Skip to main content
Top
Published in: Information Systems Frontiers 5/2019

30-10-2017

Do Strategy and Timing in IT Security Investments Matter? An Empirical Investigation of the Alignment Effect

Authors: Feng Xu, Xin (Robert) Luo, Hongyun Zhang, Shan Liu, Wei (Wayne) Huang

Published in: Information Systems Frontiers | Issue 5/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Firms have increasingly invested in information technology (IT) security to protect their information resources. Nevertheless, deciding when to invest in IT security is rather difficult for executives because of the irreversibility of spending and uncertainty of IT security investments performance. A review of the literature on IT security investments reveals that previous studies largely neglected the strategy and timing of investments. Basing on real options theory, this research examines IT security investments for the commercial exploitation strategy versus the IT security improvement strategy in terms of proactive and reactive investments. An event methodology is used to estimate the effect of IT security investment timing on the stock performance of the investments. Our results show that reactive investments for IT security improvement and proactive investments for commercial exploitation earn positive abnormal returns. Moreover, the market reacts more positively to aligned than misaligned IT security investments. The implications of the research findings are presented and discussed.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
go back to reference Adner, R., & Levinthal, D. A. (2004). What is not a real option: Considering boundaries for the application of real options to business strategy. Academy of Management Review, 29(1), 74–85.CrossRef Adner, R., & Levinthal, D. A. (2004). What is not a real option: Considering boundaries for the application of real options to business strategy. Academy of Management Review, 29(1), 74–85.CrossRef
go back to reference Agrawal, M., Kishore, R., & Rao, H. R. (2006). Market reactions to e-business outsourcing announcements: An event study. Information Management, 43(7), 861–873.CrossRef Agrawal, M., Kishore, R., & Rao, H. R. (2006). Market reactions to e-business outsourcing announcements: An event study. Information Management, 43(7), 861–873.CrossRef
go back to reference Anderson, E. E. (2010). Firm objectives, IT alignment, and information security. Ibm Journal of Research and Development, 54(3). Anderson, E. E. (2010). Firm objectives, IT alignment, and information security. Ibm Journal of Research and Development, 54(3).
go back to reference Armitage, S. (1995). Event study methods and evidence on their performance. Journal of Economic Surveys, 9(1), 25–52.CrossRef Armitage, S. (1995). Event study methods and evidence on their performance. Journal of Economic Surveys, 9(1), 25–52.CrossRef
go back to reference Avison, D., Jones, J., Powell, P., & Wilson, D. (2004). Using and validating the strategic alignment model. The Journal of Strategic Information Systems, 13(3), 223–246.CrossRef Avison, D., Jones, J., Powell, P., & Wilson, D. (2004). Using and validating the strategic alignment model. The Journal of Strategic Information Systems, 13(3), 223–246.CrossRef
go back to reference Benaroch, M. (2001). Option-based management of technology investment risk. IEEE Transactions on Engineering Management, 48(4), 428–444.CrossRef Benaroch, M. (2001). Option-based management of technology investment risk. IEEE Transactions on Engineering Management, 48(4), 428–444.CrossRef
go back to reference Bergeron, F., Raymond, L., & Rivard, S. (2004). Ideal patterns of strategic alignment and business performance. Information Management, 41(8), 1003–1020.CrossRef Bergeron, F., Raymond, L., & Rivard, S. (2004). Ideal patterns of strategic alignment and business performance. Information Management, 41(8), 1003–1020.CrossRef
go back to reference Black, F., & Scholes, M. (1973). The pricing of options and corporate liabilities. The journal of political economy, 637-654. Black, F., & Scholes, M. (1973). The pricing of options and corporate liabilities. The journal of political economy, 637-654.
