IDEAS home Printed from https://ideas.repec.org/a/eee/tefoso/v170y2021ics0040162521003048.html
   My bibliography  Save this article

Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management

Author

Listed:
  • Rajan, Rishabh
  • Rana, Nripendra P.
  • Parameswar, Nakul
  • Dhir, Sanjay
  • Sushil,
  • Dwivedi, Yogesh K.

Abstract

Cybersecurity is a serious issue that many organizations face these days. Therefore, cybersecurity management is very important for any organization. Organizations should learn to deal with these cyber threats through effective management across all business functions. The main purpose of this study is to identify the factors that affect cybersecurity within an organization and analyze relationships among these factors. The modified total interpretive structural modeling (M-TISM) technique is used to build a hierarchical model and define the common interactions between the factors. This study presents the impact of collaboration, training, resources and capabilities, information flow, technology awareness, and technological infrastructure on effective cybersecurity management. In addition, the study also explains the interrelationships among the identified factors in the M-TISM model.

Suggested Citation

  • Rajan, Rishabh & Rana, Nripendra P. & Parameswar, Nakul & Dhir, Sanjay & Sushil, & Dwivedi, Yogesh K., 2021. "Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management," Technological Forecasting and Social Change, Elsevier, vol. 170(C).
  • Handle: RePEc:eee:tefoso:v:170:y:2021:i:c:s0040162521003048
    DOI: 10.1016/j.techfore.2021.120872
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0040162521003048
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.techfore.2021.120872?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Stefan Iovan & Alina-Anabela Iovan, 2016. "From Cyber Threats To Cyber-Crime," Romanian Economic Business Review, Romanian-American University, vol. 10(2), pages 425-434, December.
    2. Aleksandr Ključnikov & Ladislav Mura & David Sklenár, 2019. "Information security management in SMEs: factors of success," Entrepreneurship and Sustainability Issues, VsI Entrepreneurship and Sustainability Center, vol. 6(4), pages 2081-2094, June.
    3. Gert-Jan Vreede & Pedro Antunes & Julita Vassileva & Marco Aurélio Gerosa & Kewen Wu, 2016. "Collaboration technology in teams and organizations: Introduction to the special issue," Information Systems Frontiers, Springer, vol. 18(1), pages 1-6, February.
    4. Arunabha Mukhopadhyay & Samir Chatterjee & Kallol K. Bagchi & Peteer J. Kirs & Girja K. Shukla, 2019. "Cyber Risk Assessment and Mitigation (CRAM) Framework Using Logit and Probit Models for Cyber Insurance," Information Systems Frontiers, Springer, vol. 21(5), pages 997-1018, October.
    5. Dhir, Sanjay & Ongsakul, Viput & Ahmed, Zafar U. & Rajan, Rishabh, 2020. "Integration of knowledge and enhancing competitiveness: A case of acquisition of Zain by Bharti Airtel," Journal of Business Research, Elsevier, vol. 119(C), pages 674-684.
    6. Atif Ahmad & Kevin C. Desouza & Sean B. Maynard & Humza Naseer & Richard L. Baskerville, 2020. "How integration of cyber security management and incident response enables organizational learning," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 71(8), pages 939-953, August.
    7. Christine T. Berry & Ronald L. Berry, 2018. "An initial assessment of small business risk management approaches for cyber security threats," International Journal of Business Continuity and Risk Management, Inderscience Enterprises Ltd, vol. 8(1), pages 1-10.
    8. Anastasia Papazafeiropoulou & Konstantina Spanaki, 2016. "Understanding governance, risk and compliance information systems (GRC IS): The experts view," Information Systems Frontiers, Springer, vol. 18(6), pages 1251-1263, December.
    9. Yanjun Zuo & Timothy O’Keefe, 2007. "Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system," Information Systems Frontiers, Springer, vol. 9(5), pages 451-467, November.
    10. J. Jena & Sumati Sidharth & Lakshman S. Thakur & Devendra Kumar Pathak & V.C. Pandey, 2017. "Total Interpretive Structural Modeling (TISM): approach and application," Journal of Advances in Management Research, Emerald Group Publishing Limited, vol. 14(2), pages 162-181, May.
    11. Lorne N. Switzer & Jun Wang, 2017. "An event based approach for quantifying the effects of securities fraud in the IT industry," Information Systems Frontiers, Springer, vol. 19(3), pages 457-467, June.
