Informing cybersecurity strategic commitment through top management perceptions: The role of institutional pressures

https://doi.org/10.1016/j.im.2021.103507Get rights and content

Abstract

Given the financial consequences of security breaches, security risk management has gained more attention in board rooms and garnered more involvement from top management. We undertake a study to understand the top managers’ role in cybersecurity strategy, specifically with cyberinsurance. This study draws from institutional and upper echelons theories to explain how top managers’ values and perceptions mediate the impact of external institutional pressures on the commitment to use cyberinsurance as a risk management strategy. We empirically test proposed hypotheses using data collected from executive-level managers of various firms and perform semi-structured interviews of six case sites as post hoc analysis. The results suggest that institutional pressures positively affect top managers’ perceptions of job security, breach risk, financial risk, transaction cost, and regulatory oversight. In turn, these perceptions influence their commitment to cyberinsurance. We find that values and perceptions of personal relevance have a significant impact on their strategic decisions. The findings emphasize the critical role that top management plays in mediating the influence of institutional pressures on cybersecurity strategy. Implications for research and practice, along with limitations and future directions, are discussed.

Introduction

Cybersecurity breaches often result in the compromise of customer data that are ultimately very costly for organizations. Costs include notifying the individuals who are impacted by the security breach as well as legal fees, fines, and recovering from the breach [1]. For example, the security breach at Target in 2013 costs the company an estimated US$293 million, with over US$18 million in legal settlements [2]. Because of these high-profile breaches and the resulting costs, organizational board members and senior management have begun to pay more attention to them [3,4]. Thus, organizations are not only using traditional security risk management strategies (risk mitigation, risk acceptance, and risk avoidance), but also focusing on risk transfer strategies that can offer an even stronger overall cybersecurity solution [1]. The traditional approaches focus largely on deterrence, prevention, detection, and response [2,3] and have informed our understanding of managing security risk. However, these approaches do not help organizations address breach-related losses and residual security risks after a breach has occurred [4].

Risk transfer is a risk management approach that does address these types of losses. Research has shown that risk transfer through cyberinsurance provides a more comprehensive solution for cybersecurity [1,5]. Cyberinsurance protects organizations from risks incurred through internet and information systems (IS) usage [6,7] by mitigating the financial impact of a cybersecurity breach. Cyberinsurance allows the companies to transfer security risks to the cyberinsurance provider [5]. In fact, many government standards and regulatory agencies now require the use of cyberinsurance. For example, the Securities and Exchange Commission (SEC) requires publicly traded firms to disclose the type of insurance used in their cybersecurity plans [14]. As such, the purchase of such insurance is a decision made by an organization; thus choosing to use cyberinsurance is a strategic decision [15].

Although there is ample literature on IS-related strategic decisions [e.g., [8], [9], [10], [11], [12]], IS strategy within the cybersecurity context is a relatively underdeveloped topic. A close examination of the strategic choice and decision-making literature in IS indicates that there are few studies that have specifically examined the cybersecurity strategic decision (see Appendix A). Studies have examined information technology (IT)/IS management and IT strategic management [12,13]. However, we found only one study that specifically examines IS strategy within the context of cybersecurity, Angst et al. [14].

Researchers have explored theories that explain organizations’ strategic choices or decisions. Among them is an institutional theory [15], which posits that external institutional pressures influence organizational decisions. In the IS field, several researchers have examined the role of institutional pressures on an organization's decision to adopt or assimilate technological innovations [16,17]. In addition, top echelons theory [18], which suggests that organizational outcomes are reflections of the values and perceptions of the organization's top executives, has been used in IS to examine strategic innovations and security investments in healthcare [10,14].

There has been little research, however, that uses the lens of both institutional theory and upper echelons theory (UET) to focus specifically on cybersecurity strategy. Fewer still are studies that unpack the top manager's values and perceptions of personal relevance with respect to the strategic decisions surrounding cybersecurity. This research gap should be addressed because a more detailed understanding of how institutional pressures and top manager's values and perceptions affect cybersecurity as an organizational strategy could be very useful for practice and could provide theoretical implications as well. Drawing from UET, institutional theory, and the cybersecurity literature, we propose a conceptual model to better understand how organizations commit to cybersecurity strategies in response to institutional pressures, values, and perceptions. Extending the findings from Liang et al. [16] who suggest that institutional pressures are mediated by top manager perceptions1 in their effect on strategic enterprise resource planning (ERP) assimilation, we argue that institutional pressures influence cybersecurity strategic decisions. Due to the forces surrounding the cybersecurity landscape, not only are organizational decisions subject to the normative, mimetic, and coercive pressures exerted by other organizations, institutions, partners, and vendors, but the decisions are also subject to the top managers’ values and perceptions. These assertions are supported by the top echelons theory that argues that external and internal stimuli are mediated by the top manager's perceptions [18].