go back to reference Bohme, R., & Moore, T. (2010). The iterated weakest link. Security & Privacy, IEEE, 8(1), 53–55.CrossRef Bohme, R., & Moore, T. (2010). The iterated weakest link. Security & Privacy, IEEE, 8(1), 53–55.CrossRef
go back to reference Bowman, E. H., & Hurry, D. (1993). Strategy through the option lens: An integrated view of resource investments and the incremental-choice process. Academy of Management Review, 18(4), 760–782.CrossRef Bowman, E. H., & Hurry, D. (1993). Strategy through the option lens: An integrated view of resource investments and the incremental-choice process. Academy of Management Review, 18(4), 760–782.CrossRef
go back to reference Busby, J., & Pitts, C. (1997). Real Options in Practice: An Exploratory Survey of How Finance Officers Deal with Flexibility in Capital Appraisal. Management Accounting Research, 8(2), 169–187.CrossRef Busby, J., & Pitts, C. (1997). Real Options in Practice: An Exploratory Survey of How Finance Officers Deal with Flexibility in Capital Appraisal. Management Accounting Research, 8(2), 169–187.CrossRef
go back to reference Byrd, T. A., Lewis, B. R., & Bryan, R. W. (2006). The leveraging influence of strategic alignment on IT investment: an empirical examination. Information Management, 43(3), 308–321.CrossRef Byrd, T. A., Lewis, B. R., & Bryan, R. W. (2006). The leveraging influence of strategic alignment on IT investment: an empirical examination. Information Management, 43(3), 308–321.CrossRef
go back to reference Campa, J. M. (1994). Multinational investment under uncertainty in the chemical processing industries. Journal of International Business Studies, 25, 557–578.CrossRef Campa, J. M. (1994). Multinational investment under uncertainty in the chemical processing industries. Journal of International Business Studies, 25, 557–578.CrossRef
go back to reference Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004a). The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers. International Journal of Electronic Commerce, 9(1), 70–104.CrossRef Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004a). The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers. International Journal of Electronic Commerce, 9(1), 70–104.CrossRef
go back to reference Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004b). A model for evaluating IT security investments. Communications of the ACM, 47(7), 87–92.CrossRef Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004b). A model for evaluating IT security investments. Communications of the ACM, 47(7), 87–92.CrossRef
go back to reference Cavusoglu, H., Raghunathan, S., & Yue, W. T. (2008). Decision-theoretic and game-theoretic approaches to IT security investment. Journal of Management Information Systems, 25(2), 281–304.CrossRef Cavusoglu, H., Raghunathan, S., & Yue, W. T. (2008). Decision-theoretic and game-theoretic approaches to IT security investment. Journal of Management Information Systems, 25(2), 281–304.CrossRef
go back to reference Chai, S., Kim, M., & Rao, H. R. (2011). Firms' information security investment decisions: Stock market evidence of investors' behavior. Decision Support Systems, 50(4), 651–661.CrossRef Chai, S., Kim, M., & Rao, H. R. (2011). Firms' information security investment decisions: Stock market evidence of investors' behavior. Decision Support Systems, 50(4), 651–661.CrossRef
go back to reference Chatterjee, D., Pacini, C., & Sambamurthy, V. (2002). The shareholder-wealth and trading-volume effects of information-technology infrastructure investments. Journal of Management Information Systems, 19(2), 7–42.CrossRef Chatterjee, D., Pacini, C., & Sambamurthy, V. (2002). The shareholder-wealth and trading-volume effects of information-technology infrastructure investments. Journal of Management Information Systems, 19(2), 7–42.CrossRef
go back to reference Chatterjee, D., Richardson, V. J., & Zmud, R. W. (2001). Examining the shareholder wealth effects of announcements of newly created CIO positions. MIS Quarterly, 25(1), 43–70.CrossRef Chatterjee, D., Richardson, V. J., & Zmud, R. W. (2001). Examining the shareholder wealth effects of announcements of newly created CIO positions. MIS Quarterly, 25(1), 43–70.CrossRef
go back to reference Chintakananda, A., & McIntyre, D. P. (2014). Market Entry in the Presence of Network Effects A Real Options Perspective. Journal of Management, 40(6), 1535–1557.CrossRef Chintakananda, A., & McIntyre, D. P. (2014). Market Entry in the Presence of Network Effects A Real Options Perspective. Journal of Management, 40(6), 1535–1557.CrossRef
