{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T14:44:21Z","timestamp":1767105861940,"version":"3.48.0"},"reference-count":75,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T00:00:00Z","timestamp":1767052800000},"content-version":"vor","delay-in-days":363,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Australian Government Research Training Program Scholarship"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The study investigates the effect of cyber resilience on cyber incidents outcomes. Though this relationship is intuitive, there is a lack of empirical evidence indicating that higher levels of organizational cyber resilience mitigate cyber incidents. We address this lack of evidence by collecting and analysing organizational data from 110 cyber practitioners using logistic regression, Kruskal\u2013Wallis and Mann\u2013Whitney tests. Our findings indicate that nonattacked organizations have higher levels of cyber resilience. More precisely, they have higher levels of prevention, education, strategy and planning, and accountability for cyber resilience. However, our findings do not support that a higher level of cyber resilience leads to a lower level of postincident outcomes. This study has implications for researchers by illustrating how cyber resilience may relate to cyber incidents\u2014an area that can be further explored in future cyber resilience research.<\/jats:p>","DOI":"10.1093\/cybsec\/tyaf040","type":"journal-article","created":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T13:10:04Z","timestamp":1764767404000},"source":"Crossref","is-referenced-by-count":0,"title":["The effect of organizational cyber resilience on cyber incident outcomes"],"prefix":"10.1093","volume":"11","author":[{"given":"Elinor","family":"Tsen","sequence":"first","affiliation":[{"name":"School of Electrical Engineering and Computing Science, University of Queensland , Brisbane, 4072 ,","place":["Australia"]}]},{"given":"Ryan K L","family":"Ko","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computing Science, University of Queensland , Brisbane, 4072 ,","place":["Australia"]}]},{"given":"Sergeja","family":"Slapni\u010dar","sequence":"additional","affiliation":[{"name":"Business School, University of Queensland , Brisbane, 4072 ,","place":["Australia"]}]}],"member":"286","published-online":{"date-parts":[[2025,12,30]]},"reference":[{"key":"2025123009391865300_bib1","volume-title":"EY Global Information Security Survey 2021","year":"2021"},{"key":"2025123009391865300_bib2","volume-title":"Check Point Research Reports a 38% Increase in 2022 Global Cyberattacks","author":"Check Point Research","year":"2023"},{"key":"2025123009391865300_bib3","volume-title":"Surge in Ransomware and 10 Biggest Attacks","author":"ISACA","year":"2021"},{"key":"2025123009391865300_bib4","volume-title":"Travelex \u2018Being Held to Ransom\u2019 by Hackers Said to be Demanding $3M","author":"Davies","year":"2020"},{"key":"2025123009391865300_bib5","volume-title":"MediSecure Concludes Investigation Into Cyber Attack","author":"Australian Cyber Security Magazine","year":"2024"},{"key":"2025123009391865300_bib6","volume-title":"State of Cybersecurity Resilience: How aligning security and the business creates cyber resilience","year":"2021"},{"key":"2025123009391865300_bib7","volume-title":"The Commonwealth Cyber Security Posture in 2022","year":"2022"},{"key":"2025123009391865300_bib8","first-page":"34","volume-title":"Validating the Integrity of Computing Devices","author":"Boyens","year":"2022"},{"key":"2025123009391865300_bib9","volume-title":"NIST Cybersecurity Framework","year":"2018"},{"key":"2025123009391865300_bib10","volume-title":"Risk and Responsibility in a Hyperconnected World Pathways to Global Cyber Resilience, Switzerland","year":"2012"},{"key":"2025123009391865300_bib11","first-page":"191","article-title":"Cybersecurity: challenges from systems, complexity, knowledge management and intelligence perspective","volume":"16","author":"Tisdale","year":"2015","journal-title":"Iss Inf Syst"},{"key":"2025123009391865300_bib12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-16486-1_31","article-title":"Cyber resilience\u2014fundamentals for a definition","volume-title":"New Contributions in Information Systems and Technologies","author":"Bj\u00f6rck","year":"2015"},{"key":"2025123009391865300_bib13","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2011.6107877","article-title":"Cyber resilience for mission assurance","volume-title":"Proceedings of the\u00a02011 IEEE International Conference on Technologies for Homeland Security (HST)","author":"Goldman","year":"2011"},{"key":"2025123009391865300_bib14","volume-title":"The Cyber Resilience Index: Advancing Organizational Cyber Resilience, Switzerland","year":"2022"},{"key":"2025123009391865300_bib15","volume-title":"Statement by