Antecedents and consequences of data breaches: A systematic review

F Schlackl, N Link, H Hoehle - Information & Management, 2022 - Elsevier
Research on data breaches is scattered across disciplines and methodologies. To help
consolidate it, we review 43 articles on data breaches' antecedents and 83 on their …

[HTML][HTML] The whole of cyber defense: Syncing practice and theory

KM de Nobrega, AF Rutkowski, C Saunders - The Journal of Strategic …, 2024 - Elsevier
This review explores the problems Chief Information Security Officers (CISOs) and other
cyber professionals face when defending their organization against cyberattacks. Using a …

Data security crisis in universities: identification of key factors affecting data breach incidents

J Li, W Xiao, C Zhang - Humanities and Social Sciences …, 2023 - nature.com
The extremely complex and dynamic digital environments of universities make them highly
vulnerable to the risk of data breaches. This study empirically investigated the factors …

Information Technology Innovativeness and Data-Breach Risk: A Longitudinal Study

Q Wang, EWT Ngai, D Pienta… - Journal of Management …, 2023 - Taylor & Francis
The adoption of new Information Technology (IT) innovations has led to increased
uncertainty among employees, a greater demand for security measures, and more entry …

Four decades of Chief Information Officer research: a literature review and research agenda based on main path analysis

S Kratzer, M Westner, S Strahringer - ACM SIGMIS Database: the …, 2023 - dl.acm.org
Despite the relevance and maturity of the Chief Information Officer (CIO) research field, no
studies exist that exhaustively summarize the current body of knowledge, focusing on the …

What do we need to know about the Chief Information Security Officer? A literature review and research agenda

Z Sahin, A Vance - Computers & Security, 2025 - Elsevier
Since its establishment in the 1990s, the role of chief information security officer (CISO) has
become critical to organizations in managing cybersecurity risks. However, despite …

Vendor selection in the wake of data breaches: A longitudinal study

Q Wang, S Jiang, EWT Ngai… - Journal of Operations …, 2024 - Wiley Online Library
With the increasing digitization and networking of medical data and personal health
information, information security has become a critical factor in vendor selection. However …

Firm diversity and data breach risk: a longitudinal study

Q Wang, EWT Ngai - The Journal of Strategic Information Systems, 2022 - Elsevier
Research has extensively investigated the rationale of firm diversity from the economic
perspective, but little is known about how such a strategy may affect information security …

The impact of managers' IT experience on the enterprises' digital transformation: Empirical evidence from China

X Pan, G Xu - Applied Economics, 2024 - Taylor & Francis
Digital transformation has become a primary strategic choice of enterprises in recent years.
We use Chinese A-share listed companies in Shanghai and Shenzhen as samples, use text …

Unintended consequences: Examining the effects of government digital regulation on corporate fintech innovation in China

W Tan, Q Tang, W Sun, X Du - Emerging Markets Review, 2025 - Elsevier
In the financial sector, government digital regulation significantly influences the development
of financial technology (fintech), yet it has not been sufficiently studied. This research …