Information technology security management concerns in global financial services institutions: Is national culture a differentiator?

Purpose – The purpose of this paper is to add a layer of understanding to a previous survey of information technology (IT) security concerns and issues in global financial services institutions (GFSI).Design/methodology/approach – This paper uses data obtained from a secondary source. The dimensions of national culture used in this paper come from Hofstede's work. Two analyses are performed on the data. First, a non‐parametric test is conducted to determine whether there are significant differences on the 13 IT security concerns when the dimensions of national culture are used to group responses. Second, a correlation analysis is carried out between the study's variables.Findings – First, the results indicate that the dimensions of national culture are not statistically important in differentiating responses and perceptions of IT security concerns across GFSI. Second, some of the dimensions of national culture are found to have significant correlations with a few of the IT security concerns investigated.R...

[1]  J. Eatwell,et al.  Global Governance of Financial Systems: The International Regulation of Systemic Risk , 2005 .

[2]  Sanjay K. Singh,et al.  An analysis of the cultural motivations for transborder data flow legislation , 1995, Inf. Technol. People.

[3]  Mikko T. Siponen,et al.  A conceptual foundation for organizational information security awareness , 2000, Inf. Manag. Comput. Secur..

[4]  S. Jong,et al.  Cross-country differences in ICT adoption: A consequence of Culture? , 2006 .

[5]  Princely Ifinedo,et al.  IT Security and Privacy Issues in Global Financial Services Institutions: Do Socio-Economic and Cultural Factors Matter? , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.

[6]  H. Jeff Smith,et al.  Values, personal information privacy, and regulatory approaches , 1995, CACM.

[7]  Princely Ifinedo Information Technology Security Concerns in Global Financial Services Institutions: Do Socio-Economic Factors Differentiate Perceptions? , 2009, Int. J. Inf. Secur. Priv..

[8]  G. Hofstede Culture′s Consequences: Comparing Values, Behaviors, Institutions and Organizations Across Nations , 2001 .

[9]  Hazel J. Johnson Global Financial Institutions and Markets , 1999 .

[10]  Yining Chen,et al.  Straight through Processing Technology in Global Financial Market: Readiness Assessment and Implementation , 2003, J. Glob. Inf. Manag..

[11]  C. Geertz,et al.  The Interpretation of Cultures , 1973 .

[12]  D GopalRam,et al.  Global software piracy , 2000 .

[13]  Detmar W. Straub,et al.  Security concerns of system users: A study of perceptions of the adequacy of security , 1991, Inf. Manag..

[14]  Kallol Kumar Bagchi,et al.  Global software piracy , 2006, Commun. ACM.

[15]  Allen N. Berger,et al.  The Effects of Geographic Expansion on Bank Efficiency , 2000 .

[16]  James Backhouse,et al.  Opportunities for computer crime: considering systems risk from a criminological perspective , 2006, Eur. J. Inf. Syst..

[17]  Quey-Jen Yeh,et al.  Threats and countermeasures for information system security: A cross-industry study , 2007, Inf. Manag..

[18]  Hock-Hai Teo,et al.  An integrative study of information systems security effectiveness , 2003, Int. J. Inf. Manag..

[19]  Derek Schatz Setting Priorities in Your Security Program , 2008 .

[20]  Sandra J. Milberg,et al.  Information Privacy: Corporate Management and National Regulation , 2000 .

[21]  E. Waarts,et al.  The Influence of National Culture on the Adoption Status of Innovations:: An Empirical Study of Firms Across Europe , 2005 .

[22]  Michelle Baddeley,et al.  Globalisation, Regionalism and Economic Activity , 2003 .

[23]  Harold F. Tipton,et al.  Information security management handbook, Sixth Edition , 2003 .

[24]  Ingoo Han,et al.  Security threats to Internet: a Korean multi-industry investigation , 2001, Inf. Manag..

[25]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[26]  S. E. Kruck,et al.  Computer Security Practices and Perceptions of the Next Generation of Corporate Computer Use , 2008, Int. J. Inf. Secur. Priv..

[27]  Bernard C. Y. Tan,et al.  Dimensions of national culture and corporate adoption of IT infrastructure , 2001, IEEE Trans. Engineering Management.

[28]  J. Eatwell,et al.  Global Governance of Financial Systems , 2005 .

[29]  Fariborz Moshirian Global Financial Services and a Global Single Currency , 2007 .

[30]  Neil F. Doherty,et al.  Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis , 2005, Inf. Resour. Manag. J..

[31]  Scott Shane,et al.  Cultural influences on national rates of innovation , 1993 .

[32]  Atreyi Kankanhalli,et al.  Cross-cultural differences and information systems developer values , 2004, Decis. Support Syst..

[33]  Felix B. Tan,et al.  Beyond Models of National Culture in Information Systems Research , 2002, J. Glob. Inf. Manag..

[34]  Princely Ifinedo,et al.  An empirical study of ERP success evaluations by business and IT managers , 2007, Inf. Manag. Comput. Secur..

[35]  David McPhee Information Technology Infrastructure Library and Security Management Overview , 2008 .

[36]  Jim Q. Chen,et al.  A Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness , 2008, J. Glob. Inf. Manag..

[37]  James Backhouse,et al.  Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..

[38]  H. Raghav Rao,et al.  Electronic Banking and Information Assurance Issues: Surveys and Synthesis , 2004, J. Organ. End User Comput..

[39]  John H. Bodley Cultural Anthropology: Tribes, States, and the Global System , 1994 .

[40]  Allen N. Berger,et al.  Efficiency of financial institutions: International survey and directions for future research , 1997 .