To read this content please select one of the options below:

Shaken to the core: trust trajectories in the aftermaths of adverse cyber events

Rosalind Searle (Adam Smith Business School, University of Glasgow, Glasgow, UK)
Karen V. Renaud (Department of Computer and Information Sciences, University of Strathclyde, Glasgow, UK) (University of South Africa, Pretoria, South Africa) (Rhodes University, Grahamstown, South Africa) (Abertay University, Dundee, UK)
Lisa van der Werff (Business School, Dublin City University, Dublin, Ireland)

Journal of Intellectual Capital

ISSN: 1469-1930

Article publication date: 11 October 2024

Issue publication date: 8 November 2024

53

Abstract

Purpose

Adverse cyber events, like death and taxes, have become inevitable. They are an increasingly common feature of organisational life. Their aftermaths are a critical and under-examined context and dynamic space within which to examine trust. In this paper, we address this deficit.

Design/methodology/approach

Drawing on pertinent theory and reports of empirical studies, we outline the basis of two alternative subsequent trajectories, drawing out the relationships between trust, vulnerability and emotion, both positive and negative, in the aftermath of an adverse cyber event.

Findings

We combine stage theory and social information processing theories to delineate the dynamics of trust processes and their multilevel trajectories during adverse cyber event aftermaths. We consider two response trajectories to chart the way vulnerability arises at different levels within these social systems to create self-reinforcing trust and distrust spirals. These ripple out to impact multiple levels of the organisation by either amplifying or relieving vulnerability.

Research limitations/implications

The way adverse cyber events aftermaths are managed has immediate and long-term consequences for organisational stakeholders. Actions impact resilience and the ability to preserve the social fabric of the organisations. Subsequent trajectories can be “negative” or “positive”. The “negative” trajectory is characterised by efforts to identify and punish the employee whose actions facilitated the adverse events, i.e. the “who”. Public scapegoating might follow thereby amplifying perceived vulnerability and reducing trust across the board. By contrast, the “positive” trajectory relieves perceived vulnerability by focusing on, and correcting, situational causatives. Here, the focus is on the “what” and “why” of the event.

Practical implications

We raise the importance of responding in a constructive way to adverse cyber events.

Originality/value

The aftermaths of cyber attacks in organisations are a critical, neglected context. We explore the interplay between trust and vulnerability and its implications for management “best practice”.

Keywords

Citation

Searle, R., Renaud, K.V. and van der Werff, L. (2024), "Shaken to the core: trust trajectories in the aftermaths of adverse cyber events", Journal of Intellectual Capital, Vol. 25 No. 5/6, pp. 1154-1183. https://doi.org/10.1108/JIC-02-2024-0038

Publisher

:

Emerald Publishing Limited

Copyright © 2024, Emerald Publishing Limited

Related articles