WHERE IS IT IN INFORMATION SECURITY? THE INTERRELATIONSHIP AMONG IT INVESTMENT, SECURITY AWARENESS, AND DATA BREACHES.
Published In: MIS Quarterly, 2023, v. 47, n. 1. P. 317 1 of 3
Database: Academic Search Ultimate 2 of 3
Authored By: Li, Wilson Weixun; Leung, Alvin Chung Man; Yue, Wei Thoo 3 of 3
Abstract
Data breaches can severely damage a firm’s reputation and its customers’ confidence. Firms must therefore continuously invest in security measures to prevent such breaches. However, the effectiveness of security investment has been questioned by both practitioners and academics. We illustrate the bidirectional dynamic relationship between information technology (IT) investment and data breaches moderated by threat and countermeasure security awareness using an eight-year panel of 311 U.S.-listed firms to provide empirical evidence that threat awareness broadens firms’ scope for addressing databreach issues by investing more in IT than in security. Countermeasure awareness equips firms with sufficient knowledge and experience to ensure effective implementation of IT, which provides more comprehensive protection than security investment alone. Our results suggest that firms should evolve beyond the reactive mindset of solely upgrading security and begin nurturing both threat awareness and countermeasure awareness to address the underlying IT system issues that are the cause of data breaches. [ABSTRACT FROM AUTHOR]
Additional Information
- Source:MIS Quarterly. 2023/03, Vol. 47, Issue 1, p317
- Document Type:Article
- Subject Area:Information Technology
- Publication Date:2023
- ISSN:0276-7783
- DOI:10.25300/MISQ/2022/15713
- Accession Number:162184898
- Copyright Statement:Copyright of MIS Quarterly is the property of MIS Quarterly and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Looking to go deeper into this topic? Look for more articles on EBSCOhost.