Reporting a Cyber Security Breach: How Organizations Respond

被引:1
|
作者
Naidoo, Jef [1 ]
Dulek, Ron [1 ,2 ]
Butler, Seth [1 ]
Baily, Brooke [1 ]
机构
[1] Univ Alabama, Tuscaloosa, AL USA
[2] Univ Alabama, 151 Alston Hall, Tuscaloosa, AL 35476 USA
关键词
breach; communication; crisis; cybersecurity; ransomware; CRISIS; INFORMATION; FRAMEWORK; HACKERS; THREAT;
D O I
10.1177/23294884241236201
中图分类号
F [经济];
学科分类号
02 ;
摘要
Cyber breaches and ransomware attacks now occur so frequently that they have become facets of organizational life. These breaches are unique in that they are initially silent; a limited number of organizational members know about the incident so firms usually have ample time to prepare a Cyber Breach Revelation (CBR). This study analyzes 378 press releases acknowledging a cyber security breach. It finds four response clusters that highlight how compromised organizations reveal cyberattacks to external stakeholders: (1) empathetic acknowledgment; (2) assurance of the organization's breach-handling capability; (3) restoration of confidence; and, (4) re-establishment of trust and loyalty. These clusters provide meaningful insights as to how firms reveal cyber breaches to their stakeholders and, equally as important, open the door for further studies as to the effectiveness and sequencing of these approaches.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] The economics of mandatory security breach reporting to authorities
    Laube, Stefan
    Boehme, Rainer
    JOURNAL OF CYBERSECURITY, 2016, 2 (01): : 29 - 41
  • [2] Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents
    Liu, Yang
    Sarabi, Armin
    Zhang, Jing
    Naghizadeh, Parinaz
    Karir, Manish
    Bailey, Michael
    Liu, Mingyan
    PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 1009 - 1024
  • [3] Before the Breach: The Role of Cyber Insurance in Incentivizing Data Security
    Heath, Brendan
    GEORGE WASHINGTON LAW REVIEW, 2018, 86 (04) : 1115 - 1151
  • [4] From Information Security to Cyber Security Cultures Organizations to Societies
    Reid, Rayne
    Van Niekerk, Lohan
    2014 INFORMATION SECURITY FOR SOUTH AFRICA (ISSA), 2014,
  • [5] STAYING SAFE: CYBER SECURITY FOR PEOPLE AND ORGANIZATIONS
    Arlitsch, Kenning
    Edelman, Adam
    JOURNAL OF LIBRARY ADMINISTRATION, 2014, 54 (01) : 46 - 56
  • [6] Three cyber-security strategies to mitigate the impact of a data breach
    Densham, Ben
    Network Security, 2015, 2015 (01) : 5 - 8
  • [7] How organizations should respond to rape in the workplace
    Lee, E
    Kleiner, BH
    JOURNAL OF EMPLOYMENT COUNSELING, 2003, 40 (03) : 123 - 128
  • [8] Cyber Security and Privacy Experiments: A Design and Reporting Toolkit
    Coopamootoo, Kovila P. L.
    Gross, Thomas
    PRIVACY AND IDENTITY MANAGEMENT: THE SMART REVOLUTION, 2018, 526 : 243 - 262
  • [9] Best Security Measures to Reduce Cyber-Incident and Data Breach Risks
    Kikuchi, Hiroaki
    Yamada, Michihiro
    Ikegami, Kazuki
    Inui, Koji
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, ESORICS 2021, 2022, 13140 : 3 - 19
  • [10] HOW TO RESPOND FROM THE ACADEMY TO THE RISKS THAT CONCERN ORGANIZATIONS?
    Useche, Hugo Armando Guzman
    Pedroza, Cristian David Maldonado
    PANORAMA, 2021, 15 (28) : 105 - 121