Please use this identifier to cite or link to this item:
To Calculate or To Follow Others: How Do Information Security Managers Make Investment Decisions?
|Title:||To Calculate or To Follow Others: How Do Information Security Managers Make Investment Decisions?|
|Keywords:||Innovative Behavioral IS Security and Privacy Research|
Internet and the Digital Economy
Decision-making; Herding strategy; Information security investment
|Date Issued:||08 Jan 2019|
|Abstract:||Economic models of information security investment suggest estimating cost and benefit to make an information security investment decision. However, the intangible nature of information security investment prevents managers from applying cost- benefit analysis in practice. Instead, information security managers may follow experts’ recommendations or the practices of other organizations. The present paper examines factors that influence information security managers’ investment decisions from the reputational herding perspective. The study was conducted using survey questionnaire data collected from 106 organizations in Finland. The findings of the study reveal that the ability and reputation of the security manager and the strength of the information about the security investment significantly motivate the security manager to discount his or her own information. Herding, as a following strategy, together with mandatory requirements are significant motivations for information security investment.|
|Rights:||Attribution-NonCommercial-NoDerivatives 4.0 International|
|Appears in Collections:||
Innovative Behavioral IS Security and Privacy Research|
Please email firstname.lastname@example.org if you need this content in ADA-compliant format.
This item is licensed under a Creative Commons License