DOI QR코드

DOI QR Code

A Study on Critical Success Factors for Enterprise Security Collaboration

전사적 보안협업을 위한 핵심성공요인에 관한 연구

  • Do, Jung-Min (Dept. of Business Administration, The Graduate School of Chung-Ang Univ.) ;
  • Kim, Jungduk (Dept. of Industrial Security, The College of Business & Economics of Chung Ang Univ.)
  • Received : 2014.08.04
  • Accepted : 2014.10.20
  • Published : 2014.10.28

Abstract

Although the requirement of enterprise security implementation has been raised, a few research on security collaboration, which is one of the methods for enterprise security has been performed. This paper approached information security from the collaboration-centric perspective and propose critical success factors for security collaboration. In this study, a model of security collaboration, which includes coordination and cooperation activities was devised. Based on the previous research on organizational collaboration literature, the eight success factors for collaboration were deduced and examined the significance of the eight factors using the PLS-SEM statistical method with data of 106 samples who are security and IT professionals who have worked for more than 7 years. The result of the hypothesis test supported that trust, expertise motivation, collaboration performance criteria, top manager support and collaboration tools are the prominent factors of security collaboration.

전사적 보안을 위한 요구사항은 점차 커지고 있는 반면, 이를 구현하기 위한 수단 중 하나인 보안협업에 대한 연구는 매우 미흡하다. 따라서 본 논문은 보안협업에 대한 개념 정립을 통해 보안협업의 유형을 분석하고, 효과적 보안협업 수행을 위한 핵심 성공요인들을 파악하고자 한다. 이를 위해 조직관리 분야에서의 기존 연구를 조사 분석하여 보안협업 모델을 정립하였고, 협업에 영향을 미치는 요인 및 보안특성을 반영하여 협업 인력, 협업 프로세스, 협업 환경 등 세 영역에서 여덟 개의 변수를 도출하였다. 본 연구는 경력 3년 이상 보안 및 IT 전문가 106명의 데이터를 수집, PLS-SEM를 사용하여 검증을 하였다. 본 연구의 결과로는 협업 구성원의 신뢰성, 전문성, 참여 동기와 협업 성과기준, 최고경영자의 의지, 협업지원도구 등이 보안협업에 영향을 미치는 요인으로 나타났다.