go back to reference Corrado, C. J., & Zivney, T. L. (1992). The specification and power of the sign test in event study hypothesis tests using daily stock returns. Journal of Financial and Quantitative Analysis, 27(03), 465–478.CrossRef Corrado, C. J., & Zivney, T. L. (1992). The specification and power of the sign test in event study hypothesis tests using daily stock returns. Journal of Financial and Quantitative Analysis, 27(03), 465–478.CrossRef
go back to reference Cowan, A. R. (1992). Nonparametric event study tests. Review of Quantitative Finance and Accounting, 2(4), 343–358.CrossRef Cowan, A. R. (1992). Nonparametric event study tests. Review of Quantitative Finance and Accounting, 2(4), 343–358.CrossRef
go back to reference Dehning, B., Richardson, V. J., & Zmud, R. W. (2003). The value relevance of announcements of transformational information technology investments. MIS Quarterly, 27(4), 637–656.CrossRef Dehning, B., Richardson, V. J., & Zmud, R. W. (2003). The value relevance of announcements of transformational information technology investments. MIS Quarterly, 27(4), 637–656.CrossRef
go back to reference Dierickx, I., & Cool, K. (1989). Asset stock accumulation and sustainability of compentitive advantage. Management Science, 35(12), 1504–1511.CrossRef Dierickx, I., & Cool, K. (1989). Asset stock accumulation and sustainability of compentitive advantage. Management Science, 35(12), 1504–1511.CrossRef
go back to reference DiRomauldo, A., & Gurbaxani, V. (1998). Strategic intent for IT outsourcing. Center for Research on Information Technology and Organizations. DiRomauldo, A., & Gurbaxani, V. (1998). Strategic intent for IT outsourcing. Center for Research on Information Technology and Organizations.
go back to reference Dixit, A. K., & Pindyck, R. S. (1994). Investment under uncertainty: Princeton University Press. Dixit, A. K., & Pindyck, R. S. (1994). Investment under uncertainty: Princeton University Press.
go back to reference Dixon, W. J., & Mood, A. M. (1946). The statistical sign test. Journal of the American Statistical Association, 41(236), 557–566.CrossRef Dixon, W. J., & Mood, A. M. (1946). The statistical sign test. Journal of the American Statistical Association, 41(236), 557–566.CrossRef
go back to reference Doherty, N. F., & Fulford, H. (2006). Aligning the information security policy with the strategic information systems plan. Computers & Security, 25(1), 55–63.CrossRef Doherty, N. F., & Fulford, H. (2006). Aligning the information security policy with the strategic information systems plan. Computers & Security, 25(1), 55–63.CrossRef
go back to reference Dos Santos, B. L., Peffers, K., & Mauer, D. C. (1993). The impact of information technology investment announcements on the market value of the firm. Information Systems Research, 4(1), 1–23.CrossRef Dos Santos, B. L., Peffers, K., & Mauer, D. C. (1993). The impact of information technology investment announcements on the market value of the firm. Information Systems Research, 4(1), 1–23.CrossRef
go back to reference Dulipovici, A., & Robey, D. (2013). Strategic alignment and misalignment of knowledge management systems: A social representation perspective. Journal of Management Information Systems, 29(4), 103–126.CrossRef Dulipovici, A., & Robey, D. (2013). Strategic alignment and misalignment of knowledge management systems: A social representation perspective. Journal of Management Information Systems, 29(4), 103–126.CrossRef
go back to reference Elango, B. (2006). When does cross-border acquisition of insurance firms lead to value creation? Journal of Risk Finance, 7(4), 402–414.CrossRef Elango, B. (2006). When does cross-border acquisition of insurance firms lead to value creation? Journal of Risk Finance, 7(4), 402–414.CrossRef
go back to reference Fama, E. F., Fisher, L., Jensen, M. C., & Roll, R. (1969). The adjustment of stock prices to new information. International Economic Review, 10(1), 1–21.CrossRef Fama, E. F., Fisher, L., Jensen, M. C., & Roll, R. (1969). The adjustment of stock prices to new information. International Economic Review, 10(1), 1–21.CrossRef
go back to reference Fichman, R. G. (2004). Real options and IT platform adoption: Implications for theory and practice. Information Systems Research, 15(2), 132–154.CrossRef Fichman, R. G. (2004). Real options and IT platform adoption: Implications for theory and practice. Information Systems Research, 15(2), 132–154.CrossRef
