Skip to main content
Article
Exploration and Exploitation in Organizational Cybersecurity
Journal of Computer Information Systems
  • Anand Jeyaraj, Wright State University - Main Campus
  • Amir Zadeh, Wright State University - Main Campus
Document Type
Article
Publication Date
7-4-2022
Find this in a Library

Catalog Record

Abstract

This study examines the cybersecurity responses by organizations to threats. Based on the notions of exploration and exploitation, this study developed a 2 × 2 matrix to characterize organizational actions as Surviving, Investigating, Reinforcing, and Balancing. Using textual data gathered from the annual 10-K reports of 87 organizations, this study mapped the explorative and exploitative behaviors of organizations and characterized the cybersecurity responses with the 2 × 2 matrix. This study also identified the changes in cybersecurity responses over multiple time periods, and the patterns of shifts between the quadrants in the 2 × 2 matrix as organizations adapted their cybersecurity responses over time. Several implications for research and practice are discussed

DOI
10.1080/08874417.2021.1902424
Citation Information
Anand Jeyaraj and Amir Zadeh. "Exploration and Exploitation in Organizational Cybersecurity" Journal of Computer Information Systems Vol. 62 Iss. 4 (2022) p. 680 - 693 ISSN: 0887-4417
Available at: http://works.bepress.com/anand-jeyaraj/25/