Organizational Strategies and Policies for Implementing Emerging Cybersecurity Technologies
DOI:
https://doi.org/10.29070/m75p4s25Keywords:
Organizational Strategies, Policies, Emerging Cybersecurity Technologies, Technology Implementation, Employee EngagementAbstract
This research uses quantitative data analysis and a qualitative exploratory method to examine how organisations embrace innovative cybersecurity solutions. The study looks at organisational policies, governance frameworks, strategic approaches, and cultural aspects that affect technology adoption using a stratified random sample technique. Structured questionnaires & feedback forms provided the data, which were then analysed using AMOS and SPSS statistical software with an emphasis on structural equation modelling (SEM) to investigate correlations between variables. A supportive organisational culture positively correlates with technology adoption (χ² = 41.179, df = 31, p < 0.001, CMIN/DF = 1.328, RMSEA = 0.034), and organisations with a proactive strategic approach were more successful in implementing cybersecurity technologies (χ² = 50.400, df = 26, p < 0.001, CMIN/DF = 1.938, RMSEA = 0.058). The research also finds that while comprehensive policies influence adoption via efficient training programs, employee involvement completely mediates the association between organisational culture and technology adoption. These findings demonstrate how crucial culture, employee participation, strategic planning, and training are to the successful integration of cybersecurity technology.
Downloads
References
A Mishra, YI Alzoubi, MJ Anwar, A. G. (2022). Attributes impacting cybersecurity policy development: An evidence from seven nations.
Ahmad, A., Desouza, K. C., Maynard, S. B., Naseer, H., & Baskerville, R. L. (2020). How integration of cyber security management and incident response enables organizational learning. Journal of the Association for Information Science and Technology, 71(8), 939–953. https://doi.org/10.1002/asi.24311
Al-alawi, P. A. I. (2020). The Significance of Cybersecurity System in Helping Managing Risk in Banking and Financial Sector. Journal of Xidian University, 14(7). https://doi.org/10.37896/jxu14.7/174
AlDaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F., & Raymond Choo, K. K. (2022). The role of national cybersecurity strategies on the improvement of cybersecurity education. Computers and Security, 119(May). https://doi.org/10.1016/j.cose.2022.102754
Ansari, M. F. (2022). An Effective Cybersecurity Awareness Training Model: First Defense of an Organizational Security Strategy. International Research Journal of Engineering and Technology (IRJET), 9(4), 1–6.
Blomsma, F., Pieroni, M., Kravchenko, M., Pigosso, D. C. A., Hildenbrand, J., Kristinsdottir, A. R., Kristoffersen, E., Shabazi, S., Nielsen, K. D., Jönbrink, A. K., Li, J., Wiik, C., & McAloone, T. C. (2019). Developing a circular strategies framework for manufacturing companies to support circular economy-oriented innovation. Journal of Cleaner Production, 241, 118271. https://doi.org/10.1016/j.jclepro.2019.118271
Camacho, N. G. (2024). The Role of AI in Cybersecurity: Addressing Threats in the Digital Age. Journal of Artificial Intelligence General Science (JAIGS) ISSN:3006-4023, 3(1), 143–154. https://doi.org/10.60087/jaigs.v3i1.75
Fuertes, G., Alfaro, M., Vargas, M., Gutierrez, S., Ternero, R., & Sabattin, J. (2020). Conceptual Framework for the Strategic Management: A Literature Review - Descriptive. Journal of Engineering (United Kingdom), 2020. https://doi.org/10.1155/2020/6253013
Georgiadou, A., Mouzakitis, S., Bounas, K., & Askounis, D. (2022). A Cyber-Security Culture Framework for Assessing Organization Readiness. Journal of Computer Information Systems, 62(3), 452–462. https://doi.org/10.1080/08874417.2020.1845583
