DOI QR코드

DOI QR Code

An Exploratory Study on the Core Technology of the Fourth Industrial Revolution and Information Security Organization: Focusing on Firm Performance

4차산업혁명 핵심기술 도입 및 정보보호조직에 관한 탐색적 연구: 성과측면에서의 비교분석

  • 김기현 (강릉원주대학교 사회과학대학 무역학과) ;
  • 조혜진 (고려대학교 경영대학 국제경영학과) ;
  • 임소희 (고려대학교 경영대학 국제경영학과)
  • Received : 2019.09.30
  • Accepted : 2020.02.07
  • Published : 2020.03.31

Abstract

This explorative study examines the difference in firm performance according to the adoption of the core technology of the Fourth industrial revolution, including artificial intelligence(AI), internet of things (IoT), cloud computing, and big data technology. Additionally, we investigate the importance of internal organizational structure exclusively responsible for information security. We analyze unique microdata offered by the Korea Information Society Development Institute to examine the impact of the adoption of the new technologies and the existence of organizational structure for information protection on firm performance, i.e., firm sales. By considering the core information technology as powerful knowledge assets, we argue that the adoption of such technology leads firms to have comparative advantage comparing to the competitors. Also, we emphasize the need to consider the organizational structure suitable for information security, which can become a structural asset of a firm.