    12. Moore, Tyler, 2010. "The economics of cybersecurity: Principles and policy options," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(3), pages 103-117.
    13. Sushil, 2018. "How to check correctness of total interpretive structural models?," Annals of Operations Research, Springer, vol. 270(1), pages 473-487, November.
    14. Sezer Bozkus Kahyaoglu & Kiymet Caliyurt, 2018. "Cyber security assurance process from the internal audit perspective," Managerial Auditing Journal, Emerald Group Publishing Limited, vol. 33(4), pages 360-376, May.
    15. I. Reay & P. Beatty & S. Dick & J. Miller, 2013. "Privacy policies and national culture on the internet," Information Systems Frontiers, Springer, vol. 15(2), pages 279-292, April.
    16. Toby E. Stuart, 2000. "Interorganizational alliances and the performance of firms: a study of growth and innovation rates in a high‐technology industry," Strategic Management Journal, Wiley Blackwell, vol. 21(8), pages 791-811, August.
    17. Knowles, William & Prince, Daniel & Hutchison, David & Disso, Jules Ferdinand Pagna & Jones, Kevin, 2015. "A survey of cyber security management in industrial control systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 9(C), pages 52-80.
    18. Sirkka L. Jarvenpaa & Ann Majchrzak, 2008. "Knowledge Collaboration Among Professionals Protecting National Security: Role of Transactive Memories in Ego-Centered Knowledge Networks," Organization Science, INFORMS, vol. 19(2), pages 260-276, April.
    19. Sanghyun Kim & Bora Kim & Minsoo Seo, 2020. "Impacts of Sustainable Information Technology Capabilities on Information Security Assimilation: The Moderating Effects of Policy—Technology Balance," Sustainability, MDPI, vol. 12(15), pages 1-24, July.
    20. Ranjay Gulati, 1999. "Network location and learning: the influence of network resources and firm capabilities on alliance formation," Strategic Management Journal, Wiley Blackwell, vol. 20(5), pages 397-420, May.
    21. Ruochen Liao & Shenaz Balasinorwala & H. Raghav Rao, 2017. "Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests," Information Systems Frontiers, Springer, vol. 19(3), pages 443-455, June.
    22. Chittaranjan Hota & Shambhu Upadhyaya & Jamal Nazzal Al-Karaki, 2015. "Advances in secure knowledge management in the big data era," Information Systems Frontiers, Springer, vol. 17(5), pages 983-986, October.
    23. Ho‐Uk Lee & Jong‐Hun Park, 2008. "The Influence of Top Management Team International Exposure on International Alliance Formation," Journal of Management Studies, Wiley Blackwell, vol. 45(5), pages 961-981, July.
    24. Kumar, Rajesh & Andersen, Poul Houman, 2000. "Inter firm diversity and the management of meaning in international strategic alliances," International Business Review, Elsevier, vol. 9(2), pages 237-252, April.
    25. Haim Mendelson, 2000. "Organizational Architecture and Success in the Information Technology Industry," Management Science, INFORMS, vol. 46(4), pages 513-529, April.
    26. Maria José Angélico Gonçalves & Álvaro Rocha & Manuel Pérez Cota, 2016. "Information management model for competencies and learning outcomes in an educational context," Information Systems Frontiers, Springer, vol. 18(6), pages 1051-1061, December.
    27. Xiong Zhang & Alex Tsang & Wei T. Yue & Michael Chau, 2015. "The classification of hackers by knowledge exchange behaviors," Information Systems Frontiers, Springer, vol. 17(6), pages 1239-1251, December.
    28. Gordon, Lawrence A. & Loeb, Martin P. & Lucyshyn, William, 2003. "Sharing information on computer systems security: An economic analysis," Journal of Accounting and Public Policy, Elsevier, vol. 22(6), pages 461-485.
    29. Humayun Zafar & Myung S. Ko & Kweku-Muata Osei-Bryson, 2016. "The value of the CIO in the top management team on performance in the case of information security breaches," Information Systems Frontiers, Springer, vol. 18(6), pages 1205-1215, December.
    30. Haeussler, Carolin & Patzelt, Holger & Zahra, Shaker A., 2012. "Strategic alliances and product development in high technology new firms: The moderating effect of technological capabilities," Journal of Business Venturing, Elsevier, vol. 27(2), pages 217-233.
    31. Akella, Ravi & Tang, Han & McMillin, Bruce M., 2010. "Analysis of information flow security in cyber–physical systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(3), pages 157-173.
