Cybersecurity and Organisational Performance – the Interplay

V. Dorairajan
{"title":"Cybersecurity and Organisational Performance – the Interplay","authors":"V. Dorairajan","doi":"10.3897/aca.7.e129255","DOIUrl":null,"url":null,"abstract":"The interplay between cybersecurity and organisational performance is multifaceted in nature, as it is related to how cybersecurity impacts and is impacted by various organisational activities and performance metrics. In the age of the rapid digitalization of organisations, cybersecurity emerges as an integral part of the health and effectiveness of an organisation. It includes not only preserving the confidentiality, integrity, availability of organisational digital assets but also establishing the organisational cybersecurity culture and, consequently, human behaviour. Cybersecurity and business are interdependent influencing each other significantly. This interplay shapes modern business.\n The convergence of people, procedures, and technology to defend business, persons, or networks against digital attacks is known ascybersecurity. Cybersecurity is essential to protect organisational assets from risks such as but not limited to personal data breaches, unauthourised access leading to reputational and financial impact (Sandhu 2021).\n Organisations that decide to implement digital technologies as part of their digital transformation journey are faced with increasing cyber threats and need to implement a reliable form of defence to protect their operations. In addition to digital transformation, organisations around the world are adopting artificial intelligence in their business process to reduce operating costs, boost productivity and improve customer experience. This introduces newer threats around artificial intelligence such as adversial AI attacks which involves attack vectors such as model poisoning. Artificial intelligence enabled cyber-attacks are also increasing and are contributing to the ever evolving complex threat landscape. Digital transformation and cybersecurity are intertwined elements crucial to today’s business. The strategic management of cybersecurity involves comprehensive understanding and measures against cybercrime, attacks, and terrorism to ensure organisational and business sustainability during digital transformation (Özsungur 2021). Effective cybersecurity practices are the cornerstone of successful digital transformation, protecting enterprises from evolving cyber threats and fostering a secure digital environment.\n Effective cybersecurity management enhances business operations and reputation (Lopatova 2021). Businesses can turn cybersecurity into a commercial advantage by adopting proactive cybersecurity measures that not only protect assets but also assure business partners and customers of the firm's commitment to security. This can lead to smoother business transactions and partnerships, fostering trust across business networks . There is a shift in the perception about cybersecurity. It is now being viewed as a vital enabler for business growth fostering value creation and competitive advantage instead of being viewed as a cost burden. By mitigating cyber risks and fostering a secure information environment, businesses can enhance their operational efficiency, secure intellectual property, and maintain customer trust, thereby gaining a competitive edge.\n Digital technologies shape the organisational design and brings cultural change. Digital transformation introduces cybersecurity challenges that necessitate a culture shift towards greater security awareness within organisations (Saeed et al. 2023). Human factors plays an important role in effective cybersecurity of the organisation. End users and IT professionals and cybersecurity personnel play pivotal role. A strong organisational culture enhances cybersecurity by aligning beliefs, values, and attitudes with security goals. Organisational leaders can foster a security-aware culture that supports the organisation’s overall cybersecurity objectives. The evolving business landscape requires continuous education on cybersecurity for all stakeholders within a company. This not only involves technical training but also understanding how cybersecurity impacts business strategies and operations. Educational initiatives need to cover the spectrum of risks and prepare businesses to handle emerging cybersecurity challenges effectively.