Campbell, K., Gordon, L. A., Loeb, M. P., & Zhou, L.
(2003). The economic cost of publicly announced
information security breaches: Empirical evidence from
the stock market. Journal of Computer Security, 11(3),
431–448.
Chau, P. Y., & Tam, K. Y. (2000). Organizational adoption
of open systems: A ‘technology-push, need-
pull’perspective. Information & Management, 37(5),
229–239.
Cram, W. A., Proudfoot, J. G., & D’arcy, J. (2017).
Organizational information security policies: A review
and research framework. European Journal of
Information Systems, 26(6), 605–641.
Evans, M., Maglaras, L. A., He, Y., & Janicke, H. (2016).
Human behaviour as an aspect of cybersecurity
assurance. Security and Communication Networks,
9(17), 4667–4679.
Gauvin, S., & Sinha, R. K. (1993). Innovativeness in
industrial organizations: A two-stage model of
adoption. International Journal of Research in
Marketing, 10(2), 165–183.
Higgs, J. L., Pinsker, R. E., Smith, T. J., & Young, G. R.
(2016). The Relationship between Board-Level
Technology Committees and Reported Security
Breaches. Journal of Information Systems, 30(3), 79–
98. https://doi.org/10.2308/isys-51402
Horne, C. A., Maynard, S. B., & Ahmad, A. (2017).
Organisational information security strategy: Review,
discussion and future research. Australasian Journal of
Information Systems, 21.
IBM, & Ponemon Institute. (2020). Cost of a Data Breach
Report 2020 Highlights. 1.
Insurance Bureau of Canada. (2019). Small Businesses in
Canada Vulnerable to Cyber Attacks (p. 16).
http://assets.ibc.ca/Documents/Cyber-Security/IBC-
Cyber-Security-Poll.pdf
Kannan, K., Rees, J., & Sridhar, S. (2007). Market reactions
to information security breach announcements: An
empirical analysis. International Journal of Electronic
Commerce, 12(1), 69–91.
Kauspadiene, L., Cenys, A., Goranin, N., Tjoa, S., &
Ramanauskaite, S. (2017). High-Level Self-Sustaining
Information Security Management Framework. Baltic
Journal of Modern Computing, 5(1), 107–123.
https://doi.org/10.22364/bjmc.2017.5.1.07
Kurpjuhn, T. (2015). The SME security challenge.
Computer Fraud & Security, 2015(3), 5–7.
Langrish, J., Gibbons, M., Evans, W. G., & Jevons, F. R.
(1972). Wealth from knowledge: Studies of innovation
in industry. Springer.
McMurrian, R. C., & Matulich, E. (2016). Building
customer value and profitability with business ethics.
Journal of Business & Economics Research (JBER),
14(3), 83–90.
Munro, H., & Noori, H. (1988). Measuring commitment to
new manufacturing technology: Integrating
technological push and marketing pull concepts. IEEE
Transactions on Engineering Management, 35(2), 63–
70.
Myers, S., & Marquis, D. G. (1969). Successful industrial
innovations: A study of factors underlying innovation in
selected firms (Vol. 69, Issue 17). National Science
Foundation.
Porter, M. E., & Millar, V. E. (1985). How information
gives you competitive advantage.
Posthumus, S., & von Solms, R. (2008). Agency Theory:
Can it be Used to Strengthen IT Governance? In S.
Jajodia, P. Samarati, & S. Cimato (Eds.), Proceedings
of The Ifip Tc 11 23rd International Information
Security Conference (Vol. 278, pp. 687–691). Springer
US. https://doi.org/10.1007/978-0-387-09699-5_46
Ramsbrock, D., Berthier, R., & Cukier, M. (2007). Profiling
Attacker Behavior Following SSH Compromises. In
Proceedings of the International Conference on
Dependable Systems and Networks (p. 124).
https://doi.org/10.1109/DSN.2007.76
Renaud, K., & Weir, G. R. S. (2016). Cybersecurity and the
Unbearability of Uncertainty. 2016 Cybersecurity and
Cyberforensics Conference (CCC), 137–143.
https://doi.org/10.1109/CCC.2016.29
Richardson, V. J., Smith, R. E., & Watson, M. W. (2019).
Much ado about nothing: The (lack of) economic
impact of data privacy breaches. Journal of Information
Systems, 33(3), 227–265.
Sen, R., & Borle, S. (2015). Estimating the contextual risk
of data breach: An empirical approach. Journal of
Management Information Systems, 32(2), 314–341.
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016).
Information security management needs more holistic
approach: A literature review. International Journal of
Information Management, 36(2), 215–225.
https://doi.org/10.1016/j.ijinfomgt.2015.11.009
van de Poel, I. (2020). Core Values and Value Conflicts in
Cybersecurity: Beyond Privacy Versus Security. The
Ethics of Cybersecurity, 45.
Von Bertalanffy, L. (1950). An outline of general system
theory. British Journal for the Philosophy of Science.
Walker, G. H., Stanton, N. A., Salmon, P. M., & Jenkins,
D. P. (2008). A review of sociotechnical systems
theory: A classic concept for new command and control
paradigms. Theoretical Issues in Ergonomics Science,
9(6), 479–499. https://doi.org/10.1080/1463922070
1635470
Wallace, S., Green, K., Johnson, C., Cooper, J., & Gilstrap,
C. (2021). An Extended TOE Framework for
Cybersecurity Adoption Decisions
(SSRN Scholarly
Paper ID 3924446). Social Science Research Network.
https://papers.ssrn.com/abstract=3924446
Yaghmaei, E., van de Poel, I., Christen, M., Gordijn, B.,
Kleine, N., Loi, M., Morgan, G., & Weber, K. (2017).
Canvas white paper 1–cybersecurity and ethics.
Available at SSRN 3091909.
Zmud, R. W. (1984). An examination of “push-pull” theory
applied to process innovation in knowledge work.
Management Science, 30(6), 727–738.