Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2014
DOI: 10.1108/ijaim-04-2014-0026
|View full text |Cite
|
Sign up to set email alerts
|

Investigating security investment impact on firm performance

Abstract: Purpose – The purpose of this study is to propose to use the economic value added to measure firm performance against information security investments. Design/methodology/approach – The authors develop a conceptual framework to capture non information technology (IT)-related and IT-related security investment factors and propose to study their holistic influences on firm performance. Findings … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
19
0
2

Year Published

2017
2017
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(22 citation statements)
references
References 53 publications
1
19
0
2
Order By: Relevance
“…In general, by allocating resources to cybersecurity capabilities, managers can not only effectively reduce potential losses due to cyberattacks, but also improve overall performance of their operations [22]. It remains that the diversion of funds away from profit-making processes and assets reduces cash flow [41]; this issue is exacerbated in small and medium-sized enterprises where there is often little or no additional funding available for cybersecurity [42].…”
Section: Theoretical Backgroundmentioning
confidence: 97%
See 2 more Smart Citations
“…In general, by allocating resources to cybersecurity capabilities, managers can not only effectively reduce potential losses due to cyberattacks, but also improve overall performance of their operations [22]. It remains that the diversion of funds away from profit-making processes and assets reduces cash flow [41]; this issue is exacerbated in small and medium-sized enterprises where there is often little or no additional funding available for cybersecurity [42].…”
Section: Theoretical Backgroundmentioning
confidence: 97%
“…Effective investments in IT [35,36], and in information security in particular [22,[37][38][39][40], have long been topics of interest in both academic and industry circles. In general, by allocating resources to cybersecurity capabilities, managers can not only effectively reduce potential losses due to cyberattacks, but also improve overall performance of their operations [22].…”
Section: Theoretical Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…First, researchers have studied cybersecurity investment strategies in general (e.g., see [18][19][20]), in addition to the more specific question of trade-offs between proactive and reactive…”
Section: Research Contributionsmentioning
confidence: 99%
“…Effective investments in IT [35,36], and in information security in particular [20,[37][38][39][40], have long been topics of interest in both academic and industry circles. In general, by allocating resources to cybersecurity capabilities, managers can not only effectively reduce potential losses due to cyberattacks, but also improve overall performance of their operations [20].…”
Section: Theoretical Backgroundmentioning
confidence: 99%