While one can assume that institutional pressures and managerial perceptions may influence commitment to using cyberinsurance as a risk management strategy, there are currently few studies that have theoretically and empirically integrated these perspectives within the cybersecurity context. As such, more theory-based IS strategic studies in cybersecurity are important and timely in the currently fast-evolving cybersecurity landscape, especially since cybersecurity has moved to the top of the management agenda as a strategic issue [19,20] and occupies top managers’ attention [21,22].

This research makes several contributions. First, by incorporating UET and institutional theory to study cybersecurity risk management strategy, this study complements prior integrative framework approaches to understanding top manager perspectives [e.g., 16]. Also, because this study bridges several perspectives in institutional theory [15], top echelons theory [18], and cybersecurity literature [22], we believe that it provides comprehensive insight and evidence of the top management decision-making towards a cybersecurity strategy. Second, and more importantly, by examining the values and perceptions that have personal relevance (e.g., job security and breach risk severity) to top managers, this study highlights how these factors could be leveraged to change and influence their commitment to a cybersecurity strategy. To our knowledge, no other study has employed UET and institutional theory to examine cybersecurity strategy and especially focused on individual risk factors that may affect organizational decisions. Thus, this study presents a novel inquiry into the use of UET in IS strategy.

Section snippets

Theoretical background

The foundation of our theoretical framework is made up of two elements: UET and institutional theory. UET argues that an organization's strategies, performance, and outcomes are reflections of the values and perceptions of the organization's top executives [18]. The values and perceptions of top executives (e.g., CEO) differ from one another, which results in differences in their estimation of organizational needs and leads to different organizational strategies [23]. Furthermore, top

Methodology

This study used a cross-sectional survey method. We tested the proposed model through survey data collected from CEOs from diverse organizations. We also conducted semi-structured interviews of top managers from different organizations to validate the study results. Most constructs are measured using multiple items and with a 7-point Likert scale ranging from 1—strongly agree to 7—strongly disagree. Some open-ended questions were also used to better access respondents’ understanding of the

Data analysis and results

Using SmartPLS 3.0 as one of partial least squares (PLS) techniques [106], we analyzed the model. PLS is suited for testing reflective and formative factors in the same model [107]. Prior to examining the structural model, we evaluated the measurement model. We performed analyses to check the reliability and convergent validity of the measurement model. The results are summarized in Table 2. Cronbach's α for each construct is above the recommended value of 0.70 [108] and ranges from 0.908 (FIN)

Discussion

We sought to understand top managers’ commitment to cyberinsurance as a risk management strategy. The empirical results confirm most of the predictions in our model and highlight the importance of individual, organizational, and situational factors in top managers’ commitment. Specifically, findings suggest that top managers’ perceptions mediate the influence of institutional pressures on their commitment and use of cyberinsurance as a risk management strategy.

Individual factors (i.e., job

Conclusion

This study examined top managers’ perspectives of a cybersecurity strategy. We drew from institutional theory and UET to test a model that links top managers’ values and perceptions as mediators between external institutional pressures and the commitment to use cyberinsurance as a risk management strategy. Both quantitative and post-hoc qualitative (through interviews of top executives) analyses provide a comprehensive insight of the top manager's decision-making towards a cybersecurity

CRediT authorship contribution statement

Obi Ogbanufe: Conceptualization, Data curation, Methodology, Writing – original draft. Dan J. Kim: Data curation, Supervision, Writing – review & editing. Mary C. Jones: Writing – review & editing.

Obi Ogbanufe is an Assistant Professor of Information Technology and Decision Sciences at the University of North Texas. She is a recipient of the NSF CyberCorps Scholarship for Service award. She has published in Information Systems Journal, Decision Support Systems and the International Journal of HumanComputer Interaction. Her research interests include information security, cybercrime, health information technology, risk management, and smart devices.

