Access the full text.
Sign up today, get DeepDyve free for 14 days.
Kenneth Knapp, T. Marshall, R. Rainer, F. Ford (2006)
Information security: management's effect on culture and policyInf. Manag. Comput. Secur., 14
Ching-Chiao Yang, H. Wei (2013)
The effect of supply chain security management on security performance in container shipping operationsSupply Chain Management, 18
Tatsuo, Asai, José, Luís, Castillo, Pérez (2012)
Human-Related Problems in Information Security Faced by Japanese, British and American Overseas Companies Because of Cultural Differences, 11
D. Ashenden (2008)
Information Security management: A human challenge?Inf. Secur. Tech. Rep., 13
M. Siponen (2001)
Five dimensions of information security awarenessSIGCAS Comput. Soc., 31
K. Green, D. Whitten, R. Inman (2008)
The impact of logistics performance on organizational performance in a supply chain contextSupply Chain Management, 13
B. Sezen (2008)
Relative effects of design, integration and information sharing on supply chain performanceSupply Chain Management, 13
E. Schultz, R. Proctor, M. Lien, G. Salvendy (2001)
Usability and Security An Appraisal of Usability Issues in Information Security MethodsComput. Secur., 20
Kwo-Shing Hong, Y. Chi, L. Chao, Jih-Hsing Tang (2003)
An integrated system theory of information security managementInf. Manag. Comput. Secur., 11
F. Caniato, J. Rice (2003)
Building a Secure and Resilient Supply ChainSupply Chain Management Review, 7
G. Dhillon, G. Torkzadeh (2006)
Value‐focused assessment of information system security in organizationsInformation Systems Journal, 16
Kwo-Shing Hong, Y. Chi, L. Chao, Jih-Hsing Tang (2006)
An empirical study of information security policy on information security elevation in TaiwanInf. Manag. Comput. Secur., 14
D. Straub, R. Welke (1998)
Coping With Systems Risk: Security Planning Models for Management Decision MakingMIS Q., 22
Zachary Williams, Jason Lueg, Ronald Taylor, R. Cook (2009)
Why all the changesInternational Journal of Physical Distribution & Logistics Management, 39
J. Rice, F. Caniato (2003)
BUILDING A SECURE AND RESILIENT SUPPLY NETWORK.Supply Chain Management Review
R. Kalakota, Andrew Whinston (1997)
Electronic Commerce: A Manager's Guide
Maria Karyda, E. Kiountouzis, S. Kokolakis (2005)
Information systems security policies: a contextual perspectiveComput. Secur., 24
H. Fulford, N. Doherty (2003)
The application of information security policies in large UK-based organizations: an exploratory investigationInf. Manag. Comput. Secur., 11
Krag Brotby (2008)
Information Security Management Metrics
R. Drazin, A. Ven (1985)
Alternative forms of fit in contingency theory.Administrative Science Quarterly, 30
L. Tornatzky, M. Fleischer, A. Chakrabarti (1990)
processes of technological innovation
S. Chang, C. Ho (2006)
Organizational factors to the effectiveness of implementing information security managementInd. Manag. Data Syst., 106
W. Doll, T. Ragu-Nathan, Jeen-Su Lim, Y. Gupta (1995)
Research Report - A Confirmatory Factor Analysis of the User Information Satisfaction InstrumentInf. Syst. Res., 6
G. Kurien (2011)
Study of performance measurement practices in supply chain management
M. Thomson, R. Solms (1998)
Information security awareness: educating your users effectivelyInf. Manag. Comput. Secur., 6
R. Solms (1998)
Information security management (1): why information security is so importantInf. Manag. Comput. Secur., 6
Tejaswini Herath, H. Rao (2009)
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectivenessDecis. Support Syst., 47
A. Kankanhalli, H. Teo, B. Tan, K. Wei (2003)
An integrative study of information systems security effectivenessInt. J. Inf. Manag., 23
M. Dlamini, J. Eloff, M. Eloff (2009)
Information security: The moving targetComput. Secur., 28
M. Voss, J. Whipple, D. Closs (2009)
The Role of Strategic Security: Internal and External Security Measures with Security Performance ImplicationsTransportation Journal
A. Veiga, N. Martins, J. Eloff (2007)
Information security culture - validation of an assessment instrument
G. Stewart (1995)
Supply chain performance benchmarking study reveals keys to supply chain excellenceLogistics Information Management, 8
