822 | |||||
net3 | 0.800 | |||||
net4 | 0.768 | |||||
HW/SW Capability | hsc1 | 0.830 | 0.802 | 0.849 | 0.653 | |
hsc2 | 0.775 | |||||
hsc4 | 0.818 | |||||
IT Business Spanning Capability | IT Management | mgmt1 | 0.811 | 0.883 | 0.846 | 0.648 |
mgmt2 | 0.799 | |||||
mgmt3 | 0.804 | |||||
IT Vision | vis1 | 0.858 | 0.848 | 0.866 | 0.683 | |
vis2 | 0.821 | |||||
vis3 | 0.800 | |||||
IT Plan | pl1 | 0.799 | 0.792 | 0.876 | 0.702 | |
pl2 | 0.850 | |||||
pl3 | 0.863 | |||||
IT Proactive Stance | IT Learning Culture | lc1 | 0.830 | 0.831 | 0.848 | 0.651 |
lc2 | 0.779 | |||||
lc3 | 0.811 | |||||
IT Investment | inv1 | 0.743 | 0.881 | 0.871 | 0.694 | |
inv2 | 0.893 | |||||
inv3 | 0.855 | |||||
IT Innovation | inno1 | 0.877 | 0.836 | 0.908 | 0.766 | |
inno2 | 0.847 | |||||
inno3 | 0.901 |
Construct | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 |
---|---|---|---|---|---|---|---|---|---|
Data Management | 0.801 | ||||||||
Network | 0.228 | 0.797 | |||||||
HW/SW Capability | 0.190 | 0.273 | 0.808 | ||||||
IT Management | 0.301 | 0.227 | 0.317 | 0.805 | |||||
IT Vision | 0.321 | 0.210 | 0.300 | 0.225 | 0.827 | ||||
IT Plan | 0.370 | 0.404 | 0.236 | 0.357 | 0.445 | 0.838 | |||
IT Learning Culture | 0.235 | 0.195 | 0.283 | 0.307 | 0.225 | 0.190 | 0.807 | ||
IT Investment | 0.338 | 0.200 | 0.333 | 0.276 | 0.320 | 0.184 | 0.221 | 0.833 | |
IT Innovation | 0.285 | 0.341 | 0.402 | 0.199 | 0.410 | 0.385 | 0.240 | 0.339 | 0.875 |
Variable | Item | Loadings | Cronbach’s Alpha | CR | AVE |
---|---|---|---|---|---|
IT Infrastructure | Data Management | 0.822 | 0.884 | 0.846 | 0.647 |
Network | 0.817 | ||||
HW/SW Capability | 0.774 | ||||
IT Business Spanning Capability | IT Management | 0.885 | 0.901 | 0.886 | 0.723 |
IT Vision | 0.802 | ||||
IT Plan | 0.861 | ||||
IT Proactive Stance | IT Learning Culture | 0.737 | 0.819 | 0.796 | 0.565 |
IT Investment | 0.770 | ||||
IT Innovation | 0.748 | ||||
Policy-to-Technology Balance | ptb1 | 0.812 | 0.839 | 0.877 | 0.640 |
ptb2 | 0.800 | ||||
ptb3 | 0.801 | ||||
ptb4 | 0.786 | ||||
Information Security Management Assimilation | sisma1 | 0.830 | 0.857 | 0.916 | 0.646 |
sisma2 | 0.844 | ||||
sisma3 | 0.799 | ||||
sisma4 | 0.806 | ||||
sisma5 | 0.795 | ||||
sisma6 | 0.743 |
Construct | 1 | 2 | 3 | 4 | 5 |
---|---|---|---|---|---|
IT Infrastructure | 0.805 | ||||
IT Business Spanning Capability | 0.268 | 0.850 | |||
IT Proactive Stance | 0.234 | 0.338 | 0.752 | ||
Policy-to-Technology Balance | 0.206 | 0.297 | 0.329 | 0.800 | |
Information Security Management Assimilation | 0.348 | 0.470 | 0.491 | 0.345 | 0.803 |
Hypothesis | Path | Std. β | t-Value | Result |
---|---|---|---|---|
H1 | IT Infrastructure → Sustainable Information Security Management Assimilation | 0.311 * | 4.458 | Supported |
H2 | IT Business Spanning Capability → Sustainable Information Security Management Assimilation | 0.469 * | 7.483 | Supported |
H3 | IT Proactive Stance → Sustainable Information Security Management Assimilation | 0.427 * | 5.071 | Supported |
Hypothesis/Path | Model | Path (Std. β/t-Value) | R2 | △R2 | F-value | Result |
---|---|---|---|---|---|---|
H4a: ITI → ISMA ↑ PTB | No Interaction | ITI → ISMA (β = −0.298/3.776 **) | 0.217 | 0.032 | 9.715 ** | Supported |
PTB → ISMA (β = 0.287/4.006 *) | ||||||
Interaction | ITI → ISMA (β = −0.292/ 4.121 **) | 0.249 | ||||
PTB → ISMA (β = 0.276/3.895 **) | ||||||
ITI x PTB → ISMA (β = 0.199/3.550 **) | ||||||
H4b: ITBSC → ISMA ↑ PTB | No Interaction | ITBSC → ISMA (β = 0.418/5.804 **) | 0.252 | 0.015 | 4.666 * | Supported |
PTB → ISMA (β = 0.266/3.783 **) | ||||||
Interaction | ITBSC → ISMA (β = 0.420/6.802 **) | 0.267 | ||||
PTB → ISMA (β = 0.278/3.760 **) | ||||||
ITBSC x PTB → ISMA (β = 0.201/2.667 *) | ||||||
H4a: ITPS → ISMA ↑ PTB | No Interaction | ITPS → ISMA (β = 0.426/5.672 **) | 0.210 | 0.008 | 2.332 | Not Supported |
PTB → ISMA (β = 0.230/2.798 *) | ||||||
Interaction | ITPS → ISMA (β = 0.421/5.831 **) | 0.218 | ||||
PTB → ISMA (β = 0.232/2.596 *) | ||||||
ITPS x PTB → ISMA (β = 0.187/2.585 *) |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kim, S.; Kim, B.; Seo, M. Impacts of Sustainable Information Technology Capabilities on Information Security Assimilation: The Moderating Effects of Policy—Technology Balance. Sustainability 2020, 12, 6139. https://doi.org/10.3390/su12156139
Kim S, Kim B, Seo M. Impacts of Sustainable Information Technology Capabilities on Information Security Assimilation: The Moderating Effects of Policy—Technology Balance. Sustainability. 2020; 12(15):6139. https://doi.org/10.3390/su12156139
Chicago/Turabian StyleKim, Sanghyun, Bora Kim, and Minsoo Seo. 2020. "Impacts of Sustainable Information Technology Capabilities on Information Security Assimilation: The Moderating Effects of Policy—Technology Balance" Sustainability 12, no. 15: 6139. https://doi.org/10.3390/su12156139
APA StyleKim, S., Kim, B., & Seo, M. (2020). Impacts of Sustainable Information Technology Capabilities on Information Security Assimilation: The Moderating Effects of Policy—Technology Balance. Sustainability, 12(15), 6139. https://doi.org/10.3390/su12156139