234
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Dark Clouds on the Horizon? Effects of Cloud Storage on Security Breaches

ORCID Icon, ORCID Icon & ORCID Icon

References

  • Alruwaythi, M.; Kambampaty, K.; and Nygard, K. User behavior trust modeling in cloud security, In 2018 International Conference on Computational Science and Computational Intelligence (CSCI), IEEE, 2018, pp. 1336–1339.
  • Angrist, J.D.; and Pischke, J. Mostly Harmless Econometrics: An Empiricist’s Companion. Princeton, NJ: Princeton University Press, 2008.
  • Angst, C.M.; Block, E.S.; D’Arcy, J.; and Kelley, K. When do IT security investments matter? Accounting for the influence of institutional factors in the context of healthcare data breaches. MIS Quarterly, 41, 3 (2017), 893–916.
  • Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.D.; Katz, R.; Konwinski, A.; Lee, G.; Patterson, D.; Rabkin, A.; and Stoica, I. A view of cloud computing. Communications of the ACM, 53, 4 (2010), 50–58.
  • Asatiani, A. Why cloud? - A review of cloud adoption determinants in organizations, In Proceedings of the European Conference on Information Systems, 2015.
  • August, T.; Niculescu, M.F.; and Shin, H. Cloud implications on software network structure and security risks. Information Systems Research, 25, 3 (2014), 489–510.
  • Austin, P.C. An introduction to propensity score methods for reducing the effects of confounding in observational studies. Multivariate Behavioral Research, 46, 3 (2011), 399–424.
  • Baskerville, R.; Rowe, F.; and Wolff, F. Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective. The DATABASE for Advances in Information Systems, 49, 1 (2018), 33–52.
  • Battleson, D.A.; West, B.C.; Kim, J.; Ramesh, B.; and Robinson, P.S. Achieving dynamic capabilities with cloud computing: An empirical investigation. European Journal of Information Systems, 25, 3 (2016), 209–230.
  • Benlian, A.; Kettinger, W.J.; Sunyaev, A.; and Winkler, T.J. The transformative value of cloud computing: A decoupling, platformization, and recombination theoretical framework. Journal of Management Information Systems, 35, 3 (2018), 719–739.
  • Bertrand, M.; Duflo, E.; and Mullainathan, S. How much should we trust differences-in-differences estimates? The Quarterly Journal of Economics, 119, 1 (2004), 249–275.
  • Bose, I.; and Leung, A.C.M. Adoption of identity theft countermeasures and its short-and long-term impact on firm value. MIS Quarterly, 43, 1 (2019), 313–327.
  • Brumley, D.; Newsome, J.; Song, D.; Wang, H.; and Jha, S. Theory and techniques for automatic generation of vulnerability-based signatures. IEEE Transactions on Dependable and Secure Computing, 5, 4 (2008), 224–241.
  • Burton-Jones, A.; and Volkoff, O. How can we develop contextualized theories of effective use? A demonstration in the context of community-care electronic health records. Information Systems Research, 28, 3 (2017), 468–489.
  • Caliendo, M.; and Kopeinig, S. Some practical guidance for the implementation of propensity score matching. Journal of Economic Surveys, 22, 1 (2008), 31–72.
  • Cao, C.; Ray, G.; Subramani, M.; and Gupta, A. Enterprise systems and the likelihood of horizontal, vertical, and conglomerate mergers and acquisitions. MIS Quarterly, 46, 2 (2022), 1227–1242.
  • Chen, P.; and Wu, S. The impact and implications of on-demand services on market structure. Information Systems Research, 24, 3 (2013), 750–767.
  • Choudhary, V.; and Vithayathil, J. The impact of cloud computing: Should the IT department be organized as a cost center or a profit center? Journal of Management Information Systems, 30, 2 (2013), 67–100.
  • Claycomb, W.R.; and Nicoll, A. Insider threats to cloud computing: Directions for new research challenges, In Proceedings of the 36th Annual Computer Software and Applications Conference, IEEE, 2012, pp. 387–394.
  • Darley, J.M.; and Latané, B. Bystander intervention in emergencies: Diffusion of responsibility. Journal of Personality and Social Psychology, 8, 4 (1968), 377–383.
  • Dehejia, R.H.; and Wahba, S. Propensity score-matching methods for nonexperimental causal studies. Review of Economics and Statistics, 84, 1 (2002), 151–161.
  • Greenwood, B.N.; and Wattal, S. Show me the way to go home: An empirical investigation of ride-sharing and alcohol related motor vehicle fatalities. MIS Quarterly, 41, 1 (2017), 163–187.
  • Hansen, L.P. Large sample properties of generalized method of moments estimators. Econometrica, 50, (1982), 1029–1054.
  • Hosseini, L.; Tang, S.; Mookerjee, V.; and Sriskandarajah, C. A switch in time saves the dime: A model to reduce rental cost in cloud computing. Information Systems Research, 31, 3 (2020), 753–775.
  • Jain, T.; and Hazra, J. Hybrid cloud computing investment strategies. Production and Operations Management, 28, 5 (2019), 1272–1284.
  • Joseph, J.; and Wilson, A.J. The growth of the firm: An attention‐based view. Strategic Management Journal, 39, 6 (2018), 1779–1800.
  • Kandias, M.; Virvilis, N.; and Gritzalis, D. The insider threat in cloud computing, In Proceedings of the International Workshop on Critical Information Infrastructures Security, Springer, 2011, pp. 93–103.
