Governing security in a digital world is not a “one size fits all” solution: A multiple case study of security governance modes and their effectiveness

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

Governing digital security is crucial for anticipating the ever-increasing impact of cyberattacks. However, persistent failures and breaches indicate that both research and practice do not provide sufficient guidance on how digital security governance (DSG) can become effective. There is a strong focus on finding the “silver bullet” or applying a “one size fits all” approach in DSG models. The central finding of this paper indicates that organizations can operate different DSG modes. We discuss four DSG modes and their benefits and drawbacks based on case study data, interviewing 33 stakeholders across 5 unique cases (large organizations). With our findings, organizations can reflect on their current DSG approaches and render them more effective.

Original languageEnglish
Title of host publicationProceedings of the 57th Annual Hawaii International Conference on System Sciences, HICSS 2024
EditorsTung X. Bui
PublisherAIS Electronic Library
Pages6533-6542
Number of pages10
ISBN (Electronic)9780998133171
Publication statusPublished - 2024
Event57th Annual Hawaii International Conference on System Sciences, HICSS 2024 - Honolulu, United States
Duration: 3 Jan 20246 Jan 2024

Publication series

NameProceedings of the Annual Hawaii International Conference on System Sciences
ISSN (Print)1530-1605

Conference

Conference57th Annual Hawaii International Conference on System Sciences, HICSS 2024
Country/TerritoryUnited States
CityHonolulu
Period3/01/246/01/24

Bibliographical note

Publisher Copyright:
© 2024 IEEE Computer Society. All rights reserved.

Keywords

  • Cybersecurity
  • Digital Security Governance
  • Governance modes
  • IT Governance

Fingerprint

Dive into the research topics of 'Governing security in a digital world is not a “one size fits all” solution: A multiple case study of security governance modes and their effectiveness'. Together they form a unique fingerprint.

Cite this