Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective
Access Status
Authors
Date
2018Type
Metadata
Show full item recordCitation
Source Title
ISSN
School
Collection
Abstract
This paper investigates the relationship between Information Systems (IS) integration and the use of cybersecurity countermeasures using an adapted exposure to risk perspective which considers both the probability of a risk through vulnerability points theory and the impact of the risk if it occurs. Based on an econometric analysis of a survey sample of 9,721 French firms, the study finds that higher degrees of system integration entail higher degrees of cybersecurity usage. Whereas previously it was thought that systems integration reduces the number of vulnerabilities and thus the need for cybersecurity countermeasures, we find that the more the system is integrated, the greater the use of self-protective cybersecurity countermeasures. We theorize that this finding comes from the elimination of many uncontrollable vulnerabilities and the presence of fewer, but controllable, vulnerability points. This finding holds both for internal and external integration but is stronger in the latter case. Moreover, results show that internal dynamism is positively correlated with cybersecurity countermeasures. Our reasoning applies to cybersecurity in terms of self-protective security measures but not necessarily to risk-transfer security measures.
Related items
Showing items related by title, author, creator and subject.
-
Johnson, G.; Scutella, R.; Tseng, Y.; Wood, Gavin; Guy, J.; Rosanna, S.; Yi-Ping, T.; Gavin, W. (2015)This report examines the relationship between structural factors, individual characteristics and homelessness. Our interest in the interaction of structural conditions and individual characteristics gives rise to two ...
-
Recidivist drink drivers self reported reasons for driving whilst unlicensed: A qualitative analysisLenton, Simon; Fetherston, James; Cercarelli, Rina (2009)Aim: This paper presents qualitative data from an in-depth interview study of 40 repeat drink drivers in Perth Western Australia to inform countermeasures for these high risk offenders. Background: Licence sanctions are ...
-
Tian, Biming (2011)Wireless Sensor Networks (WSNs) have attracted great attention not only in industry but also in academia due to their enormous application potential and unique security challenges. A typical sensor network can be seen as ...