Access the full text.
Sign up today, get DeepDyve free for 14 days.
Australasian Journal of Information Systems, 21
C. Horne, Atif Ahmad, S. Maynard (2016)
Information Security Strategy in Organisations: Review, Discussion and Future Research Directions
F. Sveen, J. Torres, J. Sarriegi (2009)
Blind information security strategyInt. J. Crit. Infrastructure Prot., 2
J. Ezingeard, Elspeth McFadzean, D. Birchall (2007)
Mastering the art of corroboration: A conceptual analysis of information assurance and corporate strategy alignmentJ. Enterp. Inf. Manag., 20
B. Lawson, D. Samson (2001)
DEVELOPING INNOVATION CAPABILITY IN ORGANISATIONS: A DYNAMIC CAPABILITIES APPROACHInternational Journal of Innovation Management, 05
D. Teece (2007)
Explicating dynamic capabilities: the nature and microfoundations of (sustainable) enterprise performanceSouthern Medical Journal, 28
J. Ferdinand (2015)
Building organisational cyber resilience: A strategic knowledge-based view of cyber security management.Journal of business continuity & emergency planning, 9 2
(2013)
Information technology – security techniques – information security management systems — requirements
J. Gomes, Pia Hurmelinna, Heidi Olander (2017)
HR practices, knowledge sharing and protection activities, and performance – A moderation modelInternational Journal of Innovation Management, 21
P. Pavlou, O. Sawy (2011)
Understanding the Elusive Black Box of Dynamic Capabilities
Dejan Kosutic, F. Pigni (2018)
Exploring the Impact of Information Security Practices on Competitive Advantage
D. Mitchell, Carol Coles (2003)
The ultimate competitive advantage of continuing business model innovationJournal of Business Strategy, 24
The purpose of this paper is to help companies address the problem of ever-increasing cybersecurity investment that does not produce tangible business value – this is achieved by explaining the relationship between cybersecurity and competitive advantage.Design/methodology/approachThe impact of cybersecurity on competitive advantage was explored through a qualitative research study – the authors conducted an extensive literature review and conducted two rounds of semi-structured interviews with executives and security professionals from companies in four countries, from the financial, IT and security industries.FindingsThe analysis of the findings enabled the conceptualization of the Cybersecurity Competitive Advantage Model that explains how to build up cybersecurity dynamic capabilities to achieve long-term competitive advantage.Research limitations/implicationsThe research presents the theorization of the model based on an extensive literature review, gathered information, insight from qualified respondents and the authors’ experience in the field. While we controlled for saturation and rigorously collected and analyzed the data, the inductive approach followed may limit the generalizability of the findings.Practical implicationsThe proposed model helps explain to executives how to differentiate their company in a novel way and how to retain that competitive advantage; security professionals can use the model to organize cybersecurity and communicate to their superiors more effectively.Originality/valueThe presented model differs from existing literature, cybersecurity frameworks and industry standards by presenting a method of avoiding technological bias and for achieving competitive advantage.
Journal of Business Strategy – Emerald Publishing
Published: Jan 3, 2022
Keywords: Cybersecurity; Competitive advantage; Dynamic capabilities; Operational capabilities; Resource-based view; Information security; Socio-technical model
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.