President Biden on our Nationa\u2019s Cybersecurity","author":"Biden","year":"2022"},{"key":"2025123009391865300_bib16","doi-asserted-by":"publisher","first-page":"34","DOI":"10.3390\/g9020034","article-title":"Risk assessment uncertainties in cybersecurity investments","volume":"9","author":"Fielder","year":"2018","journal-title":"Games"},{"key":"2025123009391865300_bib18","article-title":"Embedding information security culture emerging concerns and challenges","volume-title":"PACIS 2010 Proceedings","author":"Lim","year":"2010"},{"key":"2025123009391865300_bib19","volume-title":"How to bounce back from cyber fatigue","author":"KPMG","year":"2016"},{"key":"2025123009391865300_bib20","volume-title":"Measuring Cybersecurity and Cyber Resiliency","author":"MITRE","year":"2020"},{"key":"2025123009391865300_bib21","volume-title":"Cyber Resiliency Engineering Framework","year":"2011"},{"key":"2025123009391865300_bib22","volume-title":"Guidance on Cyber Resilience for Financial Market Infrastructures","year":"2016"},{"key":"2025123009391865300_bib23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/cybsec\/tyz013","article-title":"The cyber resilience of financial institutions","volume":"5","author":"Dupont","year":"2019","journal-title":"J Cybersecur"},{"key":"2025123009391865300_bib24","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1109\/TEM.2019.2909909","article-title":"Ambidextrous cybersecurity: the seven pillars (7Ps) of cyber resilience","volume":"68","author":"Carayannis","year":"2019","journal-title":"IEEE Trans Eng Manage"},{"key":"2025123009391865300_bib25","volume-title":"Cyber Resiliency Engineering Aid-The Updated Cyber Resiliency Engineering Framework and Guidance on Applying Cyber Resiliency Techniques","year":"2015"},{"key":"2025123009391865300_bib26","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/s10669-013-9485-y","article-title":"Resilience metrics for cyber systems","volume":"33","author":"Linkov","year":"2013","journal-title":"Environ Syst Decis"},{"key":"2025123009391865300_bib27","volume-title":"Four Domains of Cybersecurity: A Risk-Based Systems Approach to Cyber Decisions","author":"Collier","year":"2013"},{"key":"2025123009391865300_bib28","first-page":"1","article-title":"Fundamental concepts of cyber resilience: introduction and overview","author":"Linkov","year":"2019","journal-title":"Cyber Resilience of Systems and Networks"},{"key":"2025123009391865300_bib29","volume-title":"Developing Cyber-Resilient Systems: A Systems Security Engineering Approach, USA","year":"2021"},{"key":"2025123009391865300_bib30","article-title":"Investigating a contextual cyber resilience: what factors improve organisational cyber resilience?","author":"Tsen","year":"2023"},{"key":"2025123009391865300_bib31","article-title":"Cybersecurity incident response for the sub-Saharan African aviation industry","volume-title":"Proceedings of the\u00a0International Conference on Cyber Warfare and Security","author":"Lekota","year":"2019"},{"key":"2025123009391865300_bib32","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1353-4858(12)70024-7","article-title":"Building cyber-resilience to tackle threats","volume":"2012","author":"De\u00a0Crespigny","year":"2012","journal-title":"Netw Secur"},{"key":"2025123009391865300_bib33","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1002\/asi.24311","article-title":"How integration of cyber security management and incident response enables organizational learning","volume":"71","author":"Ahmad","year":"2020","journal-title":"Asso Info Sci Tech"},{"key":"2025123009391865300_bib34","doi-asserted-by":"publisher","first-page":"19","DOI":"10.3390\/s19010019","article-title":"Smart airport cybersecurity: threat mitigation and cyber resilience controls","volume":"19","author":"Lykou","year":"2018","journal-title":"Sensors"},{"key":"2025123009391865300_bib35","first-page":"134","article-title":"Cyber resilience: leadership matters","volume":"1","author":"Armour","year":"2017","journal-title":"Cyber Secur"},{"key":"2025123009391865300_bib36","doi-asserted-by":"publisher","first-page":"6","DOI":"10.22215\/timreview\/885","article-title":"Supply chain cyber-resilience: creating an agenda for future research","volume":"5","author":"Khan","year":"2015","journal-title":"Technol Innov Manag Rev"},{"key":"2025123009391865300_bib37","doi-asserted-by":"publisher","first-page":"28","DOI":"10.22215\/timreview\/888","article-title":"Cybersecurity and cyber-resilient supply chains","volume":"5","author":"Boyes","year":"2015","journal-title":"Technol Innov Manag Rev"},{"key":"2025123009391865300_bib38","doi-asserted-by":"publisher","first-page":"19","DOI":"10.22215\/timreview\/887","article-title":"Building cyber-resilience into supply chains","volume":"5","author":"Davis","year":"2015","journal-title":"Technol Innov Manag