[HTML][HTML] Learning from safety science: A way forward for studying cybersecurity incidents in organizations

N Ebert, T Schaltegger, B Ambuehl, L Schöni… - Computers & …, 2023 - Elsevier
In the aftermath of cybersecurity incidents within organizations, explanations of their causes
often revolve around isolated technical or human events such as an Advanced Persistent …

A framework for cyber-risk insurance against ransomware: A mixed-method approach

A Mukhopadhyay, S Jain - International Journal of Information Management, 2024 - Elsevier
Hackers follow a standard cyber kill chain process and install ransomware payloads using
phishing emails on firms belonging to critical industry, resulting in huge losses in revenue …

Data security crisis in universities: identification of key factors affecting data breach incidents

J Li, W Xiao, C Zhang - Humanities and Social Sciences …, 2023 - nature.com
The extremely complex and dynamic digital environments of universities make them highly
vulnerable to the risk of data breaches. This study empirically investigated the factors …

Improving threat mitigation through a cybersecurity risk management framework: A computational design science approach

BM Ampel, S Samtani, H Zhu, H Chen… - Journal of …, 2024 - Taylor & Francis
Cyberattacks have been increasing in volume and intensity, necessitating proactive
measures. Cybersecurity risk management frameworks are deployed to provide actionable …

Can cyber risk of health care firms be insured? A multinomial logistic regression model

S Jain, A Mukhopadhyay, S Jain - Journal of Organizational …, 2023 - Taylor & Francis
The healthcare sector is prone to Distributed Denial-of-Service and Ransomware attacks
owing to unsecured networks and software. This results in stalling of outpatient and inpatient …

Mobile Identity Protection: The Moderation Role of Self-Efficacy

Y Alhelaly, G Dhillon, T Oliveira - Australasian Journal of …, 2024 - journal.acs.org.au
The rapid growth of mobile applications and the associated increased dependency on
digital identity raises the growing risk of identity theft and related fraud. Hence, protecting …

[HTML][HTML] Developing a data breach protection capability framework in retailing

MR Uddin, S Akter, WJT Lee - International Journal of Production …, 2024 - Elsevier
Protecting data in retail operations is vital in the age of data-driven digital transformation.
Businesses face a constant challenge from data breaches due to the unpredictable and …

A Review of IT Investment in Firms: What Can We Do in the New Era

P Ji, H Ji, L Yu, X Yan - SAGE Open, 2024 - journals.sagepub.com
Many studies on IT investment in companies have been conducted in the past, but our team
combined them by summarizing the latest research. Compared to previous work, we revise a …

Empirically evaluating the effect of security precautions on cyber incidents

N Gandal, T Moore, M Riordan, N Barnir - Computers & Security, 2023 - Elsevier
Available data on firm cybersecurity often exhibits a positive correlation between investment
in security precautions and cyber attacks since investments are often made after a firm has …

Disclosure of IT-related risk factors in corporate filings

AZ Liu, AX Liu, K Zhao - Decision Support Systems, 2025 - Elsevier
This research investigates the disclosure of IT-related risk factors in US public firms' periodic
SEC filings. Drawing upon the Resource-Based View theory, we propose that a firm's IT …