go back to reference Fichman, R. G., Keil, M., & Tiwana, A. (2005). Beyond valuation: "Options thinking" in IT project management. California Management Review, 47(2), 74.CrossRef Fichman, R. G., Keil, M., & Tiwana, A. (2005). Beyond valuation: "Options thinking" in IT project management. California Management Review, 47(2), 74.CrossRef
go back to reference Fisch, J. H. (2008). Investment in new foreign subsidiaries under receding perception of uncertainty. Journal of International Business Studies, 39(3), 370–386.CrossRef Fisch, J. H. (2008). Investment in new foreign subsidiaries under receding perception of uncertainty. Journal of International Business Studies, 39(3), 370–386.CrossRef
go back to reference Folta, T. B., Johnson, D. R., & O'Brien, J. (2006). Uncertainty, irreversibility, and the likelihood of entry: An empirical assessment of the option to defer. Journal of Economic Behavior & Organization, 61, 432–452.CrossRef Folta, T. B., Johnson, D. R., & O'Brien, J. (2006). Uncertainty, irreversibility, and the likelihood of entry: An empirical assessment of the option to defer. Journal of Economic Behavior & Organization, 61, 432–452.CrossRef
go back to reference Folta, T. B., & Miller, K. D. (2002). Real options in equity partnerships. Strategic Management Journal, 23, 77–88.CrossRef Folta, T. B., & Miller, K. D. (2002). Real options in equity partnerships. Strategic Management Journal, 23, 77–88.CrossRef
go back to reference Folta, T. B., & O'Brien, J. P. (2004). Entry in the presence of dueling options. Strategic Management Journal, 25(2), 121–138.CrossRef Folta, T. B., & O'Brien, J. P. (2004). Entry in the presence of dueling options. Strategic Management Journal, 25(2), 121–138.CrossRef
go back to reference Gao, X., Zhong, W., & Mei, S. (2015). Security investment and information sharing under an alternative security breach probability function. Information Systems Frontiers, 17(2), 423–438.CrossRef Gao, X., Zhong, W., & Mei, S. (2015). Security investment and information sharing under an alternative security breach probability function. Information Systems Frontiers, 17(2), 423–438.CrossRef
go back to reference Gebauer, J., & Schober, F. (2006). Information system flexibility and the cost efficiency of business processes. Journal of the Association for Information Systems, 7(3), 122–146.CrossRef Gebauer, J., & Schober, F. (2006). Information system flexibility and the cost efficiency of business processes. Journal of the Association for Information Systems, 7(3), 122–146.CrossRef
go back to reference Goel, S., & Shawky, H. A. (2009). Estimating the market impact of security breach announcements on firm values. Information Management, 46(7), 404–410.CrossRef Goel, S., & Shawky, H. A. (2009). Estimating the market impact of security breach announcements on firm values. Information Management, 46(7), 404–410.CrossRef
go back to reference Goldstein, J., Chernobai, A., & Benaroch, M. (2011). An event study analysis of the economic impact of IT operational risk and its subcategories. Journal of the Association for Information Systems, 12(9), 606–631.CrossRef Goldstein, J., Chernobai, A., & Benaroch, M. (2011). An event study analysis of the economic impact of IT operational risk and its subcategories. Journal of the Association for Information Systems, 12(9), 606–631.CrossRef
go back to reference Gordon, L. A., & Loeb, M. P. (2002). The economics of information security investment. ACM Transactions on Information and System Security (TISSEC), 5(4), 438–457.CrossRef Gordon, L. A., & Loeb, M. P. (2002). The economics of information security investment. ACM Transactions on Information and System Security (TISSEC), 5(4), 438–457.CrossRef
go back to reference Gordon, L. A., & Loeb, M. P. (2006). Budgeting process for information security expenditures. Communications of the ACM, 49(1), 121–125.CrossRef Gordon, L. A., & Loeb, M. P. (2006). Budgeting process for information security expenditures. Communications of the ACM, 49(1), 121–125.CrossRef
go back to reference Gordon, L. A., Loeb, M. P., & Lucyshyn, W. (2003). Information security expenditures and real options: A wait-and-see approach. Computer Security Journal, 19(2). Gordon, L. A., Loeb, M. P., & Lucyshyn, W. (2003). Information security expenditures and real options: A wait-and-see approach. Computer Security Journal, 19(2).