\n Cybersecurity must be managed strategically within an organisation to optimize performance and mitigate risks. This involves integrating cybersecurity into business strategy, recognizing it as a dynamic field that requires continuous adaptation and management. In short, cybersecurity strategy must align with business strategy and IT strategy. By integrating cybersecurity into the strategy and cultural fabric, organisations can increase their cyber resilience. The strategic approach of an organisation significantly influences its cybersecurity landscape. Firms focusing on innovation often face greater cybersecurity risks due to decentralized control systems and a variety of technologies that may introduce vulnerabilities. Conversely, efficiency-focused businesses may have more centralized and potentially more secure systems, though they also need to adapt to evolving cyber threats.\n Effective cybersecurity practices are crucial for maintaining organisational integrity and performance. Cybersecurity influences various performance metrics, including risk management, compliance, and even financial performance.\n Is there a connection between cyber security adoption and organisational performance? The organisation’s internal and external environmental elements need to be considered when studying the impact of the adoption of cybersecurity technologies. The three variables technology, organisation, and environment are used to identify the factors that affect on cybersecurity adoption. The technology-organisation-environment framework, referred to as the TOE framework, can be used for this analysis. Technological context considers the tenability, relative advantage, return on investment, cost, complexity, and compatibility. Organisational context considers the willingness to adopt, organisational readiness, knowledge and expertise, external support, communication process, and top management support. The environmental context considers competitiveness, external pressure, geopolitics and external events, fear of exposure, experience and laws and regulations.\n In environments where system performance is prioritized over security, there might be a tendency to allocate fewer resources to security measures. This can leave systems more vulnerable to attacks. Rapidly deploying new features or updates to meet performance targets can sometimes lead to overlooking security best practices or conducting inadequate testing, creating potential vulnerabilities. Moving to the cloud and using third party services for improved performance also can increase the security risks if these services are not adequately vetted and managed.\n The Security-Performance Tradeoff Model is a concept in cybersecurity that recognizes the balance between security measures that need to be implemented and the system performance that organisations need to maintain constantly. This model is important because both cybersecurity and the systems’ performance can influence organisations’ performance in terms of reputation, acceptance, etc. The Security-Performance Tradeoff Model is focused on the idea that there is usually a trade-off between cybersecurity and systems performance, and organisations need to manage a balance. It suggests that in some cases, the highest security levels can lower system performance, and vice versa. Organisations need to strike an appropriate balance by implementing tailored solutions that meet their security requirements without compromising operational efficiency or user experience.\n The following approaches can be adopted to manage the trade-off:\n \n \n \n Risk-Based Prioritization to identify critical assets and potential vulnerabilities. Prioritize security measures based on the risk level and the organisation's risk appetite.\n \n \n Use optimization Techniques to reduce the impact of security measures.\n \n \n Design security controls with end user in mind (eg Single sign on, IP restriction)\n \n \n Implement continuous Monitoring and Testing\n \n \n Implement adaptive security frameworks that can dynamically adjust security measures based on the current threat landscape.\n \n \n \n Risk-Based Prioritization to identify critical assets and potential vulnerabilities. Prioritize security measures based on the risk level and the organisation's risk appetite.\n Use optimization Techniques to reduce the impact of security measures.\n Design security controls with end user in mind (eg Single sign on, IP restriction)\n Implement continuous Monitoring and Testing\n Implement adaptive security frameworks that can dynamically adjust security measures based on the current threat landscape.","PeriodicalId":101714,"journal":{"name":"ARPHA Conference Abstracts","volume":" 38","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ARPHA Conference Abstracts","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3897/aca.7.e129255","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The interplay between cybersecurity and organisational performance is multifaceted in nature, as it is related to how cybersecurity impacts and is impacted by various organisational activities and performance