Reference Hub1
Assessing Market Compliance of IT Security Solutions: A Structured Approach Using Diffusion of Innovations Theory

Assessing Market Compliance of IT Security Solutions: A Structured Approach Using Diffusion of Innovations Theory

Heiko Roßnagel, Jan Zibuschka
ISBN13: 9781466601970|ISBN10: 1466601973|EISBN13: 9781466601987
DOI: 10.4018/978-1-4666-0197-0.ch002
Cite Chapter Cite Chapter

MLA

Roßnagel, Heiko, and Jan Zibuschka. "Assessing Market Compliance of IT Security Solutions: A Structured Approach Using Diffusion of Innovations Theory." Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions, edited by Manish Gupta, et al., IGI Global, 2012, pp. 13-33. https://doi.org/10.4018/978-1-4666-0197-0.ch002

APA

Roßnagel, H. & Zibuschka, J. (2012). Assessing Market Compliance of IT Security Solutions: A Structured Approach Using Diffusion of Innovations Theory. In M. Gupta, J. Walp, & R. Sharman (Eds.), Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions (pp. 13-33). IGI Global. https://doi.org/10.4018/978-1-4666-0197-0.ch002

Chicago

Roßnagel, Heiko, and Jan Zibuschka. "Assessing Market Compliance of IT Security Solutions: A Structured Approach Using Diffusion of Innovations Theory." In Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions, edited by Manish Gupta, John Walp, and Raj Sharman, 13-33. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-4666-0197-0.ch002

Export Reference

Mendeley
Favorite

Abstract

In this chapter, the authors discuss the diffusion of IT security solutions. The authors base their research on Roger’s diffusion of innovations theory, and derive a model for holistic ex-ante analysis of the market potential of such systems based on generic factors influencing the diffusion of security solutions. After giving an overview of the relevant aspects of diffusion of innovations theory, and presenting the approach to use it as a structuring tool in ex-ante analysis, the authors present case study analyses for three IT security solutions, demonstrating the applicability of the method, and the alignment of results produced by the method with actual market results.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.