Ghelani, D. (2022). Diptiben Ghelani. Cyber Security, Cyber Threats, Implications and Future Perspectives. American Journal of Science, Engineering and Technology, 3(6), 12–19. https://doi.org/10.11648/j.XXXX.2022XXXX.XX
Haroun, M. H., Gohar, N., & Hanna, H. A. (2020). TOE Model: Adoption of Block Chain. The Business and Management Review, 11(01). https://doi.org/10.24052/bmr/v11nu01/art-19
Holovkin, B. M., Tavolzhanskyi, O. V., & Lysodyed, O. V. (2021). Corruption as a Cybersecurity Threat in the New World Order. Connections, 20(2), 75–87. https://doi.org/10.11610/Connections.20.2.07
Huang, K., & Pearlson, K. (2019). For what technology can’t fix: Building a model of organizational cybersecurity culture. Proceedings of the Annual Hawaii International Conference on System Sciences, 2019-January, 6398–6407. https://doi.org/10.24251/hicss.2019.769
Janssen, M., Weerakkody, V., Ismagilova, E., Sivarajah, U., & Irani, Z. (2020). A framework for analysing blockchain technology adoption: Integrating institutional, market and technical factors. International Journal of Information Management, 50, 302–309. https://doi.org/10.1016/j.ijinfomgt.2019.08.012
khalil, M. I. . & A.-R. M. (2023). Advanced Cybersecurity Measures in IT Service Operations and Their Crucial Role in Safeguarding Enterprise Data in a Connected World. Eigenpub Review of Science and Technology, 7(1), 138–158.
Kumar, S., Biswas, B., Bhatia, M. S., & Dora, M. (2021). Antecedents for enhanced level of cyber-security in organisations. Journal of Enterprise Information Management, 34(6), 1597–1629. https://doi.org/10.1108/JEIM-06-2020-0240
Matter, D. I. (2021). Cybersecurity Capacity Building. 9, 190–190. https://doi.org/10.1007/978-3-319-95873-6_300023
Mijwil, M. M., Filali, Y., Aljanabi, M., Bounabi, M., & Al-Shahwani, H. (2023). The Purpose of Cybersecurity Governance in the Digital Transformation of Public Services and Protecting the Digital Environment. Mesopotamian Journal of CyberSecurity, 2023, 1–6. https://doi.org/10.58496/MJCS/2023/001
Montewka, J., Wróbel, K., Mąka, M., Nozdrzykowski, Ł., & Banaś, P. (2020). Quantitative model evaluating the effect of novel decision support tool on the probability of ship-ship accident. Proceedings of the 30th European Safety and Reliability Conference and the 15th Probabilistic Safety Assessment and Management Conference, October. https://doi.org/10.3850/978-981-11-2724-3
Rajan, R., Rana, N. P., Parameswar, N., Dhir, S., Sushil, & Dwivedi, Y. K. (2021). Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management. Technological Forecasting and Social Change, 170. https://doi.org/10.1016/j.techfore.2021.120872
Sallos, M. P., Garcia-Perez, A., Bedford, D., & Orlando, B. (2019). Strategy and organisational cybersecurity: a knowledge-problem perspective. Journal of Intellectual Capital, 20(4), 581–597. https://doi.org/10.1108/JIC-03-2019-0041
Senarak, C. (2021). Port cybersecurity and threat: A structural model for prevention and policy development. Asian Journal of Shipping and Logistics, 37(1), 20–36. https://doi.org/10.1016/j.ajsl.2020.05.001
Shah, V. (2021). Revista Española de Documentación Científica Machine Learning Algorithms for Cybersecurity: Detecting and Preventing Threats. 04, 42–66. https://doi.org/10.5281/zenodo.10779509
Tondeur, J., Scherer, R., Baran, E., Siddiq, F., Valtonen, T., & Sointu, E. (2019). Teacher educators as gatekeepers: Preparing the next generation of teachers for technology integration in education. British Journal of Educational Technology, 50(3), 1189–1209. https://doi.org/10.1111/bjet.12748
Yarovenko, H., Kuzmenko, O., & Stumpo, M. (2020). Strategy for Determining Country Ranking by Level of Cybersecurity. Financial Markets, Institutions and Risks, 4(3), 124–137. https://doi.org/10.21272/fmir.4(3).124-137.2020