Show simple item record

dc.contributor.authorKianpour, Mazaher
dc.contributor.authorØverby, Harald
dc.contributor.authorKowalski, Stewart James
dc.contributor.authorFrantz, Christopher
dc.date.accessioned2020-04-15T16:13:44Z
dc.date.available2020-04-15T16:13:44Z
dc.date.created2019-10-08T11:37:30Z
dc.date.issued2019
dc.identifier.citationLecture Notes in Computer Science. 2019, 11594 LNCS 149-163.en_US
dc.identifier.issn0302-9743
dc.identifier.urihttps://hdl.handle.net/11250/2651189
dc.description.abstractThe most costly cybersecurity incidents for organizations result from the failures of their third parties. This means that organizations should not only invest in their own protection and cybersecurity measures, but also pay attention to that of their business and operational partners. While economic impact and real extent of third parties cybersecurity risks is hard to quantify, decision makers inevitably compare their decisions with other entities in their network. This paper presents a theoretically derived model to analyze the impact of social preferences and other factors on the willingness to cooperate in third party ecosystems. We hypothesize that willingness to cooperate among the organizations in the context of cybersecurity increases following the experience of cybersecurity attacks and increased perceived cybersecurity risks. The effects are mediated by perceived cybersecurity value and moderated by social preferences. These hypotheses are tested using a variance-based structural equation modeling analysis based on feedback from a sample of Norwegian organizations. Our empirical results confirm the strong positive impact of social preferences and cybersecurity attack experience on the willingness to cooperate, and support the reciprocal behavior of cybersecurity decision makers. We further show that more perception of cybersecurity risk and value deter the decision makers to cooperate with other organizations.en_US
dc.language.isoengen_US
dc.publisherSpringeren_US
dc.titleSocial Preferences in Decision Making Under Cybersecurity Risks and Uncertaintiesen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionacceptedVersionen_US
dc.source.pagenumber149-163en_US
dc.source.volume11594 LNCSen_US
dc.source.journalLecture Notes in Computer Scienceen_US
dc.identifier.doi10.1007/978-3-030-22351-9_10
dc.identifier.cristin1734861
dc.description.localcode"This is a post-peer-review, pre-copyedit version of an article. Locked until 12.6.2020 due to copyright restrictions. The final authenticated version is available online at: https://doi.org/10.1007/978-3-030-22351-9_10en_US
cristin.unitcode194,63,30,0
cristin.unitcode194,63,10,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.unitnameInstitutt for datateknologi og informatikk
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record