S. Solms (2000)
Information Security - The Third Wave?Comput. Secur., 19
M. Siponen (2000)
A conceptual foundation for organizational information security awarenessInf. Manag. Comput. Secur., 8
R. Solms (1996)
Information security management: The second generationComput. Secur., 15
R. Solms (2016)
Information Management & Computer Security Information security management ( 3 ) : the Code of Practice for Information Security Management ( BS 7799 )
T. Finne (1996)
The information security chain in a companyComput. Secur., 15
A. Nahm, S. Rao, Luis Solis-Galvan, T. Ragu-Nathan (2002)
The Q-Sort Method: Assessing Reliability And Construct Validity Of Questionnaire Items At A Pre-Testing StageJournal of Modern Applied Statistical Methods, 1
Robert Stern, J. Pfeffer, G. Salancik (1979)
The External Control of Organizations: A Resource Dependence Perspective.Contemporary Sociology, 8
J. Mentzer, B. Konrad (1991)
AN EFFICIENCY EFFECTIVENESS APPROACH TO LOGISTICS PERFORMANCE ANALYSISJournal of Business Logistics
A. Veiga, J. Eloff (2010)
A framework and assessment instrument for information security cultureComput. Secur., 29
日本規格協会 (2002)
情報セキュリティマネジメントシステム : 仕様及び利用の手引 : 英国規格 : BS7799-2:2002 = Information security management systems : specification with guidance for use : british standards : BS 7799-2:2002
Marie Wright (1999)
Third generation risk management practicesComputer Fraud & Security, 1999
J. Hair (1972)
Multivariate data analysisInternational Statistical Review, 40
A. Gunasekaran, C. Patel, R. McGaughey (2004)
A framework for supply chain performance measurementInternational Journal of Production Economics, 87
S. Kraemer, P. Carayon (2007)
Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists.Applied ergonomics, 38 2
Suhong Li, S. Rao, T. Ragu-Nathan, Bhanu Ragu-Nathan (2005)
Development and validation of a measurement instrument for studying supply chain management practicesJournal of Operations Management, 23
Y. Sheffi (2001)
Supply Chain Management Under The Threat Of International TerrorismThe International Journal of Logistics Management, 12
Pauline Ratnasingham, Kuldeep Kumar (2000)
Trading partner trust in electronic commerce participation
R. Sarathy (2006)
Security and the Global Supply ChainTransportation Journal
F. Tan, M. Hunter (2002)
The Repertory Grid Technique: A Method for the Study of Cognition in Information SystemsMIS Q., 26
Honggeng Zhou, W. Benton (2007)
Supply chain practice and information sharingJournal of Operations Management, 25
Chad Autry, L. Bobbitt (2008)
Supply chain security orientation: conceptual development and a proposed frameworkThe International Journal of Logistics Management, 19
G. Dhillon (2001)
Violation of Safeguards by Trusted Personnel and Understanding Related Information Security ConcernsComput. Secur., 20
G. Dhillon, J. Backhouse (2001)
Current directions in IS security research: towards socio‐organizational perspectivesInformation Systems Journal, 11
Randall Reid, Stephen Floyd (2001)
Refereed Extending the Risk Analysis Model to Include Market-InsuranceComputers & Security, 20
J. Hagen, E. Albrechtsen, J. Hovden (2008)
Implementation and effectiveness of organizational information security measuresInf. Manag. Comput. Secur., 16
M. Siponen, H. Oinas-Kukkonen (2007)
A review of information security issues and respective research contributionsData Base, 38
Andrew Kotulic, J. Clark (2004)
Why there aren't more information security research studiesInf. Manag., 41
D. Russell, John Saldanha (2003)
Five tenets of security-aware logistics and supply chain operationTransportation Journal, 42
Ming‐Miin Yu, Shih-Chan Ting, Mu-Chen Chen (2010)
Evaluating the cross-efficiency of information sharing in supply chainsExpert Syst. Appl., 37
A. Malhotra, S. Gosain, O. Sawy (2005)
Absorptive Capacity Configurations in Supply Chains: Gearing for Partner-Enabled Market Knowledge CreationMIS Q., 29
Burcu Bulgurcu, H. Cavusoglu, I. Benbasat (2010)
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security AwarenessMIS Q., 34
Rick Lehtinen, Deborah Russell, G. Gangemi (2006)
Computer Security Basics
P. Fiala (2005)
Information sharing in supply chainsOmega-international Journal of Management Science, 33
