Technologies and procedures for effectively securing cyberspace exist, but are largely underdeployed. One reason for this is that organizational - reward systems lack the proper incentives for decision-maker allocation of resources. We identify characteristics of differing stakeholder perceptions of security and privacy risks and integrate them in a decision making framework. We significantly revise the Fischhoff and Slovic model of risk perceptions --- introducing ordinal scales to the identified characteristics of risk perceptions, and incorporating the dynamics of perception by including the important and neglected time element. Over twelve months, we reviewed and verified the model with thirty five senior information security executives...
Digitalisation has tremendous benefits while simultaneously elevating cybersecurity to a prominent t...
The introduction of the Internet to the business world has changed many ways of doing business. Unfo...
Regulators have urged companies to enhance the informativeness of cybersecurity risk disclosures in ...
Technologies and procedures for effectively securing cyberspace exist, but are largely underdeployed...
Information technology security policies are designed explicitly to protect IT systems. However, ove...
Individual decision making in computer security risk plays a critical role in successful information...
This paper will examine the difference between management’s perception of the information security r...
In this paper, we investigate the role of incentives for Security Information Sharing (SIS) between ...
Security breaches often stem from business partner failures within the value chain. There have been ...
There is a growing emphasis on robust, organizationally focused information security methods to coun...
Information security breaches are increasingly motivated by fraudulent and criminal motives. Reducin...
The increasing dependence on information systems (ISs) together with the emergence of new technologi...
Previous studies show that information security breaches and privacy violations are important issues...
A critical overreliance on the technical dimension of information security has recently shifted towa...
Nowadays, information technology (IT) has become an integral part of our everyday life. In both the ...
Digitalisation has tremendous benefits while simultaneously elevating cybersecurity to a prominent t...
The introduction of the Internet to the business world has changed many ways of doing business. Unfo...
Regulators have urged companies to enhance the informativeness of cybersecurity risk disclosures in ...
Technologies and procedures for effectively securing cyberspace exist, but are largely underdeployed...
Information technology security policies are designed explicitly to protect IT systems. However, ove...
Individual decision making in computer security risk plays a critical role in successful information...
This paper will examine the difference between management’s perception of the information security r...
In this paper, we investigate the role of incentives for Security Information Sharing (SIS) between ...
Security breaches often stem from business partner failures within the value chain. There have been ...
There is a growing emphasis on robust, organizationally focused information security methods to coun...
Information security breaches are increasingly motivated by fraudulent and criminal motives. Reducin...
The increasing dependence on information systems (ISs) together with the emergence of new technologi...
Previous studies show that information security breaches and privacy violations are important issues...
A critical overreliance on the technical dimension of information security has recently shifted towa...
Nowadays, information technology (IT) has become an integral part of our everyday life. In both the ...
Digitalisation has tremendous benefits while simultaneously elevating cybersecurity to a prominent t...
The introduction of the Internet to the business world has changed many ways of doing business. Unfo...
Regulators have urged companies to enhance the informativeness of cybersecurity risk disclosures in ...