IS

Borle, Sharad

Topic Weight Topic Terms
0.285 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.138 theory theories theoretical paper new understanding work practical explain empirical contribution phenomenon literature second implications
0.126 institutional pressures logic theory normative embedded context incumbent contexts forces inertia institutionalized environment pressure identify
0.120 data used develop multiple approaches collection based research classes aspect single literature profiles means crowd

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Sen, Ravi 1
computer crime 1 computer security 1 data breach 1 data theft 1
information security 1 IT security risks 1

Articles (1)

Estimating the Contextual Risk of Data Breach: An Empirical Approach (Journal of Management Information Systems, 2015)
Authors: Abstract:
    Data breach incidents are on the rise, and have resulted in severe financial and legal implications for the affected organizations. We apply the opportunity theory of crime, the institutional anomie theory, and institutional theory to identify factors that could increase or decrease the contextual risk of data breach. We investigate the risk of data breach in the context of an organization's physical location, its primary industry, and the type of data breach that it may have suffered in the past. Given the location of an organization, the study finds support for application of the opportunity theory of crime and the institutional anomie theory in estimating the risk of data breach incidents within a state. In the context of the primary industry in which an organization operates, we find support for the institutional theory and the opportunity theory of crime in estimating risk of data breach incidents within an industry. Interestingly though, support for the opportunity theory of crime is partial. We find that investment in information technology (IT) security corresponds to a higher risk of data breach incidents within both a state and an industry, a result contrary to the one predicted by the opportunity theory of crime. A possible explanation for the contradiction is that investments in IT security are not being spent on the right kind of data security controls, a fact supported by evidence from the industry. The work has theoretical and practical implications. Theories from criminology are used to identify the risk factors of data breach incidents and the magnitude of their impact on the risk of data breach. Insights from the study can help IT security practitioners to assess the risk environment of their firm (in terms of data breaches) based on the firm's location, its industry sector, and the kind of breaches that the firm may typically be prone to. > >