skip to main content
10.1145/2971603.2971644acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicecConference Proceedingsconference-collections
short-paper

An impact of information security investment on information security incidents: a case of Korean organizations

Published:17 August 2016Publication History

ABSTRACT

Information security incidents are serious threats for a modern business environment. Firms believe that an investment on information security contribute to firms avoiding security incidents. However, there is a little research on economic outcomes of information security investment. This research investigates the relationship between information security investments and the number of information security incidents. This study empirically investigates how the information security related investment could reduce the possibility of information security incidents. Based on survey data, this study explores an impact of information security investment on information security incidents. This research explores the factors; an investment on information security, top management support, and Employees' information security awareness, contributing on firms' information security breaches. Based on Poisson regression model, we expect to figure out a positive impact of firm's information security investment on reducing the number of information security incidents. In addition, we expect to find out the impact of support of top management and employees' information security awareness.

References

  1. Bharadwaj, A., & Keil, M. 2001. The effect of information technology failures on the market value of firms: An empirical examination. INFORMS 2001 Miami.Google ScholarGoogle Scholar
  2. Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 34(3), 523--548. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Campbell, K., Gordon, L. A., Loeb, M. P., & Zhou, L. 2003. The economic cost of publicly announced information security breaches: empirical evidence from the stock market. Journal of Computer Security, 11(3), 431--448. Google ScholarGoogle ScholarCross RefCross Ref
  4. Cavusoglu, H., Mishra, B., & Raghunathan, S. 2004. The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers. International Journal of Electronic Commerce, 9(1), 70--104. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Chai, Sangmi, Minkyun Kim, and H. Raghav Rao. "Firms' information security investment decisions: Stock market evidence of investors' behavior." Decision Support Systems 50.4 (2011): 651--661. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Creel, M. D., & Loomis, J. B. (1990). Theoretical and empirical advantages of truncated count data estimators for analysis of deer hunting in California. American journal of agricultural economics, 72(2), 434--441.Google ScholarGoogle Scholar
  7. Eloff, J. H. (1988). Computer security policy: Important issues. Computers & Security, 7(6), 559--562. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ettredge, M., Richardson, V. J., & Scholz, S. 2002. Timely financial reporting at corporate web sites?. Communications of the ACM, 45(6), 67--71. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Gemalto. (2016). 2015 Findings from the 2015 breach level index. Retrieved from http://www.gemalto.com/brochures-site/download-site/Documents/ent-Breach_Level_Index_Annual_Report_2015.pdfGoogle ScholarGoogle Scholar
  10. Gordon, L. A., & Loeb, M. P. 2002. The economics of information security investment. ACM Transactions on Information and System Security (TISSEC), 5(4), 438--457. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Kankanhalli, A., Teo, H. H., Tan, B. C., & Wei, K. K. (2003). An integrative study of information systems security effectiveness. International journal of information management, 23(2), 139--154. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Knapp, K. J., Marshall, T. E., Kelly Rainer, R., & Nelson Ford, F. (2006). Information security: management's effect on culture and policy. Information Management & Computer Security, 14(1), 24--36.Google ScholarGoogle ScholarCross RefCross Ref
  13. Pahnila, S., Siponen, M., & Mahmood, A. (2007, January). Employees' behavior towards IS security policy compliance. In System sciences, 2007. HICSS 2007. 40Th annual hawaii international conference on (pp. 156b--156b). IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Posthumus, S., & Von Solms, R. (2004). A framework for the governance of information security. Computers & Security, 23(8), 638--646. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Public printing and documents, 44 U.S.C.§ 3542 (2011)Google ScholarGoogle Scholar
  16. Ilsoon Shin, Wonchang Jang, & Heeyoung Park. 2013., Information Security Investment and Security Breach: Empirical Study on the Reverse Causality. Journal of The Korea Institute of Information Security & Cryptology 23(6), 1207--1217.Google ScholarGoogle ScholarCross RefCross Ref
  17. Wooldridge, J. (2015). Introductory econometrics: A modern approach. Nelson Education.Google ScholarGoogle Scholar

Index Terms

  1. An impact of information security investment on information security incidents: a case of Korean organizations

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICEC '16: Proceedings of the 18th Annual International Conference on Electronic Commerce: e-Commerce in Smart connected World
      August 2016
      311 pages
      ISBN:9781450342223
      DOI:10.1145/2971603

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 August 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper

      Acceptance Rates

      ICEC '16 Paper Acceptance Rate44of55submissions,80%Overall Acceptance Rate150of244submissions,61%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader