Article 4
Article 4
Article 4
https://www.emerald.com/insight/0263-5577.htm
Abstract
Purpose – Employees must receive proper cybersecurity training so that they can recognize the threats to
their organizations and take the appropriate actions to reduce cyber risks. However, many cybersecurity
awareness training (CSAT) programs fall short due to their misaligned training focuses.
Design/methodology/approach – To help organizations develop effective CSAT programs, we have
developed a theoretical framework for conducting a cost–benefit analysis of those CSAT programs. We
differentiate them into three types of CSAT programs (constant, complementary and compensatory) by their
costs and into four types of CSAT programs (negligible, consistent, increasing and diminishing) by their
benefits. Also, we investigate the impact of CSAT programs with different costs and the benefits on a
company’s optimal degree of security.
Findings – Our findings indicate that the benefit of a CSAT program with different types of cost plays a
disparate role in keeping, upgrading or lowering a company’s existing security level. Ideally, a CSAT program
should spend more of its expenses on training employees to deal with the security threats at a lower security
level and to reduce more losses at a higher security level.
Originality/value – Our model serves as a benchmark that will help organizations allocate resources toward
the development of successful CSAT programs.
Keywords Awareness training, Benefit, Cost, Cybersecurity, Level of security
Paper type Research paper
1. Introduction
Cyberattacks, hacks and high-profile data breaches are part of the cybersecurity landscape.
As a result, cybersecurity has become an urgent priority, both for business organizations and
for government agencies (Shin, 2010; Ponnusamy et al., 2020). However, developing a robust
cybersecurity defense remains challenging given the evolution, the frequency and the
sophistication of cybersecurity attacks, particularly those that use social engineering
methods such as phishing and malware (Conteh and Schmick, 2016; Yaokumah et al., 2019).
Since people are often the weakest link in an organization’s cybersecurity chain (Teh et al.,
2015; De Maggio et al., 2019), organizations should not only provide sufficient security
training and resources to their employees (Chatterjee, 2019) but should also create and
maintain a culture of security awareness (Norris et al., 2019). Implementing the latest security
technologies is unlikely to prevent or to mitigate cyberattacks without the provision of
ongoing personnel training (Norris et al., 2019). A recent IBM (2019) report reiterated that
human errors continue to facilitate security breaches, as more employees fall for phishing
scams and misconfigured servers.
As security incidents continue to rise in frequency, sophistication and cost, adequate
Industrial Management & Data
personnel training regarding safe online behavior and security countermeasures remains the Systems
backbone of corporations’ cybersecurity strategy. Disparte and Furlow (2017) suggest that the Vol. 121 No. 3, 2021
pp. 613-636
best cybersecurity investment that an organization can make is stronger security training for © Emerald Publishing Limited
0263-5577
its employees. That is why organizations must invest in cybersecurity awareness training DOI 10.1108/IMDS-08-2020-0462
IMDS (CSAT) to enhance their employees’ awareness and readiness (Schmidt et al., 2008; He et al.,
121,3 2019). Despite this, CSAT programs are often underfunded (Aldawood and Skinner, 2019;
Mejia, 2019). Furthermore, many employees fail to comply with their organizations’ information
security policies (Li et al., 2019). This lack of compliance can lead to more security and data
breaches, even as it underscores the ineffectiveness of many CSAT programs (Kweon et al.,
2019). Hence, a good CSAT program must be designed in such a way that it not only improves
employees’ knowledge but also motivates them to develop compliant behaviors.
614 Thus, there is a pressing need to investigate the challenges and issues faced by CSAT
programs and to investigate ways in which organizations can make them more effective
(Chengalur-Smith and Abraham, 2019). Among the factors that undermine the effectiveness
of some current CSAT programs, He and Zhang (2019) have summarized several important
issues, including these:
(1) Employees feel bored with mandatory security training programs that force them to
watch uninspiring lectures about policies and procedures and to answer a few
multiple-choice questions at the end. According to Adams (2018), employees complete
training quickly, without paying much attention to the video content.
(2) Because of a lack of incentives and rewards, many employees lack interest and lack
the motivation to participate in their organizations’ security training programs
(Gross, 2018).
(3) Employees complain that security training programs are not tailored to their individual
and their specific organization’s security awareness needs. As a result, employees are
uninterested in closely following and getting involved in security awareness training
(Winkler, 2018; Adams, 2018).
(4) Security training programs are not designed to accommodate a variety of learning
styles and employee needs (Nadkarni, 2012).
(5) To stay ahead of the threats, security training programs require ongoing updates and
revision. Also, programs benefit from ongoing feedback from employees throughout
the organization to assess the relevance or the obsolescence of the training materials
(Pandasecurity, 2017; Adams, 2018).
Beyond the issues mentioned above, another pressing issue is related to the cost and the
benefit of implementing CSAT programs. To be effective, CSAT programs need to be
customized and sustained over a prolonged period (Khan and AlShare, 2019). As a result,
cybersecurity training requires ongoing funding for training resources; for consulting,
testing and advertising; for software/hardware and/or for professional services. One of the
main barriers to the implementation of effective information security awareness is the
organizations’ budgets (Aldawood and Skinner, 2019; Mejia, 2019; Shaw et al., 2009). Besides,
the potential benefit of such an investment is typically hard to justify when developing a
CSAT program.
