1 Introduction

Geopolitical tensions, international conflicts, and wars exacerbated an increasing threat to organizations and society. A more connected world, advances in digitalization, and greater dependence on information systems (IS) leveraged part of the conflicts into cyberspace (Sen et al. 2022). The attackers’ professionalization increased the threat by recruiting IT experts to carry out sophisticated cyber attacks (Kotsias et al. 2023). The steadily increasing number of cyber attacks and data breaches emphasizes this. Figure 1 shows the increased threat situation. US data breaches increased from 2014 to 2023 by 246 % (Clearinghouse 2023). Furthermore, experts believe the expected financial damage caused by cyber attacks will rise from 9 trillion to over 13 trillion US dollars over the next four years (Statista 2024). These statistics usually neglect indirect or immaterial damage, such as increased stress among cybersecurity employees (Singh et al. 2023), the loss of company market value (Rosati et al. 2017; Schatz and Bashroush 2016), deteriorated customer relationships (Janakiraman et al. 2018), and other side effects. As a result, hacker attacks have become a major concern for organizations (Li and Chen 2022).

At the same time, the complexity of software and the resulting number of attack vectors increases, making it even more challenging for companies to defend themselves against cyber attacks. The number of officially reported software vulnerabilities increased by 268% from 2014 to 2023 (MITRE Corporation 2024). In addition, technological advances, such as artificial intelligence (AI), make it easier for attackers to detect vulnerabilities and carry out impactful attacks (National Cyber Security Centre 2024). The Allianz Risk Barometer identifies cyber attacks as the top threat to businesses in 2025 (Allianz Commercial 2025). Therefore, some security experts believe that "Everybody will be hacked; it is just a matter of when, not if" (Holst 2025). The looming threat of a cyber attack and data breach is akin to the sword of Damocles hanging over organizations. In the story of Damocles, a single strand of horsehair suspends the sword above, serving as a powerful metaphor for the critical role of cybersecurity.

Fig. 1
figure 1

Annual number of reported US data breaches (Clearinghouse 2023) and annual number of reported software vulnerabilities (MITRE Corporation 2024)

However, what exactly is cybersecurity? Or what do we, as IS researchers, mean by it? The academic community uses the terms cyber, information-, computer- or IT security interchangeably (Dhillon et al. 2021). In a broader sense, cybersecurity deals with the "(...) protection of a person, organization, or country and their computer information against crime or attacks carried out using the Internet" (Cambridge University Press 2024). The traditional security objectives comprise confidentiality, availability, and integrity of personal and organizational assets and information (Von Solms and Van Niekerk 2013). While computer science research is concerned with detecting attacks and vulnerabilities and developing resilient and secure systems, information systems security (ISS) research focuses on the interface between cybersecurity, information systems, and human behavior (Dhillon et al. 2021). Dhillon et al. (2021) describe ISS as the protection of information handling at the technical, formal, and informal levels. ISS is not solely a technical issue but involves human, organizational, and social dimensions. The socio-technological orientation of BISE positions it as an ideal venue for impactful publications in this dynamic field.

2 The State of ISS Research

The focus of ISS research has been constantly evolving. In a first literature review, Baskerville (1993) describes how ISS evolved from simple security checklists in the 1970 s to logical control designs and data flow diagrams in the late 1980 s. The following literature reviews from Dhillon and Backhouse (2001), Siponen (2005), Siponen and Oinas-Kukkonen (2007) describe the development from a purely technical perspective of ISS research to multi-perspective research, which incorporates behavioral, conceptual, and design-oriented aspects. Siponen and Oinas-Kukkonen (2007) emphasize that an overarching approach that includes human behavior is necessary for a successful organizational security strategy. In a recent literature review, Dhillon et al. (2021) describe ISS research as an interconnected socio-technical concept to understand the interplay between technical and social systems (see Fig. 2). This perspective considers how structures (e.g., policy and regulation frameworks), people (e.g., security behavior and security compliance), technology (e.g., IS security attack and threat detection technologies), and tasks (e.g., system design) interact to avoid cyber attacks and shape ISS research.

Fig. 2
figure 2

Conceptual overview about the central research problems within ISS based on Dhillon et al. (2021)

A central socio-technological problem of ISS research is the duality in secure information systems design (Baskerville 1993; Siponen 2005). Duality refers to the conflict between the functionality and security of information systems (Siponen 2005). Finding the ideal balance between the two conflicting aspects often results in prioritizing the information systems functionality and leads to the consideration of security aspects after the implementation of information systems (Siponen 2005; Karlsson et al. 2017). The duality problem can also explain why users may resist security measures implemented after the initial system design (Siponen 2005; Paananen et al. 2020). In recent research, Paananen et al. (2020) still sees the duality problem as a major issue for secure information system design.

