Choice and Chance: A Conceptual Model of Paths to Information Security Compromise

被引:123
作者
Ransbotham, Sam [1 ]
Mitra, Sabyasachi [2 ]
机构
[1] Boston Coll, Carroll Sch Management, Chestnut Hill, MA 02467 USA
[2] Georgia Inst Technol, Coll Management, Atlanta, GA 30308 USA
关键词
information security management; computer crime; information systems risk management; COMPUTER ABUSE; CRIME; SYSTEMS; MARKET; PUNISHMENT; MANAGEMENT; JUDGMENTS; ETHICS; ISSUES;
D O I
10.1287/isre.1080.0174
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
No longer the exclusive domain of technology experts, information security is now a management issue. Through a grounded approach using interviews, observations, and secondary data, we advance a model of the information security compromise process from the perspective of the attacked organization. We distinguish between deliberate and opportunistic paths of compromise through the Internet, labeled choice and chance, and include the role of countermeasures, the Internet presence of the firm, and the attractiveness of the firm for information security compromise. Further, using one year of alert data from intrusion detection devices, we find empirical support for the key contributions of the model. We discuss the implications of the model for the emerging research stream on information security in the information systems literature.
引用
收藏
页码:121 / 139
页数:19
相关论文
共 50 条
  • [41] An Information Security Model and its Validation Research-in-Progress
    Choobineh, Joobin
    AMCIS 2013 PROCEEDINGS, 2013,
  • [42] Information security policy: An organizational-level process model
    Knapp, Kenneth J.
    Morris, R. Franklin, Jr.
    Marshall, Thomas E.
    Byrd, Terry Anthony
    COMPUTERS & SECURITY, 2009, 28 (07) : 493 - 508
  • [43] Designing a Process Reference Model for Information Security Management Systems
    Mangin, Olivier
    Barafort, Beatrix
    Heymans, Patrick
    Dubois, Eric
    SOFTWARE PROCESS IMPROVEMENT AND CAPABILITY DETERMINATION, 2012, 290 : 129 - +
  • [44] A comprehensive model of information security factors for decision-makers
    Diesch, Rainer
    Pfaff, Matthias
    Krcmar, Helmut
    COMPUTERS & SECURITY, 2020, 92
  • [45] Information Security Maturity Model for Healthcare Organizations in the United States
    Barnes, Bridget
    Daim, Tugrul
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2024, 71 : 928 - 939
  • [46] Outsource or not? An AHP Based Decision Model for Information Security Management
    Jelovcan, Luka
    Mihelic, Anze
    Prislan, Kaja
    ORGANIZACIJA, 2022, 55 (02) : 142 - 159
  • [47] Model Driven Information Security Management - Evaluating and Applying the Meta Model of ISO 27001
    Milicevic, Danijel
    Goeken, Matthias
    AMCIS 2011 PROCEEDINGS, 2011,
  • [48] The complexity of an investment competition dynamical model with imperfect information in a security market
    Xin, Baogui
    Ma, Junhai
    Gao, Qin
    CHAOS SOLITONS & FRACTALS, 2009, 42 (04) : 2425 - 2438
  • [49] A NEW MODEL FOR INFORMATION SECURITY ASSURANCE IN ORGANIZATIONS - PROPOSAL AND CASE STUDY
    Tiganoaia, Bogdan
    MANAGEMENT - FACING NEW TECHNOLOGY CHALLENGES, ICMIE 2013, 2013, : 189 - 196
  • [50] Priority indexing model for evaluating and analysing organisations' information security systems
    Zaied, Abdel Nasser H.
    International Journal of Information Systems and Change Management, 2009, 4 (01) : 57 - 65