Match!

Perceived significance of information security governance to predict the information security service quality in software service industry

Published on Mar 4, 2014in Information Management & Computer Security
· DOI :10.1108/IMCS-01-2013-0002
Sanjay Bahl2
Estimated H-index: 2
(Indian Institute of Foreign Trade),
O. P. Wali3
Estimated H-index: 3
Abstract
Purpose – Information security is a growing concern in society, across businesses and government. As the offshore IT services market continues to grow providing numerous benefits, there are also perceived risks with respect to the quality of information security delivered in the supply chain. This paper aims to examine, as a case, the perceptions of Indian software services provider (service provider) employees with respect to information security governance and its impact on information security service quality that is delivered to customers. Design/methodology/approach – The paper provides a framework built upon the existing dimensions and instruments for total quality management and service quality, suitably modified to reflect the context of information security. SmartPLS, a structural equation modelling technique, has been used to analyse field survey data collected from across various Indian cities and companies. Findings – Significant finding is that information security governance in an IT outsour...
  • References (56)
  • Citations (3)
📖 Papers frequently viewed together
2 Citations
2011
5 Citations
78% of Scinapse members use related papers. After signing in, all features are FREE.
References56
Newest
#1Joseph F. Hair (KSU: Kennesaw State University)H-Index: 51
#2Christian M. Ringle (UTS: University of Technology, Sydney)H-Index: 53
Last. Marko Sarstedt (LMU: Ludwig Maximilian University of Munich)H-Index: 51
view all 3 authors...
Structural equation modeling (SEM) has become a quasi-standard in marketing and management research when it comes to analyzing the cause-effect relations between latent constructs. For most researchers, SEM is equivalent to carrying out covariance-based SEM (CB-SEM). While marketing researchers have a basic understanding of CB-SEM, most of them are only barely familiar with the other useful approach to SEM-partial least squares SEM (PLS-SEM). The current paper reviews PLS-SEM and its algorithm, ...
3,980 CitationsSource
Few enterprise operational areas present as much inherent risk or prove as difficult to govern as Information Technology (“IT”). To be successful, IT governance requires enterprise commitment at the very top. Boards and executive management need to extend governance, already exercised over the enterprise, to IT by way of an effective IT governance framework that addresses strategic alignment, performance measurement, risk management, value delivery, and resource management. IT governance is an i...
2 Citations
#1Michael Höck (Freiberg University of Mining and Technology)H-Index: 4
#2Christian M. Ringle (UTS: University of Technology, Sydney)H-Index: 53
This paper explores long-term partnership benefits of local strategic alliances in knowledge-intensive industries. A structural model of the value continuum is formulated and tested on small and mid-size enterprises in the software industry. Partial least squares path analysis is used to investigate the cause?effect relationships between the foundation values – efficiency and effectiveness – and the innovation value. The results show that the innovation value of localised inter-firm networks ori...
19 CitationsSource
Abstract The study takes into consideration the problem of organizational quality gaps where the quality losses occur. Many service quality gaps are reviewed in this paper. But the four out of five quality gaps by Parasuraman et al. (1985) are examined. The main management problem, according to research achievements, is the gap between managers’ perception of customers’ expectation and service specifications existing in organizations. In a service organization usually more quality gaps might be ...
33 CitationsSource
#1Jörg Henseler (NOVA: Universidade Nova de Lisboa)H-Index: 37
#2Christian M. Ringle (University of Newcastle)H-Index: 53
Last. Rudolf R. SinkovicsH-Index: 35
view all 3 authors...
In order to determine the status quo of PLS path modeling in international marketing research, we conducted an exhaustive literature review. An evaluation of double-blind reviewed journals through important academic publishing databases (e.g., ABI/Inform, Elsevier ScienceDirect, Emerald Insight, Google Scholar, PsycINFO, Swetswise) revealed that more than 30 academic articles in the domain of international marketing (in a broad sense) used PLS path modeling as means of statistical analysis. We a...