Prior studies have explored the management of cybersecurity resources from a cost–benefit
perspective (e.g. Gordon and Loeb, 2006; Ekelund and Iskoujina, 2019; Gordon et al., 2020).
However, very few of them have analyzed CSAT programs from such an aspect. To address
this research gap, our study develops a framework to examine different CSAT programs based
on a cost–benefit analysis, guided by the synthesis of fragmented elements regarding
cybersecurity training in prior literature. Specifically, we address the following key research
questions in this paper: (1) what are the different types of CSAT programs in terms of their costs
and benefits? (2) how do different types of CSAT programs affect a company’s optimal degree of
security? and (3) how should companies effectively implement CSAT programs?
To answer these research questions, our research applies an analytic approach to establish Cybersecurity
and analyze a model of CSAT programs that can help companies differentiate various types of awareness
CSAT programs, examines their impact on the optimal degree of security and prioritize the
areas of intervention needed for their implementation.
training
Our paper adopts the framework used by prior studies (He and Zhang, 2019; Piccoli and programs
Pigni, 2019) to explore different types of CSAT programs and then discuss their impact and
implementation. Piccoli and Pigni’s (2019) cybersecurity model shows that companies can
develop their optimal cybersecurity strategy by balancing the trade-offs between their desired 615
degree of security and their total cost to achieve it. Building on the model by Piccoli and Pigni
(2019), He and Zhang (2019) illustrate how the success of a company’s CSAT programs
significantly impacts its cybersecurity investment. They demonstrate that a successful CSAT
program should reduce a company’s failure cost to compensate for its cost of implementation.
Thus, the company can lower its total cybersecurity cost while maintaining or increasing its
optimal degree of security. However, their study has not differentiated specific types of CSAT
programs and explored their applicability. Extending the conceptual analysis by He and Zhang
(2019), we construct an analytical framework that highlights and investigates the costs and the
benefits associated with CSAT programs.
The remainder of the paper proceeds as follows. First, we review the literature related to
cybersecurity investment and resource allocation. Next, building on the findings from these
studies, we differentiate CSAT programs in terms of three types of costs (constant,
complementary and compensatory) and four types of benefits (ineffective, consistent,
increasing and diminishing). Third, we conduct a cost–benefit analysis to investigate how a
company’s optimal degree of security changes with different types of CSAT programs. Our
analytical model provides a foundation for companies to assess the effectiveness of their
investment in CSAT programs and expore their applicability. Finally, we offer several
actionable recommendations and conclude the study by highlighting our theoretical and
practical contributions as well as limitations and future research directions.
2. Literature
This section reviews prior literature by focusing on two major research streams relevant to
our study: (1) cybersecurity investment and resource allocation and (2) the cost of CSAT
programs. In addition, we highlight the focus of our research different from prior studies.
Development cost How many working hours are needed to complete the CSAT in-house?
Direct loss of productivity and How many employee downtime and IT staff hours will it take to disinfect
revenue workstations and/or to restore them from backups, in case of a security
incident? Revenue loss per minute, per hour or per day can be significant
Loss of reputation Is there the possibility of a lost reputation caused by news of a data breach? Table 1.
(This consideration would involve the direct and indirect costs of having to Three main
deal with a security incident to customers, suppliers and stakeholders.) components of CSAT
Note(s): KnowBe4 (2019) programs
IMDS illustrates how the success of a CSAT program can significantly impact a company through
121,3 its investment in cybersecurity training.
Piccoli and Pigni (2019) show that companies can develop their optimal cybersecurity
strategies by balancing the trade-offs between their desired degree of security and their
total cost to achieve it. As Figure 1 exhibits, the total cost for the cybersecurity of a
company includes both the anticipation cost and the failure cost. The anticipation cost refers
to a company’s investment in cybersecurity to actively prevent expected cyber threats;
618 maintaining a higher degree of security requires a company to increase its anticipation cost.
Moreover, for every additional unit of the degree of security, a company will incur more
anticipation costs. So, the curve of anticipation cost is a convexly increasing curve relative
to the degree of security chosen by a company. The failure cost represents a company’s
financial loss due to unpredictable cybersecurity breaches and threats. The curve of the
failure cost decreases with the degree of security. Besides, each additional degree of
security will result in a more significant decrease in failure cost. Therefore, the total cost can
be represented by a U-shaped curve. A company should achieve its optimal degree of
security to minimize its total cost of cybersecurity.
When a company implements a CSAT program, its anticipation cost will increase. The red
dotted line in Figure 2 demonstrates the total anticipation costs, including the CSAT program.
The difference between the red and blue dotted lines represents the projected cost of the CSAT
program; this increases with the degree of security. The effectiveness of the CSAT program
determines how it will affect the failure cost. Figure 2 shows a specific type of CSAT program
that does not reduce any of the failure cost. In contrast, other kinds of CSAT programs may help
to significantly decrease a company’s failure cost. We explore the effects of the use of different
types of CSAT programs in Section 4 of this paper.
