
formation & Management, 56(5), 681–695.
https://doi.org/10.1016/j.im.2018.11.003
Johannesson, P., & Perjons Erik. (2014). An Introduction to
Design Science. Springer International Publishing.
Kalogeraki, E.-M., & Polemi, N. (2024). A tax-
onomy for cybersecurity standards. Journal of
Surveillance, Security and Safety, 5(2), 95–115.
https://doi.org/10.20517/jsss.2023.50
Babikian, J. (2023). Navigating Legal Frontiers: Ex-
ploring Emerging Issues in Cyber Law. Revista Es-
panola de Documentacion Cientifica, 17(2), 95–109.
https://doi.org/10.13140/RG.2.2.20264.55048
Boeken, J. (2024). From compliance to security, respon-
sibility beyond law. Computer Law and Security Re-
view, 52. https://doi.org/10.1016/j.clsr.2023.105926
Braun, V., & Clarke, V. (2006). Using thematic analysis in
psychology. Qualitative Research in Psychology, 3(2),
77–101. https://doi.org/10.1191/1478088706qp063oa
BreachRx. (2020, March 25). Emerging Regulations
Increase Complexity for Risk Management. A
BreachRx.
Costantino, G., De Vincenzi, M., & Matteucci, I.
(2022). In-Depth Exploration of ISO/SAE 21434
and Its Correlations with Existing Standards. IEEE
Communications Standards Magazine, 6(1), 84–92.
https://doi.org/10.1109/MCOMSTD.0001.2100080
Denscombe, M. (2010a). The Good Research Guide: For
Small-scale Social Research Projects.
Denscombe, M. (2010b). The Good Research Guide: For
Small-scale Social Research Projects (4th ed.). Open
University Press.
Denscombe, M. (2014). The Good Research Guide:
For Small-Scale Social Research Projects (5th ed.).
McGraw-Hill/Open University Press.
Edgar, T. W., & Manz, D. O. (2017). Chapter 5 - Descrip-
tive Study. In T. W. Edgar & D. O. Manz (Eds.),
Research Methods for Cyber Security (pp. 3–31).
Syngress. https://doi.org/10.1016/B978-0-12-805349-
2.00001-7
EU Cybersecurity Index. (2024). www.enisa.europa.eu.
European Commission. (2020). Commission Staff Working
Document Impact Assessment Report Accompanying
the document Proposal for a Directive of the European
Parliament and of the Council on measures for a high
common level of cybersecurity across the Union, re-
pealing Directive (EU) 2016/1148.
Fumy, W. (2004). IT security standardisation. Network Se-
curity, 2004(12), 6–11.
Gisladottir, V., Ganin, A. A., Keisler, J. M., Kepner, J.,
& Linkov, I. (2017). Resilience of cyber systems
with over-and underregulation. Risk Analysis, 37(9),
1644–1651.
Gordon, L. A., Loeb, M. P., Lucyshyn, W., Zhou, L., &
others. (2014). Externalities and the magnitude of cy-
ber security underinvestment by private sector firms:
a modification of the Gordon-Loeb model. Journal of
Information Security, 6(01), 24.
Gordon, L. A., Loeb, M. P., & Zhou, L. (2011). The im-
pact of information security breaches: Has there been
a downward shift in costs? Journal of Computer Se-
curity, 19(1), 33–56.
Hasan, S., Ali, M., Kurnia, S., & Thurasamy, R. (2021).
Evaluating the cyber security readiness of organiza-
tions and its influence on performance. Journal of In-
formation Security and Applications, 58, 102726.
Hill, M. (2023, September 14). Automotive supply chain
vulnerable to attack as cybersecurity regulation looms.
An IDG, Inc, Company.
Hiscox Report. (2023). Hiscox Cyber Readiness Report.
https://www.hiscoxgroup.com/cyber-readiness
Hoffmann, V. H., Trautmann, T., & Hamprecht, J. (2009).
Regulatory uncertainty: A reason to postpone invest-
ments? Not necessarily. Journal of Management Stud-
ies, 46(7), 1227–1253.
Jeong, C. Y., Lee, S.-Y. T., & Lim, J.-H. (2019).
Information security breaches and IT secu-
rity investments: Impacts on competitors. In-
formation & Management, 56(5), 681–695.
https://doi.org/10.1016/j.im.2018.11.003
Johannesson, P., & Perjons Erik. (2014). An Introduction to
Design Science. Springer International Publishing.
Kalogeraki, E.-M., & Polemi, N. (2024). A tax-
onomy for cybersecurity standards. Journal of
Surveillance, Security and Safety, 5(2), 95–115.
https://doi.org/10.20517/jsss.2023.50
Babikian, J. (2023). Navigating Legal Frontiers: Ex-
ploring Emerging Issues in Cyber Law. Revista Es-
panola de Documentacion Cientifica, 17(2), 95–109.
https://doi.org/10.13140/RG.2.2.20264.55048
Boeken, J. (2024). From compliance to security, respon-
sibility beyond law. Computer Law and Security Re-
view, 52. https://doi.org/10.1016/j.clsr.2023.105926
Braun, V., & Clarke, V. (2006). Using thematic analysis in
psychology. Qualitative Research in Psychology, 3(2),
77–101. https://doi.org/10.1191/1478088706qp063oa
BreachRx. (2020, March 25). Emerging Regulations
Increase Complexity for Risk Management. A
BreachRx.
Costantino, G., De Vincenzi, M., & Matteucci, I.
(2022). In-Depth Exploration of ISO/SAE 21434
and Its Correlations with Existing Standards. IEEE
Communications Standards Magazine, 6(1), 84–92.
https://doi.org/10.1109/MCOMSTD.0001.2100080
Denscombe, M. (2010a). The Good Research Guide: For
Small-scale Social Research Projects.
Denscombe, M. (2010b). The Good Research Guide: For
Small-scale Social Research Projects (4th ed.). Open
University Press.
Denscombe, M. (2014). The Good Research Guide:
For Small-Scale Social Research Projects (5th ed.).
McGraw-Hill/Open University Press.
Edgar, T. W., & Manz, D. O. (2017). Chapter 5 - Descrip-
tive Study. In T. W. Edgar & D. O. Manz (Eds.),
Research Methods for Cyber Security (pp. 3–31).
Syngress. https://doi.org/10.1016/B978-0-12-805349-
2.00001-7
EU Cybersecurity Index. (2024). www.enisa.europa.eu.
Compliance Standards and Frameworks and Its Implications on Cybersecurity: A NIS2 Study Within the Swedish Automotive Industries
375