Informing cybersecurity strategic commitment through top management perceptions: The role of institutional pressures

被引:29
作者
Ogbanufe, Obi [1 ]
Kim, Dan J. [1 ]
Jones, Mary C. [1 ]
机构
[1] Univ North Texas, G Brint Ryan Coll Business, Dept Informat Technol & Decis Sci, 1307 West Highland St, Denton, TX 76201 USA
基金
美国国家科学基金会;
关键词
Risk management; Cybersecurity strategy; Cyberinsurance; Top management; Upper echelons theory; Institutional theory; INFORMATION-SYSTEMS SECURITY; CYBER-RISK; REGULATORY OVERSIGHT; SENIOR EXECUTIVES; POLICY COMPLIANCE; JOB INSECURITY; UPPER ECHELONS; E-COMMERCE; DECISION; ASSIMILATION;
D O I
10.1016/j.im.2021.103507
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Given the financial consequences of security breaches, security risk management has gained more attention in board rooms and garnered more involvement from top management. We undertake a study to understand the top managers' role in cybersecurity strategy, specifically with cyberinsurance. This study draws from institutional and upper echelons theories to explain how top managers' values and perceptions mediate the impact of external institutional pressures on the commitment to use cyberinsurance as a risk management strategy. We empirically test proposed hypotheses using data collected from executive-level managers of various firms and perform semi structured interviews of six case sites as post hoc analysis. The results suggest that institutional pressures positively affect top managers' perceptions of job security, breach risk, financial risk, transaction cost, and regulatory oversight. In turn, these perceptions influence their commitment to cyberinsurance. We find that values and perceptions of personal relevance have a significant impact on their strategic decisions. The findings emphasize the critical role that top management plays in mediating the influence of institutional pressures on cybersecurity strategy. Implications for research and practice, along with limitations and future directions, are discussed.
引用
收藏
页数:18
相关论文
共 139 条
[81]   Trust and Satisfaction, Two Stepping Stones for Successful E-Commerce Relationships: A Longitudinal Exploration [J].
Kim, Dan J. ;
Ferrin, Donald L. ;
Rao, H. Raghav .
INFORMATION SYSTEMS RESEARCH, 2009, 20 (02) :237-257
[82]  
Kline R. B., 2015, Principle and practice of structural equation modelling, DOI [10.15353/cgjsc.v1i1.3787, DOI 10.15353/CGJSC.V1I1.3787]
[84]   Lateral Collinearity and Misleading Results in Variance-Based SEM: An Illustration and Recommendations [J].
Kock, Ned ;
Lynn, Gary S. .
JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2012, 13 (07) :546-580
[85]   IT outsourcing success: A psychological contract perspective [J].
Koh, C ;
Ang, S ;
Straub, DW .
INFORMATION SYSTEMS RESEARCH, 2004, 15 (04) :356-373
[86]   Examining risk tolerance in project-driven organization [J].
Kwak, YH ;
LaPlace, KS .
TECHNOVATION, 2005, 25 (06) :691-695
[87]   PROACTIVE VERSUS REACTIVE SECURITY INVESTMENTS IN THE HEALTHCARE SECTOR [J].
Kwon, Juhee ;
Johnson, M. Eric .
MIS QUARTERLY, 2014, 38 (02) :451-+
[88]   COGNITION AND MOTIVATION IN EMOTION [J].
LAZARUS, RS .
AMERICAN PSYCHOLOGIST, 1991, 46 (04) :352-367
[89]   Threat or coping appraisal: determinants of SMB executives' decision to adopt anti-malware software [J].
Lee, Younghwa ;
Larsen, Kai R. .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2009, 18 (02) :177-187
[90]  
Lei C., 1994, 2nd ACM Conference on Computer and Communications Security, P170