Cyber-security effect on organizational internal process: mediating role of technological infrastructure
-
DOIhttp://dx.doi.org/10.21511/ppm.18(1).2020.39
-
Article InfoVolume 18 2020, Issue #1, pp. 449-460
- Cited by
- 895 Views
-
224 Downloads
This work is licensed under a
Creative Commons Attribution 4.0 International License
Adopting the technologies among organizations comes with the continuous worries of protection and hacking. The idea of cyber-security has become over the years the main interest of many organizations, which depend on technologies in its operations, which requires them to pay extra attention to their technological infrastructure. The current study aims at examining the influence of cyber-security forces on organizational internal operations and the role of technological infrastructure in defining and controlling the level of protection that cyber-security has on organizational internal processes. Quantitative approach was adopted, and a questionnaire was utilized to collect the data from a convenient sample of 360 software engineers, network engineers, software testers, web developers, and technical support using a structured survey questionnaire, and analyzed using SPSS version 21. The results confirmed that cyber-security motivators (data growth, technology expansion, access to required resources, operational control, and technical control) indirectly affect solid internal processes that are attributed to the consistency of technological infrastructure in an organization. The variable of ‘data growth’ appeared to be the most influential motivator on cyber-security strategies, as it scored a mean of 4.2661, which is the highest among all adopted variables and followed by the variable of ‘technical control’, which scored a mean of 4.1296. Accordingly, the study recommends that organizations should consider IT infrastructure as a main item within their risk management strategies to avoid unpredicted risks and attacks.
- Keywords
-
JEL Classification (Paper profile tab)M15, L86
-
References30
-
Tables9
-
Figures2
-
- Figure 1. Conceptual framework relating cyber-security motivators to technological infrastructure and internal processes adapted
- Figure 2. Chart for path analysis results
-
- Table 1. Age
- Table 2. Gender
- Table 3. Education
- Table 4. Position
- Table 5. Descriptive statistics
- Table 6. Descriptive statistics
- Table 7. Path analysis
- Table 8. Amos results
- Table 9. Estimates for direct and indirect impact
-
- Abu-Taieh, E. M., Al Faries, A. A., Alotaibi, S. T., & Aldehim, G. (2018). Cyber Security Body of Knowledge and Curricula Development. In Reimagining New Approaches in Teacher Professional Development. IntechOpen.
- Agrafiotis, I., Nurse, J.R., Goldsmith, M., Creese, S., & Upton, D. (2018). A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, 4(1), 1-15.
- Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cyber-security. Technology Innovation Management Review, 4(10), 13-21.
- Dewal, P., Narula, G. S., Jain, V., & Baliyan, A. (2018). Security Attacks in Wireless Sensor Networks: A Survey. In Cyber Security (pp. 47-58). Springer, Singapore.
- Diego, A. B. B. O. (2019). The Analysis of Cyber Security the Extended Cartesian Method Approach With Innovative Study Models. Scientific Research Publishing, Inc. USA.
- Efthymiopoulos, M. P. (2016). Cyber-security in smart cities: the case of Dubai. Journal of Innovation and Entrepreneurship, 5(1).
- Elamiryan, R., & Bolgov, R. (2018). Comparative Analysis of Cybersecurity Systems in Russia and Armenia: Legal and Political Frameworks. In International Conference on Digital Transformation and Global Society (pp. 195-209). Springer, Cham.
- Göztepe, K., Kılıc, R., & Kayaalp, A. (2014). Cyber Defence in Depth: Designing Cyber Security Agency Organization for Turkey. Journal of Naval Science and Engineering, 10(1), 1-24.
- Haq, Q. A. U. (2019). Cyber Security and Analysis of Cyber-Crime Laws to Restrict Cyber Crime in Pakistan. International Journal of Computer Network and Information Security, 11(1), 62-69.
