Complementary Resource Effects Across Organizational Boundaries and the Remediation of Security Incidents

نویسندگان

  • Mark-David McLaughlin
  • Janis L. Gogan
چکیده

Organizations experience frequent cyber-attacks, and recovery comes at a high cost. Of especially high concern are those breaches involving inter-organizational networks, since repercussions can quickly spread across organizations. We report on a case study of such a security incident. Inter-organizational cooperation was required to detect the scope of the breach and to recover from its effects. Drawing on the resource based view (RBV), we propose that effective response to security incidents relies on bundles of complementary resources (assets and capabilities) available to the cooperating parties. We identify institutional, technical, and organizational resources used during incident response, and analyze to what extent each was complementary to or non-compatible with other resources. Our findings suggest that resources can be complementary in some situations and not complementary in other situations. We identify specific forms of non-compatibility, and offer suggestions for further research which would aim to help organizations assemble resource bundles to effectively respond to network breaches that can impact inter-organizational relationships.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Employee Engagement and Individual Differences: A Study in Indian Context

The employee engagement has emerged as a pivotal business driver for organizational success. High level of engagement in domestic and global firms is supposed to have multiple enriching effects on an organization. Studies have highlighted the importance of both organizational and individual factors in ensuring highly engaged employees. The present paper explores the individual differs across fo...

متن کامل

Extended Enterprise Applications and Sustained Competitive Advantage

In this study we extend the resource-based view of the firm to include inter-organizational complementary resources. We use web services as an example of a technology that extends firm resources beyond organizational boundaries. The modular design of web services enables the integration of monolithic applications within and across enterprises, creating the vision of an extended enterprise that ...

متن کامل

Diversity management and human resources productivity: Mediating effects of perceived organizational attractiveness, organizational justice and social identity in Isfahan’s steel industry

Acknowledged by most researchers and scholars, human resource productivity is the most important factor in the resistive economy and business. On the other hand, Workforce diversity is one of the major challenges of this century; and perhaps for managers, managing diversity is more important than seeking diversity to maximize the human resource productivity. The present study aims to analyze th...

متن کامل

Improving Information Security Training: An Intercultural Perspective

To ensure successful compliance with information security (InfoSec) policy and standards, organisations must harmonise their InfoSec training programmes with the national culture of the local workforce. A successful InfoSec policy must demonstrate the value of security, not just the requirement for security. We conducted a quantitative study of 177 professionals across 35 national cultures to i...

متن کامل

Community-based Analysis of Netflow for Early Detection of Security Incidents

Detection and remediation of security incidents (e.g., attacks, compromised machines, policy violations) is an increasingly important task of system administrators. While numerous tools and techniques are available (e.g., Snort, nmap, netflow), novel attacks and low-grade events may still be hard to detect in a timely manner. In this paper, we present a novel approach for detecting stealthy, lo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013