    32. Venkatraman, N. & Henderson, John C. & Oldach, Scott, 1993. "Continuous strategic alignment: Exploiting information technology capabilities for competitive success," European Management Journal, Elsevier, vol. 11(2), pages 139-149, June.
    33. Maria José Sousa & Miguel González-Loureiro, 2016. "Employee knowledge profiles – a mixed-research methods approach," Information Systems Frontiers, Springer, vol. 18(6), pages 1103-1117, December.
    34. Sinan Aral & Peter Weill, 2007. "IT Assets, Organizational Capabilities, and Firm Performance: How Resource Allocations and Organizational Differences Explain Performance Variation," Organization Science, INFORMS, vol. 18(5), pages 763-780, October.
    35. Jairo R. Montoya-Torres & Diego A. Ortiz-Vargas, 2014. "Collaboration and information sharing in dyadic supply chains: A literature review over the period 2000–2012," Estudios Gerenciales, Universidad Icesi, November.
    36. Raymond F. Zammuto & Terri L. Griffith & Ann Majchrzak & Deborah J. Dougherty & Samer Faraj, 2007. "Information Technology and the Changing Fabric of Organization," Organization Science, INFORMS, vol. 18(5), pages 749-762, October.
    37. Kafouros, Mario & Wang, Chengqi & Piperopoulos, Panagiotis & Zhang, Mingshen, 2015. "Academic collaborations and firm innovation performance in China: The role of region-specific institutions," Research Policy, Elsevier, vol. 44(3), pages 803-817.
    38. Anne Parmigiani & Will Mitchell, 2009. "Complementarity, capabilities, and the boundaries of the firm: the impact of within‐firm and interfirm expertise on concurrent sourcing of complementary components," Strategic Management Journal, Wiley Blackwell, vol. 30(10), pages 1065-1091, October.
    39. Sanjay Dhir & Sushil, 2017. "Flexibility in Modification and Termination of Cross-Border Joint Ventures," Global Journal of Flexible Systems Management, Springer;Global Institute of Flexible Systems Management, vol. 18(2), pages 139-151, June.
    40. Nihat Ay & Daniel Polani, 2008. "Information Flows In Causal Networks," Advances in Complex Systems (ACS), World Scientific Publishing Co. Pte. Ltd., vol. 11(01), pages 17-41.
    41. Peter J. Lane & Jane E. Salk & Marjorie A. Lyles, 2001. "Absorptive capacity, learning, and performance in international joint ventures," Strategic Management Journal, Wiley Blackwell, vol. 22(12), pages 1139-1161, December.
    42. Sushil, 2017. "Modified ISM/TISM Process with Simultaneous Transitivity Checks for Reducing Direct Pair Comparisons," Global Journal of Flexible Systems Management, Springer;Global Institute of Flexible Systems Management, vol. 18(4), pages 331-351, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Sorooshian, Shahryar & Tavana, Madjid & Ribeiro-Navarrete, Samuel, 2023. "From classical interpretive structural modeling to total interpretive structural modeling and beyond: A half-century of business research," Journal of Business Research, Elsevier, vol. 157(C).
    2. Agbodoh-Falschau, Kouassi Raymond & Ravaonorohanta, Bako Harinivo, 2023. "Investigating the influence of governance determinants on reporting cybersecurity incidents to police: Evidence from Canadian organizations’ perspectives," Technology in Society, Elsevier, vol. 74(C).
    3. Mathivathanan, Deepak & Mathiyazhagan, K. & Khorana, Sangeeta & Rana, Nripendra P. & Arora, Bimal, 2022. "Drivers of circular economy for small and medium enterprises: Case study on the Indian state of Tamil Nadu," Journal of Business Research, Elsevier, vol. 149(C), pages 997-1015.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Syed Mithun Ali & Asraf Arafin & Md. Abdul Moktadir & Towfique Rahman & Nuzhat Zahan, 2018. "Barriers to Reverse Logistics in the Computer Supply Chain Using Interpretive Structural Model," Global Journal of Flexible Systems Management, Springer;Global Institute of Flexible Systems Management, vol. 19(1), pages 53-68, March.
    2. Dovev Lavie & Stewart R. Miller, 2008. "Alliance Portfolio Internationalization and Firm Performance," Organization Science, INFORMS, vol. 19(4), pages 623-646, August.
    3. Kudic, Muhamed & Guhr, Katja, 2013. "Cooperation Events, Ego-Network Characteristics and Firm Innovativeness – Empirical Evidence from the German Laser Industry," IWH Discussion Papers 6/2013, Halle Institute for Economic Research (IWH).
    4. Sorooshian, Shahryar & Tavana, Madjid & Ribeiro-Navarrete, Samuel, 2023. "From classical interpretive structural modeling to total interpretive structural modeling and beyond: A half-century of business research," Journal of Business Research, Elsevier, vol. 157(C).
