DOI QR코드

DOI QR Code

The Measurement Model for the Evaluation of Information Systems Service : The Case of Chinese SI Company

정보시스템 서비스 평가를 위한 측정모형의 개발 및 실증적 검증 : 중국 SI 기업 사례

  • 이상재 (세종대학교 경영학과) ;
  • 임규건 (한양대학교 기술경영전문대학원/경영대학)
  • Received : 2010.01.17
  • Accepted : 2011.02.22
  • Published : 2011.06.30

Abstract

The controls of Information Systems (IS) have been an more critical issue controls as the sophistication and integration of IS is more proceeded. ITGI (The Information Technology Governance Institute) of ISACA (Information Systems Audit and Control Association) has suggested COBIT (Control Objectives for Information and related Technology) and this has been widely recognized the evaluation model of IS controls. In COBIT, IS was evaluated in terms of process, information quality, and IT resources. This study used COBIT in order to suggest and empirically test an evaluation model of IS service. The data was collated from one major Chinese SI (Systems Integration) company in four domains of processes : planning and organization, acquisition and implementation, delivery and support, and monitoring. Seven factors are extracted using an exploratory factor analysis as follows : Overall IT planning process, technological assessment process in IT planning of IT, cost-benefit assessment process in IT planning, implementation process, support process, monitoring process, post-implementation evaluation process. The results of confirmatory analysis of three alternative measurement models indicated that the measurement model with one inherent or conceptual variable has greater model fitness than the other models. This study suggests the logical and general way to test and apply COBIT in evaluating IS services.

Keywords

Acknowledgement

Supported by : 세종대학교

References

  1. 중국 SI 시장 현황보고서, 한국소프트웨어진흥원, 마켓리서치팀, 2003.
  2. Anderson, J. and Gerbing, "Structural equation modeling in practice:A review and recommended two-step approach", Psychological Bulletin, Vol.1033(1988), pp.411-423.
  3. Choudhury, V. and Sabherwal, "Portfolios of control in outsourced software development projects", Information Systems Research, Vol.14, No.3(2003), pp.291-314. https://doi.org/10.1287/isre.14.3.291.16563
  4. Cook, T. D. and Campbell, Boston, MA: Houghton Mifflin, 1979.
  5. Hair, J. F., T. Anderson, and T. Grablowsky, OK; PPC Books, 1979.
  6. Henderson, J. C. and Lee, "Managing I/S design teams:a control theories perspective", Management Science, Vol.38(1992), pp.757-777. https://doi.org/10.1287/mnsc.38.6.757
  7. ITGI(IT Governance Institute), Information Systems Audit and Control Association, 2007.
  8. Jaworski, B. J., "Toward a theory of marketing control:Environmental context, control types, and consequences", Journal of Marketing, Vol.52(1988), pp.23-39. https://doi.org/10.2307/1251447
  9. Jiang, J. J., Klein, and Carr, "Measuring Information Systems Quality:SERVQUAL from the Other Side", MIS Quarterly, Vol. 262(2002), pp.145-166.
  10. Joreskog, K. G. and Sorbom, 2nd ed., SPSS Inc., 1989.
  11. Kettinger, W. J. and Lee, "Zones of tolerance: Alternative scales for measuring information systems service quality", MIS Quarterly, Vol.29, No.4(2005), pp.607-623. https://doi.org/10.2307/25148702
  12. Kirsch, L. J., "Deploying common systems globally:The dynamics of control", Information Systems Research, Vol.154(2004), pp.374-395.
  13. Kirsch, L. J., "Portfolios of control modes and IS project management", Information Systems Research, Vol.83(1997), pp.215-239.
  14. Lee, S., Han, and Kym, "The impact of EDI controls on EDI implementation", International Journal of Electronic Commerce, Vol. 24(1998), pp.71-98.
  15. Lee, S. M., Lee, and Yoo, "An integrative model of computer abuse based on social control and general deterrence theories", Information and Management, Vol.41(2004), pp.707-718. https://doi.org/10.1016/j.im.2003.08.008
  16. Lee, Y. and Kozar, "Investigating factors affecting the adoption of anti-spyware systems", Communication of the ACM, Vol.488 (2005), pp.72-78.
  17. Markus, M. L. and J. Pfeffer, "Power and the design and implementation of accounting and control systems", Accounting, Organizations and Society, Vol.82, No.3(1983), pp.205-218.
  18. Merchant, K. A., "The design of the corporate budgeting system:Influences on managerial behavior and performance", Accounting Review, Vol.56(1981), pp.813-829.
  19. Nidumolu, S. R. and Subramni, "The matrix of control:Combining process and structure approaches to managing software development", Journal of Management Information Systems, Vol.203(2003), pp.159-196.
  20. Nunnally, J. C., Psychometric Theory, New York:McGraw-Hill, 1978.
  21. Parasuraman, A., V. A. Zeithaml, and L. L. Berry, "Alternative scales for measuring service quality:A comparative assessment based on psychometric and diagnostic criteria", Journal of Retailing, Vol.70, No.3(1994), pp.201-230. https://doi.org/10.1016/0022-4359(94)90033-7
  22. Parasuraman, A., V. A. Zeithaml, and L. L. Berry, "Refinement and reassessment of the SERVQUAL scale", Journal of Retailing Vol.67(1991), pp.420-450.
  23. Parasuraman, A., V. A. Zeithaml, and L. L. Berry, "A conceptual model of service quality and its implications for future research", Journal of Marketing, Vol.49(1985), pp.41-50.
  24. Piccoli, G. and B. Ives, "Trust and the unintended effects of behavior control in virtual teams", MIS Quarterly, Vol.27, No.3 (2003), pp.365-395. https://doi.org/10.2307/30036538
  25. Simons, R., "The role of management control systems in creating competitive advantage: New perspectives", Accounting, Organizations and Society, Vol.15, No.1/2(1990), pp.127-143. https://doi.org/10.1016/0361-3682(90)90018-P
  26. Siponen, T. M., "On the role of human mortality in information system security:From the problems of descriptivism to nondescriptive foundations", Information Resources Management Journal, Vol.14, No.4 (2001), pp.15-23.
  27. Suh, B. and I. Han, "The impact of customer trust and perception of security control on the acceptance of electronic commerce", International Journal of Electronic Commerce, Vol.7, No.3(2003), pp.135-161.
  28. Weber, R., Information Systems Control and Audit, Prentice Hall Inc., Upper Saddle River, New Jersey, 1999.
  29. Werts, C. E., R. L. Linn, and K. G. Jöreskog, "Interclass reliability estimates:Testing structural assumptions", Educational and Psychological Measurement, Vol.34(1974), pp. 25-33. https://doi.org/10.1177/001316447403400104
  30. Whitman, M. E., "In defense of the realm:Understanding the threats to information security", International Journal of Information Management, Vol.24(2004), pp.43-57. https://doi.org/10.1016/j.ijinfomgt.2003.12.003
  31. Yeh, Q.-J. and A. J.-T. Chang, "Threats and countermeasures for information system security:A cross-industry study", Information and Management, Vol.44, No.5 (2007), p.491.