Näytä suppeat kuvailutiedot

dc.contributor.authorShaikh, Faheem Ahmed
dc.contributor.authorSiponen, Mikko
dc.date.accessioned2022-11-01T12:38:58Z
dc.date.available2022-11-01T12:38:58Z
dc.date.issued2023
dc.identifier.citationShaikh, F. A., & Siponen, M. (2023). Information Security Risk Assessments following Cybersecurity Breaches : The Mediating Role of Top Management Attention to Cybersecurity. <i>Computers and Security</i>, <i>124</i>, Article 102974. <a href="https://doi.org/10.1016/j.cose.2022.102974" target="_blank">https://doi.org/10.1016/j.cose.2022.102974</a>
dc.identifier.otherCONVID_159303383
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/83750
dc.description.abstractInformation Systems (IS) research on managerial response to cybersecurity breaches has largely focused on externally oriented actions such as customer redressal and crisis response. Within the firm itself, a breach may be a symptom of systematic problems, and a narrow, siloed focus on only fixing immediate issues through technical fixes and controls might preclude other managerial actions to ensure future cybersecurity. Towards this end, Information Security Risk Assessments (ISRA) can help surface other vulnerabilities following a breach. While the role of governance in such exercises is emphasized in standards, it is undertheorized in IS research and lacks empirical evidence. We draw on the attention-based view to theorize that the principles of focus of attention, structural distribution of attention, and situated attention can lead to the top management team (TMT) according greater attention to cybersecurity following relatively high breach costs. Using firm level data, we find that high breach costs result in greater TMT attention to cybersecurity, while also making it more likely that firms will carry out an ISRA. Moreover, TMT attention to cybersecurity partially mediates the relation between breach costs and the decision to carry out an ISRA. We theorize that this is because the TMT is best positioned to oversee resource allocation, consider business implications, and centrally orchestrate an ISRA. Our findings stress the need for the cybersecurity function to work with the TMT in managing breach response.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherElsevier
dc.relation.ispartofseriesComputers and Security
dc.rightsCC BY 4.0
dc.subject.othercybersecurity breach
dc.subject.otherrisk assessment
dc.subject.othertop management team
dc.subject.otherattention-based view
dc.subject.otherpost-breach management
dc.subject.othercybersecurity governance
dc.titleInformation Security Risk Assessments following Cybersecurity Breaches : The Mediating Role of Top Management Attention to Cybersecurity
dc.typearticle
dc.identifier.urnURN:NBN:fi:jyu-202211015055
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineEmpirical Cyber Security and Software Engineeringfi
dc.contributor.oppiaineInformation Systems Scienceen
dc.contributor.oppiaineEmpirical Cyber Security and Software Engineeringen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.type.coarhttp://purl.org/coar/resource_type/c_2df8fbb1
dc.description.reviewstatuspeerReviewed
dc.relation.issn0167-4048
dc.relation.volume124
dc.type.versionpublishedVersion
dc.rights.copyright© 2022 The Author(s). Published by Elsevier Ltd.
dc.rights.accesslevelopenAccessfi
dc.subject.ysotietotekniikka
dc.subject.ysotietoturva
dc.subject.ysoriskinarviointi
dc.subject.ysotietomurto
dc.subject.ysoyritykset
dc.subject.ysokyberturvallisuus
dc.subject.ysojohtoryhmät
dc.subject.ysoriskit
dc.subject.ysotietojärjestelmät
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p5462
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p6079
jyx.subject.urihttp://www.yso.fi/onto/yso/p27294
jyx.subject.urihttp://www.yso.fi/onto/yso/p3128
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p23210
jyx.subject.urihttp://www.yso.fi/onto/yso/p11099
jyx.subject.urihttp://www.yso.fi/onto/yso/p3927
dc.rights.urlhttps://creativecommons.org/licenses/by/4.0/
dc.relation.doi10.1016/j.cose.2022.102974
jyx.fundinginformationThis research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.
dc.type.okmA1


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

CC BY 4.0
Ellei muuten mainita, aineiston lisenssi on CC BY 4.0