Full metadata record
DC FieldValueLanguage
dc.contributorGraduate School of Businessen_US
dc.creatorChin, Shu-kai Eric-
dc.identifier.urihttps://theses.lib.polyu.edu.hk/handle/200/4026-
dc.languageEnglishen_US
dc.publisherHong Kong Polytechnic University-
dc.rightsAll rights reserveden_US
dc.titleInformation system security assimilation : a theoretical and empirical modelen_US
dcterms.abstractDrawing upon institutional theory and general deterrence theory, this study presents the development and empirical validation of a model that aims to facilitate a greater understanding of the extent to which information system security (ISS) is assimilated within an organization. The paper posits that top management mediates the external influence of coercive, mimetic and normative forces and top management participation influences the internal general deterrence factors of system policy, system awareness and system security investment on ISS assimilation within an organization. Data from 206 organizations are used to test the proposed structural model using partial least squares (PLS) analysis. The results of partial least squares analyses suggest that coercive forces and normative forces positively affect top management belief, which in turn positively affects top management participation in the ISS assimilation process. Top management participation is confirmed to have a positive effect on the degree of ISS assimilation within an organization. The results also suggest that top management participation positively affect the general deterrence factors in which security awareness and security system investment positively affect the ISS assimilation. This research model provides evidence that top management mediates the effect of institutional forces and top management participation influences general deterrence factors on ISS assimilation. This study contributes to the body of ISS literature by extending the understanding of the effect of institutional forces and general deterrence factors on ISS assimilation. The implications of this study for ISS theory and practice are discussed.en_US
dcterms.extentviii, 408 leaves : col. ill. ; 30 cm.en_US
dcterms.isPartOfPolyU Electronic Thesesen_US
dcterms.issued2008en_US
dcterms.educationalLevelAll Doctorateen_US
dcterms.educationalLevelD.B.A.en_US
dcterms.LCSHHong Kong Polytechnic University -- Dissertations.en_US
dcterms.LCSHComputer security.en_US
dcterms.LCSHComputer networks -- Security measures.en_US
dcterms.LCSHIndustrial management.en_US
dcterms.accessRightsrestricted accessen_US

Files in This Item:
File Description SizeFormat 
b22405987.pdfFor All Users (off-campus access for PolyU Staff & Students only)27.43 MBAdobe PDFView/Open


Copyright Undertaking

As a bona fide Library user, I declare that:

  1. I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
  2. I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
  3. I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.

By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.

Show simple item record

Please use this identifier to cite or link to this item: https://theses.lib.polyu.edu.hk/handle/200/4026