IS

Hsu, Carol

Topic Weight Topic Terms
0.161 model research data results study using theoretical influence findings theory support implications test collected tested
0.138 institutional pressures logic theory normative embedded context incumbent contexts forces inertia institutionalized environment pressure identify
0.130 technology organizational information organizations organization new work perspective innovation processes used technological understanding technologies transformation

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Lee, Jae-Nam 1 Straub, Detmar W. 1
administrative innovation 1 adoption and assimilation 1 economic 1 information security management 1
institutional theories 1 IT capability factors 1 organizational 1

Articles (1)

Institutional Influences on Information Systems Security Innovations. (Information Systems Research, 2012)
Authors: Abstract:
    This research investigates information security management as an administrative innovation. Although a number of institutional theories deal with information systems (IS) innovation in organizations, most of these institutional-centered frameworks overlook external economic efficiency and internal organizational capability in the presence of pressures of institutional conformity. Using Korea as the institutional setting, our research model posits that economic-based consideration will moderate the institutional conformity pressure on information security adoption while organization capability will influence the institutional confirmation of information security assimilation. The model is empirically tested using two-stage survey data from a field study of 140 organizations in Korea. The results indicate that in addition to institutional influences, our six proposed economic-based and organizational capability moderating variables all have significant influences on the degree of the adoption and assimilation of information security management. We conclude with implications for research in the area of organizational theory and the information security management literature, and for practices regarding how managers can factor into their information security planning the key implementation variables discovered in this study. The robust setting of the study in Korean firms allows us to generalize the theory to a new context and across cultures.