Firms' information security investment decisions: Stock market evidence of investors' behavior

2011 ◽  
Vol 50 (4) ◽  
pp. 651-661 ◽  
Author(s):  
Sangmi Chai ◽  
Minkyun Kim ◽  
H. Raghav Rao
2018 ◽  
Vol 14 (2) ◽  
pp. 1-20 ◽  
Author(s):  
Daniel Schatz ◽  
Rabih Bashroush

This article describes how with information security steadily moving up on board room agendas, security programs are found to be under increasing scrutiny by practitioners. This level of attention by senior business leaders is new to many security professionals as their field has been of limited interest to non-executive directors so far. Currently, they have to regularly report on efficiency and value of their security capabilities whilst being measured against business priorities. Based on the Grounded Theory approach, the authors analysed the data gathered in a series of interviews with senior professionals in order to identify key factors in the context of information security investment decisions. The authors present detailed findings in context of a simplified framework that security practitioners can utilise for critical review or improvements of investment decisions in their own environments. Extensive details for each category as extracted through a qualitative data analysis are provided along with a category network analysis that highlights strong relationships within the framework.


Author(s):  
Daniel Schatz ◽  
Rabih Bashroush

This article describes how with information security steadily moving up on board room agendas, security programs are found to be under increasing scrutiny by practitioners. This level of attention by senior business leaders is new to many security professionals as their field has been of limited interest to non-executive directors so far. Currently, they have to regularly report on efficiency and value of their security capabilities whilst being measured against business priorities. Based on the Grounded Theory approach, the authors analysed the data gathered in a series of interviews with senior professionals in order to identify key factors in the context of information security investment decisions. The authors present detailed findings in context of a simplified framework that security practitioners can utilise for critical review or improvements of investment decisions in their own environments. Extensive details for each category as extracted through a qualitative data analysis are provided along with a category network analysis that highlights strong relationships within the framework.


2009 ◽  
Vol 36 (3) ◽  
pp. 329-345 ◽  
Author(s):  
Shyue-Liang Wang ◽  
Jyun-Da Chen ◽  
Paul A. Stirpe ◽  
Tzung-Pei Hong

Sign in / Sign up

Export Citation Format

Share Document