Reference (139)

  • B.K. Boyd et al.

    Executive scanning and perceived uncertainty: a multidimensional model

    J. Manage.

    (1996)
  • B. Srinidhi et al.

    Allocation of resources to cyber-security: The effect of misalignment of interest between managers and investors

    Decis. Support Syst.

    (2015)
  • A. Mukhopadhyay et al.

    Cyber-risk decision models: to insure IT or not?

    Decis. Support Syst.

    (2013)
  • D. Young et al.

    A framework for incorporating insurance in critical infrastructure cyber risk strategies

    Int. J. Crit. Infrastruct. Prot.

    (2016)
  • R.P. Majuca et al.

    The Evolution of Cyberinsurance

    (2006)
  • D.W. Straub et al.

    Coping with Systems Risk: Security Planning Models for Management Decision Making

    (1998)
  • R. Willison et al.
    (2013)
  • T. Bandyopadhyay et al.

    Why IT managers don't go for cyber-insurance products

    Commun. ACM.

    (2009)
  • C.A. Siegel et al.

    Cyber-risk management: technical and insurance controls for enterprise-level security

    Inf. Syst. Secur.

    (2002)
  • R. Böhme et al.

    On the limits of cyber-insurance

    Trust and Privacy in Digital Business

    (2006)
  • S. Romanosky et al.

    Content analysis of cyber insurance policies: how do carriers price cyber risk?

    J. Cybersecur.

    (2019)
  • D.S. Preston et al.

    Antecedents of IS strategic alignment: a nomological network

    Inf. Syst. Res.

    (2009)
  • A. Masli et al.

    Senior Executives’ IT Management Responsibilities: Serious IT-Related Deficiencies and CEO/CFO Turnover

    MIS Quarterly

    (2016)
  • C. Angst et al.

    When do it security investments matter? Accounting for the influence of institutional factors in the context of healthcare data breaches

    MIS Ouarterly

    (2017)
  • P.J. DiMaggio et al.

    The iron cage revisited : institutional isomorphism and collective rationality in organizational fields

    Am. Sociol. Rev.

    (1983)
  • H. Liang et al.
    (2007)
  • H.H. Teo et al.
    (2003)
  • D. Hambrick et al.

    Upper echelons: the organization as a reflection of its top managers

    Acad. Manag. Rev.

    (1984)
  • L. Kappelman et al.
    (2018)
  • Experian Data Breach Industry Forecast, Experian

    (2015)
  • S. Ransbotham et al.

    Choice and chance: A conceptual model of paths to information security compromise

    Inf. Syst. Res.

    (2009)
  • D. Hambrick

    Upper echelons theory : an update

    Acad. Manag. Rev.

    (2007)
  • P. Ghemawat

    Commitment: The Dynamic of Strategy

    (1991)
  • C. Hsu et al.

    Institutional influences on information systems security innovations

    Inf. Syst. Res.

    (2012)
  • G. Medvinsky, C. Lai, B.C. Neuman, Endorsements, licensing, and insurance for distributed system services, in:...
  • D. Geer

    Risk management is still where the money Is

    Comput. (Long. Beach. Calif).

    (2003)
  • B. Schneier

    Insurance and the computer industry

    Commun. ACM.

    (2001)
  • N.T. Feather

    Values, valences, and course enrollment: Testing the role of personal values within an expectancy - valence framework.

    J. Educ. Psychol.

    (1988)
  • J.P. Peter et al.

    A comparative analysis of three consumer decision strategies

    J. Consum. Res.

    (1975)
  • D.J. Kim et al.

    Trust and satisfaction, two stepping stones for successful e-commerce relationships: A longitudinal exploration

    Inf. Syst. Res.

    (2009)
  • G.L. Desanctis

    An Examination of an Expectancy Theory Model of Decision Support System Use

    (1982)
  • D. Hambrick et al.

    Assessing managerial discretion across industries

    Acad. Manag. J.

    (1995)
  • C. Crossland et al.

    Differences in managerial discretion across countries: how nation-level institutions affect the degree to which CEOs matter

    Strateg. Manag. J.

