Accounting Info Systems (SIG ASYS)
Loading...
Paper Type
ERF
Paper Number
1547
Description
Organizations incur a myriad of expenses regarding their IT security management activities leading to the perception that IT security management activities are simply a cost-center within organizations. We know that competitive advantages can occur for an organization when they possess a unique set of resources not easily obtained or replicated by other organizations. This research in progress asks the question that if properly managed can IT security management activities become valuable resources and capabilities that lead to intellectual capital development and, therefore, may allow the firm to attain competitive advantages? To answer this question, we propose and demonstrate an intuitive and testable taxonomy grounded in four extant literature streams that classifies specifically known IT security management activities into 1) seven broad categories of IT security management, 2) the four properties of resources, and 3) the three intellectual capital types. We conclude with a discussion of the next steps for the research.
Recommended Citation
Avery, Atiya and Wang, Yen-Yao, "Competing on IT Security: A Proposed Taxonomy of the Relationship Among IT Security Management Activities, Resources, and Intellectual Capital Development" (2021). AMCIS 2021 Proceedings. 4.
https://aisel.aisnet.org/amcis2021/sig_acctinfosystem_asys/sig_acctinfosystem_asys/4
Competing on IT Security: A Proposed Taxonomy of the Relationship Among IT Security Management Activities, Resources, and Intellectual Capital Development
Organizations incur a myriad of expenses regarding their IT security management activities leading to the perception that IT security management activities are simply a cost-center within organizations. We know that competitive advantages can occur for an organization when they possess a unique set of resources not easily obtained or replicated by other organizations. This research in progress asks the question that if properly managed can IT security management activities become valuable resources and capabilities that lead to intellectual capital development and, therefore, may allow the firm to attain competitive advantages? To answer this question, we propose and demonstrate an intuitive and testable taxonomy grounded in four extant literature streams that classifies specifically known IT security management activities into 1) seven broad categories of IT security management, 2) the four properties of resources, and 3) the three intellectual capital types. We conclude with a discussion of the next steps for the research.
When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.