go back to reference Gordon, L. A., Loeb, M. P., Lucyshyn, W., & Zhou, L. (2015). The impact of information sharing on cybersecurity underinvestment: A real options perspective. Journal of Accounting and Public Policy, 34(5), 509–519.CrossRef Gordon, L. A., Loeb, M. P., Lucyshyn, W., & Zhou, L. (2015). The impact of information sharing on cybersecurity underinvestment: A real options perspective. Journal of Accounting and Public Policy, 34(5), 509–519.CrossRef
go back to reference Guiso, L., & Parigi, G. (1999). Investment and demand uncertainty. Quarterly Journal of Economics, 114, 185–227.CrossRef Guiso, L., & Parigi, G. (1999). Investment and demand uncertainty. Quarterly Journal of Economics, 114, 185–227.CrossRef
go back to reference Gunther McGrath, R., & Nerkar, A. (2004). Real options reasoning and a new look at the R&D investment strategies of pharmaceutical firms. Strategic Management Journal, 25(1), 1–21.CrossRef Gunther McGrath, R., & Nerkar, A. (2004). Real options reasoning and a new look at the R&D investment strategies of pharmaceutical firms. Strategic Management Journal, 25(1), 1–21.CrossRef
go back to reference Hausken, K. (2006). Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Information Systems Frontiers, 8(5), 338–349.CrossRef Hausken, K. (2006). Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Information Systems Frontiers, 8(5), 338–349.CrossRef
go back to reference Hausken, K. (2014). Returns to information security investment: Endogenizing the expected loss. Information Systems Frontiers, 16(2), 329–336.CrossRef Hausken, K. (2014). Returns to information security investment: Endogenizing the expected loss. Information Systems Frontiers, 16(2), 329–336.CrossRef
go back to reference Henderson, J. C., & Venkatraman, N. (1993). Strategic alignment: Leveraging information technology for transforming organizations. IBM Systems Journal, 32(1), 4–16.CrossRef Henderson, J. C., & Venkatraman, N. (1993). Strategic alignment: Leveraging information technology for transforming organizations. IBM Systems Journal, 32(1), 4–16.CrossRef
go back to reference Herath, H. S. B., & Herath, T. C. (2008). Investments in information security: a real options perspective with bayesian postaudit. Journal of Management Information Systems, 25(3), 337–375.CrossRef Herath, H. S. B., & Herath, T. C. (2008). Investments in information security: a real options perspective with bayesian postaudit. Journal of Management Information Systems, 25(3), 337–375.CrossRef
go back to reference Iheagwara, C. B., Andrew, & Singhal, M. (2004). Cost effective management frameworks for intrusion detection systems. Journal of Computer Security, 12(5), 777–798.CrossRef Iheagwara, C. B., Andrew, & Singhal, M. (2004). Cost effective management frameworks for intrusion detection systems. Journal of Computer Security, 12(5), 777–798.CrossRef
go back to reference Im, K. S., Dow, K. E., & Grover, V. (2001). Research report: a reexamination of IT investment and the market value of the firm—An event study methodology. Information Systems Research, 12(1), 103–117.CrossRef Im, K. S., Dow, K. E., & Grover, V. (2001). Research report: a reexamination of IT investment and the market value of the firm—An event study methodology. Information Systems Research, 12(1), 103–117.CrossRef
