3,048
Views
17
CrossRef citations to date
0
Altmetric
Research Article

Centralized IT Decision Making and Cybersecurity Breaches: Evidence from U.S. Higher Education Institutions

, &

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (4)

Zorodzai Magura, Tinashe Gwendolyn Zhou & Samuel Musungwini. (2022) A guiding framework for enhancing database security in state-owned universities in Zimbabwe. African Journal of Science, Technology, Innovation and Development 14:7, pages 1761-1775.
Read now
Rajiv D. Banker, Cecilia (Qian) Feng & Paul A. Pavlou. (2022) Businessperson or Technologist: Stock Market Reaction to the Alignment between CIO Background and Firm Strategy. Journal of Management Information Systems 39:4, pages 1006-1036.
Read now
Ka Chung Ng, Xiaojun Zhang, James Y. L. Thong & Kar Yan Tam. (2021) Protecting Against Threats to Information Security: An Attitudinal Ambivalence Perspective. Journal of Management Information Systems 38:3, pages 732-764.
Read now
He Li, Sungjin Yoo & William J. Kettinger. (2021) The Roles of IT Strategies and Security Investments in Reducing Organizational Security Breaches. Journal of Management Information Systems 38:1, pages 222-245.
Read now

Articles from other publishers (13)

Kookyoung Han, Jin Hyuk Choi, Yunsik Choi, Gene Moo Lee & Andrew B. Whinston. (2023) Security defense against long-term and stealthy cyberattacks. Decision Support Systems 166, pages 113912.
Crossref
Yang Lei, Yue Guo, Xiaotong Li & Zhe Jing. (2022) Space economy: a new frontier of information systems, analytics and digital commerce. Industrial Management & Data Systems 123:2, pages 616-629.
Crossref
Faheem Ahmed Shaikh & Mikko Siponen. (2023) Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity. Computers & Security 124, pages 102974.
Crossref
Allen C. Johnston. (2022) A closer look at organizational cybersecurity research trending topics and limitations. Organizational Cybersecurity Journal: Practice, Process and People 2:2, pages 124-133.
Crossref
Qian Wang & Eric W.T. Ngai. (2022) Firm diversity and data breach risk: A longitudinal study. The Journal of Strategic Information Systems 31:4, pages 101743.
Crossref
Stef Schinagl, Abbas Shahim & Svetlana Khapova. (2022) Paradoxical tensions in the implementation of digital security governance: Toward an ambidextrous approach to governing digital security. Computers & Security 122, pages 102903.
Crossref
Noran Shafik Fouad. (2022) The security economics of EdTech: vendors’ responsibility and the cybersecurity challenge in the education sector. Digital Policy, Regulation and Governance 24:3, pages 259-273.
Crossref
Frederic Schlackl, Nico Link & Hartmut Hoehle. (2022) Antecedents and consequences of data breaches: A systematic review. Information & Management 59:4, pages 103638.
Crossref
Richard Busulwa, Mark Pickering & Iris Mao. (2022) Digital transformation and hospitality management competencies: Toward an integrative framework. International Journal of Hospitality Management 102, pages 103132.
Crossref
Min-Seok Pang & Hüseyin Tanriverdi. (2022) Strategic roles of IT modernization and cloud migration in reducing cybersecurity risks of organizations: The case of U.S. federal government. The Journal of Strategic Information Systems 31:1, pages 101707.
Crossref
Abdullah Saad AL-Malaise AL-Ghamdi, Mahmoud Ragab, Maha Farouk S. Sabir, Ahmed Elhassanein & Ashraf A. Gouda. (2022) Optimized Artificial Neural Network Techniques to Improve Cybersecurity of Higher Education Institution. Computers, Materials & Continua 72:2, pages 3385-3399.
Crossref
Carlos Juiz & Beatriz Gómez. 2022. COVID-19 Challenges to University Information Technology Governance. COVID-19 Challenges to University Information Technology Governance 1 42 .
Min-Seok Pang. (2017) Security Breaches in the U.S. Federal Government. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.