To Calculate or To Follow Others : How Do Information Security Managers Make Investment Decisions?
Shao, X., Siponen, M., & Pahnila, S. (2019). To Calculate or To Follow Others : How Do Information Security Managers Make Investment Decisions?. In Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS 2019) (pp. 4885-4894). University of Hawai'i at Manoa. Proceedings of the Annual Hawaii International Conference on System Sciences. https://doi.org/10.24251/hicss.2019.588
Julkaistu sarjassa
Proceedings of the Annual Hawaii International Conference on System SciencesPäivämäärä
2019Tekijänoikeudet
© the Authors, 2019.
Economic models of information security
investment suggest estimating cost and benefit to make
an information security investment decision. However,
the intangible nature of information security
investment prevents managers from applying costbenefit analysis in practice. Instead, information
security managers may follow experts’
recommendations or the practices of other
organizations. The present paper examines factors
that influence information security managers’
investment decisions from the reputational herding
perspective. The study was conducted using survey
questionnaire data collected from 106 organizations
in Finland. The findings of the study reveal that the
ability and reputation of the security manager and the
strength of the information about the security
investment significantly motivate the security manager
to discount his or her own information. Herding, as a
following strategy, together with mandatory
requirements are significant motivations for
information security investment.
...
Julkaisija
University of Hawai'i at ManoaEmojulkaisun ISBN
978-0-9981331-2-6Konferenssi
Kuuluu julkaisuun
Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS 2019)ISSN Hae Julkaisufoorumista
1530-1605Asiasanat
Alkuperäislähde
http://hdl.handle.net/10125/59926Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/28829558
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Shall We Follow? Impact of Reputation Concern on Information Security Managers’ Investment Decisions
Shao, Xiuyan; Siponen, Mikko; Liu, Fufan (Elsevier BV, 2020)Information security (infosec) is important for organizations. While budgeting for infosec is a crucial resource allocation decision, infosec managers may choose to follow other fellow experts’ recommendations or baseline ... -
Towards an optimal self-assessment tool for information security investment decision-making
Kokkonen, Mika (2017)Aikaisempi tutkimus keskittyi pääasiallisesti taloudellisiin malleihin, joiden tarkoituksena oli auttaa organisaatioita tunnistamaan kuinka paljon heidän tulisi sijoittaa tietoturvallisuuteen. Nämä mallit pyrkivät tuottojen ... -
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions
Siponen, Mikko; Soliman, Wael; Vance, Anthony (ACM, 2022)In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security ... -
The determinants affecting on the investment proposals adoption
Hirvonen, Pauliina (2016)Tietoturvallisuuden tutkimuksessa ei ole kyetty tunnistamaan tekijöitä, jotka vaikuttavat tietoturvallisuusaloitteiden onnistumiseen. Teoreettinen tutkimus lähestyy haastetta tarkastelemalla olemassa olevia tietotekniikan ... -
Method Framework for Developing Enterprise Architecture Security Principles
Larno, Sara; Seppänen, Ville; Nurmi, Jarkko (RTU Press, 2019)Organizations need to consider many facets of information security in their daily operations – among others, the rapidly increasing use of IT, emerging technologies and digitalization of organizations’ core resources provoke ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.