[HTML][HTML] The whole of cyber defense: Syncing practice and theory

KM de Nobrega, AF Rutkowski, C Saunders - The Journal of Strategic …, 2024 - Elsevier
This review explores the problems Chief Information Security Officers (CISOs) and other
cyber professionals face when defending their organization against cyberattacks. Using a …

How do organizations learn from information system incidents? A synthesis of the past, present, and future

MHR Mehrizi, D Nicolini, JR Modol - MIS quarterly, 2022 - research.vu.nl
We review the literature on how organizations learn from information system (IS) incidents.
We identify three modes of learning depending on the practices that constitute the learning …

Research in operations management and information systems interface

S Kumar, V Mookerjee… - Production and …, 2018 - journals.sagepub.com
Owing to its multidisciplinary nature, the operations management (OM) and information
systems (IS) interface distinguishes itself from the individually focused perspective of both …

The roles of IT strategies and security investments in reducing organizational security breaches

H Li, S Yoo, WJ Kettinger - Journal of Management Information …, 2021 - Taylor & Francis
This research examines the joint effects of information technology (IT) strategies and security
investments on organizational security breaches. We focus on two forms of IT strategies …

Cybersecurity skills training: An attacker-centric gamified approach

M Adams, M Makramalla - Technology Innovation Management …, 2015 - timreview.ca
Although cybersecurity awareness training for employees is important, it does not provide
the necessary skills training required to better protect businesses against cyber-attacks …

Allocation of resources to cyber-security: The effect of misalignment of interest between managers and investors

B Srinidhi, J Yan, GK Tayi - Decision Support Systems, 2015 - Elsevier
Cyber-security is increasingly seen as an important determinant of firm-specific financial risk.
Agency theory suggests that managers and investors have different preferences over such …

A security analysis method for industrial Internet of Things

H Mouratidis, V Diamantopoulou - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The industrial Internet of Things (IIoT) provide an opportunity for industries to build large
interconnected systems that utilize various technologies, such as personal computers …

Information disclosure and the diffusion of information security attacks

S Mitra, S Ransbotham - Information Systems Research, 2015 - pubsonline.informs.org
With the nearly instantaneous dissemination of information in the modern era, policies
regarding the disclosure of sensitive information have become the focus of significant …

Are we ready for cyberterrorist attacks?—Examining the role of individual resilience

J Hua, Y Chen, XR Luo - Information & Management, 2018 - Elsevier
This study measures individual resilience to cyberterrorist attacks on financial systems and
explores the antecedents of resilience. The research model integrates the resilience …

Information sharing in cybersecurity: A review

A Pala, J Zhuang - Decision Analysis, 2019 - pubsonline.informs.org
In this survey, we review the cybersecurity information-sharing literature, categorizing the
identified papers based on their main focus and methodological approaches implemented to …