Rev"},{"key":"2025123009391865300_bib39","doi-asserted-by":"publisher","first-page":"13","DOI":"10.22215\/timreview\/886","article-title":"Cyber-resilience: a strategic approach for supply chain management","volume":"5","author":"Urciuoli","year":"2015","journal-title":"Technol Innov Manag Rev"},{"key":"2025123009391865300_bib40","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1016\/j.cirpj.2021.09.008","article-title":"Assessing cyber resilience of additive manufacturing supply chain leveraging data fusion technique: a model to generate cyber resilience index of a supply chain","volume":"35","author":"Rahman","year":"2021","journal-title":"CIRP J Manuf Sci Technol"},{"key":"2025123009391865300_bib41","doi-asserted-by":"crossref","first-page":"187","DOI":"10.5267\/j.uscm.2022.10.008","article-title":"The impact of cyber resilience and robustness on supply chain performance: evidence from the UAE chemical industry","volume":"11","author":"Alshurideha","year":"2022","journal-title":"Uncertain Supply Chain Manag"},{"key":"2025123009391865300_bib42","doi-asserted-by":"publisher","first-page":"3","DOI":"10.22215\/timreview\/884","article-title":"Cyber-resilience in supply chains (April 2015)","volume":"5","author":"McPhee","year":"2015","journal-title":"Technol Innov Manag Rev"},{"key":"2025123009391865300_bib43","doi-asserted-by":"publisher","first-page":"tyy006","DOI":"10.1093\/cybsec\/tyy006","article-title":"A taxonomy of cyber-harms: defining the impacts of cyber-attacks and understanding how they propagate","volume":"4","author":"Agrafiotis","year":"2018","journal-title":"J Cybersecur"},{"key":"2025123009391865300_bib44","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1111\/jels.12035","article-title":"Empirical analysis of data breach litigation","volume":"11","author":"Romanosky","year":"2014","journal-title":"EJ Empir Legal Stud"},{"key":"2025123009391865300_bib45","doi-asserted-by":"publisher","first-page":"tyad015","DOI":"10.1093\/cybsec\/tyad015","article-title":"Predictive taxonomy analytics (LASSO): predicting outcome types of cyber breach","volume":"9","author":"Goh","year":"2023","journal-title":"J Cybersecur"},{"key":"2025123009391865300_bib46","first-page":"121","article-title":"Examining the costs and causes of cyber incidents","volume":"2","author":"Romanosky","year":"2016","journal-title":"J Cybersecur"},{"key":"2025123009391865300_bib47","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1016\/j.ejor.2018.07.021","article-title":"What are the actual costs of cyber risk events?","volume":"272","author":"Eling","year":"2019","journal-title":"Eur J Oper Res"},{"key":"2025123009391865300_bib48","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.cose.2014.05.006","article-title":"A multi-level approach to understanding the impact of cyber crime on the financial sector","volume":"45","author":"Lagazio","year":"2014","journal-title":"Comput Secur"},{"key":"2025123009391865300_bib49","doi-asserted-by":"publisher","first-page":"103546","DOI":"10.1016\/j.im.2021.103546","article-title":"No rose without a thorn: board IT competence and market reactions to operational IT failures","volume":"58","author":"Benaroch","year":"2021","journal-title":"Inf Manag"},{"key":"2025123009391865300_bib50","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1509\/jm.15.0497","article-title":"Data privacy: effects on customer and firm performance","volume":"81","author":"Martin","year":"2017","journal-title":"J Market"},{"key":"2025123009391865300_bib51","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1108\/09685220310468646","article-title":"Quantifying the financial impact of IT security breaches","volume":"11","author":"Garg","year":"2003","journal-title":"Inf Manag Comput Secur"},{"key":"2025123009391865300_bib52","volume-title":"The Economic Impact of Cyber-Attacks","author":"Cashell","year":"2004"},{"key":"2025123009391865300_bib53","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1016\/j.jfineco.2019.05.019","article-title":"Risk management, firm reputation, and the impact of successful cyberattacks on target firms","volume":"139","author":"Kamiya","year":"2021","journal-title":"J Finan Econ"},{"key":"2025123009391865300_bib54","first-page":"1","article-title":"Assessing the cost of security breach: a marketer\u2019s perspective","volume-title":"Proceedings of Allied Academies International Conference. Academy of Marketing Studies","author":"Choong","year":"2016"},{"key":"2025123009391865300_bib55","doi-asserted-by":"publisher","first-page":"tyac006","DOI":"10.1093\/cybsec\/tyac006","article-title":"Developing metrics to assess the effectiveness of cybersecurity awareness program","volume":"8","author":"Chaudhary","year":"2022","journal-title":"J Cybersecur"},{"key":"2025123009391865300_bib56","doi-asserted-by":"publisher","first-page":"102380","DOI":"10.1016\/j.technovation.2021.102380","article-title":"Defending