IDEAS home Printed from https://ideas.repec.org/a/gam/jsusta/v8y2016i7p638-d73465.html
   My bibliography  Save this article

Leadership of Information Security Manager on the Effectiveness of Information Systems Security for Secure Sustainable Computing

Author

Listed:
  • Myeonggil Choi

    (Department of Business Administration, Chung-Ang University, 84 Heukseok-ro, Dongjak-gu, Seoul 06974, Korea)

Abstract

Information security has been predicted as a barrier for future sustainable computing. Regarding information security of secure sustainable computing, the role of information security managers has received attention. In particular, transformational leadership by information security managers should be stressed for persuading, directing, and controlling management and employees. This study shows that the transformational leadership (in forms such as idealized influence, individualized consideration, and inspirational motivation) of information security managers can improve the effectiveness of information security. The enforcement and relevance of information security policies could be mediating effects on the effectiveness of information security. This study collects data from governmental and public institutions in Korea. This study suggests the need for leadership education programs, and indicates that job training for information security managers should be conducted regularly.

Suggested Citation

  • Myeonggil Choi, 2016. "Leadership of Information Security Manager on the Effectiveness of Information Systems Security for Secure Sustainable Computing," Sustainability, MDPI, vol. 8(7), pages 1-21, July.
  • Handle: RePEc:gam:jsusta:v:8:y:2016:i:7:p:638-:d:73465
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2071-1050/8/7/638/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2071-1050/8/7/638/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Kenneth J. Knapp & Thomas E. Marshall & R. Kelly Rainer Jr. & F. Nelson Ford, 2007. "Information Security Effectiveness: Conceptualization and Validation of a Theory," International Journal of Information Security and Privacy (IJISP), IGI Global, vol. 1(2), pages 37-60, April.
    2. Myeonggil Choi & Changhan Lee, 2015. "Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations," Sustainability, MDPI, vol. 7(9), pages 1-20, August.
    3. Jeffrey D. Wall & Prashant Palvia & Paul Benjamin Lowry, 2013. "Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy," Journal of Information Privacy and Security, Taylor & Francis Journals, vol. 9(4), pages 52-79, October.
    4. Detmar W. Straub, 1990. "Effective IS Security: An Empirical Study," Information Systems Research, INFORMS, vol. 1(3), pages 255-276, September.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Shiann Ming Wu & Tsung-chun Chen & Yenchun Jim Wu & Miltiadis Lytras, 2018. "Smart Cities in Taiwan: A Perspective on Big Data Applications," Sustainability, MDPI, vol. 10(1), pages 1-14, January.
    2. Jong Hyuk Park, 2019. "Advanced IT-Based Future Sustainable Computing (2017–2018)," Sustainability, MDPI, vol. 11(8), pages 1-6, April.
    3. Moon, Yun Ji & Choi, Myeonggil & Armstrong, Deborah J., 2018. "The impact of relational leadership and social alignment on information security system effectiveness in Korean governmental organizations," International Journal of Information Management, Elsevier, vol. 40(C), pages 54-66.
    4. Saqib Saeed, 2023. "Education, Online Presence and Cybersecurity Implications: A Study of Information Security Practices of Computing Students in Saudi Arabia," Sustainability, MDPI, vol. 15(12), pages 1-15, June.
    5. Amanda M. Y. Chu & Mike K. P. So, 2020. "Organizational Information Security Management for Sustainable Information Systems: An Unethical Employee Information Security Behavior Perspective," Sustainability, MDPI, vol. 12(8), pages 1-25, April.
    6. Jong Hyuk Park & Han-Chieh Chao, 2017. "Advanced IT-Based Future Sustainable Computing," Sustainability, MDPI, vol. 9(5), pages 1-4, May.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Jack Shih-Chieh Hsu & Sheng-Pao Shih & Yu Wen Hung & Paul Benjamin Lowry, 2015. "The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness," Information Systems Research, INFORMS, vol. 26(2), pages 282-300, June.
    2. Jeffrey D. Wall & Prashant Palvia & John D’Arcy, 2022. "Theorizing the Behavioral Effects of Control Complementarity in Security Control Portfolios," Information Systems Frontiers, Springer, vol. 24(2), pages 637-658, April.
