Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity
نویسندگان
چکیده
Information Systems (IS) research on managerial response to cybersecurity breaches has largely focused externally oriented actions such as customer redressal and crisis response. Within the firm itself, a breach may be symptom of systematic problems, narrow, siloed focus only fixing immediate issues through technical fixes controls might preclude other ensure future cybersecurity. Towards this end, Security Risk Assessments (ISRA) can help surface vulnerabilities following breach. While role governance in exercises is emphasized standards, it undertheorized IS lacks empirical evidence. We draw attention-based view theorize that principles attention, structural distribution situated attention lead top management team (TMT) according greater relatively high costs. Using level data, we find costs result TMT cybersecurity, while also making more likely firms will carry out an ISRA. Moreover, partially mediates relation between decision because best positioned oversee resource allocation, consider business implications, centrally orchestrate Our findings stress need for function work with managing
منابع مشابه
Composition of the Top Management Team and Information Security Breaches
Given the multifaceted problems and complexities of information security, the manner in which top management teams make investment and management decisions regarding security technologies, policy initiatives, and employee education could have a significant impact on the likelihood of information security breaches in organizations. In the context of information security management, it is not cle...
متن کاملLinking Cybersecurity Knowledge: Cybersecurity Information Discovery Mechanism
To cope with increasing amount of cyber threats, organizations need to share cybersecurity information beyond the borders of organizations, countries, and even languages. Assorted organizations built repositories that store and provide XML-based cybersecurity information on the Internet. Among them are NVD [1], OSVDB [2], and JVN [3], and more cybersecurity information from various organization...
متن کاملFrom physical security to cybersecurity
Security is a critical concern around the world. In many domains from cyber-security to sustainability, limited security resources prevent complete security coverage at all times. Instead, these limited resources must be scheduled (or allocated or deployed), while simultaneously taking into account the importance of different targets, the responses of the adversaries to the security posture, an...
متن کاملCybersecurity Cost of Quality: Managing the Costs of Cybersecurity Risk Management
There is no standard yet for measuring and controlling the costs associated with implementing cybersecurity programs. To advance research and practice towards this end, we develop a mapping using the well-known concept of quality costs and the Framework Core within the Cybersecurity Framework produced by the National Institute of Standards and Technology (NIST) in response to the Cybersecurity ...
متن کاملCybersecurity Information Sharing: a Framework for Sustainable Information Security Management in UK SME Supply Chains
UK small to medium sized enterprises (SMEs) are suffering increasing levels of cybersecurity breaches and are a major point of vulnerability in the supply chain networks in which they participate. A key factor for achieving optimal security levels within supply chains is the management and sharing of cybersecurity information associated with specific metrics. Such information sharing schemes am...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Security
سال: 2023
ISSN: ['0167-4048', '1872-6208']
DOI: https://doi.org/10.1016/j.cose.2022.102974