metrics. In the age of the rapid digitalization of organisations, cybersecurity emerges as an integral part of the health and effectiveness of an organisation. It includes not only preserving the confidentiality, integrity, availability of organisational digital assets but also establishing the organisational cybersecurity culture and, consequently, human behaviour. Cybersecurity and business are interdependent influencing each other significantly. This interplay shapes modern business. The convergence of people, procedures, and technology to defend business, persons, or networks against digital attacks is known ascybersecurity. Cybersecurity is essential to protect organisational assets from risks such as but not limited to personal data breaches, unauthourised access leading to reputational and financial impact (Sandhu 2021). Organisations that decide to implement digital technologies as part of their digital transformation journey are faced with increasing cyber threats and need to implement a reliable form of defence to protect their operations. In addition to digital transformation, organisations around the world are adopting artificial intelligence in their business process to reduce operating costs, boost productivity and improve customer experience. This introduces newer threats around artificial intelligence such as adversial AI attacks which involves attack vectors such as model poisoning. Artificial intelligence enabled cyber-attacks are also increasing and are contributing to the ever evolving complex threat landscape. Digital transformation and cybersecurity are intertwined elements crucial to today’s business. The strategic management of cybersecurity involves comprehensive understanding and measures against cybercrime, attacks, and terrorism to ensure organisational and business sustainability during digital transformation (Özsungur 2021). Effective cybersecurity practices are the cornerstone of successful digital transformation, protecting enterprises from evolving cyber threats and fostering a secure digital environment. Effective cybersecurity management enhances business operations and reputation (Lopatova 2021). Businesses can turn cybersecurity into a commercial advantage by adopting proactive cybersecurity measures that not only protect assets but also assure business partners and customers of the firm's commitment to security. This can lead to smoother business transactions and partnerships, fostering trust across business networks . There is a shift in the perception about cybersecurity. It is now being viewed as a vital enabler for business growth fostering value creation and competitive advantage instead of being viewed as a cost burden. By mitigating cyber risks and fostering a secure information environment, businesses can enhance their operational efficiency, secure intellectual property, and maintain customer trust, thereby gaining a competitive edge. Digital technologies shape the organisational design and brings cultural change. Digital transformation introduces cybersecurity challenges that necessitate a culture shift towards greater security awareness within organisations (Saeed et al. 2023). Human factors plays an important role in effective cybersecurity of the organisation. End users and IT professionals and cybersecurity personnel play pivotal role. A strong organisational culture enhances cybersecurity by aligning beliefs, values, and attitudes with security goals. Organisational leaders can foster a security-aware culture that supports the organisation’s overall cybersecurity objectives. The evolving business landscape requires continuous education on cybersecurity for all stakeholders within a company. This not only involves technical training but also understanding how cybersecurity impacts business strategies and operations. Educational initiatives need to cover the spectrum of risks and prepare businesses to handle emerging cybersecurity challenges effectively. Cybersecurity must be managed strategically within an organisation to optimize performance and mitigate risks. This involves integrating cybersecurity into business strategy, recognizing it as a dynamic field that requires continuous adaptation and management. In short, cybersecurity strategy must align with business strategy and IT strategy. By integrating cybersecurity into the strategy and cultural fabric, organisations can increase their cyber resilience. The strategic approach of an organisation significantly influences its cybersecurity landscape. Firms focusing on innovation often face greater cybersecurity risks due to decentralized control systems and a variety of technologies that may introduce vulnerabilities. Conversely, efficiency-focused businesses may have more centralized and potentially more secure