Skip to main navigation Skip to search Skip to main content

When Growth Opportunities Meet Cybersecurity Risk: A Topic Modeling Approach

  • Tracie S. Frost
  • , Muktak Tripathi
  • , Yunhui Zhuang

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

Abstract

Using textual analysis to capture firms' business prospects, this paper examines whether firms with high growth prospects are more vulnerable to cybersecurity risk, whether breaches impact growth firms' investment cycles, and how growth firms can protect against data breaches. Our findings suggest that firms with high growth prospects are greater targets for data breaches and provide compelling evidence that the particular firm characteristics that are hallmarks of growth firms may open those firms to greater cybersecurity risk. Further, our findings suggest that high growth firms maintain a robust investment cycle, despite experiencing a data breach, consistent with the growth mindset that these firms adopt. Finally, we provide evidence that growth firms with higher IT awareness can better defend themselves from cyber attacks.

Original languageEnglish
Title of host publicationProceedings of the 57th Annual Hawaii International Conference on System Sciences, HICSS 2024
EditorsTung X. Bui
PublisherIEEE Computer Society
Pages6128-6137
Number of pages10
ISBN (Electronic)9780998133171
Publication statusPublished - 2024
Event57th Annual Hawaii International Conference on System Sciences, HICSS 2024 - Honolulu, United States
Duration: 3 Jan 20246 Jan 2024

Publication series

NameProceedings of the Annual Hawaii International Conference on System Sciences
ISSN (Print)1530-1605

Conference

Conference57th Annual Hawaii International Conference on System Sciences, HICSS 2024
Country/TerritoryUnited States
CityHonolulu
Period3/01/246/01/24

Keywords

  • business prospect
  • data breach
  • high growth opportunity
  • IT awareness
  • IT investment

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'When Growth Opportunities Meet Cybersecurity Risk: A Topic Modeling Approach'. Together they form a unique fingerprint.

Cite this