    5. Sushil,, 2018. "Incorporating polarity of relationships in ISM and TISM for theory building in information and organization management," International Journal of Information Management, Elsevier, vol. 43(C), pages 38-51.
    6. Sujan Piya & Ahm Shamsuzzoha & Mohammad Khadem & Nasr Al-Hinai, 2020. "Identification of Critical Factors and Their Interrelationships to Design Agile Supply Chain: Special Focus to Oil and Gas Industries," Global Journal of Flexible Systems Management, Springer;Global Institute of Flexible Systems Management, vol. 21(3), pages 263-281, September.
    7. Zand, Fardad & Van Beers, Cees & Van Leeuwen, George, 2011. "Information technology, organizational change and firm productivity: A panel study of complementarity effects and clustering patterns in Manufacturing and Services," MPRA Paper 46469, University Library of Munich, Germany.
    8. Mazaher Kianpour & Stewart J. Kowalski & Harald Øverby, 2021. "Systematically Understanding Cybersecurity Economics: A Survey," Sustainability, MDPI, vol. 13(24), pages 1-28, December.
    9. Weifeng Xu & Qingsong Ruan & Chang Liu, 2019. "Can the Famous University Experience of Top Managers Improve Corporate Performance? Evidence from China," Sustainability, MDPI, vol. 11(24), pages 1-20, December.
    10. Partanen, Jukka & Kohtamäki, Marko & Patel, Pankaj C. & Parida, Vinit, 2020. "Supply chain ambidexterity and manufacturing SME performance: The moderating roles of network capability and strategic information flow," International Journal of Production Economics, Elsevier, vol. 221(C).
    11. Jae Kyu Lee & Younghoon Chang & Hun Yeong Kwon & Beopyeon Kim, 2020. "Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach," Information Systems Frontiers, Springer, vol. 22(1), pages 45-57, February.
    12. Burcharth, Ana Luiza Lara de Araújo & Lettl, Christopher & Ulhøi, John Parm, 2015. "Extending organizational antecedents of absorptive capacity: Organizational characteristics that encourage experimentation," Technological Forecasting and Social Change, Elsevier, vol. 90(PA), pages 269-284.
    13. Yi Zhang & Kaihua Chen & Guilong Zhu & Richard C. M. Yam & Jiancheng Guan, 2016. "Inter-organizational scientific collaborations and policy effects: an ego-network evolutionary perspective of the Chinese Academy of Sciences," Scientometrics, Springer;Akadémiai Kiadó, vol. 108(3), pages 1383-1415, September.
    14. Ana Villar & César Camisón & Montserrat Boronat, 2007. "Technical Strategic Alliances And Performance: The Mediating Effect Of Knowledge ¿Based Competencies," Working Papers. Serie EC 2007-11, Instituto Valenciano de Investigaciones Económicas, S.A. (Ivie).
    15. Gupeng Zhang & Xiao Wang & Hongbo Duan, 2020. "Obscure but important: examining the indirect effects of alliance networks in exploratory and exploitative innovation paradigms," Scientometrics, Springer;Akadémiai Kiadó, vol. 124(3), pages 1745-1764, September.
    16. Hutzschenreuter, Thomas & Horstkotte, Julian, 2013. "Performance effects of international expansion processes: The moderating role of top management team experiences," International Business Review, Elsevier, vol. 22(1), pages 259-277.
    17. Madhukar Patil & M. Suresh, 2019. "Modelling the Enablers of Workforce Agility in IoT Projects: A TISM Approach," Global Journal of Flexible Systems Management, Springer;Global Institute of Flexible Systems Management, vol. 20(2), pages 157-175, June.
    18. Anindya Ghosh & Thomas Klueter, 2022. "The Role of Frictions due to Top Management in Alliance Termination Decisions: Insights from Established Bio‐Pharmaceutical Firms," Journal of Management Studies, Wiley Blackwell, vol. 59(5), pages 1315-1353, July.
    19. Byung Park, 2010. "What matters to managerial knowledge acquisition in international joint ventures? High knowledge acquirers versus low knowledge acquirers," Asia Pacific Journal of Management, Springer, vol. 27(1), pages 55-79, March.
    20. Abhishek Kumbhat & Sushil, 2022. "Interactive Effect of Success Factors for High-Tech Startups: Value Propositions, Target Market and Operational Excellence," International Journal of Global Business and Competitiveness, Springer, vol. 17(1), pages 73-88, June.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:tefoso:v:170:y:2021:i:c:s0040162521003048. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.sciencedirect.com/science/journal/00401625 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.