Paper Type

ERF

Abstract

Artificial Intelligence is crucial in organizational cybersecurity, especially in data security. While previous research emphasizes AI’s abilities in pattern recognition and threat mitigation, research has not examined how AI and various organizations’ security elements jointly shape cybersecurity incident management outcomes. Thus motivated, this study examines how AI succeeds or fails in cybersecurity incident management. Guided by the affordance theory, we investigate the joint relationship of AI, cybersecurity strategies, and organizational context with incident characteristics. We conceptualize and propose to empirically examine the research model comprising the use of AI, cyber insurance, regulatory compliance, industry sensitivity, company size, threat severity, and mean time to detection. We focus on three incident outcomes: data breaches, attack costs, and production disruptions.

Paper Number

2091

Author Connect URL

https://authorconnect.aisnet.org/conferences/AMCIS2025/papers/2091

Comments

SIGSEC

Author Connect Link

Share

COinS
 
Aug 15th, 12:00 AM

An Affordance Perspective on Artificial Intelligence’s Role in Data Protection

Artificial Intelligence is crucial in organizational cybersecurity, especially in data security. While previous research emphasizes AI’s abilities in pattern recognition and threat mitigation, research has not examined how AI and various organizations’ security elements jointly shape cybersecurity incident management outcomes. Thus motivated, this study examines how AI succeeds or fails in cybersecurity incident management. Guided by the affordance theory, we investigate the joint relationship of AI, cybersecurity strategies, and organizational context with incident characteristics. We conceptualize and propose to empirically examine the research model comprising the use of AI, cyber insurance, regulatory compliance, industry sensitivity, company size, threat severity, and mean time to detection. We focus on three incident outcomes: data breaches, attack costs, and production disruptions.

When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.