Reference Hub2
Composition of the Top Management Team and Information Security Breaches

Composition of the Top Management Team and Information Security Breaches

Carol Hsu, Tawei Wang
ISBN13: 9781466663244|ISBN10: 1466663243|EISBN13: 9781466663251
DOI: 10.4018/978-1-4666-6324-4.ch008
Cite Chapter Cite Chapter

MLA

Hsu, Carol, and Tawei Wang. "Composition of the Top Management Team and Information Security Breaches." Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance, edited by Maria Manuela Cruz-Cunha and Irene Maria Portela, IGI Global, 2015, pp. 116-134. https://doi.org/10.4018/978-1-4666-6324-4.ch008

APA

Hsu, C. & Wang, T. (2015). Composition of the Top Management Team and Information Security Breaches. In M. Cruz-Cunha & I. Portela (Eds.), Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance (pp. 116-134). IGI Global. https://doi.org/10.4018/978-1-4666-6324-4.ch008

Chicago

Hsu, Carol, and Tawei Wang. "Composition of the Top Management Team and Information Security Breaches." In Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance, edited by Maria Manuela Cruz-Cunha and Irene Maria Portela, 116-134. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-6324-4.ch008

Export Reference

Mendeley
Favorite

Abstract

Given the multifaceted problems and complexities of information security, the manner in which top management teams make investment and management decisions regarding security technologies, policy initiatives, and employee education could have a significant impact on the likelihood of information security breaches in organizations. In the context of information security management, it is not clear from management literature regarding how the characteristics of the top management team are associated with the possibility of information security breaches. The results demonstrate that the average length and heterogeneity of tenure could increase the possibility of breaches. However, age heterogeneity and the size of the top management team are negatively related to such a possibility. In addition, the findings suggest a nonlinear association between average age and tenure and the possibility of security breaches. The authors conclude the chapter with theoretical and practical implications on the organizational and managerial aspects of information security management.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.