Assessment of cybersecurity of organizations: An empirical study of Czech and Slovak organizations
DOI:
https://doi.org/10.15549/jeecar.v11i3.1666Keywords:
Cyber Security, Cybercrime Awareness, ISMS, Organizational Learning, ISO 27001Abstract
The purpose of this research is to evaluate how companies approach cybersecurity, which measures the companies set, and how it is reflected in relation to organizational learning. A questionnaire was distributed electronically among 124 IT and IS professionals working in companies based in the Czech and Slovak Republic. Hypotheses were tested using the chi-square test of independence, the Mann–Whitney U test, and the Pearson correlation coefficient. The results depict that cybersecurity is a fundamental topic for most companies. Unless companies declare the importance of cybersecurity, they do not tend to set and use security rules unless they are not under security laws. Research shows that costs for cybersecurity are variable, not fixed, and are in correlation with the size of the company and the turnover.
References
Alanazi, M., Freeman, M., & Tootell, H. (2022). Exploring the factors that influence the cybersecurity behaviors of young adults. Computers in Human Behavior, 136, 107376. https://doi.org/10.1016/j.chb.2022.107376 DOI: https://doi.org/10.1016/j.chb.2022.107376
Anon. (2015). Cybersecurity Fundamentals Study Guide, USA: ISACA.
Argote, L., & Miron-Spektor, E. (2011). Organizational Learning: From Experience to Knowledge. Organization Science, 22(5), 1123–1137. https://doi.org/10.1287/orsc.1100.0621 DOI: https://doi.org/10.1287/orsc.1100.0621
Arsenault, M. (2011). R. K. Yin. (2012). Applications of Case Study Research. Thousand Oaks, CA : Sage. 231 pages. Canadian Journal of Program Evaluation, 26(2), 104–107. https://doi.org/10.3138/cjpe.26.008 DOI: https://doi.org/10.3138/cjpe.26.008
Bandura, A. (1977). Social learning theory, Englewood Cliffs, N.J.: Prentice Hall.
Brynjolfsson, E. and McAfee, A. (2014), The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies, Norton, New York, NY.
Hornungova, J. (2022). Human resource management in work-life balance issues in the context of Covid-19 Pandemic: an Interpretative Phenomenological Analysis. Journal of Interdisciplinary Research, 12(2), 60-64.
Lessig, L. (2004). Free culture: How big media uses technology and the law to Lock Down Culture and control creativity. Penguin.
Mayer, P., Kunz, A., & Volkamer, M. (2017). Reliable Behavioural Factors in the Information Security Context. Proceedings of the 12th International Conference on Availability, Reliability and Security. https://doi.org/10.1145/3098954.3098986 DOI: https://doi.org/10.1145/3098954.3098986
McHugh, M. L. (2013). The Chi-square test of independence. Biochemia Medica, 143–149. https://doi.org/10.11613/bm.2013.018 DOI: https://doi.org/10.11613/BM.2013.018
McKight, P. E., & Najab, J. (2010). Kruskal‐Wallis Test. The Corsini Encyclopedia of Psychology, 1–1. Portico. https://doi.org/10.1002/9780470479216.corpsy0491 DOI: https://doi.org/10.1002/9780470479216.corpsy0491
Milichovský, F., & Kuba, K. (2023). Expected Impact of Industry 4.0 on Employment in Selected Professions in the Czech Republic and Germany. Processes, 11(2), 516. MDPI AG. https://doi.org/10.3390/pr11020516 DOI: https://doi.org/10.3390/pr11020516
Molnár, Z. et al. (2012). Pokročilé metody vědecké práce, [Zeleneč]: Profess Consulting.
Nguegang Tewamba, H., Robert Kala Kamdjoug, J., Bell Bitjoka, G., Fosso Wamba, S., & Nkondock Mi Bahanag, N. (2019). Effects of Information Security Management Systems on Firm Performance. American Journal of Operations Management and Information Systems, 4(3), 99. https://doi.org/10.11648/j.ajomis.20190403.15 DOI: https://doi.org/10.11648/j.ajomis.20190403.15
Nonaka, I., & Takeuchi, H. (1995). The Knowledge-Creating Company. https://doi.org/10.1093/oso/9780195092691.001.0001 DOI: https://doi.org/10.1093/oso/9780195092691.001.0001
Schober, P., Boer, C., & Schwarte, L. A. (2018). Correlation Coefficients: Appropriate Use and Interpretation. Anesthesia & Analgesia, 126(5), 1763–1768. https://doi.org/10.1213/ane.0000000000002864 DOI: https://doi.org/10.1213/ANE.0000000000002864
Thanh Nguyen, L., Tat, T. D., & Dang, M. H. (2023). The impacts of organizational culture on the organizational commitment: A case study of Vinaphone’s business centers in Southwest Vietnam. Journal of Eastern European and Central Asian Research (JEECAR), 10(2), 213–226. https://doi.org/10.15549/jeecar.v10i2.976 DOI: https://doi.org/10.15549/jeecar.v10i2.976
von Solms, B., & von Solms, R. (2018). Cybersecurity and information security – what goes where? Information & Computer Security, 26(1), 2–9. https://doi.org/10.1108/ics-04-2017-0025 DOI: https://doi.org/10.1108/ICS-04-2017-0025
von Solms, R. (1998). Information security management (3): the Code of Practice for Information Security Management (BS 7799). Information Management & Computer Security, 6(5), 224–225. https://doi.org/10.1108/09685229810240158 DOI: https://doi.org/10.1108/09685229810240158
Zheng, X. & Sun, A. (2022). Digitalization and internationalization: a study of the manufacturing industry in China. Transformations in Business & Economics, 21(2B), 772-791.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Kateřina Petrová, Jan Spatenka, Lukas Vaclavik
This work is licensed under a Creative Commons Attribution 4.0 International License.
The JEECAR journal allows the author(s) to hold the copyright and publishing rights of their own manuscript without restrictions.
This journal applies the Creative Attribution Common License to works we publish, and allows reuse and remixing of its content, in accordance with a CC-BY 4.0 license.
Authors are free to: Share — copy and redistribute the material in any medium or format and Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Under the following terms: Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
No additional restrictions — The author may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
The JEECAR Journal is committed to the editorial principles of all aspects of publication ethics and publication malpractice as assigned by the Committee on Public Ethics.