dc.contributor.author | Kohli, Rajiv | |
dc.contributor.author | Sarker, Suprateek | |
dc.contributor.author | Siponen, Mikko | |
dc.contributor.author | Karjalainen, Mari | |
dc.date.accessioned | 2023-04-18T04:56:24Z | |
dc.date.available | 2023-04-18T04:56:24Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Kohli, R., Sarker, S., Siponen, M., & Karjalainen, M. (2022). Beyond economic and financial analyses : A revelatory study of IT security investment decision-making process. In <i>WISP 2022 : Proceedings of the 17th Workshop on Information Security and Privacy</i>. Association for Information Systems. <a href="https://aisel.aisnet.org/wisp2022/13/" target="_blank">https://aisel.aisnet.org/wisp2022/13/</a> | |
dc.identifier.other | CONVID_182723941 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/86380 | |
dc.description.abstract | Information Technology (IT) security breaches and the extent of damage they may cause to an organization are inherently uncertain. Therefore, managers’ decisions about whether to make IT security investment (ITSI) and how much, depend upon a subjective assessment of the economic value of the investment and the likelihood of the damage to the organization. When managers delay or fail to decide on whether and how much to invest in IT security, it can make organizations vulnerable to operational and strategic perils. Based upon interviews, document reviews, and observations in three organizations in Finland that made ITSI decisions to acquire a secure email application system, we examined the process through which ITSI decisions were made. Using institutional logics as the theoretical scaffolding, we find that ITSI decisions are driven by more than economic and financial analyses. We find that when stakeholders’ logics conflict with each other’s logics, framing through discourse gives way to a dominant logic, or a hybrid logic which in turn results in an ITSI decision outcome. Trigging events, within or outside the organizations, can lead to iterations of the decision-making process. Using the metaphor of a spiral, we illustrate the repetitive iterations through which institutional logics shape stakeholders’ ITSI decision-making process. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Association for Information Systems | |
dc.relation.ispartof | WISP 2022 : Proceedings of the 17th Workshop on Information Security and Privacy | |
dc.relation.uri | https://aisel.aisnet.org/wisp2022/13/ | |
dc.rights | In Copyright | |
dc.subject.other | IT security | |
dc.subject.other | revelatory study | |
dc.subject.other | decision making | |
dc.subject.other | cybersecurity | |
dc.subject.other | behavioral | |
dc.title | Beyond economic and financial analyses : A revelatory study of IT security investment decision-making process | |
dc.type | conferenceObject | |
dc.identifier.urn | URN:NBN:fi:jyu-202304182504 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietojärjestelmätiede | fi |
dc.contributor.oppiaine | Empirical Cyber Security and Software Engineering | fi |
dc.contributor.oppiaine | Information Systems Science | en |
dc.contributor.oppiaine | Empirical Cyber Security and Software Engineering | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | nonPeerReviewed | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © Association for Information Systems 2022 | |
dc.rights.accesslevel | openAccess | fi |
dc.relation.conference | Pre-ICIS Workshop on Information Security and Privacy | |
dc.subject.yso | investoinnit | |
dc.subject.yso | päätöksenteko | |
dc.subject.yso | tietojärjestelmät | |
dc.subject.yso | yritykset | |
dc.subject.yso | johtaminen | |
dc.subject.yso | tietoturva | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | tietotekniikka | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p4320 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p8743 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3927 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3128 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p554 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5462 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.type.okm | D3 | |