We define the anticipation0 cost as 00aðsÞ; in which s denotes0 the level of security, so
according to our assumption a0 ðsÞ > 0, a00 ðsÞ > 0; að0Þ ¼ 0; and a ð0Þ ¼ 0: The failure cost is
represented as f ðsÞ: Hence, f ðsÞ < 0, f ðsÞ > 0; and f ð0Þ ¼ F; where F is a constant that
represents the failure cost when there are no security measures implemented in a company.
The projected cost for implementing a CSAT program is tðsÞ; so the firm’s total projected
cybersecurity cost is CðsÞ ¼ aðsÞ þ f ðsÞ þ tðsÞ: Therefore, the firm determines s*–the
optimal degree of security–to minimize the total cost CðsÞ: See Table 2 for a summary of the
notation.
Cost
Failure Cost with
No Security
Anticipation Cost
Total Cost
Figure 1.
Trade-offs between
cost and degree of Failure Cost
security (Piccoli and
Pigni, 2019)
Optimal Degree of Security Degree of Security
Cybersecurity
Cost
awareness
training
Failure Cost with
programs
No Security
Symbol Meaning
Anticipation Cost
programs
No Security
Anticipation Cost
Therefore, if company X’s anticipation and failure costs are each higher than those of
company Y, company X’s optimal degree of security will be lower than that for company Y, as
shown in Figures 3 and 4. These two propositions also imply that investing more in
cybersecurity may not always make a company more secure (i.e. increasing its level of
security). If the cybersecurity investment does not help lower a company’s potential loss, the
company’s level of security may be reduced. In other words, if the anticipation cost does not
work as it is expected, the company will end up with a higher total cybersecurity cost and
become less secure.
Cost
Complementary
121,3 Cost of a CSAT Program
Constant
Figure 5.
The cost of a CSAT
program: three types
Degree of Security
Increasing
programs
No Security
Diminishing
Consistent
Figure 6.
The benefit of a CSAT
program: four types
Degree of Security
training program will help to reduce the potential failure cost for a company at every degree
of security. The increasing benefit of a CSAT program shows that this type of training
program provides more benefits to a company that has more advanced safeguards in place
since the failure cost will decrease more at a higher degree of security. In contrast, the
diminishing benefit of a CSAT program implies that this kind of training program provides
more benefits to companies with less sophisticated cybersecurity safeguards because the
failure cost will be reduced at a lower degree of security.
4.2.3 A cost–benefit analysis. Combining the three cost types and the four benefit types, we
next conduct a cost–benefit analysis of CSAT programs and propose a formal framework
that summarizes how the optimal degree of security will change, depending upon the use of
the different types of CSAT programs with their projected costs and benefits.
Considering a CSAT program as an additional investment in a company’s cybersecurity
safeguards, we focus on how such a program will impact the company’s existing degree of
security. The next proposition shows the impact of CSAT programs with negligible or
consistent benefits on a company’s optimal degree of security.
Proposition 4. A CSAT program with a projected negligible or consistent benefit will
result in the same, a lower or a higher optimal degree of security if its
projected cost is constant, complementary or compensatory.
Proof: Please see Appendix.
Proposition 4 indicates that the cost of a CSAT program has the same impact on the
optimal degree of security when the CSAT program has either no or a consistent benefit.
When the projected cost of the CSAT program is constant at every degree of security, the total
cybersecurity cost curve will shift upward (or possibly downward if there is a consistent
benefit), so there is no change for the optimal degree of security. When the projected cost of
the CSAT program is complementary, it will be more costly for the company to implement the
CSAT program at a higher degree of security, while having no or the same benefit. Therefore,
it is better for the company to choose a lower optimal degree of security. In contrast, when the
projected cost of the CSAT program is compensatory, it will entail less cost for the CSAT
program for every unit increasing degree of security; hence, the company will result in a
higher optimal degree of security.
The following proposition summarizes how the CSAT programs with increasing benefits
influence a company’s optimal degree of security.
IMDS Proposition 5. A CSAT program with a projected increasing benefit will result in a higher
121,3 optimal degree of security if its projected cost is constant or compensatory;
however, the change in the optimal degree of security is undecided if the
CSAT program’s projected cost is complementary.
Proof: Please see Appendix.
Proposition 5 demonstrates that when a company chooses to implement a CSAT program
624 with the increasing benefit, the optimal degree of security will mostly increase, unless the
projected cost of the CSAT program is complementary, in which case the company needs to
balance the trade-off between the higher cost and the increasing benefit of the CSAT program
at a higher degree of security.
The last proposition demonstrates the influence of CSAT programs with diminishing
benefits on a company’s optimal degree of security.
Proposition 6. A CSAT program with a projected diminishing benefit will result in a
lower optimal degree of security if its projected cost is constant or
complementary; however, the change in the optimal degree of security is
undecided if the CSAT program’s projected cost is compensatory.
Proof: Please see Appendix.
Proposition 6 implies that when a company chooses to implement a CSAT program with
the diminishing benefit, the optimal degree of security will mostly decrease unless the cost of
the CSAT program is compensatory, in which case the company needs to balance the trade-
off between the higher cost and the larger benefit for the CSAT program at a lower degree of
security.
