Abstract

This study investigated information systems security (ISS) as one of the important issues of e-government for sustainable development. ISS is becoming increasingly important in the discourse on information technology-related organizational transformation, and governments need to undergo organizational transformation to establish an effective ISS system for advancing e-government capacity which plays a vital role in achieving sustainability. Furthermore, ISS breaches are becoming the norm rather than the exception, but ISS can only be achieved when employees fully and firmly embrace the concept by changing their behavior to comply with advanced ISS technologies. A research model is theoretically developed in this context based on institution theory, which proposes a dual path model consisting of legitimacy-leading organizational citizenship behaviors (OCB) and organizational cynicism-causing counterproductive work behaviors (CWB) in the process of innovating ISS for e-government. This dual-path model is empirically tested against 388 data collected from information security managers in 30 departments and councils within Korea’s central government. A structural model evaluation of the collected data principally validates the research model. The results indicate that the path through legitimacy, influenced by normative and coercive isomorphism, is stronger than that through organizational cynicism. The data largely supports the proposed research model, confirming the applicability of institutional theory in explaining the institutionalization processes in effective ISS compliance at the organizational and individual levels. The implications of these findings are then discussed in detail.

Highlights

  • Electronic government (e-government) for sustainable development has been recognized as an international cooperation strategy to accomplish green governments through citizen-oriented service delivery with citizens’ active interactions and participation, and innovative, effective, and high-quality public service [1]

  • The low R-squares which have been pointed out and the result that does not show the positive association between mimetic isomorphism and information systems security (ISS) legitimacy may be derived from ISS characteristics, which calls for further studies

  • Effective ISS becomes critical for advancing e-government capacity which plays a vital role in achieving sustainability

Read more

Summary

Introduction

Electronic government (e-government) for sustainable development has been recognized as an international cooperation strategy to accomplish green governments through citizen-oriented service delivery with citizens’ active interactions and participation, and innovative, effective, and high-quality public service [1]. Employees fully and firmly embrace these policies so their behavior becomes more compliant In this regard, this institutionalization process [19,20,21] seems to play an important role in the actual implementation of ISS policies and practices. This study is designed to explore and expose how ISS institutions shape ISS policies and practices, and how they create organizational reactions that influence employees’ behavior, which may lead to effective ISS policy implementation. This study attempts to answer the following questions: (1) How do external isomorphic forces institutionalize ISS policies into actual practice, embraced by individual employees’ OCB and CWB? Research on Korean governments’ ISS effectiveness, based on ISS-related organizational change, will provide useful theoretical and practical implications in the fields of e-government and ISS literature

ISS and Institution Theory
Three Types of Isomorphism and Their Influences on Government Organizations
ISS Effectiveness
Legitimacy Path
Organizational Cynicism Path
Methodology
Measurement of Constructs
Data Collection
Data Analysis and Results
Discussion and Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.