IDEAS home Printed from https://ideas.repec.org/a/spr/joinma/v23y2012i4d10.1007_s10845-010-0402-7.html
   My bibliography  Save this article

An analysis on effects of information security investments: a BSC perspective

Author

Listed:
  • Hee-Kyung Kong

    (Electronics and Telecommunications Research Institute)

  • Tae-Sung Kim

    (Chungbuk National University)

  • Jungduk Kim

    (Chung-Ang University)

Abstract

With the growing importance of information security due to the arrival of information society and the spread of the internet, information security is emerging as a tool to guarantee competitive advantage and is at the same time an indispensable requirement for stable business execution for companies and organizations. Additionally, the value of tangible and intangible assets that need to be protected as components of corporate assets are on the rise, where the importance of efficient and effective information asset management and information security investment is increasing for the organizations and companies managing them. However, despite an increase in the information security investment of an organization, there is a lack of systematic methodology pertaining to performance appraisals, which makes decision-making activities and determining means of improvement difficult. The existing financially focused information security investment is inadequate for systematic analyses and understanding due to the opportunity cost type characteristics of information security investment and the difficulty involved in presenting future strategic direction. This paper, considering the characteristics of the effects of information security investment, analyzes from a balanced score card perspective information security investment strategies and performance relationships. In short, critical success factors and key performance indicators are initially obtained from previous research related to information security investment, and the data collected through surveys at related companies and organizations are empirically analyzed utilizing the structural equation model.