Based on three types of projected costs and the four types of projected benefits, a CSAT
program may belong to one of the twelve scenarios shown in Figure 7. We summarize the
major findings from our cost–benefit analysis in terms of how the optimal degree of security
will change for each of the 12 different CSAT programs. The two cells with a gray
background show that the implementation of such types of CSAT programs does not result in
any change for the optimal degree of security since the changing rates of the anticipation and
the failure costs remain the same both before and after these CSAT programs are
implemented. The four cells with a light orange background denote that a lowered optimal
degree of security will result from the use of these four types of CSAT programs. The
remaining four cells with a blue background and the two cells with a light blue background
represent the CSAT programs that may help companies shift to a higher optimal degree of
security. For the two “undecided” scenarios, although they may possibly lead to a lower
optimal degree of security, it should be noted that companies can strengthen the effects of
increasing benefit or compensatory cost to negate the impact of complementary cost or
diminishing benefit. In summary, a CSAT program with an increasing benefit or a
Figure 9.
Implementation of
CSAT programs G E
Complementary F Diminishing
In Figure 9, the horizontal and vertical axes denote how a CSAT program’s cost and benefit
changes with a company’s level of security. The dotted lines indicate the boundary of the
maximal changes allowed in the cost and benefit. The three possible, three less likely but
desired and three less likely and undesired CSAT programs are also represented in Figure 9.
Their matching parts are summarized in Table 3 as follows.
When a company implements CSAT programs (2) or (3), their level of security may not
always increase due to the trade-off between the opposite effects of the cost and benefit of the
program. The two triangular areas with gridlines represent the CSAT programs that have a
stronger effect on either its cost or benefit to help the company upgrade its security level.
Therefore, these two areas (ABI and IDE) stand for the CSAT programs that companies
should implement. The area BCDI and lines IB and ID denote the CSAT programs that
companies should aspire to implement; these programs are difficult for companies to match
their benefits with costs, but they help them increase their security level. In particular, point C
is the one that can maximally upgrade companies’ level of security; this implies that ideally, a
CSAT program should spend more of its expenses on training employees to deal with the
security threats at a lower level of security and to reduce more losses at a higher level of
security.
Researchers from both the industry and academia have developed several useful methods
and tools that can help assess a company’s level of security, for instance, BitSight (Bannam,
2017), SecurityScorecard (Herath et al., 2010), Value at Risk (Ekelund and Iskoujina, 2019),
Factor Analysis of Information Risk (Freund and Jones, 2014), SAFE (Security Assessment
Framework for Enterprise) platform (Lucideus Incorporated, 2020), and Cyber Doppler
CSAT programs
No Category Benefit Cost Matching parts in Figure 9
5. Actionable recommendations
Following up on the findings from our cost–benefit analysis, we next make some actionable
recommendations to help companies invest wisely when choosing and developing effective
CSAT programs.
Figure 10.
Determine the best Determine the best
security level security level
IMDS 5.1 Investing wisely in CSAT programs
121,3 It is crucial to allocate appropriate investment in CSAT programs. When the budget for a
CSAT program is too low, companies are likely to suffer from security incidents and data
breaches and to incur a substantial loss. However, the allocation of a high budget for a CSAT
program is not a guarantee that security incidents will not happen to the company. Optimal
resource allocation for security is often affected by uncertain variables, which can lead to
disparities in resource allocation decisions. Companies must be realistic and develop a clear
628 strategy for funding CSAT programs with a focus on training their employees to handle the
most common security threats at a lower level of security.
6. Conclusion
Cybersecurity risks that result in a data breach are business risks that damage organizations’
finances and reputations. As a result of increasing breaches, many organizations are
prepared to make substantial investments in cybersecurity, and cybersecurity budgets have
generally been growing in many organizations (Moore et al., 2016).
Since workers are often the weakest link in an organization’s cybersecurity chain, Cybersecurity
organizations must develop an effective CSAT program that can motivate their employees to awareness
stay alert and to avoid breaches. To that end, an adequate annual budget for CSAT programs
needs to include funding for training resources, consulting, testing, advertising, software/
training
hardware and/or professional services costs. However, providing adequate resources to build programs
and to maintain an effective CSAT program is not an easy task, since cybersecurity
prevention is constantly changing as it learns to keep up with new cybersecurity breaches.
Companies must understand the costs and benefits associated with CSAT programs and 629
must develop a clear strategy for funding such programs.
Our research makes significant contributions to the existing literature by establishing a
formal framework for conducting a cost–benefit analysis of CSAT programs with different
projected costs and benefits. In particular, we differentiate three types of CSAT programs
(constant, complementary and compensatory) in terms of their costs and four types (ineffective,
consistent, increasing and diminishing) of CSAT programs with respect to their benefits. In
our framework, the projected cost increases with the degree of security for a complementary
CSAT program, decreases for a compensatory CSAT program, and remains the same for a
constant CSAT program. In terms of the projected benefit, a CSAT program with an
ineffective benefit does not reduce any failure cost, a CSAT program with a consistent benefit
reduces the same amount of failure cost at every degree of security, a CSAT program with an
increasing benefit reduces more of a company’s failure cost at a higher degree of security, and
a CSAT program with a diminishing benefit decreases more of the failure cost at a lower
degree of security.
