Does Security Impact E-procurement Performance? Testing a Model of Direct and Moderated Effects

Despite the widespread adoption of e-procurement and the critical role of information security in these situations, academic research examining the relationship between information security and e-procurement performance has been surprisingly minimal. This study represents an interdisciplinary approach to present and test a theoretical model that links security in e-procurement processes to e-procurement performance. E-procurement performance is measured as a combination of cost savings, order quality, and satisfaction of fulfillment as perceived by buyers. The model also posits that two aspects of the procurement process will enhance the value of security in e-procurement, namely, process complexity and process interdependence. We empirically examine these relationships using data collected from procurement managers. Our results have important implications for managing the e-procurement process.

[1]  Powell E. Robinson,et al.  The Impact of E-Replenishment Strategy on Make-to-Order Supply Chain Performance , 2005, Decis. Sci..

[2]  Paul A. Pavlou,et al.  Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective , 2007, MIS Q..

[3]  Detmar W. Straub,et al.  Validation in Information Systems Research: A State-of-the-Art Assessment , 2001, MIS Q..

[4]  Andrew B. Whinston,et al.  An Empirical Investigation of Net-Enabled Business Value , 2004, MIS Q..

[5]  Robin L. Dillon,et al.  Including technical and security risks in the management of information systems: A programmatic risk management model , 2005, Syst. Eng..

[6]  R. Narasimhan,et al.  Perspectives on risk management in supply chains , 2009 .

[7]  Michael A. Roberto,et al.  Lessons from Everest: The Interaction of Cognitive Bias, Psychological Safety, and System Complexity , 2002 .

[8]  S. Snell,et al.  Integrated Manufacturing and Job Design: Moderating Effects of Organizational Inertia , 1991 .

[9]  Lawrence A. Gordon,et al.  Market Value of Voluntary Disclosures Concerning Information Security , 2010, MIS Q..

[10]  G. Day The Capabilities of Market-Driven Organizations , 1994 .

[11]  Richard L. Daft,et al.  Measures of Perrow's Work Unit Technology: An Empirical Assessment and a New Scale , 1983 .

[12]  D. Gefen,et al.  E-commerce: the role of familiarity and trust , 2000 .

[13]  Richard Baskerville,et al.  Power and Practice in Information Systems Security Research , 2008, ICIS.

[14]  Detmar W. Straub,et al.  Current Technological Impediments to Business-to-Consumer Electronic Commerce , 1999, Commun. Assoc. Inf. Syst..

[15]  P. M. Podsakoff,et al.  Self-Reports in Organizational Research: Problems and Prospects , 1986 .

[16]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[17]  M. Lindell,et al.  Accounting for common method variance in cross-sectional research designs. , 2001, The Journal of applied psychology.

[18]  T. S. Lee,et al.  Pooling Data Across Transparently Different Groups of Key Informants: Measurement Equivalence and Survey Research , 2008, Decis. Sci..

[19]  C. Wisner A STRUCTURAL EQUATION MODEL OF SUPPLY CHAIN MANAGEMENT STRATEGIES AND FIRM PERFORMANCE , 2003 .

[20]  Godwin J. Udo,et al.  Privacy and security concerns as major barriers for e-commerce: a survey study , 2001, Inf. Manag. Comput. Secur..

[21]  Huseyin Cavusoglu,et al.  The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers , 2004, Int. J. Electron. Commer..

[22]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[23]  Jerry C. Wei,et al.  Impact of eBusiness technologies on operational performance: The role of production information integration in the supply chain , 2007 .

[24]  James Backhouse,et al.  Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..

[25]  Ram L. Kumar,et al.  A Framework for Assessing the Business Value of Information Technology Infrastructures , 2004, J. Manag. Inf. Syst..

[26]  Sunder Kekre,et al.  Strategic and Operational Benefits of Electronic Integration in B2B Procurement Processes , 2002, Manag. Sci..

[27]  Laura Lally,et al.  Information Technology as a Target and Shield in the Post 9/11 Environment , 2005, Inf. Resour. Manag. J..

[28]  Michelle D. Lane,et al.  Exploring the barriers to the adoption of e‐auctions for sourcing , 2006 .

[29]  Kyung Kyu Kim,et al.  An Assessment of Electronic Information Transfer in B2B Supply-Channel Relationships , 2005, J. Manag. Inf. Syst..

[30]  Ramesh Kolluru,et al.  Security and trust management in supply chains , 2001, Inf. Manag. Comput. Secur..

[31]  Varun Grover,et al.  Examining the Impact of Interorganizational Systems on Process Efficiency and Sourcing Leverage in Buyer-Supplier Dyads , 2005, Decis. Sci..

[32]  Rajiv Kohli,et al.  Measuring Information Technology Payoff: A Meta - Analysis of Structural Variables in Firm - Level Empirical Research , 2003, Inf. Syst. Res..

[33]  Ganesh Vaidyanathan,et al.  A five-factor framework for analyzing online risks in e-businesses , 2003, CACM.

[34]  Roger G. Schroeder,et al.  Generic manufacturing strategies: an empirical test of two configurational typologies , 2001 .

[35]  A. S. Carr,et al.  The relationship between information technology use and buyer-supplier relationships: an exploratory analysis of the buying firm's perspective , 2002, IEEE Trans. Engineering Management.

[36]  Germaine H. Saad,et al.  Managing Disruption Risks in Supply Chains , 2005 .

[37]  Dennis F. Galletta,et al.  User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..

[38]  P. Bentler,et al.  Significance Tests and Goodness of Fit in the Analysis of Covariance Structures , 1980 .

[39]  Laura B. Cardinal,et al.  RETROSPECTIVE REPORTS IN ORGANIZATIONAL RESEARCH: A REEXAMINATION OF RECENT EVIDENCE , 1997 .

[40]  Stefan Einarsson Human error in high hazard systems: Do we treat the problem in an appropriate way? , 1999 .

[41]  James C. Anderson,et al.  Some Methods for Respecifying Measurement Models to Obtain Unidimensional Construct Measurement , 1982 .

[42]  Joseph P. Cannon,et al.  An Examination of the Nature of Trust in Buyer–Seller Relationships: , 1997 .

[43]  P. Pavlou,et al.  Perceived Information Security, Financial Liability and Consumer Trust in Electronic Commerce Transactions , 2002 .

[44]  K. B. Hendricks,et al.  An Empirical Analysis of the Effect of Supply Chain Disruptions on Long‐Run Stock Price Performance and Equity Risk of the Firm , 2005 .

[45]  Robert W. Zmud,et al.  A Contingency Approach to Software Project Coordination , 2002, J. Manag. Inf. Syst..

[46]  Robin L. Dillon,et al.  Including technical and security risks in the management of information systems: A programmatic risk management model , 2005 .

[47]  Jayashankar M. Swaminathan,et al.  Models for Supply Chains in E-Business , 2003, Manag. Sci..

[48]  K. Eisenhardt Agency Theory: An Assessment and Review , 1989 .

[49]  J. Mentzer,et al.  Logistics Service Quality as a Segment-Customized Process , 2001 .