An analysis on effects of information security investments: a BSC perspective
Author
Abstract
Suggested Citation
DOI: 10.1007/s10845-010-0402-7
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Tanaka, Hideyuki & Matsuura, Kanta & Sudoh, Osamu, 2005. "Vulnerability and information security investment: An empirical analysis of e-local government in Japan," Journal of Accounting and Public Policy, Elsevier, vol. 24(1), pages 37-59.
- Sarv Devaraj & Ming Fan & Rajiv Kohli, 2002. "Antecedents of B2C Channel Satisfaction and Preference: Validating e-Commerce Metrics," Information Systems Research, INFORMS, vol. 13(3), pages 316-333, September.
- Bagozzi, Richard P & Yi, Youjae, 1991. "Multitrait-Multimethod Matrices in Consumer Research," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 17(4), pages 426-439, March.
- Kjell Hausken, 2006. "Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability," Information Systems Frontiers, Springer, vol. 8(5), pages 338-349, December.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Igor Bernik & Kaja Prislan, 2016. "Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation," PLOS ONE, Public Library of Science, vol. 11(9), pages 1-33, September.
- Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
- Berlilana & Tim Noparumpa & Athapol Ruangkanjanases & Taqwa Hariguna & Sarmini, 2021. "Organization Benefit as an Outcome of Organizational Security Adoption: The Role of Cyber Security Readiness and Technology Readiness," Sustainability, MDPI, vol. 13(24), pages 1-20, December.
- Xiaofei Qian & Xinbao Liu & Jun Pei & Panos M. Pardalos & Lin Liu, 2017. "A game-theoretic analysis of information security investment for multiple firms in a network," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 68(10), pages 1290-1305, October.
- Tejaswini C. Herath & Hemantha S. B. Herath & David Cullum, 2023. "An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks," Information Systems Frontiers, Springer, vol. 25(2), pages 681-721, April.
- Tahereh Hasani & Norman O’Reilly & Ali Dehghantanha & Davar Rezania & Nadège Levallet, 2023. "Evaluating the adoption of cybersecurity and its influence on organizational performance," SN Business & Economics, Springer, vol. 3(5), pages 1-38, May.
- Feng Xu & Xin (Robert) Luo & Hongyun Zhang & Shan Liu & Wei (Wayne) Huang, 2019. "Do Strategy and Timing in IT Security Investments Matter? An Empirical Investigation of the Alignment Effect," Information Systems Frontiers, Springer, vol. 21(5), pages 1069-1083, October.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Amitava Dutta & Rahul Roy, 2008. "Dynamics of organizational information security," System Dynamics Review, System Dynamics Society, vol. 24(3), pages 349-375, September.
- Levitin, Gregory & Hausken, Kjell & Taboada, Heidi A. & Coit, David W., 2012. "Data survivability vs. security in information systems," Reliability Engineering and System Safety, Elsevier, vol. 100(C), pages 19-27.
- Alessandro Fedele & Cristian Roner, 2022.
"Dangerous games: A literature review on cybersecurity investments,"
Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
- Alessandro Fedele & Cristian Roner, 2020. "Dangerous Games: A Literature Review on Cybersecurity Investments," BEMPS - Bozen Economics & Management Paper Series BEMPS75, Faculty of Economics and Management at the Free University of Bozen.
- Liao, Chun-Hsiung & Chen, Chun-Wei, 2014. "Network externality and incentive to invest in network security," Economic Modelling, Elsevier, vol. 36(C), pages 398-404.
- David Iliaev & Sigal Oren & Ella Segev, 2023. "A Tullock-contest-based approach for cyber security investments," Annals of Operations Research, Springer, vol. 320(1), pages 61-84, January.
- Yong Wu & Gengzhong Feng & Richard Y. K. Fung, 2018. "Comparison of information security decisions under different security and business environments," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 69(5), pages 747-761, May.
- Loic Mar'echal & Alain Mermoud & Dimitri Percia David & Mathias Humbert, 2024. "Measuring the performance of investments in information security startups: An empirical analysis by cybersecurity sectors using Crunchbase data," Papers 2402.04765, arXiv.org, revised Feb 2024.
- Xing Gao & Weijun Zhong, 2015. "Information security investment for competitive firms with hacker behavior and security requirements," Annals of Operations Research, Springer, vol. 235(1), pages 277-300, December.
- Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
- Jin P. Gerlach & Ronald T. Cenfetelli, 2022. "Overcoming the Single-IS Paradigm in Individual-Level IS Research," Information Systems Research, INFORMS, vol. 33(2), pages 476-488, June.
- repec:dgr:rugsom:04f04 is not listed on IDEAS
- XiaoJuan Zhang & Xiang Jinpeng & Farhan Khan, 2020. "The Influence of Social Media on Employee’s Knowledge Sharing Motivation: A Two-Factor Theory Perspective," SAGE Open, , vol. 10(3), pages 21582440209, July.
- Yi Sun & Shihui Li & Lingling Yu, 2022. "The dark sides of AI personal assistant: effects of service failure on user continuance intention," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(1), pages 17-39, March.
- Muhammad Shaukat Malik, Sabah Younus, 2019. "Determinants of Tax-Compliance Behaviour Explored by Slippery Slope Framework and Theory of Planned Behaviour: An Evidence from Small Business Owner," Journal of Management Sciences, Geist Science, Iqra University, Faculty of Business Administration, vol. 6(2), pages 33-47, October.
- repec:idn:jimfjn:v:4:y:2018:i:2h:p:1-14 is not listed on IDEAS
- Harith Yas Khudhair & Ahmad Jusoh & Abbas Mardani & Khalil Md Nor & Dalia Streimikiene, 2019. "Review of Scoping Studies on Service Quality, Customer Satisfaction and Customer Loyalty in the Airline Industry," Contemporary Economics, University of Economics and Human Sciences in Warsaw., vol. 13(4), December.
- Adrian S. Choo & Kevin W. Linderman & Roger G. Schroeder, 2007. "Method and Psychological Effects on Learning Behaviors and Knowledge Creation in Quality Improvement Projects," Management Science, INFORMS, vol. 53(3), pages 437-450, March.
- Faqih, Khaled M.S., 2016. "An empirical analysis of factors predicting the behavioral intention to adopt Internet shopping technology among non-shoppers in a developing country context: Does gender matter?," Journal of Retailing and Consumer Services, Elsevier, vol. 30(C), pages 140-164.
- Pietro Evangelista & Aino Kianto & Henri Hussinki & Mika Vanhala & Anna-Maija Nisula, 2023. "Knowledge-Based Human Resource Management, Logistics Capability, and Organizational Performance in Small Finnish Logistics Service Providers," Logistics, MDPI, vol. 7(1), pages 1-21, February.
- Rashedul Hasan & M. Kabir Hassan & Mamunur Rashid, 2018. "Cash Waqf Investment And Poverty Alleviation: Case Of Tabung Masjids In Malaysia," Journal of Islamic Monetary Economics and Finance, Bank Indonesia, vol. 4(2), pages 333-346, November.
- Lin, Winston T. & Chen, Yueh H. & Chou, Chia-Ching, 2021. "Assessing the business values of e-commerce and information technology separately and jointly and their impacts upon US firms' performance as measured by productive efficiency," International Journal of Production Economics, Elsevier, vol. 241(C).
- Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
More about this item
Keywords
Information security investments; Balanced score card (BSC); Empirical analysis; Structural equation model (SEM); Critical success factors (CSF); Key performance indicators (KPI);All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:joinma:v:23:y:2012:i:4:d:10.1007_s10845-010-0402-7. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.