A further research area deals with human security behavior. Central research questions focus on motivating individuals to adopt protective best practices, such as using strong passwords, and on exploring what triggers non-compliant security behavior (Hui et al. 2016; Dhillon et al. 2021). Numerous studies have investigated employee compliance with IS policies, examining various behavioral factors and their impacts (Cram et al. 2019). In a meta-analysis of 95 existing publications, Cram et al. (2019) concluded that employee attitudes, norms, and beliefs are the strongest predictors of compliance. In contrast, factors such as rewards, punishments, and threats were found to have a relatively weak impact on compliance (Cram et al. 2019). More recent studies, such as Cram et al. (2024), criticize the nomothetic approach of behavioral studies. The reliance on cross-sectional data with one-time surveys provides limited insights into how individual behavior changes over time. They are calling for more idiographic research approaches to validate existing theories by examining how individual behavior aligns with theoretical predictions over time (Cram et al. 2024). Another research stream deals with the impact of cyber attacks on human behavior. Phishing attacks are particularly highlighted in ISS research and are well-suited for both experimental and field setups (Wright et al. 2023; Jensen et al. 2022). Publications try to explain why people fall for phishing attacks using various models, such as the cognitive evaluation (Jensen et al. 2022) or the contextual theory (Wright et al. 2023; Jaeger and Eckhardt 2021). Closely linked are studies on security awareness and the resulting increase in phishing susceptibility (Jaeger and Eckhardt 2021; Pienta et al. 2020). Additional publications deal with design science research to create attributes that increase phishing susceptibility (Zahedi et al. 2024; Abbasi et al. 2021). For instance, Abbasi et al. (2021) developed a design artifact to predict users’ susceptibility to phishing websites. Employees using the design artifact responded significantly less to phishing threats than control groups, resulting in substantial cost savings for the company. ISS research often overlooks complex attacks and their detection and defense mechanisms through advanced threat protection. This omission is probably due to the fact that simulating such complex attacks in a laboratory setting is quite challenging, and it can be difficult to find appropriate subjects, such as security experts, for behavioral research questions.

In addition to individual safety behavior, research also looks at the organizational perspective. For example, Wang et al. (2023) found a positive relationship between IT innovativeness and data breach risk, especially in complex organizational environments. The research uses organizational learning theory to explain how IT innovation can enhance organizational capabilities and introduce new vulnerabilities (Wang et al. 2023). In another study, Ghahramani et al. (2023) show that the ability of an organization to learn and utilize new knowledge plays a crucial role in improving ISS. They demonstrate that the competitive pressure between companies strengthens the mediating role of adaptability (Ghahramani et al. 2023).

In addition to using new technologies (Wang et al. 2023) and organizational learning (Ghahramani et al. 2023), security investments are another focus of the organizational perspective. A study by Kwon and Johnson (2014) shows that proactive investment in the security of IS reduces the risk of data breaches. Angst et al. (2017) emphasize that focusing solely on technological solutions (increased IT security investments) may not be sufficient to prevent data breaches. They argue that understanding how institutional factors influence IT adoption is crucial for developing effective security strategies (Angst et al. 2017).

Another organizational research stream deals with risk management (Hui et al. 2016). For instance, Chen et al. (2011) focus on the risk of information network failure due to cyber attacks that exploit software vulnerabilities. They provide valuable insights into the optimal level of software diversification within an information network, considering the trade-offs between the benefits of compatibility and the risks of failures (Chen et al. 2011).

The previously presented studies generally investigate how companies deal internally with new technology, security investments, human behavior, and strategies to avoid data breaches. Further research deals with the consequences of a data breach. For example, Hoehle et al. (2022) investigate the impact of post-data breach compensation strategies on customer relationships. They showed that meeting customer expectations regarding compensation was crucial for positive justice perceptions and provided insights to organisations regarding how to effectively respond to data breaches and mitigate their negative consequences (Hoehle et al. 2022). This research demonstrates that effective post-breach compensation strategies are crucial for maintaining customer trust and mitigating the negative impacts of data breaches (Hoehle et al. 2022). Another focus is on how companies can learn from data breaches. Research conducted by Mehrizi et al. (2021) highlights that data breaches often consist of a series of interconnected events. Organizations need to engage in an iterative process that incorporates different learning models. The authors stress the importance of adopting a more holistic and dynamic approach to organizational learning from IS incidents (Mehrizi et al. 2021). Current studies often overlook the context during or immediately after a security incident. These situations present unique opportunities to strengthen an organization’s resilience by examining crisis and business continuity management. A crucial question is how organizations can transition from crisis mode back to normal operations as quickly as possible.

