Treffer: UNITED WE STAND, DIVIDED WE FALL: AN AUTOGENIC PERSPECTIVE ON EMPOWERING CYBERSECURITY IN ORGANIZATIONS.

Title:
UNITED WE STAND, DIVIDED WE FALL: AN AUTOGENIC PERSPECTIVE ON EMPOWERING CYBERSECURITY IN ORGANIZATIONS.
Authors:
Durcikova, Alexandra1 alex@ou.edu, Miranda, Shaila M.2 SMiranda@walton.uark.edu, Jensen, Matthew L. rtw2n@virginia.edu, Wright, Ryan T.3 mjensen@ou.edu
Source:
MIS Quarterly. Dec2024, Vol. 48 Issue 4, p1503-1536. 34p. 18 Color Photographs.
Database:
Business Source Premier

Weitere Informationen

Cybersecurity groups navigate complex, challenging environments in their mission to protect their organizations. They experience uncertainty from adaptive threats from external attackers and unpredictable stakeholders. Under such volatility, business groups operate best when they are psychologically empowered. Recognizing the potential for empowerment to reduce organizational risk, we sought to learn how cybersecurity groups come to be (dis)empowered and how this (dis)empowerment is sustained. Instead of the conventional view of the empowerment process as designed, we advance an emergent view of the empowerment process. We abductively surface this process from our case analyses of 15 U.S.organizations. We offer three insights: First, organizations with empowered cybersecurity groups enjoy an enhanced level of protection from breaches. Second, we highlight generative rules through which groups become empowered—via their bridging initiatives that co-opt stakeholders into security behaviors and stakeholder responsiveness to bridging, rather than unilaterally applied buffering initiatives. Third, we highlight reinforcing rules through which empowered states persist—via the group’s ability to safeguard organizational information assets, thereby ensuring cybersecurity group viability, continued bridging, and motivated stakeholder responsiveness. For practitioners, our study underscores the interdependence between cybersecurity groups and their stakeholders in securing an organization and posits processes for empowering cybersecurity groups. [ABSTRACT FROM AUTHOR]

Copyright of MIS Quarterly is the property of MIS Quarterly and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)

Volltext ist im Gastzugang nicht verfügbar.