Information Security Program Effectiveness in Organizations: The Moderating Role of Task Interdependence

نویسندگان

  • Kenneth J. Knapp
  • Claudia J. Ferrante
چکیده

This research investigates the moderating role of task interdependence on factors influencing information security effectiveness in organizations. Drawing on the literature, the authors develop a theoretical model depicting top management support and awareness & training support as predictors of information security program effectiveness. Further, the model shows security culture as a partial mediator between the predictor and criterion variables. The authors then apply task interdependence as a moderator to the model. Results from a survey given to a sample of 371 certified information security professionals find support for the model while showing certain paths to be significant only under high task interdependence while others only under low task interdependence. In high task interdependence environments, security culture did not mediate the relationships between the predictor and criterion variables suggesting that managers focus on providing greater structural support to maximize security effectiveness. However, in low task interdependence, security culture fully mediated the relationships between the predictor and criterion variables suggesting that the role of culture is amplified and central in those environments.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Team Goal Commitment and Team Effectiveness: The Role of Task Interdependence and Supportive Behaviors

The objectives of this study were to test the relationships between team goal commitment and 3 criteria of team effectiveness (i.e., team performance, quality of group experience, and team viability) as well as to examine the moderating effect of task interdependence and the mediating role of supportive behaviors. Data were gathered from a sample of 74 teams working in 13 Canadian organizations...

متن کامل

Trust and knowledge sharing in diverse global virtual teams

Global virtual teams (GVTs) allow organizations to improve productivity, procure global knowledge, and transfer best practice information instantaneously among team members. GVTs rely heavily on IT and have little face-to-face interaction, thereby increasing problems resulting from geographic barriers, time language, and cultural differences, and inter-personal relationships. The purpose of our...

متن کامل

Exploring the effects of trust, task interdependence and virtualness on knowledge sharing in teams

The sharing of knowledge within teams is critical to team functioning. However, working with team members who are in different locations (i.e. in virtual teams) may introduce communication challenges and reduce opportunities for rich interactions, potentially affecting knowledge sharing and its outcomes. Therefore, using questionnaire-based data, this study examined the potential effects of dif...

متن کامل

شناسایی و رتبه‌بندی عوامل کلیدی مؤثر بر اثربخشی سیستم‌های اطلاعاتی در سازمان‌های دولتی

Nowadays, information systems organizations can help in gaining competitive advantage, because the quality of the output of these systems play an important role in improving the performance of the organization. The main objective of this study is Identification and ranking of key factors influencing the effectiveness of information systems in State-Owned Organizations. For this purpose, the rol...

متن کامل

Organisational Security Culture and Information Security Compliance for E-Government Development: The Moderating Effect of Social Pressure

Rapid development of e-government has exposed critical public information to the possibility of cybercrime. Information security has become a critical issue that needs to be adequately addressed in egovernment development. This paper develops an information security compliance model by drawing insights from organizational and institutional theory literature to examine how organizational securit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JOEUC

دوره 26  شماره 

صفحات  -

تاریخ انتشار 2014