314 research outputs found

    Customer Cybersecurity and Supplier Cost Management Strategy

    Get PDF
    In this paper, we explore the spillover effect of customer firms’ data breaches on their upstream supplier firms’ cost management strategies, proxied by cost stickiness. Our primary analyses suggest that data breaches suffered by customer firms are associated with a decrease in cost stickiness among supplier firms. Furthermore, the reductions in supplier cost stickiness are stronger if suppliers are managed by CEOs from national cultural groups with high uncertainty avoidance, low long-term orientations, and/or low individualism. In sum, the findings contribute to both Information Systems (IS) and Operations Management (OM) disciplines in terms of data breach, cost management strategy, and the role of national culture in OM. In particular, the findings can facilitate the management and regulation of data breaches for managers and regulators

    The Role of Uncertainty in Data Breach Response Processes - A Reactance Theory Perspective

    Get PDF
    Data breaches lead to inherent uncertainty among customers due to the compromise of information and its potential consequences for customers, e.g., identity theft or credit card misuse. Previous research has focused on outcome-based strategies to address these negative impacts. However, informed by reactance theory, we argue that customers feel a loss of control due to the induced uncertainty and that companies need to tackle these impacts. We test our hypotheses in two empirical studies. The results of Study 1 suggest that data breaches indeed lead to an increased perception of uncertainty among customers. Study 2 examines to what extent the establishment of control can mitigate the negative uncertainty effects. We highlight that by providing customers with control, companies can reduce the degree of uncertainty and increase satisfaction with the response. By conceptualizing choice as a catalyst for perceived control, we offer practitioners a novel strategy for responding to data breaches

    From Convergence to Compromise: Understanding the Interplay of Digital Transformation and Mergers on Data Breach Risks in Local and Cross-Border Mergers

    Get PDF
    In today\u27s digital age, the potential risks and challenges associated with digital transformation (DT) and cybersecurity have received limited research attention. This dissertation consists of three interconnected studies that aim to address this gap. The first study employs paradox theory to demonstrate that DT initiatives can increase a firm\u27s susceptibility to data breaches. Using a unique dataset spanning 10 years and involving 3604 brands, our analysis reveals that DT efforts in mobile and digital marketing are associated with a higher incidence of data breaches. However, firms can mitigate this impact by enhancing their innovative capacities. These findings contribute to a better understanding of the complex relationship between DT, data breaches, and innovation. Our second investigation, rooted in complexity theory and matching theory, examines the impact of mergers and acquisitions (M&As) on the frequency of data breaches. By analyzing 18 years of data from 5072 US firms, we find that M&As increase the likelihood of data breaches, particularly when the merging firms operate in different business domains. Furthermore, we observe that M&As that receive more media attention are more prone to data breaches, while those involving a more vulnerable target firm have fewer breaches. In our third study, guided by Institutional theory, we explore the relationship between cross-border mergers and acquisitions (CBMA) and data breaches. Our findings indicate that CBMAs, especially those accompanied by significant media publicity and involving firms from divergent institutional contexts, heighten the risk of data breaches. Overall, these studies provide valuable insights for firms aiming to mitigate data breach risks during their digital transformation (DT) efforts and M&A activities. They emphasize the importance of adopting a balanced communication strategy and considering the security implications of strategic actions. Moreover, our findings contribute to the academic discourse in information systems by illuminating the intricate interplay between DT, M&As, and data breaches

    User evaluation of the performance of information systems

    Get PDF
    Information technologies (IT) are considered the primary survival factor for many organizations and the most critical success factor in businesses today. To justify the necessary investment in IT, user evaluation of information systems\u27 performance in organizations is a key consideration. This research investigated a comprehensive and convenient means for end users to assess this performance. Among the existing theories and models on the evaluation of information system performance based on intrinsic technological properties, the Web of System Performance (WOSP) model provides the most comprehensive basis for information system evaluation, and therefore merited further investigation. The research question was how well the eight WOSP performance criteria, namely functionality, usability, flexibility, reliability, security, extendibility, connectivity, and privacy, applied in the context of an individual evaluating one or more information systems for use by an organization. For this, it was important to show that, while these performance criteria were abstract concepts, they can be established and identified clearly, in a manner that is valid in the sense of the meaning and that users would consider important. Illustrative statements for each of the eight criteria were therefore obtained, which users were asked to evaluate. Next, it was necessary to show that users prefer the choice of the eight WOSP criteria to the current dominant instrument for evaluation when evaluating software. This was done using a preference questionnaire where subjects rated both the WOSP model and an alternative means of evaluation along various dimensions, the results being compared by statistical analysis. Finally, it was necessary to show that users rate at least three of the WOSP criteria as being important for evaluating information systems. For this, conjoint analysis was used. A browser was selected as the experimental software for this research. The results showed that users found illustrative statements clear, valid and important for the evaluation of browsers. They also preferred using the WOSP model for the evaluation of browsers over TAM, the current dominant model. Finally, while users attached different levels of importance to the various performance criteria for the selection of browsers, five of the criteria were important to a significant degree

