88
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Weathering the storm: examining how organisations navigate the sea of cybersecurity regulations

, &
Received 17 Apr 2023, Accepted 16 Apr 2024, Published online: 26 Apr 2024
 

ABSTRACT

Governments around the world routinely regulate the activities of private enterprises to guide the behaviour of individuals and organisations towards acceptable norms. This holds true in a cybersecurity context. However, practitioners report that cybersecurity regulations are often out of date and compliance is confusing, expensive, and time consuming. As a result, organisational leaders are often uncertain about the practicalities of adopting and implementing the various rules, which can lead to trickle-down effects on the robustness of lower-level cybersecurity controls and compliance activities. In this research, we aim to clarify how cybersecurity regulations are operationalised in organisations, as well as reveal the compliance and performance consequences of cybersecurity regulations. To do so, we interviewed 22 senior leaders with expertise in cybersecurity regulations. Our analysis reveals 7 distinct themes (i.e., concept groupings) that are ordered within four phases (i.e., temporal stages), which we use to create the Institutional Cybersecurity Regulations Model (ICRM). The results provide a holistic view of the cybersecurity regulations process in organisations that can serve to clarify current theory relationships and inform future research. As well, the ICRM can provide a practical roadmap for managers to navigate regulatory cybersecurity challenges in their own companies.

Acknowledgements

The research reported in this article was supported, in part, by funds from the members of the Cybersecurity at MIT Sloan (CAMS) consortium. https://cams.mit.edu/

Disclosure statement

No potential conflict of interest was reported by the author(s).

Notes

1. ISO 27000 (International Organization for Standardization) is a set of standards and best practices organisations can use to help manage cyber risks.

2. PCI DSS (Payment Card Industry Data Security Standard) is a standard organisations use to help secure payment card transactions and avoid fraud.

3. COBIT (Control Objectives for Information and Related Technology) is an information technology and governance framework created by the Information Systems Audit and Control Association (ISACA). COBIT helps organisations manage technology-related issues focusing on compliance, risk, and strategy.

4. ITIL (Information Technology Infrastructure Library) is a set of best practices for managing IT and aligning it with business strategy.

5. We acknowledge that the IT Governance Cube (Tiwana et al. Citation2013) includes strategic implications; however, our work focuses more on its operational dimensions (i.e., the “who”, “what”, and “how” components). In particular, we strongly emphasise the “how” dimension in our work, as it aligns with our discussion of the processes organisations use to operationalise cybersecurity regulations.

6. This quantity of participants is in line with research in top information systems journals that use a similar design. For example, see Bagayogo et al. (Citation2014); Chan et al. (Citation2019); Kude et al. (Citation2018); Lansing et al. (Citation2018); Trier and Richter (Citation2015).

7. We solicited participants from an interdisciplinary consortium of organisations interested in researching and responding to cybersecurity issues.

8. We conducted a pilot data collection with 12 interviewees to form an initial conceptualisation of this topic area before commencing with the core data collection. Our findings from these preliminary interviews were used as a basis for a segment of our semi-structured interview protocol. This approach of leveraging a smaller initial dataset to inform a subsequent, larger data collection protocol has been utilised in prior scholarship for this type of research (e.g., Bagayogo et al., Citation2014).

9. This project was issued “Exempt Category 2 – Educational Testing, Surveys, Interviews, or Observation” status by the Committee on the Use of Humas as Experimental Subjects (COUHES) at the Massachusetts Institute of Technology (MIT). The COUHES ID for this project is E-3037.

10. Financial Industry Regulatory Authority.

11. TBEST is an intelligence-driven simulated attack framework.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 61.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 337.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.