dc.contributor.author | Shao, Xiuyan | |
dc.contributor.author | Siponen, Mikko | |
dc.contributor.author | Pahnila, Seppo | |
dc.date.accessioned | 2019-01-04T06:09:35Z | |
dc.date.available | 2019-01-04T06:09:35Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | Shao, X., Siponen, M., & Pahnila, S. (2019). To Calculate or To Follow Others : How Do Information Security Managers Make Investment Decisions?. In <i>Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS 2019)</i> (pp. 4885-4894). University of Hawai'i at Manoa. Proceedings of the Annual Hawaii International Conference on System Sciences. <a href="https://doi.org/10.24251/hicss.2019.588" target="_blank">https://doi.org/10.24251/hicss.2019.588</a> | |
dc.identifier.other | CONVID_28829558 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/60873 | |
dc.description.abstract | Economic models of information security
investment suggest estimating cost and benefit to make
an information security investment decision. However,
the intangible nature of information security
investment prevents managers from applying costbenefit analysis in practice. Instead, information
security managers may follow experts’
recommendations or the practices of other
organizations. The present paper examines factors
that influence information security managers’
investment decisions from the reputational herding
perspective. The study was conducted using survey
questionnaire data collected from 106 organizations
in Finland. The findings of the study reveal that the
ability and reputation of the security manager and the
strength of the information about the security
investment significantly motivate the security manager
to discount his or her own information. Herding, as a
following strategy, together with mandatory
requirements are significant motivations for
information security investment. | fi |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | University of Hawai'i at Manoa | |
dc.relation.ispartof | Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS 2019) | |
dc.relation.ispartofseries | Proceedings of the Annual Hawaii International Conference on System Sciences | |
dc.relation.uri | http://hdl.handle.net/10125/59926 | |
dc.rights | CC BY-NC-ND 4.0 | |
dc.subject.other | information systems | |
dc.subject.other | security | |
dc.subject.other | digital economy | |
dc.subject.other | decision-making | |
dc.subject.other | herding strategy | |
dc.subject.other | information security investments | |
dc.title | To Calculate or To Follow Others : How Do Information Security Managers Make Investment Decisions? | |
dc.type | conference paper | |
dc.identifier.urn | URN:NBN:fi:jyu-201901031045 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietojärjestelmätiede | fi |
dc.contributor.oppiaine | Information Systems Science | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.date.updated | 2019-01-03T13:15:15Z | |
dc.relation.isbn | 978-0-9981331-2-6 | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 4885-4894 | |
dc.relation.issn | 1530-1605 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © the Authors, 2019. | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | conferenceObject | |
dc.relation.conference | Proceedings of the Annual Hawaii International Conference on System Sciences | |
dc.subject.yso | tietojärjestelmät | |
dc.subject.yso | Internet | |
dc.subject.yso | tietoturva | |
dc.subject.yso | yksityisyys | |
dc.subject.yso | uusi talous | |
dc.subject.yso | päätöksenteko | |
dc.subject.yso | tietoturvapolitiikka | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3927 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p20405 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p10909 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p11471 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p8743 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p25795 | |
dc.rights.url | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.relation.doi | 10.24251/hicss.2019.588 | |
dc.type.okm | A4 | |