Keywords

References

  1. T.M. Amabile et al, '"Academic-practitioner collaboration in management research: A case of cross-profession collaboration," Academy of Management Journal, vol. 44, no. 2, pp. 418-431, Apr 2001. https://doi.org/10.2307/3069464
  2. R.P. Bagozzi and Y. Yi, '"On the evaluation of structural equation models," Journal of the academy of marketing science, vol. 16, no. 1, pp. 74-94, Spr 1988. https://doi.org/10.1007/BF02723327
  3. P.H. Carstensen and K. Schmidt, '"Computer supported cooperative work: New challenges to systems design," 1999.
  4. P. Danese, '"Towards a contingency theory of collaborative planning initiatives in supply networks," Int J Prod Res, vol. 49, no. 4, pp. 1081-1103, Feb 2011. https://doi.org/10.1080/00207540903555510
  5. K.S. Dean, '"Strategies and Benefits of Fostering Intra-Organizational Collaboration," Dec 2010.
  6. C. Fornell and F.L. Bookstein, '"Two structural equation models: LISREL and PLS applied to consumer exit-voice theory." Journal of Marketing Research (JMR), vol. 19, no. 4, Nov 1982.
  7. C. Forest, "Empowerment skills for family workers: A worker handbook," Cornell University, 2003.
  8. R. Gulati, F. Wohlgezogen and P. Zhelyazkov, '"The two facets of collaboration: Cooperation and coordination in strategic alliances," The Academy of Management Annals, vol. 6, no. 1, pp. 531-583, May 2012. https://doi.org/10.1080/19416520.2012.691646
  9. Groenewegen L. (2013). "Factors influencing collaboration within a partnership of large infra-structural projects in the netherlands," TUDelft, Sep 2013.
  10. N. Hara, P. Solomon, S. Kim and D.H. Sonnenwald, '"An emerging view of scientific collaboration: scientists' perspectives on collaboration and factors that impact collaboration," J.Am.Soc.Inf.Sci.Technol., vol. 54, no. 10, pp. 952-965, Aug 2003. https://doi.org/10.1002/asi.10291
  11. J. Horwath and T. Morrison, '"Collaboration, integration and change in children's services: critical issues and key ingredients," Child Abuse Negl., vol. 31, no. 1, pp. 55-69, Jan 2007. https://doi.org/10.1016/j.chiabu.2006.01.007
  12. ISO/IEC "27001:2013. Information security management," 2013
  13. ISO/IEC "27014:2013. Information security governance," 2013
  14. P. Mattesich, M. Murray-Close and B. Monsey, '"Collaboration: What makes it work-areviewoftheresearchliteratureonfactorsinfluencings uccessfulcollaboration,"SaintPaul,MN:AmherstH.Wil derFoundation,May2001.
  15. X. Meng, M. Sun and M. Jones, '"Maturity model for supply chain relationships in construction," J.Manage.Eng., vol. 27, no. 2, pp. 97-105, Mar 2011. https://doi.org/10.1061/(ASCE)ME.1943-5479.0000035
  16. R.T. Moulton and M.E. Moulton, '"Electronic communications risk management: a checklist for business managers," Comput.Secur., vol. 15, no. 5, pp. 377-386, 1996. https://doi.org/10.1016/0167-4048(96)82560-0
  17. D.B. Parker, '"The strategic values of information security in business," Comput.Secur., vol. 16, no. 7, pp. 572-582, 1997. https://doi.org/10.1016/S0167-4048(97)80793-6
  18. S. Posthumus and R. Von Solms, '"A framework for the governance of information security," Comput.Secur., vol. 23, no. 8, pp. 638-646, Dec 2004. https://doi.org/10.1016/j.cose.2004.10.006
  19. B. Singh, "Collaboration and competition tensions in multi-unit organizations facing volatile business environments." CASE WESTERN RESERVE UNIVERSITY, Dec 2005.
  20. B. von Solms, '"Information security-the fourth wave,"Comput.Secur.,vol.25,no.3,pp.165-168,May2006. https://doi.org/10.1016/j.cose.2006.03.004
  21. J.R. Westby, '"How boards & senior executives are managing cyber risks," Governance of Enterprise Security: CyLab 2012 Report, pp. 1-28, May 2012
  22. M.B. Winer and K.L. Ray, '"Collaboration handbook," Amherst H. Wilder Foundation, Apr 1994.
  23. K.K. Wong, '"Partial Least Squares Structural Equation Modeling (PLS-SEM) Techniques Using SmartPLS." Marketing Bulletin, vol. 24. 2013
  24. K W Kim and J D Kim, '"A Study on Critical Success Factors for Implementing Information Security Governance," Journal of Digital Convergence, Vol.8, no.4, pp.97-108, Dec 2010.
  25. J D Kim and S I Lee, "A study on cases of nation introduction and international standardization for security governance," KIISC REVIEW, vol.22, no.6, pp.9-14, Oct 2012.
  26. J D Kim and K H Hong, '"A Review on security issues and research," KIISC REVIEW, vol.17, no.4, pp.18-25, Aug 2007.
  27. D H Lee, "An Exploratory Study on Information Security Governance Components in the View of Manager," The University of Chung Ang, 2012.
  28. S G Lee & S B Cho, "A Study on the Success Factors of On-line Collaboration for Manufacturing Innovation Using AHP Analysis," KITS, vol.10, no.3, pp.1-19, Sep 2011. https://doi.org/10.9716/KITS.2011.10.3.001
  29. E C Lee & M I Chae, "A Study on Key Success Factors of SCM Applying AHP," Korean Journal of Logistics, vol.17, no.1, pp.53-77, 2009. https://doi.org/10.15735/kls.2009.17.1.004
  30. W.W. Chin, "Commentary: Issues and opinion on structural equation modeling." MIS Quarterly, Vol. 22, No. 1, pp. 7-16, Mar 1998.
  31. "5 critical instructions for innovation of security ", http://korea.emc.com/about/news/press/korea/2014/20140107.htm,EMC