3,121 CitationsSource
#1Christos B. Fotopoulos (UoI: University of Ioannina)H-Index: 1
#2Evangelos Psomas (UoI: University of Ioannina)H-Index: 22
Purpose – The purpose of this paper is to explore the relationships between “soft” and “hard” TQM elements and quality management results.Design/methodology/approach – Empirical data were drawn from 370 Greek companies using the questionnaire method. Confirmatory Factor Analysis was used to examine constructs' reliability and validity, while the relationships between them were examined through Structural Equation Modelling.Findings – The study proved that quality improvement and the consolidatio...
221 CitationsSource
#1J. Carlos Bou-Llusar (James I University)H-Index: 4
#2Ana B. Escrig-Tena (James I University)H-Index: 15
Last. Inmaculada Beltrán-Martín (James I University)H-Index: 14
view all 4 authors...
Total quality management (TQM) is an approach to management embracing both social and technical dimensions aimed at achieving excellent results, which needs to be put into practice through a specific framework. Nowadays, quality award models, such as the Malcolm Baldrige National Quality Award (MBNQA) and the European Foundation for Quality Management (EFQM) Excellence Model, are used as a guide to TQM implementation by a large number of organizations. Nevertheless, there is a paucity of empiric...
360 CitationsSource
38 Citations
#1Syaripah Ruzaini Syed Aris (UiTM: Universiti Teknologi MARA)H-Index: 5
#2Noor Habibah Arshad (UiTM: Universiti Teknologi MARA)H-Index: 10
Last. Azlinah Mohamed (UiTM: Universiti Teknologi MARA)H-Index: 17
view all 3 authors...
Outsourcing is becoming a trend nowadays. Malaysia also takes this opportunity and embraces in IT outsourcing. As a result, Malaysia has been ranked as the third most attractive destination for outsourcing after India and China. Despite increasing number of organizations that involve in IT outsourcing, it should be noted that IT outsourcing is not a panacea. It comes together with risks. The risks, if not managed, will lead to outsourcing failure. Even though other areas have adopted risk manage...
18 Citations
#1Mahesh S. Raisinghani (Texas Woman's University)H-Index: 14
#2Brandi Starr (Texas Woman's University)H-Index: 1
Last. Michael Howard (Texas Woman's University)H-Index: 1
view all 5 authors...
The operation of information technology and information systems (IT/IS) offshore outsourcing is being increasingly practiced among firms that are focusing on core competencies and cost effectiveness. With the increase in offshore IT/IS operations, a growing number of companies are encountering negative experiences and unpredicted results. The analysis performed in this article reveals the possible risks and perceived success factors of companies outsourcing IT/IS operations offshore. The major p...
10 CitationsSource
Cited By3
Newest
#1William LIdsterH-Index: 1
#2Shawon S. M. Rahman (UH Hilo: University of Hawaii at Hilo)H-Index: 3
Information security leadership has struggled for almost two decades to demonstrate that investment in information security capabilities would return a tangible value to the organization. The efforts to govern and manage security have not resulted in the value statement that has been desired. A critical look at literature reveals that the struggles with governance can be consolidated into three main topics: practitioners do not have guidance on how to implement security governance; security gove...
1 CitationsSource
#1M.R. Fazlida (UiTM: Universiti Teknologi MARA)H-Index: 1
#2Jamaliah Said (UiTM: Universiti Teknologi MARA)H-Index: 9
Abstract The growing emergence of information security threat call for information security to be integrate in the organization's corporate governance and been treat as high important as other critical corporate governance area by Boards and executive management. This paper provides an overview of information security risk, governance and implementation setback. Review shows that Information Security can complement IT Governance (ITG), in term of assurance on the confidentiality, integrity, and ...
7 CitationsSource
#2Jing GaoH-Index: 11
This paper explores the modified information management and information governance challenges faced by organizations when shifting from traditional on-site model to the cloud. The specific cloud information management and governance challenges, often ignored by businesses due to their experience in traditional information governance and outsourcing, have the potential to threaten the sustainability of a business that is new to the cloud. As cloud solutions from powerful vendors are being thrust ...