Cybersecurity hazards and financial system vulnerability: a synthesis of literature

MH Uddin, MH Ali, MK Hassan - Risk Management, 2020 - Springer
In this paper, we provide a systematic review of the growing body of literature exploring the
issues related to pervasive effects of cybersecurity risk on the financial system. As the …

[HTML][HTML] Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity

FA Shaikh, M Siponen - Computers & Security, 2023 - Elsevier
Abstract Information Systems (IS) research on managerial response to cybersecurity
breaches has largely focused on externally oriented actions such as customer redressal and …

Dangerous games: A literature review on cybersecurity investments

A Fedele, C Roner - Journal of Economic Surveys, 2022 - Wiley Online Library
Cybersecurity has gained prominence in the decision‐making of firms. Due to the increasing
occurrences of threats in the cyberspace, investments in cybersecurity have become critical …

[HTML][HTML] Decision support approaches for cyber security investment

A Fielder, E Panaousis, P Malacaria, C Hankin… - Decision support …, 2016 - Elsevier
When investing in cyber security resources, information security managers have to follow
effective decision-making strategies. We refer to this as the cyber security investment …

What are the trend and core knowledge of information security? A citation and co-citation analysis

WL Shiau, X Wang, F Zheng - Information & Management, 2023 - Elsevier
Abstract Information technology brings business success opportunities, but also causes
potential safety hazards to organizations. In response to the increasing academia and …

Game-theoretic analysis of DDoS attacks against Bitcoin mining pools

B Johnson, A Laszka, J Grossklags, M Vasek… - … Cryptography and Data …, 2014 - Springer
One of the unique features of the digital currency Bitcoin is that new cash is introduced by so-
called miners carrying out resource-intensive proof-of-work operations. To increase their …

Investigating the security divide between SME and large companies: How SME characteristics influence organizational IT security investments

M Heidt, JP Gerlach, P Buxmann - Information Systems Frontiers, 2019 - Springer
Lagging IT security investments in small and medium-sized enterprises (SME) point towards
a security divide between SME and large enterprises, yet our structured literature review …

[PDF][PDF] Modeling cyber-insurance: towards a unifying framework.

R Böhme, G Schwartz - WEIS, 2010 - infosecon.net
We propose a comprehensive formal framework to classify all market models of cyber-
insurance we are aware of. The framework features a common terminology and deals with …

Organizational learning from cybersecurity performance: Effects on cybersecurity investment decisions

FA Shaikh, M Siponen - Information Systems Frontiers, 2024 - Springer
IS literature has identified various economic, performance, and environmental factors
affecting cybersecurity investment decisions. However, economic modeling approaches …

Proactive versus reactive security investments in the healthcare sector

J Kwon, ME Johnson - Mis Quarterly, 2014 - JSTOR
This study identifies the effects of security investments that arise from previous failures or
external regulatory pressure. Building on organizational learning theory, the study focuses …