  • Kathuria, A.; Mann, A.; Khuntia, J.; Saldanha, T.J.; and Kauffman, R.J. A strategic value appropriation path for cloud computing. Journal of Management Information Systems, 35, 3 (2018), 740–775.
  • Kleibergen, F.; and Paap, R. Generalized reduced rank tests using the singular value decomposition. Journal of Econometrics, 133, 1 (2006), 97–126.
  • Koh, H.C.; and Tan, G. Data mining applications in healthcare. Journal of Healthcare Information Management, 19, 2 (2011), 64–72.
  • Kohli, R.; and Kettinger, W.J. Informating the clan: Controlling physicians’ costs and outcomes. MIS Quarterly, 28, 3 (2004), 363–394.
  • Kwon, J.; and Johnson, M.E. Meaningful healthcare security: Does “meaningful-use” attestation improve information security performance? MIS Quarterly, 42, 4 (2018), 1043–1067.
  • Kwon, J.; and Johnson, M.E. Proactive versus reactive security investments in the healthcare sector. MIS Quarterly, 38, 2 (2014), 451–471.
  • Lacity, M.C.; and Reynolds, P. Cloud services practices for small and medium-sized enterprises. MIS Quarterly Executive, 13, 1 (2014), 31–44.
  • Li, H.; Yoo, S.; and Kettinger, W.J. The roles of IT strategies and security investments in reducing organizational security breaches. Journal of Management Information Systems, 38, 1 (2021), 222–245.
  • Liu, C.; Huang, P.; and Lucas, H.C. Centralized IT decision making and cybersecurity breaches: Evidence from U.S. higher education institutions. Journal of Management Information Systems, 37, 3 (2020), 758–787.
  • Liu, Y.; Sheng, X.; and Marston, S.R. The impact of client-side security restrictions on the competition of cloud computing services. International Journal of Electronic Commerce, 19, 3 (2015), 90–117.
  • Mookerjee, V.; Mookerjee, R.; Bensoussan, A.; and Yue, W.T. When hackers talk: Managing information security under variable attack rates and knowledge dissemination. Information Systems Research, 22, 3 (2011), 606–623.
  • Naldi, M.; and Mastroeni, L. Economic decision criteria for the migration to cloud storage. European Journal of Information Systems, 25, 1 (2016), 16–28.
  • Ocasio, W.; Joseph, J.; Laureiro-Martinez, D.; Nigam, A.; and Rerup, C. Call for papers: Special issue of strategic organization: Research frontiers on the attention-based view of the firm. Strategic Organization, 19, 1 (2021), 176–180.
  • Ocasio, W.; Laamanen, T.; and Vaara, E. Communication and attention dynamics: An attention‐based view of strategic change. Strategic Management Journal, 39, 1 (2018), 155–167.
  • Ocasio, W. Attention to attention. Organization Science, 22, 5 (2011), 1286–1296.
  • Ocasio, W. Towards an attention‐based view of the firm. Strategic Management Journal, 18, S1 (1997), 187–206.
  • Pang, M.; and Tanriverdi, H. Strategic roles of IT modernization and cloud migration in reducing cybersecurity risks of organizations: The case of US federal government. Journal of Strategic Information Systems, 31, 1 (2022), 101707.
  • Qi, K.; and Han, S. Does IT improve revenue management in hospitals? Journal of the Association for Information Systems, 21, 6 (2020), 1486–1506.
  • Rishika, R.; and Ramaprasad, J. The effects of asymmetric social ties, structural embeddedness, and tie strength on online content contribution behavior. Management Science, 65, 7 (2019), 3398–3422.
  • Rubin, D.B. Using propensity scores to help design observational studies: Application to the tobacco litigation. Health Services and Outcomes Research Methodology, 2, 3 (2001), 169–188.
  • Schneider, S.; and Sunyaev, A. Determinant factors of cloud-sourcing decisions: Reflecting on the IT outsourcing literature in the era of cloud computing. Journal of Information Technology, 31, 1 (2016), 1–31.
  • Sherif, K.; and Menon, N.M. Managing technology and administration innovations: Four case studies on software reuse. Journal of the Association for Information Systems, 5, 7 (2004), 247–281.
  • Shiffrin, R.M.; and Schneider, W. Controlled and automatic human information processing: II. perceptual learning, automatic attending and a general theory. Psychological Review, 84, 2 (1977), 127–190.
  • Soh, F.; and Grover, V. Leveraging platform boundary resources: The role of distributed sensemaking. Journal of Management Information Systems, 39, 2 (2022), 366–394.
  • Stock, J.H.; and Yogo, M. Testing for weak instruments in linear IV regression, In Andrews, W.K.; and Stock, J.H. (eds.), Identification and Inference for Econometric Models: Essays in Honor of Thomas Rothenberg, Cambridge, UK: Cambridge University Press, 2002, pp. 80–108.
  • Takabi, H.; Joshi, J.B.; and Ahn, G. Security and privacy challenges in cloud computing environments. IEEE Security & Privacy, 8, 6 (2010), 24–31.
  • Weick, K.E.; and Sutcliffe, K.M. Mindfulness and the quality of organizational attention. Organization Science, 17, 4 (2006), 514–524.
  • Yang, M.; Jacob, V.S.; and Raghunathan, S. Cloud service model’s role in provider and user security investment incentives. Production and Operations Management, 30, 2 (2021), 419–437.
  • Zhang, Z.; Nan, G.; and Tan, Y. Cloud services vs. on-premises software: Competition under security risk and product customization. Information Systems Research, 31, 3 (2020), 848–864.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.