go back to reference Johnston, A. C., & Hale, R. (2009). Improved Security through Information Security Governance. Communications of the ACM, 52(1), 126–129.CrossRef Johnston, A. C., & Hale, R. (2009). Improved Security through Information Security Governance. Communications of the ACM, 52(1), 126–129.CrossRef
go back to reference Kauffman, R. J., & Li, X. (2005). Technology competition and optimal investment timing: a real options perspective. IEEE Transactions on Engineering Management, 52(1), 15–29.CrossRef Kauffman, R. J., & Li, X. (2005). Technology competition and optimal investment timing: a real options perspective. IEEE Transactions on Engineering Management, 52(1), 15–29.CrossRef
go back to reference Keown, A. J., Martin, J. D., Petty, J. W., & Scott, D. F. (2002). Financial management: principles and applications. Keown, A. J., Martin, J. D., Petty, J. W., & Scott, D. F. (2002). Financial management: principles and applications.
go back to reference Kester, W. C. (1984). Today's options for tomorrow's growth. Harvard Business Review, 62, 153–160. Kester, W. C. (1984). Today's options for tomorrow's growth. Harvard Business Review, 62, 153–160.
go back to reference Kim, S., & Lee, H. J. (2005). Cost-benefit analysis of security investments: methodology and case study. In (pp. 1239-1248): ICCSA 2005. Kim, S., & Lee, H. J. (2005). Cost-benefit analysis of security investments: methodology and case study. In (pp. 1239-1248): ICCSA 2005.
go back to reference Kim, Y. J., & Sanders, G. L. (2002). Strategic actions in information technology investment based on real option theory. Decision Support Systems, 33(1), 1–11.CrossRef Kim, Y. J., & Sanders, G. L. (2002). Strategic actions in information technology investment based on real option theory. Decision Support Systems, 33(1), 1–11.CrossRef
go back to reference Kogut, B. (1991). Joint ventures and the option to expand and acquire. Management Science, 37(1), 19–33.CrossRef Kogut, B. (1991). Joint ventures and the option to expand and acquire. Management Science, 37(1), 19–33.CrossRef
go back to reference Kogut, B., & Kulatilaka, N. (1994). Options thinking and platform investments - investing in opportunity. California Management Review, 36(2), 52–71.CrossRef Kogut, B., & Kulatilaka, N. (1994). Options thinking and platform investments - investing in opportunity. California Management Review, 36(2), 52–71.CrossRef
go back to reference Kong, H. K., Kim, T. S., & Kim, J. (2012). An analysis on effects of information security investments: a BSC perspective. Journal of Intelligent Manufacturing, 23(4), 941–953.CrossRef Kong, H. K., Kim, T. S., & Kim, J. (2012). An analysis on effects of information security investments: a BSC perspective. Journal of Intelligent Manufacturing, 23(4), 941–953.CrossRef
go back to reference Kulatilaka, N., & Perotti, E. C. (1998). Strategic growth options. Management Science, 44, 1021–1031.CrossRef Kulatilaka, N., & Perotti, E. C. (1998). Strategic growth options. Management Science, 44, 1021–1031.CrossRef
go back to reference Kwon, J., & Johnson, M. E. (2014). Proactive versus reactive security investments in the healthcare sector. MIS Quarterly, 38(2), 451–471.CrossRef Kwon, J., & Johnson, M. E. (2014). Proactive versus reactive security investments in the healthcare sector. MIS Quarterly, 38(2), 451–471.CrossRef
