The Influence of Information Security Management on Operational Performance of Humanitarian Value Chains in Arid and Semi-Arid Lands of Kenya
DOI:
https://doi.org/10.47941/ijscl.1165Keywords:
Information Security, Humanitarian Organizations, Arid and Semi-Arid Lands, Performance, Value ChainsAbstract
Purpose: Managements of humanitarian organizations in arid and semi-arid lands have recently become sensitized to the vulnerability of their supply chains. This is due to an ever-increasing range of security breaches and disruptions that affect global value chains especially in information security management. The current study sought to determine the influence of information security management on the operational performance of humanitarian value chains in arid and semi-arid lands of Kenya.
Methodology: The study adopted a cross-sectional design. A target population of 100 respondents was studied through census method from humanitarian organizations operating in arid and semi-arid lands of Kenya. A semi-structured questionnaire was used to collect information whereas descriptive and inferential statistics were used to analyze the data. The results were presented by use of tables.
Findings: Scrutiny of the results of linear regression analysis indicated that information security management significantly predicted the operational performance of the organizations (r=.659, p=0.000).
Unique contribution to theory, practice and policy: The study recommends that humanitarian organizations should put measures into place to ensure access control and safe storage of information. Employees should also be trained in information security management to understand their role on overall organizational performance.
Downloads
References
Boone, C. A., Skipper, J. B., & Hazen, B. T. (2017). A framework for investigating the role of big data in service parts management. Journal of cleaner production, 153, 687-691.
George, D., & Mallery, P. (2019). IBM SPSS statistics 26 step by step: A simple guide and reference. Routledge.
Hameri, A. P., & Hintsa, J. (2009). Assessing the drivers of change for cross"border supply chains. International Journal of Physical Distribution & Logistics Management.
Hutter, T., Haeussler, S., & Missbauer, H. (2018). Successful implementation of an order release mechanism based on workload control: a case study of a make-to-stock manufacturer. International Journal of Production Research, 56(4), 1565-1580.
Magutu, P. O., Aduda, J., & Nyaoga, R. B. (2015). Does supply chain technology moderate the relationship between supply chain strategies and firm performance? Evidence from large- scale manufacturing firms in Kenya. International Strategic Management Review, 3(1-2), 43-65.
Sheffi, Y. (2001). Supply chain management under the threat of international terrorism. The International Journal of logistics management, 12(2), 1-11.
Åšwierczek, A. (2014). The impact of supply chain integration on the "snowball effect" in the transmission of disruptions: An empirical evaluation of the model. International Journal of Production Economics, 157, 89-104.
Urciuoli, L. (2010). Supply chain security"”mitigation measures and a logistics multi-layered framework. Journal of Transportation Security, 3(1), 1-28.
Urciuoli, L., Mohanty, S., Hintsa, J., & Boekesteijn, E. G. (2014). The resilience of energy supply chains: a multiple case study approach on oil and gas supply chains to Europe. Supply Chain Management: An International Journal.
Van Wassenhove, L. N. (2006). Humanitarian aid logistics: supply chain management in high gear. Journal of the Operational research Society, 57(5), 475-489.
Downloads
Published
How to Cite
Issue
Section
License
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.