IDEAS home Printed from https://ideas.repec.org/a/aic/revebs/y2024j33waizelg.html
   My bibliography  Save this article

Potential Effects Of Advanced Cyberattacks On Cybersecurity Software Buyers’ Behaviour

Author

Listed:
  • GUY WAIZEL

    (Doctoral School of Economics and Business Administration, Alexandru Ioan Cuza University – Iași, Romania)

  • ADRIANA ZAIÈš

    (Alexandru Ioan Cuza University of IaÅŸi, Faculty of Economics and Business Administration, IaÅŸi, Romania)

Abstract

This research paper aims to develop a comprehensive understanding of cybersecurity buyer behavior by integrating multiple theories. Specifically, we examine the Theory of Buyer Behavior, the Theory of Reasoned Action, the Theory of Planned Behavior, the Stakeholder Theory, and their relevance in the context of advanced cybersecurity attacks. The paper proposes a new model, the Cybersecurity Buyer Behavior Effect Model (CB2EM), which synthesizes insights from these theories to predict the potential effect of advanced cybersecurity attacks, including zero-day supply chain attacks and stealth techniques attacks, on cybersecurity buyer behavior. Through a systematic review and analysis of the selected theories, we identify commonalities and complementarities, ultimately creating a unified framework that enriches our understanding of how cyber incidents shape buyer decisions. The CB2EM is expected to provide marketers and cybersecurity vendors with valuable insights to effectively address buyer concerns in a rapidly evolving threat landscape.

Suggested Citation

  • Guy Waizel & Adriana Zaièš, 2024. "Potential Effects Of Advanced Cyberattacks On Cybersecurity Software Buyers’ Behaviour," Review of Economic and Business Studies, Alexandru Ioan Cuza University, Faculty of Economics and Business Administration, issue 33, pages 43-61, June.
  • Handle: RePEc:aic:revebs:y:2024:j:33:waizelg
    DOI: 10.47743/rebs-2024-1-0002
    as

    Download full text from publisher

    File URL: https://rebs.feaa.uaic.ro/articles/pdfs/356.pdf
    Download Restriction: no

    File URL: https://libkey.io/10.47743/rebs-2024-1-0002?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Keywords

    stealth techniques; buyer behavior; zero-day; supply chain attacks; cybersecurity software;
    All these keywords.

    JEL classification:

    • M3 - Business Administration and Business Economics; Marketing; Accounting; Personnel Economics - - Marketing and Advertising
    • M31 - Business Administration and Business Economics; Marketing; Accounting; Personnel Economics - - Marketing and Advertising - - - Marketing

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:aic:revebs:y:2024:j:33:waizelg. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sireteanu Napoleon-Alexandru (email available below). General contact details of provider: https://edirc.repec.org/data/feaicro.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.