A Configurational Approach of the Relationship between Information Security Management and Performance of Small and Medium Enterprises in Kenya (Review Completed - Accepted)
Enterprises corresponding to a backbone of a modern society recognize information security management (ISM) as one of business management factors.Companies suffer significant financial and reputational damage due to ineffective information security management, severely impacting their performance and market valuation. Information security is vital for protecting important assets of organizations, including the information resources and the organization’s reputation. SMEs have the capacity to achieve rapid economic growth and in Kenya they employ about 85 percent of the Kenyan workforce. The need to link ISM with performance has become especially important for firms striving to achieve superior performance. However, there have been little documented evidences that existed for specific relationships between ISM and SME performance. To better understand this relationship, this paper takes a holistic approach guided by a cross-sectional research design. Using the hierarchical and moderated multiple regression (MMR) analyses, the theoretical models and hypotheses in this study were tested based on empirical data gathered from 94 SMEs that participated in the 2013 Top 100 Survey. The results revealed that entrepreneurial orientation significantly moderated the relationship between information security management and performance of SMEs. This study will enhance the skill set in Kenyan SMEs, producing a more sustainable solution, as well as contributing to the open literature.
In this study, economy and technology development in South Korea is discussed and a problem that has accompanied the advancement is examined. Industrial technology leakage, which has been increasing in the South Korean society among the nationвЂ™s major industry sectors has resulted in immeasurable financial consequences; it can also threaten the countryвЂ™s status as the worldвЂ™s leading manufacturer in shipbuilding, semiconductor, and electronics. A total of twelve technology espionage cases, three from each industry, that have received substantial attention by the media and been introduced in the вЂњTechnology Leakage Cases and Security TipsвЂќ published by the Korean Association for Industrial Technology Security are analyzed in order to find common patterns, actors involved, and characteristics of the leakage activities. The results show that in most cases assessed, a former employee is motivated by the monetary rewards and utilized the external devices to transmit the information. Furthermore, viable policy implications are suggested to provide a possible solution to the problem.