Assessment of cybersecurity of organizations: An empirical study of Czech and Slovak organizations

Authors

DOI:

https://doi.org/10.15549/jeecar.v11i3.1666

Keywords:

Cyber Security, Cybercrime Awareness, ISMS, Organizational Learning, ISO 27001

Abstract

The purpose of this research is to evaluate how companies approach cybersecurity, which measures the companies set, and how it is reflected in relation to organizational learning. A questionnaire was distributed electronically among 124 IT and IS professionals working in companies based in the Czech and Slovak Republic. Hypotheses were tested using the chi-square test of independence, the Mann–Whitney U test, and the Pearson correlation coefficient. The results depict that cybersecurity is a fundamental topic for most companies. Unless companies declare the importance of cybersecurity, they do not tend to set and use security rules unless they are not under security laws. Research shows that costs for cybersecurity are variable, not fixed, and are in correlation with the size of the company and the turnover.

Author Biographies

Kateřina Petrová, University of Technology Brno, Check Republic

Katerina Petrova is a doctoral student at the Department of Business and Management since 2019. She has been an assistant in this department since 2022. Her professional interests include management, organizational culture, and digital transformation.

Jan Spatenka, University of Technology Brno, Check Republic

Jan Spatenka is a doctoral student at the Department of Informatics. He has been part of the research team since 2020. His expertise is in information systems implementation and project management, including agile and scaled agile frameworks. He is also involved in the research of teal organizations.

Lukas Vaclavik, University of Technology Brno, Check Republic

Lukas Vaclavik has been a doctoral student at the Faculty of Business and Management, Department of Informatics, since 2020. His research focuses mainly on cybersecurity and its economic aspects.

References

Alanazi, M., Freeman, M., & Tootell, H. (2022). Exploring the factors that influence the cybersecurity behaviors of young adults. Computers in Human Behavior, 136, 107376. https://doi.org/10.1016/j.chb.2022.107376 DOI: https://doi.org/10.1016/j.chb.2022.107376

Anon. (2015). Cybersecurity Fundamentals Study Guide, USA: ISACA.

Argote, L., & Miron-Spektor, E. (2011). Organizational Learning: From Experience to Knowledge. Organization Science, 22(5), 1123–1137. https://doi.org/10.1287/orsc.1100.0621 DOI: https://doi.org/10.1287/orsc.1100.0621

Arsenault, M. (2011). R. K. Yin. (2012). Applications of Case Study Research. Thousand Oaks, CA : Sage. 231 pages. Canadian Journal of Program Evaluation, 26(2), 104–107. https://doi.org/10.3138/cjpe.26.008 DOI: https://doi.org/10.3138/cjpe.26.008

Bandura, A. (1977). Social learning theory, Englewood Cliffs, N.J.: Prentice Hall.

Brynjolfsson, E. and McAfee, A. (2014), The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies, Norton, New York, NY.

Hornungova, J. (2022). Human resource management in work-life balance issues in the context of Covid-19 Pandemic: an Interpretative Phenomenological Analysis. Journal of Interdisciplinary Research, 12(2), 60-64.

Lessig, L. (2004). Free culture: How big media uses technology and the law to Lock Down Culture and control creativity. Penguin.

Mayer, P., Kunz, A., & Volkamer, M. (2017). Reliable Behavioural Factors in the Information Security Context. Proceedings of the 12th International Conference on Availability, Reliability and Security. https://doi.org/10.1145/3098954.3098986 DOI: https://doi.org/10.1145/3098954.3098986

McHugh, M. L. (2013). The Chi-square test of independence. Biochemia Medica, 143–149. https://doi.org/10.11613/bm.2013.018 DOI: https://doi.org/10.11613/BM.2013.018

McKight, P. E., & Najab, J. (2010). Kruskal‐Wallis Test. The Corsini Encyclopedia of Psychology, 1–1. Portico. https://doi.org/10.1002/9780470479216.corpsy0491 DOI: https://doi.org/10.1002/9780470479216.corpsy0491

Milichovský, F., & Kuba, K. (2023). Expected Impact of Industry 4.0 on Employment in Selected Professions in the Czech Republic and Germany. Processes, 11(2), 516. MDPI AG. https://doi.org/10.3390/pr11020516 DOI: https://doi.org/10.3390/pr11020516

Molnár, Z. et al. (2012). Pokročilé metody vědecké práce, [Zeleneč]: Profess Consulting.

Nguegang Tewamba, H., Robert Kala Kamdjoug, J., Bell Bitjoka, G., Fosso Wamba, S., & Nkondock Mi Bahanag, N. (2019). Effects of Information Security Management Systems on Firm Performance. American Journal of Operations Management and Information Systems, 4(3), 99. https://doi.org/10.11648/j.ajomis.20190403.15 DOI: https://doi.org/10.11648/j.ajomis.20190403.15

Nonaka, I., & Takeuchi, H. (1995). The Knowledge-Creating Company. https://doi.org/10.1093/oso/9780195092691.001.0001 DOI: https://doi.org/10.1093/oso/9780195092691.001.0001

Schober, P., Boer, C., & Schwarte, L. A. (2018). Correlation Coefficients: Appropriate Use and Interpretation. Anesthesia & Analgesia, 126(5), 1763–1768. https://doi.org/10.1213/ane.0000000000002864 DOI: https://doi.org/10.1213/ANE.0000000000002864

Thanh Nguyen, L., Tat, T. D., & Dang, M. H. (2023). The impacts of organizational culture on the organizational commitment: A case study of Vinaphone’s business centers in Southwest Vietnam. Journal of Eastern European and Central Asian Research (JEECAR), 10(2), 213–226. https://doi.org/10.15549/jeecar.v10i2.976 DOI: https://doi.org/10.15549/jeecar.v10i2.976

von Solms, B., & von Solms, R. (2018). Cybersecurity and information security – what goes where? Information & Computer Security, 26(1), 2–9. https://doi.org/10.1108/ics-04-2017-0025 DOI: https://doi.org/10.1108/ICS-04-2017-0025

von Solms, R. (1998). Information security management (3): the Code of Practice for Information Security Management (BS 7799). Information Management & Computer Security, 6(5), 224–225. https://doi.org/10.1108/09685229810240158 DOI: https://doi.org/10.1108/09685229810240158

Zheng, X. & Sun, A. (2022). Digitalization and internationalization: a study of the manufacturing industry in China. Transformations in Business & Economics, 21(2B), 772-791.

Downloads

Published

2024-06-04

How to Cite

Petrová, K., Spatenka, J., & Vaclavik, L. (2024). Assessment of cybersecurity of organizations: An empirical study of Czech and Slovak organizations. Journal of Eastern European and Central Asian Research (JEECAR), 11(3), 668–682. https://doi.org/10.15549/jeecar.v11i3.1666