Suggested Citation

  • Hee-Kyung Kong & Tae-Sung Kim & Jungduk Kim, 2012. "An analysis on effects of information security investments: a BSC perspective," Journal of Intelligent Manufacturing, Springer, vol. 23(4), pages 941-953, August.
  • Handle: RePEc:spr:joinma:v:23:y:2012:i:4:d:10.1007_s10845-010-0402-7
    DOI: 10.1007/s10845-010-0402-7
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10845-010-0402-7
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10845-010-0402-7?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Tanaka, Hideyuki & Matsuura, Kanta & Sudoh, Osamu, 2005. "Vulnerability and information security investment: An empirical analysis of e-local government in Japan," Journal of Accounting and Public Policy, Elsevier, vol. 24(1), pages 37-59.
    2. Sarv Devaraj & Ming Fan & Rajiv Kohli, 2002. "Antecedents of B2C Channel Satisfaction and Preference: Validating e-Commerce Metrics," Information Systems Research, INFORMS, vol. 13(3), pages 316-333, September.
    3. Bagozzi, Richard P & Yi, Youjae, 1991. "Multitrait-Multimethod Matrices in Consumer Research," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 17(4), pages 426-439, March.
    4. Kjell Hausken, 2006. "Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability," Information Systems Frontiers, Springer, vol. 8(5), pages 338-349, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Igor Bernik & Kaja Prislan, 2016. "Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation," PLOS ONE, Public Library of Science, vol. 11(9), pages 1-33, September.
    2. Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
    3. Berlilana & Tim Noparumpa & Athapol Ruangkanjanases & Taqwa Hariguna & Sarmini, 2021. "Organization Benefit as an Outcome of Organizational Security Adoption: The Role of Cyber Security Readiness and Technology Readiness," Sustainability, MDPI, vol. 13(24), pages 1-20, December.
    4. Xiaofei Qian & Xinbao Liu & Jun Pei & Panos M. Pardalos & Lin Liu, 2017. "A game-theoretic analysis of information security investment for multiple firms in a network," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 68(10), pages 1290-1305, October.
    5. Tejaswini C. Herath & Hemantha S. B. Herath & David Cullum, 2023. "An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks," Information Systems Frontiers, Springer, vol. 25(2), pages 681-721, April.
    6. Tahereh Hasani & Norman O’Reilly & Ali Dehghantanha & Davar Rezania & Nadège Levallet, 2023. "Evaluating the adoption of cybersecurity and its influence on organizational performance," SN Business & Economics, Springer, vol. 3(5), pages 1-38, May.
    7. Feng Xu & Xin (Robert) Luo & Hongyun Zhang & Shan Liu & Wei (Wayne) Huang, 2019. "Do Strategy and Timing in IT Security Investments Matter? An Empirical Investigation of the Alignment Effect," Information Systems Frontiers, Springer, vol. 21(5), pages 1069-1083, October.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Amitava Dutta & Rahul Roy, 2008. "Dynamics of organizational information security," System Dynamics Review, System Dynamics Society, vol. 24(3), pages 349-375, September.
    2. Levitin, Gregory & Hausken, Kjell & Taboada, Heidi A. & Coit, David W., 2012. "Data survivability vs. security in information systems," Reliability Engineering and System Safety, Elsevier, vol. 100(C), pages 19-27.
    3. Alessandro Fedele & Cristian Roner, 2022. "Dangerous games: A literature review on cybersecurity investments," Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
    4. Liao, Chun-Hsiung & Chen, Chun-Wei, 2014. "Network externality and incentive to invest in network security," Economic Modelling, Elsevier, vol. 36(C), pages 398-404.
    5. David Iliaev & Sigal Oren & Ella Segev, 2023. "A Tullock-contest-based approach for cyber security investments," Annals of Operations Research, Springer, vol. 320(1), pages 61-84, January.
    6. Yong Wu & Gengzhong Feng & Richard Y. K. Fung, 2018. "Comparison of information security decisions under different security and business environments," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 69(5), pages 747-761, May.
    7. Loic Mar'echal & Alain Mermoud & Dimitri Percia David & Mathias Humbert, 2024. "Measuring the performance of investments in information security startups: An empirical analysis by cybersecurity sectors using Crunchbase data," Papers 2402.04765, arXiv.org, revised Feb 2024.
    8. Xing Gao & Weijun Zhong, 2015. "Information security investment for competitive firms with hacker behavior and security requirements," Annals of Operations Research, Springer, vol. 235(1), pages 277-300, December.
    9. Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
    10. Jin P. Gerlach & Ronald T. Cenfetelli, 2022. "Overcoming the Single-IS Paradigm in Individual-Level IS Research," Information Systems Research, INFORMS, vol. 33(2), pages 476-488, June.
    11. repec:dgr:rugsom:04f04 is not listed on IDEAS
    12. XiaoJuan Zhang & Xiang Jinpeng & Farhan Khan, 2020. "The Influence of Social Media on Employee’s Knowledge Sharing Motivation: A Two-Factor Theory Perspective," SAGE Open, , vol. 10(3), pages 21582440209, July.
    13. Yi Sun & Shihui Li & Lingling Yu, 2022. "The dark sides of AI personal assistant: effects of service failure on user continuance intention," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(1), pages 17-39, March.
    14. Muhammad Shaukat Malik, Sabah Younus, 2019. "Determinants of Tax-Compliance Behaviour Explored by Slippery Slope Framework and Theory of Planned Behaviour: An Evidence from Small Business Owner," Journal of Management Sciences, Geist Science, Iqra University, Faculty of Business Administration, vol. 6(2), pages 33-47, October.
    15. repec:idn:jimfjn:v:4:y:2018:i:2h:p:1-14 is not listed on IDEAS
    16. Harith Yas Khudhair & Ahmad Jusoh & Abbas Mardani & Khalil Md Nor & Dalia Streimikiene, 2019. "Review of Scoping Studies on Service Quality, Customer Satisfaction and Customer Loyalty in the Airline Industry," Contemporary Economics, University of Economics and Human Sciences in Warsaw., vol. 13(4), December.
    17. Adrian S. Choo & Kevin W. Linderman & Roger G. Schroeder, 2007. "Method and Psychological Effects on Learning Behaviors and Knowledge Creation in Quality Improvement Projects," Management Science, INFORMS, vol. 53(3), pages 437-450, March.
    18. Faqih, Khaled M.S., 2016. "An empirical analysis of factors predicting the behavioral intention to adopt Internet shopping technology among non-shoppers in a developing country context: Does gender matter?," Journal of Retailing and Consumer Services, Elsevier, vol. 30(C), pages 140-164.
    19. Pietro Evangelista & Aino Kianto & Henri Hussinki & Mika Vanhala & Anna-Maija Nisula, 2023. "Knowledge-Based Human Resource Management, Logistics Capability, and Organizational Performance in Small Finnish Logistics Service Providers," Logistics, MDPI, vol. 7(1), pages 1-21, February.
    20. Rashedul Hasan & M. Kabir Hassan & Mamunur Rashid, 2018. "Cash Waqf Investment And Poverty Alleviation: Case Of Tabung Masjids In Malaysia," Journal of Islamic Monetary Economics and Finance, Bank Indonesia, vol. 4(2), pages 333-346, November.
    21. Lin, Winston T. & Chen, Yueh H. & Chou, Chia-Ching, 2021. "Assessing the business values of e-commerce and information technology separately and jointly and their impacts upon US firms' performance as measured by productive efficiency," International Journal of Production Economics, Elsevier, vol. 241(C).
    22. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:joinma:v:23:y:2012:i:4:d:10.1007_s10845-010-0402-7. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.