UNT Libraries - 4 Matching Results

Search Results

Defining the Information Security Posture: An Empirical Examination of Structure, Integration, and Managerial Effectiveness

Description: The discipline of information security management is still in its infancy as evidenced by the lack of empirical scholarly work in this area. Most research within the information security domain focuses on specific technologies and algorithms and how it impacts the principles of confidentiality, integrity, and availability. But, an important area receiving little attention is the antecedents of effective information security management at the organizational level (Stanton, Guzman, Stam & Caldera, 2003). The little empirical research that has been conducted in this area has shown that information security management in many organizations is poor (Baskerville, 1993; Shimeall & McDermott, 1999). Several researchers have identified the need for methods to measure the organization-wide information security posture of organizations (Eloff & Von Solms, 2000; James, 1996). This dissertation attempts to measure the organization-wide information security posture by examining benchmark variables that assess role, planning orientation, and performance structure within the organization. Through this conceptualization of an organization's information security posture, a means is presented to measure overall information security and how it impacts the effective utilization of information security strategies. The presence of the dependent variable, effectiveness, gives academics and practitioners a success measure which can guide more effective decision making in the information security domain. An additional aim of this dissertation is to empirically examine the influence of management practices and decisions on effective use of information security strategies within the organization. The issues of centralization versus decentralization of information security activities will be evaluated along with its impact on information security posture of organizations and the effectiveness of the organization's information security strategies. Data was collected from 119 IT and information security executives. Results show that how the organization structures information security activities is not correlated with more effective utilization of information security strategies. Meanwhile, the organization's information security posture ...
Date: August 2008
Creator: Young, Randall Frederick

Information systems success and technology acceptance within a government organization.

Description: Numerous models of IS success and technology acceptance their extensions have been proposed and applied in empirical. This study continues this tradition and extends the body of knowledge on the topic of IS success by developing a more comprehensive model for measuring IS success and technology acceptance within a government organization. The proposed model builds upon three established IS success and technology acceptance frameworks namely the DeLone and McLean (2003), Venkatesh et al.'s (2003) unified theory of acceptance and use of technology (UTAUT), and Wixom and Todd (2005). The findings from this study provide not only a comprehensive IS success assessment model but also insights into whether and how IS success models are influenced by application variables as applied within a government organization. Exploratory factor analysis and confirmatory factor analysis were performed for instrument refinement and validity test of the existing and proposed models. Using data from employees of a local government municipal, the comprehensive model explained 32 percent variance. Four of the hypothesis were fully supported five were not supported, and four were partially supported. In addition, the results suggest that behavioral intention may not be the best predictor of technology acceptance in a mandatory environment.
Date: August 2008
Creator: Thomas, Patricia

IT Offshoring Success: A Social Exchange Perspective

Description: Spending by U.S. companies in offshore IT services continues at unprecedented levels despite a high failure rate. This study fills a gap in the existing literature by examining the client-vendor offshoring relationship through the theoretical lens of social exchange theory at the organizational level of analysis from the client's perspective. Social exchange theory focuses on the exchange of activities between two parties, whether they are individuals or companies and was used as a basis for examining the client and vendor relationship. Variables were identified by a review of the literature primarily from IT outsourcing and offshoring but also from general IT, marketing, sociology and organizational science literature. Data was collected using a field survey of Fortune 500 CIOs representing a population of organizations at the forefront of the offshoring phenomenon. The survey instrument was developed based on the adaptation of previously validated scales. Hypotheses regarding the correlations between social variables such as trust, communication, dependence, power, shared values and offshoring success were tested using Spearman's rho correlation. Seven of the hypotheses were supported, four hypotheses were not supported and one hypothesis was deemed not testable due to lack of information.
Date: August 2008
Creator: St. John, Jeremy

Organizational factors contributing to an effective information technology intelligence system.

Description: The purpose of this dissertation is to investigate the organizational factors that contribute to effective emerging information technology intelligence processes and products. Emerging information technology is defined as a technology which is little commercialized and is currently adopted by not more than twenty percent of the companies within a given industry. By definition, information technology intelligence is a subdivision of competitive intelligence and business intelligence. I discovered evidence that the information technology intelligence process includes assessment of information technology intelligence needs of consumers, collection of data from internal and external sources, analysis of the collected data and distribution of the analyzed data to the consumers. Exploratory factor analysis confirmed the existence of all the variables in the proposed research model. I found empirical evidence that the final technology intelligence product contributes to better decisions made by consumers, their better environmental scanning, and more funding to information technology departments in organizations from different industries and of different sizes.
Date: December 2008
Creator: Taskov, Konstantin