2018
DOI: 10.1016/j.cose.2018.02.001
|View full text |Cite
|
Sign up to set email alerts
|

Information security investments: An exploratory multiple case study on decision-making, evaluation and learning

Abstract: The need to protect resources against attackers is reflected by huge information security investments of firms worldwide. In the presence of budget constraints and a diverse set of assets to protect, organizations have to decide in which IT security measures to invest, how to evaluate those investment decisions, and how to learn from past decisions to optimize future security investment actions. While the academic literature has provided valuable insights into these issues, there is a lack of empirical contrib… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(21 citation statements)
references
References 94 publications
0
21
0
Order By: Relevance
“…Effective investments in IT [35,36], and in information security in particular [22,[37][38][39][40], have long been topics of interest in both academic and industry circles. In general, by allocating resources to cybersecurity capabilities, managers can not only effectively reduce potential losses due to cyberattacks, but also improve overall performance of their operations [22].…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…Effective investments in IT [35,36], and in information security in particular [22,[37][38][39][40], have long been topics of interest in both academic and industry circles. In general, by allocating resources to cybersecurity capabilities, managers can not only effectively reduce potential losses due to cyberattacks, but also improve overall performance of their operations [22].…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…The theoretical aspects of mathematical support for decision-making in the course of choosing a rational strategy for investing in IS are considered in [17,18]. However, these works do not describe the software implementation of those models.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…Are measures in place to protect the privacy of customers despite increased monitoring capabilities enabled by smart meters and other smart home devices [22]? Does information security contribute to the organizational goals or is it perceived as a impediment to smooth operations [48]? Can the SG fulfill the hopes by providing electricity in a safe, reliable and secure way without significantly increasing society's exposure to new threats [19]?…”
Section: Smart Grid Architecture Model (Sgam)mentioning
confidence: 99%