- Horowitz, B., Beling, P., Fleming, C., Adams, S., Carter, B., Sherburne, T., Elks, C., Bakirtzis, G., Shull, F., & Mead, N. R. (2018). Cyber security requirements methodology (No. SERC-2018-TR-110). Stevens Institute of Technology Hoboken United States.
- Keplinger, K. (2018). Is quantum computing becoming relevant to cyber-security? Network Security, 9, 16-19.
- Miron, W., & Muita, K. (2014). Cybersecurity capability maturity models for providers of critical infrastructure. Technology Innovation Management Review, 4(10).
- Moreira, N., Molina, E., Lazaro, J., Jacob, E., & Astarloa, A. (2016). Cyber-security in substation automation systems. Renewable and Sustainable Energy Reviews, 54, 1552-1562.
- Narukonda, K., & Rowland, P. (2018). The Perceptions of Cyber Security in High School Girls. MWAIS2018.
- Pak Nejad, M., Javadi, R., & Mohammadi, J. (2014). Influence of security information management in cyber environment on electronic banking efficiency. European Online Journal of Natural and Social Sciences: Proceedings, 2(3(s)), 2240-2248.
- Pernik, P., Wojtkowiak, J., & Verschoor-Kirss, A. (2016). National Cyber Security Organisation: United States. NATO Cooperative Cyber Defence Centre of Excellence: Tallinn.
- Pfleeger, S. L., Sasse, M. A., & Furnham, A. (2014). From weakest link to security hero: Transforming staff security behavior. Journal of Homeland Security and Emergency Management, 11(4), 489-510.
- Poresky, C., Andreades, C., Kendrick, J., & Peterson, P. (2017). Cyber Security in Nuclear Power Plants: Insights for Advanced Nuclear Technologies. Department of Nuclear Engineering, University of California, Berkeley, Publication UCBTH-17-004.
- Priyadarshini, I. (2018). Cyber Security Risks in Robotics. In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (pp. 1235-1250). IGI Global.
- Rasekh, A., Hassanzadeh, A., Mulchandani, S., Modi, S., & Banks, M. K. (2016). Smart water networks and cyber security. Journal of Water Resources Planning and Management, 142(7).
- Renaud, K., Flowerday, S., Warkentin, M., Cockshott, P., & Orgeron, C. (2018). Is the responsibilization of the cyber security risk reasonable and judicious? Computers & Security, 78, 198-211.
- Schatz, D., Bashroush, R., & Wall, J. (2017). Towards a more representative definition of cyber security. Journal of Digital Forensics, Security and Law, 12(2), 53-74.
- Sommestad, T., Hallberg, J., Lundholm, K., & Bengtsson, J. (2014). Variables influencing information security policy compliance: A systematic review of quantitative studies. Information Management & Computer Security, 22(1), 42-75.
- Stafford, T., Deitz, G., & Li, Y. (2018). The role of internal audit and user training in information security policy compliance. Managerial Auditing Journal, 33(4), 410-424.
- Sun, C. C., Hahn, A., & Liu, C. C. (2018). Cyber security of a power grid: State-of-the-art. International Journal of Electrical Power & Energy Systems, 99, 45-56.
- Symantec (2016). Internet Security Threat Report (6 p.).
- Udo, G., Bagchi, K., & Kirs, P. (2018). Analysis of the Growth of Security Breaches: A Multi-Growth Model Approach. Issues in Information Systems, 19(4), 176-186.
- Vishik, C., Matsubara, M., & Plonk, A. (2016). Key Concepts in Cyber Security: Towards a Common Policy and Technology Context for Cyber Security Norms. In NATO CCD COE Publications, Tallinn (pp. 221-242).
- Whyte, C., & Mazanec, B. (2018). Understanding Cyber Warfare: Politics, Policy and Strategy. Routledge.
- Yasin, A., Liu, L., Li, T., Wang, J., & Zowghi, D. (2018). Design and Preliminary Evaluation of a Cyber-security Requirements Education Game (SREG). Information and Software Technology, 95, 179-200.