Today, organisations heavily depend on the data and information that flow through their interconnected systems. As a result of this dependence, a cyber threat can pose significant risks to the uninterrupted functioning of business operations, the unauthorised acquisition of sensitive information, and damage to the organisation's reputation. Cybersecurity awareness is now a top priority for organisations operating in a rapidly changing and highly interconnected environment. The debate regarding the optimal choice between managing cybersecurity practices internally and outsourcing is evolving in this context. Prior research has examined the advantages and disadvantages of both solutions. However, there is still a lack of research on the disparities in the efficacy of cybersecurity practices between internally managed and outsourced cybersecurity processes.
This research aims to fill this gap by proposing a survey questionnaire based on a five-point Likert scale and using a Mann-Whitney U test for the hypothesis analysis, analysing the efficacy of outsourcing and internal management in cybersecurity managerial protocol actions defined using the NIST model framework. The sample surveyed consists of 153 respondents with expertise in cybersecurity or IT practices. Furthermore, a binary logistic regression analysis was conducted to investigate how these practices significantly impact the choice of an outsourcing policy.
The results indicated notable disparities in the efficacy of internal management versus external cybersecurity outsourcing. Outsourcing is associated with higher perceived effectiveness of disciplinary procedures, whereas internal management is associated with higher perceived effectiveness in safeguarding log information and applying lessons learned to improve recovery strategies.
Beyond the operational dimension, the findings highlight how cybersecurity management serves as a catalyst for organisational learning and knowledge creation. Internal cybersecurity practices tend to foster experiential learning, codification of tacit knowledge, and continuous feedback loops that enhance resilience. Conversely, outsourcing models often promote managerial innovation through exposure to external expertise and the transfer of specialised knowledge across organisational boundaries.
With these results, this study offers a deeper understanding of cybersecurity management literature and provides a valuable resource for firms seeking to customise their cyber protocols to fit their organisational context.
扫码关注我们
求助内容:
应助结果提醒方式:
