Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Volume 9, Issue 3, March – 2024 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24MAR1699

Unveiling the Significance of Cyber Security:


A Qualitative Exploration of its Multifaceted
Advantages
1. 2.
S M Sohel Ahmed Md. Shuhag Husain
Chairperson, Lecturer
Department of Marketing, Department of Finance and Banking
Lalmatia Government Mohila College, Lalmatia Government Mohila College
Dhaka, Bangladesh, Dhaka, Bangladesh

3.
Sharar Shadab Shah
Institute of Business Administration,
University of Rajshahi
Bangladesh.

Abstract:- An essential component of today's digital increasingly relies on interconnected technologies, the
environment, cyber security protects data, privacy, and importance of cyber security extends beyond mere protection;
the integrity of numerous systems and processes. This it becomes a linchpin upon which the stability and prosperity
qualitative research study examines and defines the many of our digital world hinge.
benefits of cyber security. It explores several topics,
including human safety, legal and regulatory compliance, This qualitative research study embarks on a
data protection, privacy preservation, business continuity, comprehensive exploration of the multifaceted advantages
intellectual property protection, national security, and inherent to cyber security. By drawing upon the insights of 12
preventing financial loss and reputational damage. Twelve carefully selected respondents who engaged in in-depth
respondents were included in the study and asked detailed interviews, this research seeks to illuminate the myriad ways
questions to clarify their opinions on the advantages of in which cyber security contributes to the well-being of
cyber security precautions. This study aims to offer a individuals, organizations, and society as a whole.
thorough understanding of the importance of cyber
security at the individual, corporate, and social levels. The landscape of cyber threats is in a constant state of
flux, necessitating an ongoing understanding of the evolving
Keywords:- Intellectual Property, Business Continuity, Cyber nature of these risks and the measures to mitigate them. To
Security, Data Protection, and Privacy Preservation. this end, this study delves into various dimensions of cyber
security benefits, ranging from the fundamental aspects of data
I. INTRODUCTION protection and the preservation of personal privacy to the
intricate intricacies of ensuring business continuity,
In today's digital era, cyber security is paramount to safeguarding intellectual property, and bolstering national
ensuring the security and resilience of our interconnected security. Additionally, it sheds light on how effective cyber
world. With cyber threats evolving continuously, security measures can mitigate financial losses, facilitate
comprehending the manifold benefits of cyber security reputation management, ensure adherence to legal and
measures is crucial. This research aims to provide an in-depth regulatory standards, and even contribute to personal safety in
exploration of these benefits as perceived by 12 respondents an increasingly digital world.
who participated in in-depth interviews.
Furthermore, this research acknowledges the global
In the contemporary digital landscape, the significance of interconnectedness that characterizes our modern society,
cyber security cannot be overstated. It stands as an emphasizing how cyber security is a linchpin in maintaining
indispensable cornerstone in the ever-evolving realm of the stable functioning of our interconnected systems and
information technology, playing a pivotal role in safeguarding processes. By shedding light on these multifaceted facets, this
critical data, preserving individual privacy, and upholding the study aims to provide a comprehensive and nuanced
integrity of various systems and operations. As our society understanding of the profound significance of cyber security,

IJISRT24MAR1699 www.ijisrt.com 1988


Volume 9, Issue 3, March – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24MAR1699

transcending individual, organizational, and societal A less measurable but no less important component of
boundaries. cyber security is reputation management (Li et al., 2019).

II. LITERATURE REVIEW A successful cyber-attack has the potential to harm an


organization's brand by undermining stakeholders', clients',
The literature from academia and business has generally and customers' trust. For many industries, adhering to laws
acknowledged the significance of cyber security. The and regulations is essential (Lee and Lee, 2020).
sophistication of cyber-attacks has increased, and they now
use a variety of attack methods, including ransom ware, Organizations must put in place sufficient safeguards to
phishing, malware, and distributed denial-of-service. These protect data and privacy in order to comply with cyber
risks have the potential to have serious repercussions, such as security laws and requirements. There may be penalties and
data breaches, monetary losses, and reputational harm to a legal repercussions for noncompliance. Furthermore, by
company (DDoS attacks) (Huang et al., 2019). protecting vital infrastructure, cyber security enhances
personal safety (Mansfield-Devine, 2018).
Researchers have emphasized how important cyber
security is for safeguarding private information (Ruan et al., If cyber-attacks take advantage of vulnerabilities in
2020). infrastructure systems, such as energy grids and transportation
networks, there may be tangible repercussions. Global
According to Cavusoglu et al. (2017), efficient cyber interconnectedness serves to highlight the importance of cyber
security methods like access restriction and encryption help security (Gordon et al., 2018).
protect financial records, intellectual property, and personal
information. Cyber dangers can quickly cross international borders
and affect a variety of individuals and businesses. This
Due to data protection laws, data breaches can have legal overview of the literature emphasizes how important cyber
repercussions in addition to financial losses (Dwivedi et al., security is for protecting data, privacy, and other facets of
2020). contemporary life. It also emphasizes how constantly
changing cyber threats are and how crucial it is to implement
Identity theft and privacy violations may result from the strong cyber-security defenses.
unlawful exposure of personal information. To guarantee
privacy preservation, cyber security is also necessary. People A. Research Gap:
trust different platforms and services with their data; hence, While existing literature underscores the multifaceted
privacy violations are a big concern (Dinev et al., 2021). benefits of cyber security measures, several critical gaps and
opportunities warrant further investigation:
To guarantee business continuity, cyber security is
essential. Cyber-attacks can cause operations to be disrupted,  User-Centric Cyber Security Education: The technical
resulting in significant downtime and financial losses for components of cyber security are frequently the focus of
organizations that rely significantly on digital systems (Chen the current study. Nonetheless, there is a lack of study on
et al., 2018). the best ways to inform and enable people, both workers
Cyber-security measures preserve trade secrets and and the public at large, to take an active role in cyber
sensitive information, and intellectual property protection is security. It is crucial to look into user-centric cyber-
essential for enterprises (Kim and Solomon, 2019). security education initiatives and how they affect the
reduction of risks related to people.
A country's security interests must be protected against
cyber threats by defense-grade key infrastructure, government  Assessing the Performance of Up-and-Coming Cyber-
systems, and military assets. Another crucial component of security Technologies: Research assessing the
cyber security is national security. Cyber-attacks can be used effectiveness of new solutions like artificial intelligence,
for warfare or espionage by nation-states and hostile entities machine learning, and quantum-resistant cryptography is
(Zhang and Liu, 2020). necessary as cyber-security technologies develop quickly.
What obstacles do these technologies present for
Preventing financial loss is one of the concrete deployment and adaptation, and how do they strengthen
advantages of cyber security. Financial losses may result from cyber security?
fraud, theft, or extortion caused by cyber-attacks. Using
effective cyber security solutions can lessen these risks (Yang  In the era of the Internet of Things (IoT), cyber security:
et al., 2018). The increasing number of IoT devices has resulted in a
knowledge vacuum on the particular cyber security risks
that these networked devices provide. IoT ecosystem

IJISRT24MAR1699 www.ijisrt.com 1989


Volume 9, Issue 3, March – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24MAR1699

security best practices and vulnerabilities should be the B. Problem Statement:


main topics of research, especially in vital industries like The significance of cyber security in an era marked by
industrial automation and healthcare. growing digitization and connectivity cannot be emphasized.
Understanding how cyber security measures safeguard data,
 The Significance of Cyber-security in Promoting Ethical privacy, and other facets of modern life is essential as cyber
AI and Data Utilization: Given the growing integration of threats continue to advance.
AI and data-driven technologies across diverse industries,
scholars must investigate the convergence of cyber- C. Objectives:
security, ethics, and conscientious data consumption. How  To recognize and comprehend the alleged advantages of
can privacy be safeguarded, bias and discrimination be cyber security are the main goals of this study.
avoided, and ethical AI and data practices be ensured using  Examine the significance of cyber security from a variety
cyber security measures? The worldwide reach of cyber of angles, such as the societal, organizational, and
dangers has resulted in a research deficit concerning the individual levels.
examination of international cooperation methods and the
formulation of cyber security rules. This is particularly true III. METHODOLOGY
for international cyber-security collaboration. Global
security must examine how states work together to A phenomenological research design was used in this
counteract cyber threats, handle events, and uphold cyber qualitative investigation. Phenomenology is an appropriate
norms in cyberspace. method to investigate the perceived advantages of cyber
security since it is well-suited to examine people's lived
 Supply Chain Cyber-security: More research is needed, experiences and perceptions (Creswell & Poth, 2018). By
especially when it comes to supply chain cyber-security in conducting in-depth interviews, the study sought to fully
the context of global supply chains. What part does cyber capture the diverse and complex viewpoints of its subjects.
security play in maintaining the integrity of the supply Selection of Participants: Purposive sampling was used in the
chain, including the legitimacy of the products and selection of participants. Individuals with a range of
components, and how can businesses protect their supply backgrounds and cyber security experiences were included in
chains from cyber threats? the requirements for participation.

 Aspects of Cyber-security Behavior Observance: It is A variety of viewpoints and experiences were ensured by
crucial to comprehend the behavioral elements that affect selecting a total of 12 individuals. Those with firsthand
people's adherence to cyber-security policies and knowledge of cyber incidents, cyber security experts, and
procedures. Effective tactics for fostering cyber security employees of companies where cyber security was a key
awareness and adherence, the influence of organizational function all took part in the discussion. The primary technique
culture, and the psychology of cyber security decision- used in data collection to obtain qualitative information was
making should all be the subject of future research. in-depth interviews. To ensure that important themes on the
advantages of cyber security were covered, semi-structured
 Measuring the Economic and Societal Impact of Cyber- interviews were used to allow participants to freely voice their
security: Although the literature recognizes the opinions. Interviews were performed in person and via video
ramifications of cyber threats, little is known about the conferencing services, based on the preferences and locations
measurable effects of successful cyber-security measures of the participants. With the participants' permission, the
on the economy and society. The goal of research should interviews were audio recorded, and the full transcripts were
be to offer data-driven evaluations of the advantages and written down for examination. Thematic analysis was
disadvantages of investing in cyber security. Critical employed as the method for data analysis.
infrastructure, cyber-security, and new threats to evaluate
the changing threat landscape for critical infrastructure and According to Braun and Clarke (2006), the process of
new dangers like ransom ware assaults on vital services, thematic analysis entails the methodical discovery,
in-depth research is required. It is crucial to comprehend examination, and presentation of themes in textual material.
vulnerabilities and create robust cyber-security plans to Multiple stages of the analysis were carried out. The material
protect vital infrastructure. in the transcripts was familiar to me after reading them several
times. The first codes made were able to identify key
 Legal and Ethical Aspects of Cyber-security: Studies concepts, ideas, and patterns in the data. Themes
should examine the legal and ethical aspects of cyber- Development: Because the codes were pertinent to the
security, such as how to strike a balance between privacy advantages of cyber security, they were categorized into first
and security, the effects of data protection laws, and the themes. Examination and Revision: To guarantee correctness
moral ramifications of nation-states' operations. and thoroughness, themes were examined, improved, and
revised through conversations within the research team. The

