Information Technology (IT) Integration and Cybersecurity/Security: The Security Savviness of Board of Directors

被引:0
|
作者
Islam, Md Shariful [1 ]
Stafford, Thomas [1 ]
机构
[1] Louisiana Tech Univ, Ruston, LA 71270 USA
来源
关键词
Cybersecurity/security; Internal Audit; Value Proposition; Competitive Differentiator;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As Information Technology has become increasingly important to the competitive position of firms, managers have become more sensitive to their organization's overall IT risk management. Given the significant cyber-attacks that are occurring with disturbing frequency, and the mounting evidence that companies of all shapes and sizes are increasingly under a constant threat of cyber-attacks, ensuring the adequacy of a company's cybersecurity measures has become a key area of purview for the Board of Directors (BoD). To address this issue, staffing the Board with members who have significant security expertise might be one of the best protective mechanisms in an increasingly risky business environment, both from the perspective of sound corporate governance and in terms of sensible IT governance. We expect that high-tech firms are far likely to have Board members with security expertise, and we expect that the degree to which IT is a differentiator or primary value proposition in the firm will moderate the presence of security expertise at the Board level, and we also expect that internal audit capabilities with security expertise will tend to moderate between a firm's technological sophistication and security expertise at the Board level.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Information Technology Governance: The Role of Board of Directors in Cybersecurity Oversight
    Al-Sartawi, Abdalmuttaleb
    [J]. PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 15 - 21
  • [2] Information technology and the board of directors
    Lewis, B
    [J]. HARVARD BUSINESS REVIEW, 2006, 84 (02) : 156 - 156
  • [3] Information technology and the board of directors
    Nolan, R
    McFarlan, FW
    [J]. HARVARD BUSINESS REVIEW, 2005, 83 (10) : 96 - +
  • [5] Cybersecurity: Effect of Information Availability in Security Games
    Maqbool, Zahid
    Pammi, V. S. Chandrasekhar
    Dutt, Varun
    [J]. 2016 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBERSA), 2016,
  • [6] Information technology governance and cybersecurity at the board level
    Al-Sartawi, Abdalmuttaleb M. A. Musleh
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2020, 16 (02) : 150 - 161
  • [7] Cybersecurity and information security - what goes where?
    von Solms, Basie
    von Solms, Rossouw
    [J]. INFORMATION AND COMPUTER SECURITY, 2018, 26 (01) : 2 - 9
  • [8] Leveraging information security and computational trust for cybersecurity
    Robson de Oliveira Albuquerque
    Luis Javier García Villalba
    Ana Lucila Sandoval Orozco
    Rafael Timóteo de Sousa Júnior
    Tai-Hoon Kim
    [J]. The Journal of Supercomputing, 2016, 72 : 3729 - 3763
  • [9] A Definition of Information Security Classification in Cybersecurity Context
    Collard, Guillaume
    Disson, Eric
    Ducroquet, Stephane
    Talens, Guilaine
    [J]. 2017 11TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2017, : 77 - 82
  • [10] Cooperative Information Security/Cybersecurity Curriculum Development
    Bouras, Abdelaziz
    Gasmi, Houssem
    Ghemri, Fadi
    [J]. MOBILE NETWORKS AND MANAGEMENT (MONAMI 2017), 2018, 235 : 178 - 187