In addition, we investigate the impact of CSAT programs with different costs and benefits
on a company’s optimal degree of security. Our findings indicate that the benefit of a CSAT
program with different types of cost plays a disparate role in helping companies keep,
upgrade or lower their existing degrees of security. If a company is to implement a CSAT
program with a projected consistent cost and a constant benefit, the optimal degree of
security will remain the same. A CSAT program with a compensatory cost will help a
company move to a higher level of security since the company can take advantage of such a
program to incur a lower cost at a higher security level, whereas a CSAT program with a
complementary cost can significantly reduce a company’s willingness to move to a higher
security level as the company would have to spend additional expenses on cybersecurity
training at a higher level.
Although our research makes valuable contributions to the literature and provides
useful insights to the practitioners, it is limited by its theoretical basis. Our cost–benefit
analysis does not consider the impact of CSAT programs on a company’s total
cybersecurity cost because companies with different sizes, or in diverse settings, may vary
significantly in their anticipation and failure costs. Although anticipation costs may be
measured based on companies’ investment in cybersecurity systems or other safeguards, it
is difficult to objectively assess the failure costs of different companies. Depending on the
actual amount of the failure and anticipation costs, the total cybersecurity cost may either
increase or decrease after a CSAT program is implemented. Future research should
contact both large and small organizations to conduct detailed case studies related to their
investment in CSAT programs, to generate managerial insights that can be widely
applicable for the budgeting of enterprise CSAT programs. Such case studies will help to
provide decision support and will help to identify policies that would optimize expected
returns from investments in CSAT programs. Future research should also take into
account the legal and environmental requirements while studying the costs incurred by
implementing personalized CSAT programs to match an individual’s security knowledge,
experience, learning style and learning preferences.
IMDS References
121,3 Abawajy, J. (2014), “User preference of cyber security awareness delivery methods”, Behaviour and
Information Technology, Vol. 33 No. 3, pp. 237-248.
Adams, R. (2018), “Our approach to employee security training”, March 20, available at: https://www.
pagerduty.com/blog/security-training-at-pagerduty/.
Aldawood, H. and Skinner, G. (2019), “Reviewing cyber security social engineering training and
630 awareness programs – pitfalls and ongoing issues”, Future Internet, Vol. 11 No. 3, p. 73.
Bannam, R. (2017), “Cyber scorekeepers: a growing number of ratings firms aim to help companies
and their insurers assess and manage cyber security risks”, Risk Management, Vol. 64 No. 10,
pp. 26-30.
Bojanc, R. and Jerman-Blazic, B. (2008), “An economic modelling approach to information security risk
management”, International Journal of Information Management, Vol. 28 No. 5, pp. 413-422.
Boston Consulting Group (2019), “Mastering cybersecurity with BCG”, available at: https://www.bcg.
com/en-us/capabilities/technology-digital/mastering-cybersecurity.aspx.
Carfagno, D. (2018), “How much should your company invest in cybersecurity?”, November 4,
available at: https://www.blackstratus.com/how-much-should-your-company-invest-in-
cybersecurity/.
Cavusoglu, H., Raghunathan, S. and Yue, W.T. (2008), “Decision-theoretic and game-theoretic
approaches to IT security investment”, Journal of Management Information Systems, Vol. 25
No. 2, pp. 281-304.
Chatterjee, D. (2019), “Should executives go to jail over cyber security breaches?”, Journal of
Organizational Computing and Electronic Commerce, Vol. 29 No. 1, pp. 1-3.
Chengalur-Smith, I. and Abraham, S. (2019), “Evaluating the effectiveness of learner controlled
information security training”, Computers and Security, Vol. 87, 101586.
Conteh, N.Y. and Schmick, P.J. (2016), “Cyber security: risks, vulnerabilities and countermeasures to
prevent social engineering attacks”, International Journal of Advanced Computer Research,
Vol. 6 No. 23, p. 31.
Cordes, J.J. (2011), “An overview of the economics of cybersecurity and cybersecurity policy”, George
Washington University, Cybersecurity Policy Research Institute Report, pp. 1-18.
De Maggio, M.C., Mastrapasqua, M., Tesei, M., Chittaro, A. and Setola, R. (2019), “How to improve the
security awareness in complex organizations”, European Journal of Scientific Research, Vol. 4,
pp. 33-49.
Dimov, D. and Juzenaite, R. (2015), “Budgeting for security awareness: who – what – when – where –
why – how much”, available at: https://resources.infosecinstitute.com/budgeting-for-security-
awareness-who-what-when-where-why-how-much/#gref.
Disparte, D. and Furlow, C. (2017), “The best cybersecurity investment you can make is better
training”, Harvard Business Review, available at: https://hbr.org/2017/05/the-best-cybersecurity-
investment-you-can-make-is-better-training.
Dodge, R., Coronges, K. and Rovira, E. (2012), “Empirical benefits of training to phishing
susceptibility”, IFIP International Information Security Conference, June, Springer, Berlin,
Heidelberg, pp. 457-464.
Ekelund, S. and Iskoujina, Z. (2019), “Cybersecurity economics–balancing operational security
spending”, Information Technology and People, Vol. 32 No. 5, pp. 1318-1342.
Epstein, J. (2014), “Phishing our employees”, IEEE Security and Privacy, Vol. 12 No. 3, pp. 3-4.
Fagade, T., Maraslis, K. and Tryfonas, T. (2017), “Towards effective cybersecurity resource allocation:
the Monte Carlo predictive modelling approach”, International Journal of Critical
Infrastructures, Vol. 13 Nos 2-3, pp. 152-167.
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C. and Smeraldi, F. (2016), “Decision support Cybersecurity
approaches for cyber security investment”, Decision Support Systems, Vol. 86, pp. 13-23.
awareness
Freund, J. and Jones, J. (2014), Measuring and Managing Information Risk: A FAIR Approach,
Butterworth-Heinemann, Oxford.
training
Gordon, L.A. and Loeb, M.P. (2002), “The economics of information security investment”, ACM
programs
Transactions on Information and System Security, Vol. 5 No. 4, pp. 438-457.
Gordon, L.A. and Loeb, M.P. (2006), Managing Cybersecurity Resources: A Cost-Benefit Analysis, Vol. 1, 631
McGraw-Hill, New York.
Gordon, L.A., Loeb, M.P. and Zhou, L. (2020), “Integrating cost–benefit analysis into the NIST cybersecurity
framework via the Gordon–Loeb model”, Journal of Cybersecurity, Vol. 6 No. 1, tyaa005.
Gross, A. (2018), “Effective security training requires change in employee behavior”, available at:
https://www.hitechanswers.net/effective-security-training-requires-change-in-employee-
behavior/.
He, W., Ash, I., Anwar, M., Li, L., Yuan, X., Xu, L. and Tian, X. (2019), “Improving employees’
intellectual capacity for cybersecurity through evidence-based malware training”, Journal of
Intellectual Capital, Vol. 21 No. 2, pp. 203-213.
He, W. and Zhang, Z. (2019), “Enterprise cybersecurity training and awareness programs:
recommendations for success”, Journal of Organizational Computing and Electronic
Commerce, Vol. 29 No. 4, pp. 249-257.
Herath, T., Herath, H. and Bremser, W.G. (2010), “Balanced scorecard implementation of security
strategies: a framework for IT security performance management”, Information Systems
Management, Vol. 27 No. 1, pp. 72-81.
Hua, J. and Bapna, S. (2013), “The economic impact of cyber terrorism”, The Journal of Strategic
Information Systems, Vol. 22 No. 2, pp. 175-186.
Huang, C.D., Hu, Q. and Behara, R.S. (2008), “An economic analysis of the optimal information security
investment in the case of a risk-averse”, International Journal of Production Economics, Vol. 114
No. 2, pp. 793-804.
IBM (2019), “IBM X-Force threat intelligence index 2019”, available at: https://www.ibm.com/
downloads/cas/ZGB3ERYD.
Jalali, M.S., Siegel, M. and Madnick, S. (2019), “Decision-making and biases in cybersecurity capability
development: evidence from a simulation game experiment”, The Journal of Strategic
Information Systems, Vol. 28 No. 1, pp. 66-82.
Jerman-Blazic, B. (2012), “Quantitative model for economic analyses of information security
investment in an enterprise information system”, Organizacija, Vol. 45 No. 6, pp. 276-288.
Jin, G., Tu, M., Kim, T.H., Heffron, J. and White, J. (2018), “Game based cybersecurity training for high
school students”, Proceedings of the 49th ACM Technical Symposium on Computer Science
Education, pp. 68-73.
Khan, H.U. and AlShare, K.A. (2019), “Violators versus non-violators of information security measures
in organizations – a study of distinguishing factors”, Journal of Organizational Computing and
Electronic Commerce, Vol. 29 No. 1, pp. 4-23.
KnowBe4 (2019), “The return on investment (ROI) of security awareness training”, available at:
https://www.knowbe4.com/resources/security-awareness-training-roi/.
Kweon, E., Lee, H., Chai, S. and Yoo, K. (2019), “The utility of information security training and education
on cybersecurity incidents: an empirical evidence”, Information Systems Frontiers, pp. 1-13.
Li, L., He, W., Xu, L., Ash, I., Anwar, M. and Yuan, X. (2019), “Investigating the impact of
cybersecurity policy awareness on employees’ cybersecurity behavior”, International Journal of
Information Management, Vol. 45, pp. 13-24.
Lucideus Incorporated (2020), “SAFE security assessment framework for enterprise”, available at:
https://www.lucideus.com/safe.html.
IMDS Mejia, G. (2019), “Examining the impact of major security breaches on organizational performance:
should investing in cybersecurity be a requirement for companies?”, Doctoral dissertation,
121,3 Utica College.
Moore, T., Dynes, S. and Chang, F.R. (2016), “Identifying how firms manage cybersecurity
investment”, available at: https://cpb-us-w2.wpmucdn.com/blog.smu.edu/dist/e/97/files/2015/10/
SMU-IBM.pdf.
Nadkarni, S. (2012), “Security awareness training made easy”, available at: https://www.
632 computerweekly.com/tip/Security-awareness-training-made-easy.
Njilla, L.L., Kamhoua, C.A., Kwiat, K.A., Hurley, P. and Pissinou, N. (2017), “Cyber security resource
allocation: a Markov decision process approach”, 2017 IEEE 18th International Symposium on
High Assurance Systems Engineering (HASE), January, IEEE, pp. 49-52.
Norris, D.F., Mateczun, L., Joshi, A. and Finin, T. (2019), “Cyberattacks at the grass roots: American
local governments and the need for high levels of cybersecurity”, Public Administration Review,
Vol. 79 No. 6, pp. 895-904.
Pandasecurity (2017), “3 ways to minimize ‘security fatigue’ among employees”, available at: https://
www.pandasecurity.com/mediacenter/tips/minimize-security-fatigue/.
Pattinson, M., Butavicius, M., Lillie, M., Ciccarello, B., Parsons, K., Calic, D. and McCormac, A. (2019),
“Matching training to individual learning styles improves information security awareness”,
Information and Computer Security, Vol. 28 No. 1, pp. 1-14.
Piccoli, G. and Pigni, F. (2019), Information Systems for Managers, Prospect Press, Burlington, VT.
Ponnusamy, V., Selvam, L.M.P. and Rafique, K. (2020), “Cybersecurity governance on social
engineering awareness”, in Vasaki, P., Khalid, R. and Noor, Z. (Eds), Employing Recent
Technologies for Improved Digital Governance, IGI Global, pp. 210-236.
Qian, X., Liu, X., Pei, J. and Pardalos, P.M. (2018), “A new game of information sharing and security
investment between two allied firms”, International Journal of Production Research, Vol. 56
No. 12, pp. 4069-4086.
Rue, R. and Pfleeger, S.L. (2009), “Making the best use of cybersecurity economic models”, IEEE
Security and Privacy, Vol. 7 No. 4, pp. 52-60.
Santora, N. (2019), “How to buy a security awareness training program”, January 11, available at:
https://securityboulevard.com/2019/01/how-to-buy-a-security-awareness-training-program/.
Schmidt, M.B., Johnston, A.C., Arnett, K.P., Chen, J.Q. and Li, S. (2008), “A cross-cultural comparison of
US and Chinese computer security awareness”, Journal of Global Information Management,
Vol. 16 No. 2, pp. 91-103.
Shao, X., Siponen, M. and Liu, F. (2020), “Shall we follow? Impact of reputation concern on information
security managers’ investment decisions”, Computers and Security, Vol. 97, 101961.
Shaw, R.S., Chen, C.C., Harris, A.L. and Huang, H.J. (2009), “The impact of information richness on
information security awareness training effectiveness”, Computers and Education, Vol. 52,
pp. 92-100.
Shin, D. (2010), “The effects of trust, security and privacy in social networking: a security-based
approach to understand the pattern of adoption”, Interacting with Computers, Vol. 22 No. 5,
pp. 428-438, doi: 10.1016/j.intcom.2010.05.001.
Shin, D. and Ahn, D. (2013), “Associations between game use and cognitive empathy: a cross-
generational study”, Cyberpsychology, Behavior, and Social Networking, Vol. 16 No. 8,
pp. 599-603, doi: 10.1089/cyber.2012.0639.
Srinidhi, B., Yan, J. and Tayi, G.K. (2015), “Allocation of resources to cyber-security: the effect of
misalignment of interest between managers and investors”, Decision Support Systems, Vol. 75,
pp. 49-62.
Teh, P., Ahmed, P.K. and D’Arcy, J. (2015), “What drives information security policy violations among Cybersecurity
banking employees?: insights from neutralization and social exchange theory”, Journal of Global
Information Management, Vol. 23 No. 1, pp. 44-64, doi: 10.4018/jgim.2015010103. awareness
Tschakert, K.F. and Ngamsuriyaroj, S. (2019), “Effectiveness of and user preferences for security
training
awareness training methodologies”, Heliyon, Vol. 5 No. 6, e02010. programs
Valentine, J.A. (2006), “Enhancing the employee security awareness model”, Computer Fraud and
Security, Vol. 2006 No. 6, pp. 17-19.
633
Wang, J., Chaudhury, A. and Rao, H.R. (2008), “A value-at-risk approach to information security
investment”, Information Systems Research, Vol. 19 No. 1, pp. 106-120.
Weish€aupl, E., Yasasin, E. and Schryen, G. (2018), “Information security investments: an exploratory
multiple case study on decision-making, evaluation and learning”, Computers and Security,
Vol. 77, pp. 807-823.
Willemson, J. (2006), “On the Gordon and Loeb model for information security investment”, in The
Fifth Workshop on Economics of Information Security (WEIS), University of Cambridge,
available at: http://www.econinfosec.org/archive/weis2006/docs/12.pdf.
Williams, E.J., Hinds, J. and Joinson, A.N. (2018), “Exploring susceptibility to phishing in the
workplace”, International Journal of Human-Computer Studies, Vol. 120, pp. 1-13.
Winkler, I. (2018), The Fundamental Flaw in Security Awareness Programs, July 19, InformationWeek
IT Network, available at: https://www.darkreading.com/endpoint/the-fundamental-flaw-in-
security-awareness-programs/a/d-id/1332301.
Yaokumah, W., Walker, D.O. and Kumah, P. (2019), “SETA and security behavior: mediating role of
employee relations, monitoring, and accountability”, Journal of Global Information
Management, Vol. 27 No. 2, pp. 102-121, doi: 10.4018/JGIM.2019040106.
Further reading
Chen, R., Rao, H.R. and Valecha, R. (2016), “Response to the office of personnel management data
breaches: a conceptual exploration”, The 2016 Americas Conference on Information
Systems, 2016.
Dobran, B. (2018), “Start a security awareness training program your staff can’t ignore”, available at:
https://phoenixnap.com/blog/security-awareness-training-program.
Huang, C.D., Behara, R.S. and Goo, J. (2014), “Optimal information security investment in a healthcare
information exchange: an economic analysis”, Decision Support Systems, Vol. 61, pp. 1-11.
IBM (2014), “IBM security services 2014 cyber security intelligence index”, available at: http://media.
scmagazine.com/documents/82/ibm_cyber_security_intelligenc_20450.pdf.
Katz, I. (2017), “Cybersecurity awareness training: how to improve employee security behavior”,
available at: https://blog.dashlane.com/cybersecurity-awareness-training-how-to/.
Rhee, H.S., Ryu, Y. and Kim, C.T. (2005), “I am fine but you are not: optimistic bias and illusion of
control on information security”, ICIS 2005 Proceedings, Vol. 32.
Schwarzer, R. (1994), “Optimism, vulnerability, and self-beliefs as health-related cognitions: a
systematic overview”, Psychology and Health, Vol. 9 No. 3, pp. 161-180.
Stilgherrian (2018), “Security training is useless unless it changes behaviours”, ZDNet, April 3, available
at: https://www.zdnet.com/article/security-training-is-useless-unless-it-changes-behaviours/.
IMDS Appendix
121,3
A. Proof of Lemma 1
Proof: The total cost of cybersecurity for a company with no cybersecurity training and awareness
0 0 0
program is CðsÞ ¼ aðsÞ þ f ðsÞ. The first derivative of CðsÞ with respect to s is C ðsÞ ¼ a ðsÞ þ f ðsÞ.
0 0
* *
Since a ðsÞ > 0 and f ðsÞ < 0, there exists an optimal degree s of security which makes Cðs Þ ¼ 0.
a' (s)
–fY' (s)
–fX' (s)
Figure A1.
Proof of Proposition 2
S*X S*Y Degree of Security
C. Proof of Proposition 3
0 0
Proof: If aX ðsÞ > aY ðsÞ, ∀s ∈ ½0; ∞Þ, between company X and Y, then s*X < s*Y , as shown in Figure A2.
Derivative
dY(S)
dX(S)
f '(s)
Figure A2.
S*Y
Proof of Proposition 3
S*X Degree of Security
D. Proof of Proposition 4 Cybersecurity
0
Proof: For a CSAT program with an ineffective or consistent benefit, the −f ðsÞ line does not change in
Figure A3 after the CSAT program is implemented. When the CSAT program has a constant, awareness
0
complementary, or compensatory cost, the a ðsÞ line will remain unchanged, shift upward, or shift training
downward, so the optimal degree of security will remain unchanged, decrease, or increase. programs
635
Derivative
f ' (s)
E. Proof of Proposition 5 0
Proof: For a CSAT program with an increasing benefit, the −f ðsÞ line will shift upward, as shown in
Figure A4, after the CSAT 0
program is implemented. When the CSAT program has a constant or
compensatory cost, the a ðsÞ line will remain unchanged or will shift downward, resulting in an
0
increased optimal degree of security. When the CSAT program has a complementary cost, the a ðsÞ line
will shift upward, so the optimal degree of security may remain the same, increase, or decrease,
0 0
depending on the changes of the −f ðsÞ and a ðsÞ lines.
Derivative
–f ' (s)
Figure A4.
Proof of Proposition 5
S* Degree of Security
F. Proof of Proposition 6
0
Proof: For a CSAT program with a diminishing benefit, the −f ðsÞ line will shift downward, as shown in
Figure A5, after the CSAT program is implemented. When the CSAT program has a constant or
0
complementary cost, the a ðsÞ line will remain unchanged or will shift upward, resulting in a decreased
0
IMDS optimal degree of security. When the CSAT program has a compensatory cost, the a ðsÞ line will shift
downward, so the optimal degree of security may remain the same, increase or decrease, depending on
121,3 0 0
the changes of the −f ðsÞ and a ðsÞ lines.
Derivative
636
a' (s) complementary
f ' (s)
Figure A5.
Proof of Proposition 6 Degree of Security
S*
Corresponding author
Zuopeng (Justin) Zhang can be contacted at: justin.zhang@unf.edu
For instructions on how to order reprints of this article, please visit our website:
www.emeraldgrouppublishing.com/licensing/reprints.htm
Or contact us for further details: permissions@emeraldinsight.com