    3. Moon, Yun Ji & Choi, Myeonggil & Armstrong, Deborah J., 2018. "The impact of relational leadership and social alignment on information security system effectiveness in Korean governmental organizations," International Journal of Information Management, Elsevier, vol. 40(C), pages 54-66.
    4. Amanda M. Y. Chu & Mike K. P. So, 2020. "Organizational Information Security Management for Sustainable Information Systems: An Unethical Employee Information Security Behavior Perspective," Sustainability, MDPI, vol. 12(8), pages 1-25, April.
    5. Myeonggil Choi & Jungwoo Lee & Kumju Hwang, 2018. "Information Systems Security (ISS) of E-Government for Sustainability: A Dual Path Model of ISS Influenced by Institutional Isomorphism," Sustainability, MDPI, vol. 10(5), pages 1-25, May.
    6. Kumju Hwang & Hyemi Um, 2021. "Social Controls and Bonds of Public Information Consumer on Sustainable Utilization and Provision for Computing," Sustainability, MDPI, vol. 13(9), pages 1-20, May.
    7. Francesco Bogliacino & Rafael Charris & Camilo Gómez & Felipe Montealegre & Cristiano Codagnone, 2021. "Expert endorsement and the legitimacy of public policy. Evidence from Covid19 mitigation strategies," Journal of Risk Research, Taylor & Francis Journals, vol. 24(3-4), pages 394-415, April.
    8. V. S. Prakash Attili & Saji K. Mathew & Vijayan Sugumaran, 2022. "Information Privacy Assimilation in IT Organizations," Information Systems Frontiers, Springer, vol. 24(5), pages 1497-1513, October.
    9. A. J. Burns & Clay Posey & James F. Courtney & Tom L. Roberts & Prabhashi Nanayakkara, 2017. "Organizational information security as a complex adaptive system: insights from three agent-based models," Information Systems Frontiers, Springer, vol. 19(3), pages 509-524, June.
    10. Silva, Leiser & Hsu, Carol & Backhouse, James & McDonnell, Aidan, 2016. "Resistance and power in a security certification scheme: the case of c:cure," LSE Research Online Documents on Economics 68348, London School of Economics and Political Science, LSE Library.
    11. Sumantra Sarkar & Anthony Vance & Balasubramaniam Ramesh & Menelaos Demestihas & Daniel Thomas Wu, 2020. "The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context," Information Systems Research, INFORMS, vol. 31(4), pages 1240-1259, December.
    12. Debabrata Dey & Abhijeet Ghoshal & Atanu Lahiri, 2022. "Circumventing Circumvention: An Economic Analysis of the Role of Education and Enforcement," Management Science, INFORMS, vol. 68(4), pages 2914-2931, April.
    13. Mengmeng Song & Joseph Ugrin & Man Li & Jinnan Wu & Shanshan Guo & Wenpei Zhang, 2021. "Do Deterrence Mechanisms Reduce Cyberloafing When It Is an Observed Workplace Norm? A Moderated Mediation Model," IJERPH, MDPI, vol. 18(13), pages 1-16, June.
    14. A. J. Burns & Clay Posey & James F. Courtney & Tom L. Roberts & Prabhashi Nanayakkara, 0. "Organizational information security as a complex adaptive system: insights from three agent-based models," Information Systems Frontiers, Springer, vol. 0, pages 1-16.
    15. Liangpeng Gao & Yanjie Ji & Xingchen Yan & Yao Fan & Weihong Guo, 2021. "Incentive measures to avoid the illegal parking of dockless shared bikes: the relationships among incentive forms, intensity and policy compliance," Transportation, Springer, vol. 48(2), pages 1033-1060, April.
    16. A. J. Burns & Tom L. Roberts & Clay Posey & Paul Benjamin Lowry & Bryan Fuller, 2023. "Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse," Information Systems Research, INFORMS, vol. 34(1), pages 342-362, March.
    17. Willison , Robert, 2006. "Understanding the Perpetration of Employee Computer Crime in the Organisational Context," Working Papers 2006-4, Copenhagen Business School, Department of Informatics.
    18. Martin Eling & Michael McShane & Trung Nguyen, 2021. "Cyber risk management: History and future research directions," Risk Management and Insurance Review, American Risk and Insurance Association, vol. 24(1), pages 93-125, March.
    19. Eun Hee Park & Jongwoo Kim & Lynn Wiles, 2023. "The role of collectivism and moderating effect of IT proficiency on intention to disclose protected health information," Information Technology and Management, Springer, vol. 24(2), pages 177-193, June.
    20. Brice Corgnet & Roberto Hernán-González & Matthew W. McCarter, 2015. "The Role of the Decision-Making Regime on Cooperation in a Workgroup Social Dilemma: An Examination of Cyberloafing," Games, MDPI, vol. 6(4), pages 1-16, November.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jsusta:v:8:y:2016:i:7:p:638-:d:73465. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.