2015
DOI: 10.1016/j.im.2014.12.004
|View full text |Cite
|
Sign up to set email alerts
|

Institutional pressures in security management: Direct and indirect influences on organizational investment in information security control resources

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
66
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 82 publications
(67 citation statements)
references
References 37 publications
1
66
0
Order By: Relevance
“…Normative pressure comes mainly from the norms and values established in the community and among consumers, or professional working conditions and methods defined by a specific industry (DiMaggio & Powell, 1983). As one form of societal legalization, the behavior of each firm is restricted by norms, standards and expectations of external stakeholders (Cavusoglu, Cavusoglu, Son, & Benbasat, 2015). Even without compulsory and punitive functions of laws and systems, normative pressure still has a bearing on a firm's environmental innovation.…”
Section: Normative Pressure and Environmental Innovationmentioning
confidence: 99%
“…Normative pressure comes mainly from the norms and values established in the community and among consumers, or professional working conditions and methods defined by a specific industry (DiMaggio & Powell, 1983). As one form of societal legalization, the behavior of each firm is restricted by norms, standards and expectations of external stakeholders (Cavusoglu, Cavusoglu, Son, & Benbasat, 2015). Even without compulsory and punitive functions of laws and systems, normative pressure still has a bearing on a firm's environmental innovation.…”
Section: Normative Pressure and Environmental Innovationmentioning
confidence: 99%
“…Strategic management and organizational science literature shows that differences in configurations of organizational resources and capabilities explain much of the heterogeneity in organizational performance [28][29][30]; however, achieving optimal configurations of resources and capabilities is a complex task in which not all organizations succeed [31][32][33]. Similarly, configuration of cybersecurity capabilities is inextricably tied to organizational performance, and evidence shows that major variations in the configuration of cybersecurity resources exist from company to company [34].…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…Similarly, configuration of cybersecurity capabilities is inextricably tied to organizational performance, and evidence shows that major variations in the configuration of cybersecurity resources exist from company to company [34].…”
Section: Theoretical Backgroundmentioning
confidence: 99%