Investigating the role of internal security resources in post-adoption satisfaction with the Security-as-a-Service model: an organizational mindfulness perspective
IF 7.4 3区 管理学Q1 INFORMATION SCIENCE & LIBRARY SCIENCE
{"title":"Investigating the role of internal security resources in post-adoption satisfaction with the Security-as-a-Service model: an organizational mindfulness perspective","authors":"Ali Vedadi, Nita Brooks, Tim Greer","doi":"10.1108/jeim-07-2022-0227","DOIUrl":null,"url":null,"abstract":"<h3>Purpose</h3>\n<p>Many organizations struggle to utilize security-as-a-service (SecaaS) advantages effectively, thus challenging the assumption that adopting the SecaaS model will necessarily lead to post-adoption satisfaction. This research paper draws on the organizational mindfulness theory and investigates the factors that lead to satisfaction with SecaaS.</p><!--/ Abstract__block -->\n<h3>Design/methodology/approach</h3>\n<p>The key informant-based survey approach was employed to collect data from 215 organizations that were using the SecaaS model. PLS was used for data analysis.</p><!--/ Abstract__block -->\n<h3>Findings</h3>\n<p>Organizations with greater extents of internal security resources report higher satisfaction levels with SecaaS, thanks to the mediating effect of organizational mindfulness, and that organizations with extensive and mature security auditing were especially well-positioned to experience satisfaction with SecaaS.</p><!--/ Abstract__block -->\n<h3>Originality/value</h3>\n<p>This research provides new theoretical insights into the conditions under which organizations' post-adoption satisfaction with the SecaaS model is shaped by investigating the role of internal security resources and organizational mindfulness.</p><!--/ Abstract__block -->","PeriodicalId":47889,"journal":{"name":"Journal of Enterprise Information Management","volume":"19 8","pages":""},"PeriodicalIF":7.4000,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Enterprise Information Management","FirstCategoryId":"91","ListUrlMain":"https://doi.org/10.1108/jeim-07-2022-0227","RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"INFORMATION SCIENCE & LIBRARY SCIENCE","Score":null,"Total":0}
引用次数: 0
Abstract
Purpose
Many organizations struggle to utilize security-as-a-service (SecaaS) advantages effectively, thus challenging the assumption that adopting the SecaaS model will necessarily lead to post-adoption satisfaction. This research paper draws on the organizational mindfulness theory and investigates the factors that lead to satisfaction with SecaaS.
Design/methodology/approach
The key informant-based survey approach was employed to collect data from 215 organizations that were using the SecaaS model. PLS was used for data analysis.
Findings
Organizations with greater extents of internal security resources report higher satisfaction levels with SecaaS, thanks to the mediating effect of organizational mindfulness, and that organizations with extensive and mature security auditing were especially well-positioned to experience satisfaction with SecaaS.
Originality/value
This research provides new theoretical insights into the conditions under which organizations' post-adoption satisfaction with the SecaaS model is shaped by investigating the role of internal security resources and organizational mindfulness.
期刊介绍:
The Journal of Enterprise Information Management (JEIM) is a significant contributor to the normative literature, offering both conceptual and practical insights supported by innovative discoveries that enrich the existing body of knowledge.
Within its pages, JEIM presents research findings sourced from globally renowned experts. These contributions encompass scholarly examinations of cutting-edge theories and practices originating from leading research institutions. Additionally, the journal features inputs from senior business executives and consultants, who share their insights gleaned from specific enterprise case studies. Through these reports, readers benefit from a comparative analysis of different environmental contexts, facilitating valuable learning experiences.
JEIM's distinctive blend of theoretical analysis and practical application fosters comprehensive discussions on commercial discoveries. This approach enhances the audience's comprehension of contemporary, applied, and rigorous information management practices, which extend across entire enterprises and their intricate supply chains.