    ACUTA Journal of Telecommunications in Higher Education

    Get PDF
    In This Issue Campus Wireless Needs; DAS lssues to Consider Dead Duck: Don\u27t Let the Next Flap Over Social Media Be Yours New Law Requires Fire Reporting ADVERTORIAL: Centurylink Cloud-Based Services The Never-Ending Conundrum of lllegal Student Downloads Technology and Privacy on the 21st-Century Campus Great Expectations: Cloud Computing Fail to Plan?...Plan to Fail President\u27s Message From the lnterim Executive Director Q&A with the CI

    Relationship Between Corporate Governance and Information Security Governance Effectiveness in United States Corporations

    Get PDF
    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and information security governance (ISG) effectiveness in United States-based corporations. Surveys were used to collect data from 95 strategic and tactical leaders of the 500 largest for-profit United States headquartered corporations. The results of the multiple linear regression indicated the model was able to significantly predict ISG effectiveness, F(5, 89) = 3.08, p = 0.01, R² = 0.15. Strategic alignment was the only statistically significant (t = 2.401, p \u3c= 0.018) predictor. The implications for positive social change include the potential to constructively understand the correlates of ISG effectiveness, thus increasing the propensity for consumer trust and reducing consumers' costs

    Lawyers\u27 Abuse of Technology

    Get PDF
    Lawyers are highly educated and, allegedly, of higher than average intelligence, but sometimes individual lawyers demonstrate colossal errors in judgment, especially when insufficiently trained in the new and emerging risks involved with the technological age. For instance, although the internet is a necessary tool for attorneys\u27 and is now a prominent feature in the everyday lives of all actors in the legal system, this technology poses particularized and often unanticipated risks of professional and ethical abuse -- risks that are extraordinary both in quantity and intensity. As Harvard\u27s Director of the Center for the Legal Profession warned: We are only at the forefront of seeing the kind of changes that technology is likely to bring to legal practice, and these changes will have a profound effect on how we think about regulating lawyers. Unfortunately, the American Bar Association (ABA) missed an opportunity it had with its own Ethics 20/20 Commission to address meaningful changes in the practice of law wrought by technology. However, the opportunities for unethical and unprofessional behavior in the use of electronic communications and storage cannot be ignored. This Article assesses the risks of technology abuse and proposes a scheme for addressing the professional and ethical problems that have and will continue to accompany the shift to digital lawyering

    The impact of market orientation on research-based spin off performance: emerging issues from an exploratory study

    Get PDF
    The paper addresses the relationship between Market Orientation (MO) and Research based spin offs' business performance, using a sample of 90 Italian RBSOs present in the Netval (Italian association for the valorisation of results from public research) database. The findings of the study may be useful for researchers and academics, advancing knowledge on Research based spin-offs (RBSOs) and the impact of MO on their performance, but also professionals from new high tech ventures and technology transfer offices may use these results to plan and design market-focused actions and support activities that will lead to improved business performance.The results could in fact indicate to entrepreneurs (or the entrepreneurial team) of this kind of firms which dimensions of MO deserve more attention in order to obtain a higher business performance

    Success Factors for Minority Small Business Sustainability

    Get PDF
    Minority small business owners significantly contribute to national and local economies. Only 50% of small firm owners sustain their businesses longer than 5 years. The purpose of the multiple case study was to explore the management strategies that minority small business owners used to sustain their businesses for longer than 5 years. The study\u27s population consisted of 4 minority small business owners in the midwestern region of the United States to explore management strategies necessary for maintaining minority small firm operations. The conceptual framework for the study was general system theory. Data sources included semistructured interviews, social media information, company documentation, and company website information. Based on the methodological triangulation of the data sources, analytical coding, and analyzing the data using a qualitative data analysis software, 3 themes emerged: networking with other small business owners, strategic planning, and building strong customer and employee relationships. The study findings might contribute to positive social change by providing knowledge about effective management strategies to minority small firm owners, thereby creating jobs, augmenting local and national economies, and increasing profitability

    Southeastern Law Librarian Spring 1998

    Get PDF
    • …
    corecore