Managerial information security awareness' impact on an organization's information security performance

Namjoo Choi, Dan J. Kim, Jayhun Goo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

The primary goal of this study is to examine the relationship between managerial information security awareness and managerial actions toward information security for the purpose of putting stress on the significant roles of managerial information security awareness in an organization's total information security performance. Under the assumption that managerial actions toward information security has a positive impact on changes in the content of strategies and organizational outcomes in turn, the research supports the following: higher managerial information security awareness leads to more managerial actions toward information security and ultimately more efficient organization performance regarding information security.

Original languageEnglish
Title of host publicationAssociation for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006
Pages915-931
Number of pages17
StatePublished - 2006
Event12th Americas Conference on Information Systems, AMCIS 2006 - Acapulco, Mexico
Duration: Aug 4 2006Aug 6 2006

Publication series

NameAssociation for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006
Volume6

Conference

Conference12th Americas Conference on Information Systems, AMCIS 2006
Country/TerritoryMexico
CityAcapulco
Period8/4/068/6/06

Keywords

  • Information security awareness (ISA)
  • Managerial actions toward information security (MATIS)
  • Managerial information security awareness (MISA)

ASJC Scopus subject areas

  • Computer Science Applications
  • Computer Networks and Communications
  • Library and Information Sciences
  • Information Systems

Fingerprint

Dive into the research topics of 'Managerial information security awareness' impact on an organization's information security performance'. Together they form a unique fingerprint.

Cite this