Since 2017, additional research investigates the attacker’s perspective. This shift stems from an increasing recognition that cyber attacks and data breaches are not random (Hui et al. 2016). The research utilizes design science methodology to proactively identify threats by analyzing darknet and hacker forums and marketplaces (Chan et al. 2024; Ampel et al. 2024; Li and Chen 2022; Ebrahimi et al. 2020). Instead of focusing on past events (e.g., log file analysis), researchers attempt to anticipate exploits by infiltrating and observing darknet and clearnet hacker forums and marketplaces (Bromiley 2016) to detect attacks as early (de Nobrega et al. 2024; Kotsias et al. 2023). Attackers can also employ new technologies, such as large language models, to make phishing attacks even more difficult to detect. As early as 2010, an MISQ editorial by Mahmood et al. (2010) called for an investigation into the motivations and techniques of attackers. Despite the passage of time, there is still limited literature on this subject. Gaining a deeper understanding of attacker behavior and how they leverage new technologies could enhance proactive security measures.

In terms of methodology, ISS research offers a wide range of possibilities. As previously mentioned, there are experimental studies that focus on human behavior (Jensen et al. 2022; Jaeger and Eckhardt 2021), design science approaches aimed at developing artifacts to enhance ISS in organizations (Zahedi et al. 2024; Abbasi et al. 2021), and long-term studies that investigate employee compliance behavior (Cram et al. 2024). However, there is a lack of empirical data on how companies respond before, during, and shortly after a cyber attack. Siponen and Oinas-Kukkonen (2007) called for more empirical studies in this area. Due to the lack of reliable data, many questions about the costs of cyber attacks remain unanswered. Research neglects indirect costs, such as employee burnout caused by overworked security staff, as well as cascading effects, like the impact of a data breach on suppliers and customers, when analyzing the financial damage to organizations.

Within BISE, the publications of ISS are sparse. Several articles deal solely with privacy or access management (Glöckler et al. 2024; Binzer et al. 2024; Baumann et al. 2019; Mannhardt et al. 2019). Over the last ten years, only four publications within BISE have focused on ISS-related research. These publications deal with human security behavior (Nofer et al. 2014), security risk (Matulevičius et al. 2018), and organizational aspects of ISS (Jiang et al. 2023; Arce 2022), and we present them briefly in the following.

Jiang et al. (2023) propose a comprehensive taxonomy to model the interconnections and dependencies between information technology and operation technology security. Their approach enables cascade modeling for vulnerability assessment and identification of critical components. The paper further suggests power-grid reference models to enhance the reproducibility and applicability of the proposed method.

Arce (2022) observed that cloud providers use security measures (e.g., cryptography) to lock in customers, making switching harder. This strategy can increase profits and cloud providers prioritize lock-in over price leadership, hindering standardization in the cloud industry.

Nofer et al. (2014) distinguish between the impacts of privacy violations and security breaches on consumer trust and behavior. Results support the privacy paradox where people prioritize privacy in theory but prioritize security in practice. This intention-behavior gap persists even after privacy breaches.

The fourth publication from Matulevičius et al. (2018) developed an approach for eliciting and introducing security requirements into business processes using security risk-oriented patterns. These patterns identify security risks and suggest mitigations, reducing the effort required for risk analysis. The authors share their experience in applying the presented approach to derive security requirements for distributed airline turnaround systems. To stimulate more research in this critical area, we provide the following overview of ISS-relevant topics that could be published in BISE.

3 ISS Research Agenda

ISS research within the scope of BISE focuses on a socio-technical perspective, considering the interconnection between technological and organizational factors. Possible ISS questions can relate to the interplay between the structures (regulation), people (human behavior), technologies, and tasks conceptualized in Fig. 2. Attackers constantly threaten this dynamic construct and offer a rich playground for IS researchers. Research can focus on how the introduction of new structures (such as the upcoming EU-wide NIS2 regulation) or technologies (like GenAI) affects organizational tasks and human behavior. Reciprocal relationships, such as the regulation of new technologies, can also be the subject of research. In particular, AI technologies such as large language models and GenAI lead to new research questions. These research questions are part of a call for papers in MISQ (MISQ 2024) and underline the topic’s importance. Focusing on the BISE departments, Table 1 shows potential research questions from the ISS area that match the departments’ editorial statements.