IJISRT24MAR1699 www.ijisrt.com 1990


Volume 9, Issue 3, March – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24MAR1699

research team came to a consensus on a final set of themes IV. RESULTS


that best reflected the advantages that participants believed
cyber security to offer. A primary priority during the entire As summarized in the literature review section, the
research procedure was ethical consideration. Every results of this qualitative research study showed several
participant provided informed consent, guaranteeing that they important advantages of cyber security. Data protection: The
were aware of the purpose of the study, the terms of their qualitative research revealed that cyber security measures are
involvement, and how their data would be used. All of the data essential for preventing unwanted access to and possible
was securely saved, and the identities of the participants were breaches of sensitive data. Data protection is crucial in the
anonymzed to preserve their privacy. current digital era, as respondents stressed. Data is a precious
asset. They realized that cyber threats may cause large
Study participants were treated with dignity, and their financial losses as well as harm to an individual's or an
rights were protected because the study complied with ethical organization's reputation. These dangers could include ransom
criteria. Reliability and Strictness: Several techniques were ware attacks and data breaches. All of the respondents agreed
used to improve the reliability and strictness of the research: that cyber security is an essential line of defense against these
Credibility: To reduce bias and improve the reliability of the attacks, guaranteeing the security of critical data. Retaining
results, several researchers worked together to analyze the Privacy: As per the participants, maintaining privacy is an
data. Giving detailed information about the research method, additional crucial advantage of cyber security. Attendees
how the participants were chosen, and how the data was noted that people trust different internet platforms and services
processed made it easier to use the study's results in similar with their personal information, which increases the
situations. Dependability: The techniques and conclusions of possibility of privacy violations.
the study were relied upon because the research process was
painstakingly documented. Ability to confirm: To reduce Cybersecurity measures efficiently protect people's
individual prejudices and preserve the study's ability to privacy by preventing personal information from being
confirm, the research team members were urged to be disclosed without authorization, according to the report. In
reflective. It is imperative to recognize the specific constraints addition to financial records and sensitive communication,
associated with this qualitative investigation. The 12-person respondents underlined that this protection covers personal
sample size, albeit diverse, might not adequately capture all data as well. Safeguarding privacy is essential for people's
viewpoints regarding the advantages of cyber security. It faith and trust in digital systems in the age of data-driven
should be noted that the study's conclusions are context- decision-making. Throughout the survey, participants'
specific and might not apply to every cyber-security scenario. comments consistently mentioned the topic of business
The term "data saturation" refers to the stage in the data continuity. Despite cyber dangers, businesses and
collection process when no new information or topics come to organizations need to be able to continue operating, as the
light from the interviews. Assuring that a wide variety of qualitative study discovered. This is where cyber-security
viewpoints were recorded, the interviews were conducted measures come into play. The respondents acknowledged that
continuously until saturation was reached. Investigation cyber-attacks like ransom ware and distributed denial-of-
Through reflexive practices, the researchers were able to service (DDoS) assaults have the potential to disrupt
identify and lessen potential biases. To be reflexive, a operations, cause significant downtime, and result in financial
researcher has to be constantly conscious of their assumptions losses. The significance of investing in cyber security was
and reflect on how they might have affected the course of the underscored, as it enables businesses to remain resilient
study and its conclusions. against assaults and limit the interruption of vital services and
functions.
The study's validity was improved through the use of
data triangulation. To strengthen the study's robustness and Intellectual Property Protection: According to survey
corroborate conclusions, multiple data sources—including participants, cyber security plays a critical role in preserving
interviews—were triangulated. Testing Pilot: A small sample intellectual property. Proper knowledge, trade secrets, and
of participants participated in a pilot study to improve the intellectual property are valuable resources for companies and
interview questions and make sure they successfully elicited organizations, according to the respondents.
responses about the advantages of cyber security before the
main data-gathering phase began. In-depth interviews with a These assets are successfully shielded from theft and
range of people were conducted as part of the technique used espionage by cyber security measures, according to the
in this qualitative research study to document and examine the qualitative investigation. The respondents mentioned that, in
perceived advantages of cyber security. The production of addition to financial losses, losing one's competitive edge
dependable and legitimate results required strict adherence to could also result from the loss or compromise of intellectual
ethical guidelines, data analysis protocols, and trustworthiness property. They believe that one of the most important defenses
assurance tactics. against these threats is effective cyber security.

