2021
DOI: 10.1080/07421222.2021.1870390
|View full text |Cite
|
Sign up to set email alerts
|

The Roles of IT Strategies and Security Investments in Reducing Organizational Security Breaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 34 publications
(7 citation statements)
references
References 53 publications
0
7
0
Order By: Relevance
“…When considering the impact of information security investments on data breaches, companies must consider the impact of institutional factors and balance them. Li et al ( 2021 ) found that IT security investments have different effects on security breaches in organizations with different approaches to making digitalized progress. Li W, Leung ACM, Yue WT ( 2022 ) stated that there is a dynamic interrelationship between IT investments and data breaches.…”
Section: Literature Reviewmentioning
confidence: 99%
“…When considering the impact of information security investments on data breaches, companies must consider the impact of institutional factors and balance them. Li et al ( 2021 ) found that IT security investments have different effects on security breaches in organizations with different approaches to making digitalized progress. Li W, Leung ACM, Yue WT ( 2022 ) stated that there is a dynamic interrelationship between IT investments and data breaches.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The consensus indicates that the adoption of new digital technologies progresses alongside the emergence of more convenient and capable technologies. According to Li et al (2021), this means that organizations are also likely to upgrade their corporate security environments with upgrades to their information security environments. Many published studies have dealt with certain aspects of specific industries adopting new technologies, including risk analysis (Karanja and Rosso, 2017; Inskeep, 2019; Li et al , 2021; Ritchey, 2020), and while this can be extended to apply to security convergence, there are few direct resources designed to guide or analyze a broad approach to security convergence operations.…”
Section: Prior Convergence Studiesmentioning
confidence: 99%
“…Dimensions Li, Yoo & Kettinger [49] Information security, security of decision making and communication processes, security of the ICT infrastructure.…”
Section: Authormentioning
confidence: 99%