Keywords

References

  1. 고형석, 이홍제, 임화연, 한정석 2018. "4차 산업혁명시대의 빅데이터 정보자원 관리전략에 관한 연구," 정보화연구 (15:2), pp.119-131. https://doi.org/10.22865/JITA.2018.15.2.119
  2. 김경규, 신호경, 박성식, 김범수 2009. "정보자산보호 성과가 조직성과에 미치는 영향에 관한 연구: 관리활동과 통제활동을 중심으로," 정보관리연구 (40:3), pp.61-77. https://doi.org/10.1633/JIM.2009.40.3.061
  3. 김승래 2017. "AI 시대의 지식재산권 보호전략과 대책," 지식재산연구 (12:2), pp.145-176.
  4. 백민정, 손승희 2011. "중소규모 조직구성원의 정보보안인식과 행동이 정보보안성과에 미치는 영향에 관한 연구," 중소기업연구 (33:2), pp.113-132.
  5. 서성웅, 박병규, 지대환 2017. "인공지능(AI) 융합기술 기반의 기업형 챗봇(Chatting Robot) 개발을 통한 일반업무 디지털트랜스포메이션 효과에 관한 연구," 2017년 경영정보관련 추계학술대회 논문집, pp.284-289.
  6. 손인수, 김대길 2017. "클라우드 컴퓨팅 도입이 기업의 시장가치에 미치는 영향: 이벤트 스터디를 활용한 분석," 인터넷전자상거래연구 (17:1), pp.1-21.
  7. 심혜정, 김건우 2018. "우리 기업의 인공지능(AI)을 활용한 비즈니스 모델," Trade Focus, 국제무역연구원, pp.1-26
  8. 유성민 2014. "ICBM 산업육성 방안 및 기술도입 전략," 한국정보기술학회지 (12:2), pp.9-16.
  9. 이강백, 김태환, 이상용 2015. "기업보안투자가 기업성과에 끼치는 영향," 2015년 한국경영정보학회춘계학술대회 논문집, pp.354-359
  10. 이종화, 이현규 2018. "빅테이터 분석을 위한 비용효과적 오픈 소스 시스템 설계," 지식경영연구 (19:1), pp.119-132 https://doi.org/10.15813/kmr.2018.19.1.007
  11. 임재수, 오재인 2017. "클라우드 컴퓨팅 서비스의 도입특성이 기업의 인지된 기대성과에 미치는 영향," Information Systems Review (19:1), pp. 75-100. https://doi.org/10.14329/isr.2017.19.1.075
  12. 정현준, 신우철, 홍정민, 이운호, 이용희, 변종석, 박민규 2018. "ICT부문 분석용 마이크로데이터 구축", 정책연구, pp. 18-76, 정보통신정책연구원.
  13. 조일형, 김진, 유진호 2019. "개인정보보호 관련 공공사업의 타당성 조사를 위한 비용효과분석 사례 연구," 지식경영연구 (20:3), pp.91-104. https://doi.org/10.15813/kmr.2019.20.3.006
  14. 최병구 2016. "정보기술 개발 유형과 기업성과 간의 관계에 대한 실증적 고찰: 자원준거 이론 관점에서," 지식경영연구 (17:4), pp.163-189. https://doi.org/10.15813/kmr.2016.17.4.008
  15. 최은수, 이윤철 2009. "정보기술이 지식경영활동과 성과에 미치는 효과에 대한 실증분석," 지식경영연구 (10:3), pp.51-80.
  16. 편용범, 강수경, 김광복, 김종진, 차형기, 이형준 2019. "딥러닝 기업을 이용한 정량적 어획물 분류를 위한 기반 연구," 한국수산과학회 양식분과 학술대회, p.120.
  17. 현정훈 2018. "4차산업혁명과 기업보안의 현시점," 한국멀티미디어학회지 (22:2), pp.6-12.
  18. Anat Hovav, 한진영 2013. "정보보안 사고가 기업의 주식가치에 미치는 영향: 한국기업 중심으로," 인터넷전자상거래연구 (13:3), pp.43-67.
  19. MiHye Yang, Wonho Nam, Taegon Kim and Yonghwa Kim. 2019. "Machine learning application for predicting the strawberry harvesting time," Korean Journal of Agriculture Science (46:2), pp.381-393
  20. Ahuja G. and Katila R. 2001. "Technological Acquisitions and the Innovation Performance of Acquiring Firms: A Longitudinal Study," Strategic Management Journal (22:3), pp.197-220. https://doi.org/10.1002/smj.157
  21. Ashford W. 2012. Many UK Firms Underestimate Cost of Data Breaches, Study Finds.
  22. Barney J. 1986. "Strategic Factor Markets: Expectations, Luck, and Business Strategy," Management Science (32:10), pp.1231-1241. https://doi.org/10.1287/mnsc.32.10.1231
  23. Barney J. 1991. "Firm Resources and Sustained Competitive Advantage," Journal of Management (17:1), pp.99-120. https://doi.org/10.1177/014920639101700108
  24. Belissent J. 2010. "Getting Clever About Smart Cities: New Opportunities Require New Business Models," Cambridge, Massachusetts, USA.
  25. Berchicci L. 2013. "Towards an Open R&D System: Internal R&D Investment, External Knowledge Acquisition and Innovative Performance," Research Policy (42:1), pp.117-127. https://doi.org/10.1016/j.respol.2012.04.017
  26. Bharadwaj A. S., Bharadwaj S. G. and Konsynski B. R. 1999. "Information Technology Effects on Firm Performance as Measured by Tobin's Q," Management Science (45:7), pp.1008-1024. https://doi.org/10.1287/mnsc.45.7.1008
  27. Chang S. E. and Ho C. B. 2006. "Organizational Factors to the Effectiveness of Implementing Information Security Management," Industrial Management & Data Systems (106:3), pp.345-361. https://doi.org/10.1108/02635570610653498
  28. Dutot V., Bergeron F. and Raymond L. 2014. "Information Management for the Internationalization of Smes: An Exploratory Study Based on a Strategic A lignment Perspective," International Journal of Information Management (34:5), pp.672-681. https://doi.org/10.1016/j.ijinfomgt.2014.06.006