R. Narasimhan, J. Jayaram (1998)
Causal Linkages in Supply Chain Management: An Exploratory Study of North American Manufacturing FirmsDecision Sciences, 29
Mukul Gupta, A. Chaturvedi, S. Mehta, L. Valeri (2000)
The experimental analysis of information security management issues for online financial services
E. Kritzinger, E. Smith (2008)
Information security management: An information security retrieval and awareness model for industryComput. Secur., 27
S. Nadler, J. Kros (2008)
AN INTRODUCTION TO SARBANES-OXLEY AND ITS IMPACT ON SUPPLY CHAIN MANAGEMENTJournal of Business Logistics, 29
Ken Guo, Yufei Yuan, N. Archer, C. Connelly (2011)
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior ModelJournal of Management Information Systems, 28
Qingxiong Ma, Allen Johnston, J. Pearson (2008)
Information security management objectives and practices: a parsimonious frameworkInf. Manag. Comput. Secur., 16
Geoffrey Mills, Peter Airasian (1995)
Educational Research: Competencies for Analysis and Application
M. Sambasivan, T. Nandan, Z. Mohamed (2009)
Consolidation of performance measures in a supply chain environmentJ. Enterp. Inf. Manag., 22
Charlie Chen, B. Medlin, R. Shaw (2008)
A cross-cultural investigation of situational information security awareness programsInf. Manag. Comput. Secur., 16
R. Werlinger, K. Hawkey, K. Beznosov (2009)
An integrated view of human, organizational, and technological challenges of IT security managementInf. Manag. Comput. Secur., 17
G. Dhillon (2006)
Principles of information systems security - text and cases
S. Chang, Chin-Shien Lin (2007)
Exploring organizational culture for information security managementInd. Manag. Data Syst., 107
S. Lee, F. Luthans, D. Olson (1982)
A management science approach to contingency models of organizational structure.Academy of Management journal. Academy of Management, 25 3
Jacob Cohen (1960)
A Coefficient of Agreement for Nominal ScalesEducational and Psychological Measurement, 20
Purpose – The purpose of this empirical research is to attempt to explore the effect of information security initiatives (ISI) on supply chain performance, considering various intra- and inter-organization information security aspects that are deemed to have an influence on supply chain operations and performance. Design/methodology/approach – Based on extant information security management and supply chain security management literature, a conceptual model was developed and validated. A questionnaire survey instrument was developed and administered among supply chain managers to collect data. Data were collected from 197 organizations belonging to various sectors. The study used exploratory and confirmatory factor analysis for data analysis. Further, to test the hypotheses and to fit the theoretical model, structural equation modeling techniques were used. Findings – Results of this study indicate that ISI, comprising technical, formal and informal security aspects in an intra- and inter-organizational environment, are positively associated with supply chain operations, which, in turn, positively affects supply chain performance. Research limitations/implications – This study provides the foundation for future research in the management of information security in supply chains. Findings are expected to provide the communities of practice with better information security decision-making in a supply chain context, by clearly formulating technical, formal and informal information security policies for improving supply chain performance. Originality/value – In today’s global supply chain environment where competition prevails among supply chains, this research is relevant in terms of capability that an organization has to acquire for managing internal and external information security. In that sense, this study contributes to the body of knowledge with an empirical analysis of organizations’ information security management initiatives as a blend of technical, formal and informal security aspects.
Information Management & Computer Security – Emerald Publishing
Published: Nov 10, 2014
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.