go back to reference Leiblein, M. J., & Ziedonis, A. A. (2007). Deferral and growth options under sequential innovation. Advances in Strategic Management, 24, 225–245.CrossRef Leiblein, M. J., & Ziedonis, A. A. (2007). Deferral and growth options under sequential innovation. Advances in Strategic Management, 24, 225–245.CrossRef
go back to reference Lin, L., & Kulatilaka, N. (2007). Strategic growth options in network industries. Advances in Strategic Management, 24(3), 177–198.CrossRef Lin, L., & Kulatilaka, N. (2007). Strategic growth options in network industries. Advances in Strategic Management, 24(3), 177–198.CrossRef
go back to reference Loderer, C. F., & Mauer, D. C. (1992). Corporate dividends and seasoned equity issues: An empirical investigation. The Journal of Finance, 47(1), 201–225.CrossRef Loderer, C. F., & Mauer, D. C. (1992). Corporate dividends and seasoned equity issues: An empirical investigation. The Journal of Finance, 47(1), 201–225.CrossRef
go back to reference MacKinlay, A. C. (1997). Event studies in economics and finance. Journal of economic literature, 13-39. MacKinlay, A. C. (1997). Event studies in economics and finance. Journal of economic literature, 13-39.
go back to reference Majd, S., & Pindyck, R. S. (1987). Time to build, option value, and investment decisions. Journal of Financial Economics, 18(1), 7–27.CrossRef Majd, S., & Pindyck, R. S. (1987). Time to build, option value, and investment decisions. Journal of Financial Economics, 18(1), 7–27.CrossRef
go back to reference McDonald, R., & Siegel, D. (1986). The value of waiting to invest. Quarterly Journal of Economics, 101, 707–728.CrossRef McDonald, R., & Siegel, D. (1986). The value of waiting to invest. Quarterly Journal of Economics, 101, 707–728.CrossRef
go back to reference Miaoui, Y., & Boudriga, N. (2017). Enterprise security investment through time when facing different types of vulnerabilities. Information Systems Frontiers, 1-40. Miaoui, Y., & Boudriga, N. (2017). Enterprise security investment through time when facing different types of vulnerabilities. Information Systems Frontiers, 1-40.
go back to reference Miller, K. D., & Folta, T. B. (2002). Option value and entry timing. Strategic Management Journal, 23(7), 655–665.CrossRef Miller, K. D., & Folta, T. B. (2002). Option value and entry timing. Strategic Management Journal, 23(7), 655–665.CrossRef
go back to reference Miller, M. H., & Modigliani, F. (1961). Dividend policy, growth, and the valuation of shares. the. Journal of Business, 34(4), 411–433.CrossRef Miller, M. H., & Modigliani, F. (1961). Dividend policy, growth, and the valuation of shares. the. Journal of Business, 34(4), 411–433.CrossRef
go back to reference Myers, S. C. (1977). Determinants of corporate borrowing. Journal of Financial Economics, 5(2), 147–175.CrossRef Myers, S. C. (1977). Determinants of corporate borrowing. Journal of Financial Economics, 5(2), 147–175.CrossRef
go back to reference Pindyck, R. S. (1986). Irreversible investment, capacity choice, and the value of the firm. National Bureau of Economic Research. Pindyck, R. S. (1986). Irreversible investment, capacity choice, and the value of the firm. National Bureau of Economic Research.