  29. Candelin-Palmqvist H., Sandberg, B., and Mylly U. M. 2012. "Intellectual Property Rights in Innovation Management Research: A Review," Technovation (32:9-10), pp.502-512 https://doi.org/10.1016/j.technovation.2012.01.005
  30. Im K. S., Dow K. E. and Grover V. 2001. "Research Report: A Reexamination of IT Investment and the Market Value of the Firm-an Event Study Methodology," Information Systems Research (12:1), pp.103-117. https://doi.org/10.1287/isre.12.1.103.9718
  31. Jones G. K., Lanctot A. and Teegen H. J. 2001. "Determinants and Performance Impacts of External Technology Acquisition," Journal of Business Venturing (16:3), pp.255-283. https://doi.org/10.1016/S0883-9026(99)00048-8
  32. Kayworth T. and Whitten D. 2010. "Effective Information Security Requires a Balance of Social and Technology Factors," MIS Quarterly executive (9:3), pp.2012-2052.
  33. Nord W. R. and Tucker S. 1987. Implementing Routine and Radical Innovations. Lexington Books: Lexington, MA.
  34. Penrose R. 1959. The Theory of the Growth of the Firm. Oxford University Press: Oxford.
  35. Piccoli G. and Ives B. 2005. "It-Dependent Strategic Initiatives and Sustained Competitive Advantage: A Review and Synthesis of the Literature," MIS quarterly (29:4), pp.747-776. https://doi.org/10.2307/25148708
  36. Piccoli G. and Lui T-W. 2014 "The Competitive Impact of Information Technology: Can Commodity IT Contribute to Competitive Performance?" European Journal of Information Systems (23:6), pp.616-628 https://doi.org/10.1057/ejis.2013.20
  37. Plummer D. C. 2008. Cloud Computing: Definition and Describing an Emerging Phenomenon, Gartner Group: Stamford, CT.
  38. Prahlad, K. and Hamel, G. 1990. "The core competence of the corporation," Harvard Business Review (90), pp.79-91.
  39. Richardson V. J. and Zmud R. W. 2002. "The Value Relevance of Information Technology Investment Announcements: Incorporating Industry Strategic IT Role," in Proceedings of the Proceedings of the 35th Annual Hawaii International Conference on System Sciences, Big Island, Hwaii, USA.
  40. Ring T. 2013. "A Breach Too Far?," Computer Fraud & Security (2013:6), pp.5-9. https://doi.org/10.1016/S1361-3723(13)70052-6
  41. Root F. R. 1994. Entry Strategies for International Markets. Lexington books New York.
  42. Roth K. 1995. "Managing International Interdependence: CEO Characteristics in a Resource-Based Framework," Academy of Management Journal (38:1), pp.200-231. https://doi.org/10.2307/256733
  43. Rumelt R. P. 1991. "How Much Does Industry Matter?," Strategic Management Journal (12:3), pp.167-185. https://doi.org/10.1002/smj.4250120302
  44. Soomro Z. A., Shah M. H. and Ahmed J. 2016. "Information Security Management Needs More Holistic Approach: A Literature Review," International Journal of Information Management (36:2), pp.215-225. https://doi.org/10.1016/j.ijinfomgt.2015.11.009
  45. Teece D. J. 1986. "Profiting from Technological Innovation: Implications for Integration, Collaboration, Licensing and Public Policy," Research Policy (15:6), pp.285-305. https://doi.org/10.1016/0048-7333(86)90027-2
  46. Teece D. J. 2000. "Strategies for Managing Knowledge Assets: The Role of Firm Structure and Industrial Context," Long Range Planning (33:1), pp.35-54. https://doi.org/10.1016/S0024-6301(99)00117-X
  47. Tippins M. J. and Sohi R. S. 2003. "It Competency and Firm Performance: Is Organizational Learning a Missing Link?" Strategic Management Journal (24:8), pp.745-761. https://doi.org/10.1002/smj.337
  48. Tsai K. H. and Wang J. C. 2007. "Inward Technology Licensing and Firm Performance: A Longitudinal Study," R&D Management (37:2), pp.151-160. https://doi.org/10.1111/j.1467-9310.2007.00464.x
  49. Wernerfelt B. 1984. "A Resource-Based View of the Firm," Strategic M anagement Journal (5:2), pp.171-180. https://doi.org/10.1002/smj.4250050207
  50. Wiseman C. 1985. Strategy and Computer. Dow Jones Irwin: New York.

Cited by

  1. 정보보호 공시제도의 운영실태와 효과성 분석 vol.22, pp.1, 2021, https://doi.org/10.15813/kmr.2021.22.1.015