Information Security Risk Assessments following Cybersecurity Breaches : The Mediating Role of Top Management Attention to Cybersecurity
Shaikh, F. A., & Siponen, M. (2023). Information Security Risk Assessments following Cybersecurity Breaches : The Mediating Role of Top Management Attention to Cybersecurity. Computers and Security, 124, Article 102974. https://doi.org/10.1016/j.cose.2022.102974
Julkaistu sarjassa
Computers and SecurityPäivämäärä
2023Oppiaine
TietojärjestelmätiedeEmpirical Cyber Security and Software EngineeringInformation Systems ScienceEmpirical Cyber Security and Software EngineeringTekijänoikeudet
© 2022 The Author(s). Published by Elsevier Ltd.
Information Systems (IS) research on managerial response to cybersecurity breaches has largely focused on externally oriented actions such as customer redressal and crisis response. Within the firm itself, a breach may be a symptom of systematic problems, and a narrow, siloed focus on only fixing immediate issues through technical fixes and controls might preclude other managerial actions to ensure future cybersecurity. Towards this end, Information Security Risk Assessments (ISRA) can help surface other vulnerabilities following a breach. While the role of governance in such exercises is emphasized in standards, it is undertheorized in IS research and lacks empirical evidence. We draw on the attention-based view to theorize that the principles of focus of attention, structural distribution of attention, and situated attention can lead to the top management team (TMT) according greater attention to cybersecurity following relatively high breach costs. Using firm level data, we find that high breach costs result in greater TMT attention to cybersecurity, while also making it more likely that firms will carry out an ISRA. Moreover, TMT attention to cybersecurity partially mediates the relation between breach costs and the decision to carry out an ISRA. We theorize that this is because the TMT is best positioned to oversee resource allocation, consider business implications, and centrally orchestrate an ISRA. Our findings stress the need for the cybersecurity function to work with the TMT in managing breach response.
...
Julkaisija
ElsevierISSN Hae Julkaisufoorumista
0167-4048Asiasanat
Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/159303383
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisätietoja rahoituksesta
This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Literature review of information security practice survey reports
Yang, Yaping (2018)The author searched reports about enterprises information security prepared by consulting companies in order to understand organizations' security practices. The author then summarized the reports by year, identified topics ... -
Beyond economic and financial analyses : A revelatory study of IT security investment decision-making process
Kohli, Rajiv; Sarker, Suprateek; Siponen, Mikko; Karjalainen, Mari (Association for Information Systems, 2022)Information Technology (IT) security breaches and the extent of damage they may cause to an organization are inherently uncertain. Therefore, managers’ decisions about whether to make IT security investment (ITSI) and how ... -
Organizational Learning from Cybersecurity Performance : Effects on Cybersecurity Investment Decisions
Shaikh, Faheem Ahmed; Siponen, Mikko (Springer, 2023)IS literature has identified various economic, performance, and environmental factors affecting cybersecurity investment decisions. However, economic modeling approaches dominate, and research on cybersecurity performance ... -
Information Security Governance in Civil Aviation
Salmenpää, Tomi (Springer, 2022)This chapter focuses mainly to proactive means in information security and more specifically governance of information security in civil aviation. The reason is that, to find sustainable, coherent and holistic way to ... -
TARA+AD: Threat Analysis and Risk Assessment for Automated Driving : cybersecurity of road vehicles
Loskin, Ilona (2023)Cybersecurity of road vehicles has become a genuine matter as vehicles are not manufactured anymore as plain mechanical devices but containing numerous amounts of computers and millions of lines of code. The intelligent ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.