Reporting a Cyber Security Breach: How Organizations Respond

被引:1
|
作者
Naidoo, Jef [1 ]
Dulek, Ron [1 ,2 ]
Butler, Seth [1 ]
Baily, Brooke [1 ]
机构
[1] Univ Alabama, Tuscaloosa, AL USA
[2] Univ Alabama, 151 Alston Hall, Tuscaloosa, AL 35476 USA
关键词
breach; communication; crisis; cybersecurity; ransomware; CRISIS; INFORMATION; FRAMEWORK; HACKERS; THREAT;
D O I
10.1177/23294884241236201
中图分类号
F [经济];
学科分类号
02 ;
摘要
Cyber breaches and ransomware attacks now occur so frequently that they have become facets of organizational life. These breaches are unique in that they are initially silent; a limited number of organizational members know about the incident so firms usually have ample time to prepare a Cyber Breach Revelation (CBR). This study analyzes 378 press releases acknowledging a cyber security breach. It finds four response clusters that highlight how compromised organizations reveal cyberattacks to external stakeholders: (1) empathetic acknowledgment; (2) assurance of the organization's breach-handling capability; (3) restoration of confidence; and, (4) re-establishment of trust and loyalty. These clusters provide meaningful insights as to how firms reveal cyber breaches to their stakeholders and, equally as important, open the door for further studies as to the effectiveness and sequencing of these approaches.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] PROTECTING MARKET IDENTITY: WHEN AND HOW DO ORGANIZATIONS RESPOND TO CONSUMERS' DEVALUATIONS?
    Wang, Tao
    Wezel, Filippo Carlo
    Forgues, Bernard
    ACADEMY OF MANAGEMENT JOURNAL, 2016, 59 (01): : 135 - 162
  • [42] Towards a General Information Security Management Assessment Framework to Compare Cyber-Security of Critical Infrastructure Organizations
    Bernroider, Edward W. N.
    Margiol, Sebastian
    Taudes, Alfred
    RESEARCH AND PRACTICAL ISSUES OF ENTERPRISE INFORMATION SYSTEMS, 10TH IFIP WG 8.9 WORKING CONFERENCE, CONFENIS 2016, 2016, 268 : 127 - 141
  • [43] Empowering boards: How the National Cyber Security Centre Board (United Kingdom) toolkit is transforming cyber security governance Reply
    Tarka, Mitchell
    Blankstein, Michael
    Schottel, Patrick
    INJURY-INTERNATIONAL JOURNAL OF THE CARE OF THE INJURED, 2023, 54 (11):
  • [44] The first breach of computer security?
    Grier, DA
    IEEE ANNALS OF THE HISTORY OF COMPUTING, 2001, 23 (02) : 78 - 79
  • [45] Bad helplines breach security
    Fox, B
    NEW SCIENTIST, 2000, 166 (2242) : 14 - 14
  • [46] Insider trading ahead of cyber breach announcements
    Lin, Zhaoxin
    Sapp, Travis R. A.
    Ulmer, Jackie Rees
    Parsa, Rahul
    JOURNAL OF FINANCIAL MARKETS, 2020, 50
  • [47] Android Applications and Security Breach
    Noemi Benitez-Mejia, Diana Gabriela
    Sanchez-Perez, Gabriel
    Karina Toscano-Medina, Linda
    2016 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING, DATA MINING, AND WIRELESS COMMUNICATIONS (DIPDMWC), 2016, : 164 - 169
  • [48] State agency security breach
    不详
    COMPUTERS & SECURITY, 2004, 23 (03) : 187 - 188
  • [49] A Classification of Essential Factors for the Development and Implementation of Cyber Security Strategy in Public Sector Organizations
    Aman, Waqas
    Al Shukaili, Jihan
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (08) : 169 - 176
  • [50] Polarised Security: How do Chinese Netizens Respond to the Securitisation of Terrorism?
    Guan, Tianru
    Liu, Tianyang
    ASIAN STUDIES REVIEW, 2020, 44 (02): : 335 - 354