Reporting a Cyber Security Breach: How Organizations Respond

被引:1
|
作者
Naidoo, Jef [1 ]
Dulek, Ron [1 ,2 ]
Butler, Seth [1 ]
Baily, Brooke [1 ]
机构
[1] Univ Alabama, Tuscaloosa, AL USA
[2] Univ Alabama, 151 Alston Hall, Tuscaloosa, AL 35476 USA
关键词
breach; communication; crisis; cybersecurity; ransomware; CRISIS; INFORMATION; FRAMEWORK; HACKERS; THREAT;
D O I
10.1177/23294884241236201
中图分类号
F [经济];
学科分类号
02 ;
摘要
Cyber breaches and ransomware attacks now occur so frequently that they have become facets of organizational life. These breaches are unique in that they are initially silent; a limited number of organizational members know about the incident so firms usually have ample time to prepare a Cyber Breach Revelation (CBR). This study analyzes 378 press releases acknowledging a cyber security breach. It finds four response clusters that highlight how compromised organizations reveal cyberattacks to external stakeholders: (1) empathetic acknowledgment; (2) assurance of the organization's breach-handling capability; (3) restoration of confidence; and, (4) re-establishment of trust and loyalty. These clusters provide meaningful insights as to how firms reveal cyber breaches to their stakeholders and, equally as important, open the door for further studies as to the effectiveness and sequencing of these approaches.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] How to Improve the Security Awareness in Complex Organizations
    Maria Carla De Maggio
    Marzia Mastrapasqua
    Marco Tesei
    Andrea Chittaro
    Roberto Setola
    European Journal for Security Research, 2019, 4 (1) : 33 - 49
  • [22] THE 'WORM' AS A WEAPON OF MASS DESTRUCTION HOW TO RESPOND LEGALLY TO CYBER WARFARE?
    Meulenbelt, Stephanie
    RUSI JOURNAL, 2012, 157 (02): : 62 - 67
  • [23] Fidelity of Statistical Reporting in 10 Years of Cyber Security User Studies
    Gross, Thomas
    SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST, STAST 2019, 2021, 11739 : 3 - 26
  • [24] Maritime Cyber Security Analysis - How to Reduce Threats?
    Mrakovic, Ivan
    Vojinovic, Ranko
    TRANSACTIONS ON MARITIME SCIENCE-TOMS, 2019, 8 (01): : 132 - 139
  • [25] How deception can change cyber security defences
    Bushby A.
    Computer Fraud and Security, 2019, 2019 (01): : 12 - 14
  • [26] How does intellectual capital align with cyber security?
    Renaud, Karen
    Von Solms, Basie
    Von Solms, Rossouw
    JOURNAL OF INTELLECTUAL CAPITAL, 2019, 20 (05) : 621 - 641
  • [27] How Collaborative Research Bolsters Utility Cyber Security
    Warren, Chris
    EPRI Journal, 2024, (03): : 27 - 30
  • [28] Cyber Security - How Visual Analytics Unlock Insight
    Marty, Raffael
    19TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'13), 2013, : 1139 - 1139
  • [29] RFID security breach
    不详
    CONTROL ENGINEERING, 2008, 55 (08) : 49 - 49
  • [30] THE NECESSITY OF A CENTRALIZED CYBER SECURITY PERFORMANCE AND RISK MEASUREMENT FRAMEWORK FOR PRIVATE ORGANIZATIONS
    Georgescu, Tiberiu-Marian
    INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY, IE 2016: EDUCATION, RESEARCH & BUSINESS TECHNOLOGIES, 2016, : 302 - 306