IDEAS home Printed from https://ideas.repec.org/a/aip/access/v7y2026i1p43-60.html

Assessing information leakage risks in Japanese enterprises: strategic management and corporate attributes

Author

Listed:
  • Takaaki ISHIKAWA

    (Graduate School of Technology Management (MOT), Ritsumeikan University, Osaka, Japan)

  • Hiroyuki SUZUKI

    (Single ID K.K., Tokyo, Japan)

  • Kiminori GEMBA

    (Hosei Business School of Innovation Management, Hosei University, Tokyo, Japan)

  • Tetsuaki ODA

    (Graduate School of Technology Management (MOT), Ritsumeikan University, Osaka, Japan)

Abstract

As cybersecurity threats intensify, understanding the organizational drivers of information leakage has become a critical priority, especially in the context of Japanese enterprises where structural and technological legacies often persist. This study provides empirical insight into how corporate attributes shape data leakage risks, particularly focusing on email-related incidents that pose significant reputational and financial consequences. Objectives: The objective of this study is to examine how specific organizational characteristics—such as the number of affiliated sites, site density, presence of legacy systems, and employee-induced leakage frequency—influence the risk of information leakage in Japanese firms operating in an increasingly digitized environment. Methods/Approach: The study uses a dataset of 399 Japanese enterprises collected from both public databases and private sources. Multiple regression analysis is employed to evaluate the impact of these attributes on the frequency of email leakage incidents, allowing for quantifiable insights into structural vulnerabilities and organizational exposure. Results: The findings show that firms with a higher number of affiliated sites are more susceptible to data leaks, whereas those with denser site distributions experience lower risks. The presence of legacy systems, especially in older firms, significantly increases vulnerability. Furthermore, a higher frequency of employee-induced incidents highlights gaps in internal governance and employee awareness. Conclusions: Information leakage risks are strongly influenced by structural and organizational factors rather than being random occurrences. These results underscore the importance of tailoring cybersecurity strategies to firm-specific attributes. The study offers a novel contribution by empirically linking corporate structure to data security outcomes, bridging strategic management and cybersecurity as an emerging interdisciplinary challenge in the digital era.

Suggested Citation

  • Takaaki ISHIKAWA & Hiroyuki SUZUKI & Kiminori GEMBA & Tetsuaki ODA, 2026. "Assessing information leakage risks in Japanese enterprises: strategic management and corporate attributes," Access Journal, Access Press Publishing House, vol. 7(1), pages 43-60, November.
  • Handle: RePEc:aip:access:v:7:y:2026:i:1:p:43-60
    DOI: 10.46656/access.2026.7.1(3)
    as

    Download full text from publisher

    File URL: https://journal.access-bg.org/journalfiles/journal/issue-7-1-2026/assessing_information_leakage_risks_in_Japanese_enterprises-strategic_management.pdf
    Download Restriction: no

    File URL: https://libkey.io/10.46656/access.2026.7.1(3)?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Keywords

    ;
    ;
    ;
    ;
    ;
    ;
    ;

    JEL classification:

    • L86 - Industrial Organization - - Industry Studies: Services - - - Information and Internet Services; Computer Software
    • M15 - Business Administration and Business Economics; Marketing; Accounting; Personnel Economics - - Business Administration - - - IT Management
    • D22 - Microeconomics - - Production and Organizations - - - Firm Behavior: Empirical Analysis

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:aip:access:v:7:y:2026:i:1:p:43-60. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Mariana Petrova (email available below). General contact details of provider: https://access-bg.org/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.