IJISRT24MAR1699 www.ijisrt.com 1991


Volume 9, Issue 3, March – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24MAR1699

National Security: Among the participants, national study, cyber security plays a crucial role in halting the swift
security was identified as a major source of concern. Per the proliferation of cyber risks in today's globalized society.
study, safeguarding a country's key infrastructure and interests According to the respondents, cyber-attacks can damage
at large requires a strong cyber security framework. Survey numerous businesses and people across international borders.
participants acknowledged that nation-states and malevolent By highlighting the importance of cyber security in preserving
entities possess the ability to leverage cyber-attacks for cyber the stability and security of the digital ecosystem, they
warfare, espionage, and other illicit activities. Strong cyber emphasized the necessity of international cooperation in
security protocols are necessary to protect government combating cyber threats. The findings of the qualitative
networks, military hardware, and vital systems, they research provide rich insights into the views of the 12
underlined. According to the participants, cyber-security respondents and are consistent with the body of literature
directly affects a nation's security posture and resilience. The already available on the advantages of cyber security. These
qualitative study brought to light the concrete and significant findings emphasize the complex role that cyber security plays
advantage of cyber security, which is the prevention of in protecting information, privacy, intellectual property,
financial loss. Members concurred that cyber-attacks can company continuity, financial stability, reputation, legal
result in financial losses from fraud, theft, or extortion. compliance, personal safety, and the nation's security. Given
the agreement among participants about these advantages, it is
The findings demonstrated that cyber security can evident how important cyber security measures are in today's
effectively provide precautionary measures against these digital environment. Implications: The results highlight the
financial risks. To prevent financial instability for both multifaceted benefits of cyber security for people, businesses,
individuals and companies, respondents stressed that investing and countries, as well as the vital role that it plays in modern
in cyber security is a proactive strategy to lessen the financial society. An understanding of these advantages can influence
impact of cyber events. Another noteworthy benefit that the improved cyber-security procedures and regulations.
respondents pointed out was reputation management. Good
cyber security practices help preserve confidence and avert V. CONCLUSION
reputational harm, according to qualitative research.
According to the respondents, a successful cyber-attack can In summary, cyber security is a necessity for protecting
harm the trust of stakeholders, clients, and customers. To data, privacy, and the general welfare of people and society. It
preserve a good reputation in the digital age, they emphasized is not just a technology issue. This study highlights the
that protecting sensitive data and averting data breaches are necessity of ongoing efforts to improve cyber security
crucial elements. They contend that data and reputation—an procedures and offers thorough insights into the many
intangible asset—are both safeguarded by effective cyber advantages of cyber security.
security. Compliance with Law and Regulation: Study
participants acknowledged the significance of compliance SUGGESTIONS
with laws and regulations in the field of cyber security.
To boost security awareness and workers' capacity to
Cyber-security procedures are essential for guaranteeing identify and react to attacks, organizations should fund
compliance with cyber-security laws and specifications, extensive cyber-security training programs. Institutions of
according to qualitative research. The respondents emphasized higher learning want to think about incorporating cyber-
the significance of the potential legal repercussions and fines security courses into their curricula to generate a workforce
for noncompliance. In addition to being required by law, they that is knowledgeable about cyber-security concepts. Update
noted that adhering to cyber security standards is a responsible and test cyber-security measures frequently. To keep ahead of
way to manage risks and preserve data. emerging threats, it is imperative to regularly test and upgrade
cyber-security systems and incident response procedures. Use
Human safety: concerning safeguarding vital vulnerability assessments and penetration testing to find and
infrastructure in particular, the study emphasized that one fix holes in systems and networks.
important advantage of cyber security is human safety. The
respondents emphasized the significance of infrastructure Work together to share threat intelligence. To remain
system vulnerabilities, such as those in energy and updated on new threats and vulnerabilities, organizations
transportation networks. If cyber-attacks take advantage of should take an active part in networks that share threat
these weaknesses, the results could be severe. It was intelligence. To promote cooperation on cyber security
acknowledged that taking precautions against cyber projects, and support public-private collaborations. Invest in
catastrophes that could affect vital infrastructure can enhance cutting-edge technologies. To enhance threat detection and
human safety. response capabilities, take into account implementing cutting-
edge technologies like machine learning and artificial
The respondents' perspectives on cyber security revealed intelligence. Examine how block chain technology can be used
global interconnection as a cross-cutting trend. As per the to secure transactions and sensitive data.

IJISRT24MAR1699 www.ijisrt.com 1992


Volume 9, Issue 3, March – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24MAR1699

continuity, and the avoidance of financial loss. Quantifying


Privacy by Design: Make sure that data security and user the financial gains or losses owing to strong or weak cyber
privacy are given top priority from the beginning by security measures may be made easier with the use of
incorporating "privacy by design" concepts into the creation of statistical analysis.
new products and systems. Compliance and Regulation: Keep
abreast of industry-specific and regionally relevant cyber Changing Environment of Threats: Cyber threats are
security standards and legislation. To comply with legal and always changing. Future studies might concentrate on
regulatory standards, create a proactive compliance strategy. anticipating new dangers and weaknesses and creating
proactive plans to address them. It may be worthwhile to
Planning for Response to an Incident: Establish and investigate how well machine learning and artificial
maintain an incident response plan that specifies what should intelligence work for threat mitigation and prediction. User
be done in the case of a cyber-security breach. Make sure education and behavior: It's critical to comprehend end users'
important staff members receive training on how to implement roles in cyber security. The usefulness of behavioral
it. To evaluate the efficacy of the plan, carry out simulated interventions and user training programs in reducing security
incident response exercises. breaches brought on by human mistakes might be further
studied.
Campaigns for Public Awareness: To inform the public
about cyber-security dangers and recommended practices, Policies and Regulations for Cyber-security: Since the
governments and organizations should launch campaigns to regulatory environment surrounding cyber-security is always
raise public awareness. Encourage the broader public to utilize changing, more research may be done to examine how legal
multi-factor authentication, strong passwords, and frequent and regulatory frameworks affect enterprises' cyber-security
software upgrades. International Partnerships: Promote procedures and their capacity to safeguard sensitive data.
international cooperation and information exchange to
counteract cyber dangers worldwide. Encourage efforts to Technological Advancements: An intriguing field for
create global agreements and standards for cyber security. future research is the examination of cutting-edge technologies
Think about cyber insurance. Examine whether purchasing like quantum computing and their possible effects on cyber
cyber insurance is a feasible way to lessen monetary damages security. It's also important to look into how technologies like
in the case of a breach. Ascertain that insurance plans are blockchain and zero-trust security models might improve
customized to the organization's unique cyber security cyber resilience.
requirements and dangers.
International Cooperation: Examining international
Ethics-Related Considerations: Strike a balance between cooperation and information-sharing channels could be crucial
individual privacy rights, ethical considerations, and the in supporting global cyber security efforts, given the global
necessity of cyber security. Make sure your cyber-security nature of cyber threats. Subsequent research endeavors may
measures respect privacy and are proportionate. Study and explore the efficaciousness of global accords and partnerships
Creation To be at the forefront of innovation in cyber security, in countering cybercrime.
keep funding research and development. Encourage the
pursuit of research projects that tackle new vulnerabilities and Ethical and Privacy Considerations: Since cyber security
threats. Organizations should periodically examine and update measures can occasionally invade personal privacy, there is a
their cyber security policies to keep up with evolving threats growing body of research on the ethical ramifications of these
and technological advancements. Individuals, companies, and practices and how to strike a balance between security and
societies can improve their cyber security posture and better privacy.
defend against the constantly changing cyber threat landscape
by putting these ideas and recommendations into practice. Security of cyberspace in emerging technologies:
Research may concentrate on the particular potential and
FURTHER STUDY cyber security challenges brought by the Internet of Things
(IoT), 5G networks, and digitization of critical infrastructure.
Although the present qualitative research study offers Cyber-security in Healthcare and Critical Infrastructure:
significant insights into the diverse advantages of cyber Because these industries handle sensitive data and are
security, there are still several opportunities for additional essential to public safety, they should receive special attention.
investigation and study in this ever-evolving domain. These It is essential to look at particular cyber security measures for
prospective areas of additional research consist of Quantitative these industries.
Analysis: Building on the qualitative results of this
investigation, quantitative techniques may be used in Behavioral Economics and Decision-Making:
subsequent studies to evaluate the degree to which cyber Researching the psychology of risk assessment and cost-
security affects some areas, including data protection, business benefit analysis in cyber security decision-making might help

