Business Strategy and Cybersecurity Breaches

IF 7.3 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS European Journal of Information Systems Pub Date : 2023-06-01 DOI:10.2308/isys-2022-033
Tianpei Li, S. Walton
{"title":"Business Strategy and Cybersecurity Breaches","authors":"Tianpei Li, S. Walton","doi":"10.2308/isys-2022-033","DOIUrl":null,"url":null,"abstract":"\n This study examines whether a firm’s business strategy is an underlying determinant of cybersecurity breach likelihood. Based on organizational theory, firm strategy can focus on innovation or efficiency, with innovative strategy firms being more likely to have weaker, decentralized control systems, multiple technologies, and greater risk than firms with an efficiency-focused strategy. Following the Miles and Snow (1978) strategy topology, we predict and find that the prospector business strategy is associated with greater breach likelihood. We further explore IT awareness within the firm. Ex ante, it is unclear whether strategic IT policy formation is impounded into a firm’s strategy or can be impacted by individual executives and nonstrategy firm characteristics. We find that IT understanding at the executive or firm level can affect the relationship between strategy and breach likelihood. Collectively, our results indicate that business strategy is a useful indicator in evaluating firms’ cybersecurity activities.","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":null,"pages":null},"PeriodicalIF":7.3000,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"European Journal of Information Systems","FirstCategoryId":"91","ListUrlMain":"https://doi.org/10.2308/isys-2022-033","RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

This study examines whether a firm’s business strategy is an underlying determinant of cybersecurity breach likelihood. Based on organizational theory, firm strategy can focus on innovation or efficiency, with innovative strategy firms being more likely to have weaker, decentralized control systems, multiple technologies, and greater risk than firms with an efficiency-focused strategy. Following the Miles and Snow (1978) strategy topology, we predict and find that the prospector business strategy is associated with greater breach likelihood. We further explore IT awareness within the firm. Ex ante, it is unclear whether strategic IT policy formation is impounded into a firm’s strategy or can be impacted by individual executives and nonstrategy firm characteristics. We find that IT understanding at the executive or firm level can affect the relationship between strategy and breach likelihood. Collectively, our results indicate that business strategy is a useful indicator in evaluating firms’ cybersecurity activities.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
业务战略和网络安全漏洞
本研究考察了公司的商业战略是否是网络安全漏洞可能性的潜在决定因素。根据组织理论,企业战略可以关注创新或效率,与注重效率的企业相比,创新战略企业更有可能拥有较弱、分散的控制系统、多种技术和更大的风险。根据Miles和Snow(1978)的战略拓扑,我们预测并发现勘探者的商业战略与更大的违约可能性相关。我们进一步探索公司内部的信息技术意识。在此之前,还不清楚战略it政策的形成是否包含在公司的战略中,或者是否会受到个别高管和非战略公司特征的影响。我们发现,高管或公司层面的信息技术理解可以影响战略与违约可能性之间的关系。总体而言,我们的研究结果表明,企业战略是评估企业网络安全活动的有用指标。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
European Journal of Information Systems
European Journal of Information Systems 工程技术-计算机:信息系统
CiteScore
23.10
自引率
4.20%
发文量
52
审稿时长
>12 weeks
期刊介绍: The European Journal of Information Systems offers a unique European perspective on the theory and practice of information systems for a global readership. We actively seek first-rate articles that offer a critical examination of information technology, covering its effects, development, implementation, strategy, management, and policy.
期刊最新文献
Unveiling motivational configurations in shaping meaningful engagement in green gamification Determinants of gamification effectiveness: perspectives of technology affordances and coping responses in the context of team-based gamified training Examining the impact of mobile gambling harm minimisation features: a dualistic model of passion perspective Achieving strategic alignment between business and information technology with information technology governance: the role of commitment to principles and Top Leadership Support Reducing the incidence of biased algorithmic decisions through feature importance transparency: an empirical study
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1