Reference Hub1
A Structural Model Approach for Assessing Information Security Value in Organizations

A Structural Model Approach for Assessing Information Security Value in Organizations

Daniel Schatz, Rabih Bashroush
Copyright: © 2018 |Volume: 9 |Issue: 4 |Pages: 23
ISSN: 1947-8569|EISSN: 1947-8577|EISBN13: 9781522544210|DOI: 10.4018/IJSDS.2018100104
Cite Article Cite Article

MLA

Schatz, Daniel, and Rabih Bashroush. "A Structural Model Approach for Assessing Information Security Value in Organizations." IJSDS vol.9, no.4 2018: pp.47-69. http://doi.org/10.4018/IJSDS.2018100104

APA

Schatz, D. & Bashroush, R. (2018). A Structural Model Approach for Assessing Information Security Value in Organizations. International Journal of Strategic Decision Sciences (IJSDS), 9(4), 47-69. http://doi.org/10.4018/IJSDS.2018100104

Chicago

Schatz, Daniel, and Rabih Bashroush. "A Structural Model Approach for Assessing Information Security Value in Organizations," International Journal of Strategic Decision Sciences (IJSDS) 9, no.4: 47-69. http://doi.org/10.4018/IJSDS.2018100104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Data is rapidly becoming one of the most important assets in global markets, and criminals are spotting opportunities to exploit new potential income sources. In response to this, organizations are dedicating increasing resources to information security programs. However, faced with unrelenting breach reports and rising costs, decision makers inevitably wonder which type of security investment is economically viable. In this article, the authors present an empirically tested model describing the underlying key constructs for assessing information security value in an organization. Based on identified latent variables previously put forward in the literature, the authors use a partial least squares structural equation modeling approach to verify the model's soundness. They identify five crucial variables for value-focused information security investment. The relationships among these latent variables are then investigated and contributions of the structural model assessed. The key findings are finally presented to highlight opportunities for security practitioners to apply the proposed model.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.