Complementary Resource Effects Across Organizational Boundaries and the Remediation of Security Incidents
نویسندگان
چکیده
Organizations experience frequent cyber-attacks, and recovery comes at a high cost. Of especially high concern are those breaches involving inter-organizational networks, since repercussions can quickly spread across organizations. We report on a case study of such a security incident. Inter-organizational cooperation was required to detect the scope of the breach and to recover from its effects. Drawing on the resource based view (RBV), we propose that effective response to security incidents relies on bundles of complementary resources (assets and capabilities) available to the cooperating parties. We identify institutional, technical, and organizational resources used during incident response, and analyze to what extent each was complementary to or non-compatible with other resources. Our findings suggest that resources can be complementary in some situations and not complementary in other situations. We identify specific forms of non-compatibility, and offer suggestions for further research which would aim to help organizations assemble resource bundles to effectively respond to network breaches that can impact inter-organizational relationships.
منابع مشابه
Employee Engagement and Individual Differences: A Study in Indian Context
The employee engagement has emerged as a pivotal business driver for organizational success. High level of engagement in domestic and global firms is supposed to have multiple enriching effects on an organization. Studies have highlighted the importance of both organizational and individual factors in ensuring highly engaged employees. The present paper explores the individual differs across fo...
متن کاملExtended Enterprise Applications and Sustained Competitive Advantage
In this study we extend the resource-based view of the firm to include inter-organizational complementary resources. We use web services as an example of a technology that extends firm resources beyond organizational boundaries. The modular design of web services enables the integration of monolithic applications within and across enterprises, creating the vision of an extended enterprise that ...
متن کاملDiversity management and human resources productivity: Mediating effects of perceived organizational attractiveness, organizational justice and social identity in Isfahan’s steel industry
Acknowledged by most researchers and scholars, human resource productivity is the most important factor in the resistive economy and business. On the other hand, Workforce diversity is one of the major challenges of this century; and perhaps for managers, managing diversity is more important than seeking diversity to maximize the human resource productivity. The present study aims to analyze th...
متن کاملImproving Information Security Training: An Intercultural Perspective
To ensure successful compliance with information security (InfoSec) policy and standards, organisations must harmonise their InfoSec training programmes with the national culture of the local workforce. A successful InfoSec policy must demonstrate the value of security, not just the requirement for security. We conducted a quantitative study of 177 professionals across 35 national cultures to i...
متن کاملCommunity-based Analysis of Netflow for Early Detection of Security Incidents
Detection and remediation of security incidents (e.g., attacks, compromised machines, policy violations) is an increasingly important task of system administrators. While numerous tools and techniques are available (e.g., Snort, nmap, netflow), novel attacks and low-grade events may still be hard to detect in a timely manner. In this paper, we present a novel approach for detecting stealthy, lo...
متن کامل