Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Cybersecurity: investing for competitive outcomes

Cybersecurity: investing for competitive outcomes The purpose of this paper is to help companies address the problem of ever-increasing cybersecurity investment that does not produce tangible business value – this is achieved by explaining the relationship between cybersecurity and competitive advantage.Design/methodology/approachThe impact of cybersecurity on competitive advantage was explored through a qualitative research study – the authors conducted an extensive literature review and conducted two rounds of semi-structured interviews with executives and security professionals from companies in four countries, from the financial, IT and security industries.FindingsThe analysis of the findings enabled the conceptualization of the Cybersecurity Competitive Advantage Model that explains how to build up cybersecurity dynamic capabilities to achieve long-term competitive advantage.Research limitations/implicationsThe research presents the theorization of the model based on an extensive literature review, gathered information, insight from qualified respondents and the authors’ experience in the field. While we controlled for saturation and rigorously collected and analyzed the data, the inductive approach followed may limit the generalizability of the findings.Practical implicationsThe proposed model helps explain to executives how to differentiate their company in a novel way and how to retain that competitive advantage; security professionals can use the model to organize cybersecurity and communicate to their superiors more effectively.Originality/valueThe presented model differs from existing literature, cybersecurity frameworks and industry standards by presenting a method of avoiding technological bias and for achieving competitive advantage. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Journal of Business Strategy Emerald Publishing

Cybersecurity: investing for competitive outcomes

Journal of Business Strategy , Volume 43 (1): 9 – Jan 3, 2022

Loading next page...
 
/lp/emerald-publishing/cybersecurity-investing-for-competitive-outcomes-5VkKW2vNzl

References (12)

Publisher
Emerald Publishing
Copyright
© Emerald Publishing Limited
ISSN
0275-6668
eISSN
0275-6668
DOI
10.1108/jbs-06-2020-0116
Publisher site
See Article on Publisher Site

Abstract

The purpose of this paper is to help companies address the problem of ever-increasing cybersecurity investment that does not produce tangible business value – this is achieved by explaining the relationship between cybersecurity and competitive advantage.Design/methodology/approachThe impact of cybersecurity on competitive advantage was explored through a qualitative research study – the authors conducted an extensive literature review and conducted two rounds of semi-structured interviews with executives and security professionals from companies in four countries, from the financial, IT and security industries.FindingsThe analysis of the findings enabled the conceptualization of the Cybersecurity Competitive Advantage Model that explains how to build up cybersecurity dynamic capabilities to achieve long-term competitive advantage.Research limitations/implicationsThe research presents the theorization of the model based on an extensive literature review, gathered information, insight from qualified respondents and the authors’ experience in the field. While we controlled for saturation and rigorously collected and analyzed the data, the inductive approach followed may limit the generalizability of the findings.Practical implicationsThe proposed model helps explain to executives how to differentiate their company in a novel way and how to retain that competitive advantage; security professionals can use the model to organize cybersecurity and communicate to their superiors more effectively.Originality/valueThe presented model differs from existing literature, cybersecurity frameworks and industry standards by presenting a method of avoiding technological bias and for achieving competitive advantage.

Journal

Journal of Business StrategyEmerald Publishing

Published: Jan 3, 2022

Keywords: Cybersecurity; Competitive advantage; Dynamic capabilities; Operational capabilities; Resource-based view; Information security; Socio-technical model

There are no references for this article.