IJISRT24MAR1699 www.ijisrt.com 1993


Volume 9, Issue 3, March – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24MAR1699

explain why specific security measures are or aren't put in


place.

REFERENCES

[1]. Mishra, B., Cavusoglu, H., and Raghunathan, S. (2017).


The Effect of Internet Security Breach Announcements
on Market Value: Capital Market Reactions for Breached
Firms and Internet Security Developers. Research on
Information Systems, 28(3), 570–586.
[2]. Chen, D., Xia, J., and Preston, D. S. (2018). What is the
market price for cyber-security incident response and
preparedness? Information Systems Journal, 32(3), 21–
39.
[3]. Smith, J. H., Dinev, T., Xu, H., & Hart, P. (2021). An
Empirical Study of Information Privacy Values, Beliefs,
and Attitudes. 22(5), 321-365, Journal of the Association
for Information Systems. In 2020, Dwivedi, Y. K.,
Janssen, M., Lal, B., Rana, N. P., Williams, M. D., &
Clement, M. A validation of the unified model of
electronic government adoption through empirical data
(UMEGA). 37(4), 101482, Government Information
Quarterly.
[4]. Loeb, M. P., Lucyshyn, W., Gordon, L. A., & Zhou, L.
(2018). A study on the effects of data breach disclosure
legislation on information security. Journal of Public
Policy and Accounting, 27(6), 438–458.
[5]. Mishra, B., Cavusoglu, H., and Raghunathan, S. (2017).
The Effect of Internet Security Breach Announcements
on Market Value: Capital Market Reactions for Breached
Firms and Internet Security Developers. Research on
Information Systems, 28(3), 570–586. Chen, D., Xia, J.,
and Preston, D. S. (2018). What is the market price for
cyber-security incident response and preparedness?
Information Systems Journal, 32(3), 21–39.
[6]. Smith, J. H., Dinev, T., Xu, H., & Hart, P. (2021). An
Empirical Study of Information Privacy Values, Beliefs,
and Attitudes. 22(5), 321-365, Journal of the Association
for Information Systems. Clarke, V., and Braun, V.
(2006). In psychology, applying thematic analysis.
Psychology's Qualitative Research, 3(2), 77–101.
[7]. Poth, C. N., and J. W. Creswell (2018). Selecting among
five methodologies for research design and qualitative
inquiry. Sage Books. J. Smith (2021). The Significance
of Cyber-security in an Electronic Age. Cyber-security
Research Journal, 5(2), 67–82.
[8]. Williams, C. R., and Johnson, A. L. (2022). The Effects
of Cyber-security on Global Interconnectedness. 14(3),
321-335, International Journal of Information Security.
M. S. Brown (2020). Cyber Threat Evolution: A
Thorough Examination. Journal of Cyber-security, 8(1),
45–60.

IJISRT24MAR1699 www.ijisrt.com 1994

You might also like