    (2011)
  • W. Lewis et al.
    (2003)
  • D. Chatterjee et al.
    (2002)
  • E. Mollick

    People and process, suits and innovators: The role of individuals in firm performance

    Strateg. Manag. J.

    (2012)
  • M. Bertrand et al.

    Managing With Style: The Effect of Managers on Firm Policies

    (2002)
  • D. Hambrick et al.

    The influence of top management team heterogeneity on firms competitive moves

    Adm. Sci. Q.

    (1996)
  • M. Newman et al.

    Determinants of Commitment to Information Systems Development: A Longitudinal Investigation

    (1996)
  • E. Babakus et al.

    The effect of management commitment to service quality on employees’ affective and performance outcome

    J. Acad. Mark. Sci.

    (2003)
  • Cited by (24)

    • A pathway model to five lines of accountability in cybersecurity governance

      2023, International Journal of Accounting Information Systems
    • Securing online accounts and assets: An examination of personal investments and protection motivation

      2023, International Journal of Information Management
      Citation Excerpt :

      The issue of personal relevance is also at the heart of PMT-based security research (Johnston et al., 2015). Researchers note that situations or events with personal relevance help individuals evaluate how threatening a situation can be and their vulnerability to such threat (Jaeger & Eckhardt, 2020; Ogbanufe et al., 2021). Therefore, given the individuals’ investments, which have personal relevance, we expect their perceptions of vulnerability to the hacking of the online account holding those investments to be enhanced or processed carefully.

    • Governing cybersecurity from the boardroom: Challenges, drivers, and ways ahead

      2022, Computers and Security
      Citation Excerpt :

      Lastly, organisations affected by past cyber-breaches may be more proactive in responding to additional cyber-attacks (Jeyaraj and Zadeh, 2020). Our literature review has highlighted that organisational factors interact with institutional pressures to drive the diffusion of effective cybersecurity practices (Damenu and Beaumont, 2017; Ogbanufe et al., 2021; Renaud et al., 2019; Schinagl and Shahim, 2020; Zukis, 2016). Yet, our knowledge about how this applies to BoDs’ engagement with cybersecurity is largely incomplete.

    • Model of the information security protection subsystem operation and method of optimization of its composition

      2022, Egyptian Informatics Journal
      Citation Excerpt :

      The disadvantages of this type of model are similar to those mentioned above. Models [14–17] were created with a focus on the description of the third performance indicator. The data for analysis in these models are: – the number of failures in the studied system for the censored period, which were caused by unknown negative impacts; – the number of failures in the operation of the studied system during the censored period, which were caused by negative impacts, the mechanisms of counteraction of which were embedded in the studied system at the stage of its design.

    View all citing articles on Scopus

    Obi Ogbanufe is an Assistant Professor of Information Technology and Decision Sciences at the University of North Texas. She is a recipient of the NSF CyberCorps Scholarship for Service award. She has published in Information Systems Journal, Decision Support Systems and the International Journal of HumanComputer Interaction. Her research interests include information security, cybercrime, health information technology, risk management, and smart devices.

    Dan J. Kim is a Fulbright Sr. Scholar and Professor of Information Technology and Decision Sciences at the University of North Texas. His research interests are in multidisciplinary areas, such as information security and privacy, business and intlligence analytics, trust in electronic commerce, and others. His research work has been published or forthcoming in more than 180 papers, in refereed journals, peer-reviewed book chapters, and conference proceedings including ISR, JMIS, JAIS, EJIS, CACM, DSS, I&M, etc. His publications have been cited more than 9,000 times over the last five years and he is ranked top 1.2% of most-cited worldwide researchers in the information systems area. He has been awarded several research grants for multi-years including NSF, NSA, and Core Fulbright Scholarship grant. He serves or served as a guest, senior, and associate editor for several top journals, including MISQ, I&M, ISF, ISM, and ECRA.

    Mary C. Jones is a Professor of information systems in the Information Technology and Decision Sciences Department at the University of North Texas. Her work appears in numerous journals, including MIS Quarterly, European Journal of Information Systems, Behavioral Science, Decision Support Systems, System Dynamics Review, and Information and Management. Her research interests are primarily in the impact on organizations of large scale, organizational spanning information systems, and in organizational-level IT management issues. She teaches a variety of courses, including enterprise applications of business intelligence/analytics, IT project management, and doctoral seminars in general systems theory and in research methods.

    View full text