Information Security Risk Assessments following Cybersecurity Breaches : The Mediating Role of Top Management Attention to Cybersecurity
Shaikh, F. A., & Siponen, M. (2023). Information Security Risk Assessments following Cybersecurity Breaches : The Mediating Role of Top Management Attention to Cybersecurity. Computers and Security, 124, Article 102974. https://doi.org/10.1016/j.cose.2022.102974
Published in
Computers and SecurityDate
2023Copyright
© 2022 The Author(s). Published by Elsevier Ltd.
Information Systems (IS) research on managerial response to cybersecurity breaches has largely focused on externally oriented actions such as customer redressal and crisis response. Within the firm itself, a breach may be a symptom of systematic problems, and a narrow, siloed focus on only fixing immediate issues through technical fixes and controls might preclude other managerial actions to ensure future cybersecurity. Towards this end, Information Security Risk Assessments (ISRA) can help surface other vulnerabilities following a breach. While the role of governance in such exercises is emphasized in standards, it is undertheorized in IS research and lacks empirical evidence. We draw on the attention-based view to theorize that the principles of focus of attention, structural distribution of attention, and situated attention can lead to the top management team (TMT) according greater attention to cybersecurity following relatively high breach costs. Using firm level data, we find that high breach costs result in greater TMT attention to cybersecurity, while also making it more likely that firms will carry out an ISRA. Moreover, TMT attention to cybersecurity partially mediates the relation between breach costs and the decision to carry out an ISRA. We theorize that this is because the TMT is best positioned to oversee resource allocation, consider business implications, and centrally orchestrate an ISRA. Our findings stress the need for the cybersecurity function to work with the TMT in managing breach response.
...


Publisher
ElsevierISSN Search the Publication Forum
0167-4048Keywords
Publication in research information system
https://converis.jyu.fi/converis/portal/detail/Publication/159303383
Metadata
Show full item recordCollections
Additional information about funding
This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.License
Related items
Showing items with similar title or keywords.
-
Information Security Governance in Civil Aviation
Salmenpää, Tomi (Springer, 2022)This chapter focuses mainly to proactive means in information security and more specifically governance of information security in civil aviation. The reason is that, to find sustainable, coherent and holistic way to ... -
Kiristyshaittaohjelmahyökkäysten kohteiden valikoituminen
Markkanen, Veikko (2022)Kiristyshaittaohjelmahyökkäysten muodostama rasite kasvaa. Hyökkäyksiä ohjaavien voimien ymmärtäminen on tullut ratkaisevan tärkeäksi tehokkaampia torjuntamekanismeja rakennettaessa. Kiristyshaittaohjelmahyökkäysten kehitystä ... -
Assessment of Cybersecurity Risks: Maritime Automated Piloting Process
Pöyhönen, Jouni; Lehto, Martti (Academic Conferences International Ltd, 2022)A modern society is a combination of several critical infrastructures, of which international and national maritime transportation systems are essential parts. Digitalization makes it possible to increase levels ... -
Literature review of information security practice survey reports
Yang, Yaping (2018)The author searched reports about enterprises information security prepared by consulting companies in order to understand organizations' security practices. The author then summarized the reports by year, identified topics ... -
Ulkoisten kyberturvallisuuden riskien arviointi finanssialan organisaatiossa
Takala, Niko (2019)Riskienhallintaa ja riskien arviointia voidaan tarkastella useasta eri näkökulmasta ja sitä ohjaavat useat erilaiset tekijät. Ohjaaviksi tekijöiksi voidaan tunnistaa organisaation strategia, organisaatiokulttuuri, ...