Empirical analysis on Information Management Performance Impact of Information Security activities

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Impact of Information Security Breaches on Financial Performance of the Breached Firms: an Empirical Investigation

This study investigates the impact of information security breaches on firm performance. Unlike previous studies that used an event study methodology, we used a matched-sample comparison analysis to investigate the impact of security breaches on firm performance. To investigate this impact, we considered subsequent four quarters following the security breach and determine if the breached firms’...

متن کامل

Impact of information security initiatives on supply chain performance: An empirical investigation

Purpose: Study aims to: 1. Develop a comprehensive framework for the effective application of information security encompassing the internal and external technical environment, formal and informal management, and includes several aspects from an organizational perspective and between organizations in the context of the supply chain. 2. Exploring the potential outcomes and outcomes of the effect...

متن کامل

The Impact of Accounting Information System on User Satisfaction: Empirical Studies on Local Government Bank

This study aims at investigating the factors that affect a user’s satisfaction of accounting information systems based on the quality and the perceived usefulness of such systems, and the quality of data involved. The paper analyses the given factors on data collected from Bank Sumut,  Indonesia. In addition, this research also aims to find out whether the influence of perceived ease of use can...

متن کامل

Impact of Information Technology (IT) Security Information Sharing among Competing IT Firms on Firm's Financial Performance: An Empirical Investigation

Traditionally, IT firms closely guard the management and control of critical information assets. A group of IT firms, however, adopted a different approach and formed an organization with the goal of sharing critical IT security information with industry peers (firms in the same industry that do not directly compete) and competitors to more effectively manage IT security. The inherent vulnerabi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Korea Safety Management and Science

سال: 2015

ISSN: 1229-6783

DOI: 10.12812/ksms.2015.17.3.205