A Study on the Corporate Members’ Autonomy-centric Security Management in the Context of Internet Companies

Hyunjin Seo, Jungduk Kim

Abstract


In the rapidly changing business environments, Internet companies have the characteristics of organizational culture that emphasize the flexible, open and autonomous nature of organizational culture, and are transforming into flexible smart working environment that is independent of time and place. Despite such an Internet business environment, the security management system still fails to reflect the business environment and organizational culture of the Internet company, and the control-focused security management system in the Internet company is facing limitations. Therefore, this study designed and developed Corporate members’ autonomy-centered security items that considering the characteristics of the business environment and organizational culture of the Internet company. The results of this study are expected to be used to implement and operate corporate members’ autonomy-
centered security management system in internet companies with an agile business environment and an autonomous organizational culture.


Full Text:

PDF

References


Cha, I. H., “A study on the development of personnel security management for protection against insider threat,” The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 3, No. 4, pp. 210-220, 2008.

Education Research Institute Seoul National University, Dictionary of the Terms of Education, 1994.

Gartner, “Maverick research: Kill off security controls to reduce risk,” Sep. 2012.

Hackman, J. R. and Oldham, G. R., “Development of the job diagnostic survey,” Journal of Applied Psychology, Vol. 60, No. 2, pp. 159-170, 1975.

Huumonen, J., “Conceptualizing agility of enterprises,” Human Factors and Ergonomics in Manufacturing & Service Industries, Vol. 21, No. 2, pp. 132-149, 2011.

ISO/IEC 27001:2013, Information security -Security techniques-Information Security Management Systems-Requirements, ISO, 2013

Jeffrey, D. W. and Paul, B. L., “Control-related motivations and information security policy compliance: The role of autonomy and efficacy,” Journal of Information Privacy and Security, Vol. 9, No. 4, 2013.

Kang, H. S. and Kim, J. D., “A study on information security departmentalization model,” The Journal of Society for e-Business Studies, Vol. 20, No. 2, pp. 167-174, 2015.

Kim, J. D., “Major issues and future strategies for information protection management paradigm shift,” Review of KIISC, Vol. 23, No. 5, pp. 5-8, 2013.

Kim, J. D., Kim, B. K., Park, S. H., and Kim, K. W., “Considerations for information protection innovation in a self-regulated environment,” Review of KIISC, Vol. 25, No. 4, pp. 63-68, 2015.

Kim, J. S., Kim, J. B., and Shin, Y. T., “A study on the effect of CISO’s recognition of the role to the information security performance,” Korean Management Consulting Review, Vol. 12, No. 4, pp. 21-34, 2012.

Kim, K. W. and Kim, J. D., “A study on effects of implementing information security governance by information security committee activities,” Journal of the Korea Institute of Information Security & Cryptology, Vol. 25, No. 4, pp. 915-920, 2015.

Kim, S., “Internet business environment,” e-Business Review, Vol. 3, No. 1, pp. 247-272, 2002.

KISA, A Research on ISMS Maturity Level and Evaluation Methodology, 2010.

Ko, E. J., Lee, S. J., and Kim, S. S., “Effects of job autonomy and self-efficacy on creative behavior: Focusing on the mediation effect of knowledge sharing in smart work environment,” Knowledge Management Research, Vol. 19, No. 2, pp. 163-185, 2018.

Lee, C. S., “A research on the revenue structure model for internet business,” The Journal of Internet Electronic Commerce Research, Vol. 9, No. 3, pp. 93-113, 2009.

Lee, J. K., Na, O. K., and Chang, H. B., “A study on the research security system of the researcher-centric,” The Journal of Society for e-Business Studies, Vol. 23, No. 3, pp. 65-84, 2018.

Lee, M. R. and Ju, S. H., “Policy suggestions for autonomy of university,” CNU Journal of Educational Studies, Vol. 27, No. 1, pp. 69-93, 2006.

McClure, M. L., “Managing the professional nurse: Part II. Applying management theory to the challenges,” JONA: The Journal of Nursing Administration, Vol. 14, No. 3, 1984.

Ministry of Science and ICT, Korea Internet & Security Agency, “Critical information infrastructure protection technical vulnerability & analysis assessment detailed guides,” 2017.

Ministry of Science and ICT, Ministry of the Interior and Safety, Korea Communications Commission and Korea Internet & Security Agency, Information & Personal Information management System Guidebook, 2019.

Ministry of SMEs and startup and Korea Foundation for Corporation of Large Small Business, Rural Affairs, “SMEs Technical Protection Guide,” 2018.

Ministry of Trade, Industry and Energy, “White paper of trade, industry and energy(part of industry),” 2018.

National Information Society Agency, “2017 Smart work survey report,” 2017.

Netflix Culture, Https://jobs.netflix.com/culture.

NIST, “Security and Privacy Controls for Federal Information Systems and Organizations (NIST SP 800-53 R4),” 2013.

Pfeffer, J., “The human equation: Building profits by putting people first,” Harvard Business School Press, 1998.

Rha, H. D., “A theoretical comparative study of human resource security based on Korean and int’l information security management systems,” Journal of Convergence for Information Technology, Vol. 6, No. 3, pp. 13-19, 2016.


Refbacks

  • There are currently no refbacks.