digital supply chains: evidence from a decade-long research program","volume":"118","author":"Boyson","year":"2022","journal-title":"Technovation"},{"key":"2025123009391865300_bib57","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1146\/annurev-psych-120710-100452","article-title":"Sources of method bias in social science research and recommendations on how to control it","volume":"63","author":"Podsakoff","year":"2012","journal-title":"Annu Rev Psychol"},{"key":"2025123009391865300_bib58","doi-asserted-by":"publisher","first-page":"101931","DOI":"10.1016\/j.cose.2020.101931","article-title":"Time pressure in human cybersecurity behavior: theoretical framework and countermeasures","volume":"97","author":"Chowdhury","year":"2020","journal-title":"Comput Secur"},{"key":"2025123009391865300_bib59","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MSP.2010.60","article-title":"Why measuring security is hard","volume":"8","author":"Pfleeger","year":"2010","journal-title":"IEEE Secur Priv Mag"},{"key":"2025123009391865300_bib60","doi-asserted-by":"publisher","first-page":"103638","DOI":"10.1016\/j.im.2022.103638","article-title":"Antecedents and consequences of data breaches: a systematic review","volume":"59","author":"Schlackl","year":"2022","journal-title":"Inf Manag"},{"key":"2025123009391865300_bib61","volume-title":"Critical Cybersecurity Hygiene: Patching the Enterprise","author":"Souppaya","year":"2018"},{"key":"2025123009391865300_bib74","volume-title":"Cost of a Data Breach Report","year":"2021"},{"key":"2025123009391865300_bib75","doi-asserted-by":"publisher","first-page":"18","DOI":"10.21863\/ijfm\/2015.5.4.020","article-title":"The market value and reputational effects from lost confidential information","volume":"5","author":"Tanimura","year":"2015","journal-title":"IIFM"},{"key":"2025123009391865300_bib76","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.cose.2015.12.006","article-title":"The impact of information security events to the stock market: a systematic literature review","volume":"58","author":"Spanos","year":"2016","journal-title":"Comput Secur"},{"key":"2025123009391865300_bib62","volume-title":"Cyber security and Australian small businesses","year":"2019"},{"key":"2025123009391865300_bib63","volume-title":"Entrepreneurship at a Glance","year":"2017"},{"key":"2025123009391865300_bib64","doi-asserted-by":"publisher","first-page":"102520","DOI":"10.1016\/j.ijinfomgt.2022.102520","article-title":"The role of cybersecurity and policy awareness in shifting employee compliance attitudes: building supply chain capabilities","volume":"66","author":"Wong","year":"2022","journal-title":"Int J Inf Manage"},{"key":"2025123009391865300_bib65","doi-asserted-by":"publisher","first-page":"645","DOI":"10.25300\/MISQ\/2022\/14880","article-title":"Applying and extending the theory of effective use in a business intelligence context","volume":"46","author":"Trieu","year":"2022","journal-title":"MIS Quart"},{"key":"2025123009391865300_bib66","volume-title":"Determining Sample Size","author":"Morse","year":"2000"},{"key":"2025123009391865300_bib67","article-title":"Sampling in qualitative inquiry","volume-title":"Doing Qualitative Research","author":"Kuzel","year":"1999"},{"key":"2025123009391865300_bib68","volume-title":"R: A Language and Environment for Statistical Computing","author":"R Core Team","year":"2021"},{"key":"2025123009391865300_bib69","volume-title":"Fraud Detection","author":"Qualtrics","year":"2022"},{"key":"2025123009391865300_bib70","doi-asserted-by":"publisher","first-page":"267","DOI":"10.3200\/JEXE.74.3.267-288","article-title":"The search for \"optimal\" cutoff properties: fit index criteria in structural equation modeling","volume":"74","author":"Sivo","year":"2006","journal-title":"J Exp Educ"},{"key":"2025123009391865300_bib71","volume-title":"Nonparametric Statistics","author":"Siegel","year":"1988"},{"key":"2025123009391865300_bib72","doi-asserted-by":"publisher","first-page":"6398","DOI":"10.24251\/HICSS.2019.769","article-title":"For what technology can\u2019t fix: building a model of organizational cybersecurity culture","volume-title":"Proceedings of 52nd Hawaii International Conference on System Sciences","author":"Huang","year":"2019"},{"key":"2025123009391865300_bib73","volume-title":"Reshaping the Cybersecurity Landscape","year":"2020"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf040\/66159997\/tyaf040.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf040\/66159997\/tyaf040.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T14:39:32Z","timestamp":1767105572000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaf040\/8407314"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":75,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaf040","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyaf040"}}