go back to reference Ranganathan, C., & Brown, C. V. (2006). ERP investments and the market value of firms: Toward an understanding of influential ERP project variables. Information Systems Research, 17(2), 145–161.CrossRef Ranganathan, C., & Brown, C. V. (2006). ERP investments and the market value of firms: Toward an understanding of influential ERP project variables. Information Systems Research, 17(2), 145–161.CrossRef
go back to reference Reuer, J. J., & Tong, T. W. (2005). Real options in international joint ventures. Journal of Management, 31(3), 403–423.CrossRef Reuer, J. J., & Tong, T. W. (2005). Real options in international joint ventures. Journal of Management, 31(3), 403–423.CrossRef
go back to reference Roztocki, N., & Weistroffer, H. R. (2015). Investments in enterprise integration technology: An event study. Information Systems Frontiers, 17(3), 659–672.CrossRef Roztocki, N., & Weistroffer, H. R. (2015). Investments in enterprise integration technology: An event study. Information Systems Frontiers, 17(3), 659–672.CrossRef
go back to reference Tiwana, A., Keil, M., & Fichman, R. G. (2006). Information systems project continuation in escalation situations: A real options model. Decision Sciences, 37(3), 357–391.CrossRef Tiwana, A., Keil, M., & Fichman, R. G. (2006). Information systems project continuation in escalation situations: A real options model. Decision Sciences, 37(3), 357–391.CrossRef
go back to reference Tong, T. W., Reuer, J. J., & Peng, M. W. (2008). International joint ventures and the value of growth options. Academy of Management Journal, 51(5), 1014–1029.CrossRef Tong, T. W., Reuer, J. J., & Peng, M. W. (2008). International joint ventures and the value of growth options. Academy of Management Journal, 51(5), 1014–1029.CrossRef
go back to reference Trigeorgis, L. (1991). Anticipated competitive entry and early preemptive investment in deferrable projects. Journal of Economics and Business, 43, 143–156.CrossRef Trigeorgis, L. (1991). Anticipated competitive entry and early preemptive investment in deferrable projects. Journal of Economics and Business, 43, 143–156.CrossRef
go back to reference Wang, J., Chaudhury, A., & Rao, H. R. (2008). Research Note—A Value-at-Risk Approach to Information Security Investment. Information Systems Research, 19(1), 106–120.CrossRef Wang, J., Chaudhury, A., & Rao, H. R. (2008). Research Note—A Value-at-Risk Approach to Information Security Investment. Information Systems Research, 19(1), 106–120.CrossRef
go back to reference Wu, S. P.-J., Straub, D. W., & Liang, T.-P. (2015). How information technology governance mechanisms and strategic alignment influence organizational performance: Insights from a matched survey of business and IT managers. MIS Quarterly, 39(2), 497–518.CrossRef Wu, S. P.-J., Straub, D. W., & Liang, T.-P. (2015). How information technology governance mechanisms and strategic alignment influence organizational performance: Insights from a matched survey of business and IT managers. MIS Quarterly, 39(2), 497–518.CrossRef
go back to reference Yao, T., Jiang, B., Young, S. T., & Talluri, S. (2010). Outsourcing timing, contract selection, and negotiation. International Journal of Production Research, 48(2), 305–326.CrossRef Yao, T., Jiang, B., Young, S. T., & Talluri, S. (2010). Outsourcing timing, contract selection, and negotiation. International Journal of Production Research, 48(2), 305–326.CrossRef
go back to reference Ziedonis, A. A. (2007). Real options in technology licensing. Management Science, 53(10), 1618–1633.CrossRef Ziedonis, A. A. (2007). Real options in technology licensing. Management Science, 53(10), 1618–1633.CrossRef
go back to reference Zingales, L. (2000). In search of new foundations. National Bureau of Economic Research. Zingales, L. (2000). In search of new foundations. National Bureau of Economic Research.
Metadata
Title
Do Strategy and Timing in IT Security Investments Matter? An Empirical Investigation of the Alignment Effect
Authors
Feng Xu
Xin (Robert) Luo
Hongyun Zhang
Shan Liu
Wei (Wayne) Huang
Publication date
30-10-2017
Publisher
Springer US
Published in
Information Systems Frontiers / Issue 5/2019
Print ISSN: 1387-3326
Electronic ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-017-9807-6

Other articles of this Issue 5/2019

Information Systems Frontiers 5/2019 Go to the issue

Premium Partner