The perspective of organizations and their strategic response to the heightened threat environment offers further opportunities for investigation. How organizations deal with data breaches also provides excellent research potential. While researchers have addressed the communication of data breaches as well as their impact on customer behavior (Janakiraman et al. 2018) and on companies’ reputation (Syed 2019), IS management during or after a cyber attack remains understudied. In addition, the investigation of coping strategies and organizations’ cyber resilience can also be part of further research. Other topics within this research area are the impact of innovations and the influence of security on digital business strategies. These topics address BISE’s Digital Business Management and Digital Leadership department.

Table 1 BISE department with potential ISS research questions

Including attacker perspectives in current research and the resulting proactive action of organizations offers potential for investigation. The design, implementation, and evaluation of technical solutions to detect and prevent cyber attacks is an essential research area (Hui et al. 2016). Dhillon et al. (2021) stated that much of the existing research focuses on phishing attacks and that it is important to investigate other types of cyber attacks (e.g., DDoS, Social Engineering, Ransomware) as well. While developing quantitative methods to detect cyber attacks and cyber risks is part of Decision Analytics and Data Science, the development of secure information systems, in general, is part of the Information Systems Engineering and Technology department. At BISE, however, we are not interested in purely technical solutions but in the interplay between technical solutions, human behavior, structures, and tasks. A better understanding of attack strategies on information systems and attackers’ behavior might support countermeasures in a proactive manner.

Another research area is human behavior and human-computer interaction. Cram et al. (2024) advocate an idiographic approach, which focuses on the temporal changes in human behavior. In addition, Dhillon et al. (2021) highlight the context of research studies as an essential factor for developing behavioral theories. Research can investigate contextual theories that examine non-compliant employee behavior and workplace dynamics. Furthermore, researchers can examine the effects of the increasing threat situation on human behavior. On the other side, attackers can use new technologies, like GenAI, to develop even more sophisticated phishing techniques to deceive humans. The Human-Centered Information Systems department covers the effects of these technologies on human behavior (defender and attacker) and offers many opportunities for IS researchers.

Submissions focused on Business Process Management can explore the security aspects of business processes. Research questions may focus on enhancing the security of existing processes as well as designing new secure business processes. Submissions can explore process mining to discover hidden processes and verify compliance with respect to business rules or process models (Silalahi et al. 2022). This includes anomaly and drift detection. Additionally, it is possible to examine how organizations can automate security-related processes and the socio-technological implications of these changes. Submissions can also address aspects related to the duality problem of ISS (Baskerville 1993).

In the context of the Economics of Information Systems, researchers can investigate how to quantify cyber risk and the effects of cybersecurity on digital platforms and marketplaces. This research area also includes topics such as investments in cybersecurity architecture and the economic impact of data breaches. The research themes market effects of security enhancements and security investment studies, as outlined in a research curation by Kai-Lung et al. (2016), align with the editorial statement of the Economics of Information Systems department.

Enterprise Modeling and Enterprise Engineering provide a conceptual perspective on ISS. Research questions can relate to the modeling of security aspects into digital twins and their consequences. Authors can address the investigation of reference architectures based on implemented information systems with case studies.

From a methodological perspective, we agree with the argument made by Siponen and Oinas-Kukkonen (2007) for the need to conduct more empirical studies, particularly in the development of new data science and machine learning (ML) methods. This approach can enhance the creation and design of systems for detecting threats, attacks, and incidents. Additionally, empirical data beyond laboratory settings is crucial to understanding the risks and vulnerabilities associated with human behavior. Given the current threat landscape, we believe that organizations need to be more open to research collaboration.

ISS is a vast and dynamic field of research, and the presented research areas provide a rough guide for researchers interested in publishing in BISE. Potential BISE submissions can address the increased threat situation, resulting dynamics, and effects on human behavior and organizations. As IS researchers, we cannot eliminate the threat of cyber attacks, symbolized by the sword of Damocles. However, we can strengthen the holding strand of horsehair by conducting insightful empirical analyses, enriching theory and understanding the behavior of players in this setting.