systems, though they also need to adapt to evolving cyber threats. Effective cybersecurity practices are crucial for maintaining organisational integrity and performance. Cybersecurity influences various performance metrics, including risk management, compliance, and even financial performance. Is there a connection between cyber security adoption and organisational performance? The organisation’s internal and external environmental elements need to be considered when studying the impact of the adoption of cybersecurity technologies. The three variables technology, organisation, and environment are used to identify the factors that affect on cybersecurity adoption. The technology-organisation-environment framework, referred to as the TOE framework, can be used for this analysis. Technological context considers the tenability, relative advantage, return on investment, cost, complexity, and compatibility. Organisational context considers the willingness to adopt, organisational readiness, knowledge and expertise, external support, communication process, and top management support. The environmental context considers competitiveness, external pressure, geopolitics and external events, fear of exposure, experience and laws and regulations. In environments where system performance is prioritized over security, there might be a tendency to allocate fewer resources to security measures. This can leave systems more vulnerable to attacks. Rapidly deploying new features or updates to meet performance targets can sometimes lead to overlooking security best practices or conducting inadequate testing, creating potential vulnerabilities. Moving to the cloud and using third party services for improved performance also can increase the security risks if these services are not adequately vetted and managed. The Security-Performance Tradeoff Model is a concept in cybersecurity that recognizes the balance between security measures that need to be implemented and the system performance that organisations need to maintain constantly. This model is important because both cybersecurity and the systems’ performance can influence organisations’ performance in terms of reputation, acceptance, etc. The Security-Performance Tradeoff Model is focused on the idea that there is usually a trade-off between cybersecurity and systems performance, and organisations need to manage a balance. It suggests that in some cases, the highest security levels can lower system performance, and vice versa. Organisations need to strike an appropriate balance by implementing tailored solutions that meet their security requirements without compromising operational efficiency or user experience. The following approaches can be adopted to manage the trade-off: Risk-Based Prioritization to identify critical assets and potential vulnerabilities. Prioritize security measures based on the risk level and the organisation's risk appetite. Use optimization Techniques to reduce the impact of security measures. Design security controls with end user in mind (eg Single sign on, IP restriction) Implement continuous Monitoring and Testing Implement adaptive security frameworks that can dynamically adjust security measures based on the current threat landscape. Risk-Based Prioritization to identify critical assets and potential vulnerabilities. Prioritize security measures based on the risk level and the organisation's risk appetite. Use optimization Techniques to reduce the impact of security measures. Design security controls with end user in mind (eg Single sign on, IP restriction) Implement continuous Monitoring and Testing Implement adaptive security frameworks that can dynamically adjust security measures based on the current threat landscape.
网络安全与组织绩效--相互作用
相反,注重效率的企业可能拥有更集中、更安全的系统,尽管它们也需要适应不断变化的网络威胁。有效的网络安全实践对保持组织的完整性和绩效至关重要。网络安全会影响各种绩效指标,包括风险管理、合规性甚至财务绩效。网络安全的采用与组织绩效之间是否存在联系?在研究采用网络安全技术的影响时,需要考虑组织的内部和外部环境因素。技术、组织和环境这三个变量被用来确定影响网络安全采用的因素。技术-组织-环境框架(简称 TOE 框架)可用于此分析。技术环境考虑的因素包括适用性、相对优势、投资回报、成本、复杂性和兼容性。组织环境考虑采用意愿、组织准备、知识和专业技能、外部支持、沟通过程和高层管理支持。环境因素包括竞争力、外部压力、地缘政治和外部事件、对暴露的恐惧、经验和法律法规。在系统性能优先于安全的环境中,可能会倾向于为安全措施分配较少的资源。这会使系统更容易受到攻击。为了达到性能目标而快速部署新功能或更新,有时会导致忽视安全最佳实践或进行不充分的测试,从而产生潜在漏洞。如果不对这些服务进行充分审查和管理,那么迁移到云端和使用第三方服务来提高性能也会增加安全风险。安全-性能权衡模型是网络安全中的一个概念,它认识到需要实施的安全措施与组织需要持续保持的系统性能之间的平衡。这一模型非常重要,因为网络安全和系统性能都会影响组织在声誉、接受度等方面的表现。安全-性能权衡模型的重点是,网络安全与系统性能之间通常存在权衡,组织需要在两者之间取得平衡。它表明,在某些情况下,最高的安全级别会降低系统性能,反之亦然。组织需要通过实施量身定制的解决方案,在不影响运行效率或用户体验的情况下满足其安全要求,从而取得适当的平衡。可采用以下方法来权衡利弊: 确定关键资产和潜在漏洞的风险优先级。根据风险水平和组织的风险承受能力确定安全措施的优先级。 使用优化技术减少安全措施的影响。 在设计安全控制时考虑到最终用户(如单点登录、IP 限制) 实施持续监控和测试 实施适应性安全框架,可根据当前威胁状况动态调整安全措施。 基于风险确定优先级,以识别关键资产和潜在漏洞。根据风险水平和组织的风险偏好确定安全措施的优先级。使用优化技术降低安全措施的影响。在设计安全控制时考虑到最终用户(如单点登录、IP 限制) 实施持续监控和测试 实施适应性安全框架,可根据当前威胁状况动态调整安全措施。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信