Search results

1 – 10 of 80
Content available
Article
Publication date: 21 August 2009

J. Shambora

208

Abstract

Details

Strategic Direction, vol. 25 no. 9
Type: Research Article
ISSN: 0258-0543

Keywords

Content available
Article
Publication date: 1 September 1999

725

Abstract

Details

Circuit World, vol. 25 no. 3
Type: Research Article
ISSN: 0305-6120

Keywords

Content available
Book part
Publication date: 18 July 2013

Abstract

Details

Developing People’s Information Capabilities: Fostering Information Literacy in Educational, Workplace and Community Contexts
Type: Book
ISBN: 978-1-78190-766-5

Abstract

Details

New Library World, vol. 101 no. 6
Type: Research Article
ISSN: 0307-4803

Keywords

Content available
Book part
Publication date: 22 August 2019

Brett Lashua

Abstract

Details

Popular Music, Popular Myth and Cultural Heritage in Cleveland: The Moondog, The Buzzard, and the Battle for the Rock and Roll Hall of Fame
Type: Book
ISBN: 978-1-78769-156-8

Content available
Book part
Publication date: 6 July 2020

John Fenwick and Lorraine Johnston

Abstract

Details

Leading Local Government: The Role of Directly Elected Mayors
Type: Book
ISBN: 978-1-83909-650-1

Content available
Book part
Publication date: 16 September 2019

James Fowler

Abstract

Details

London Transport: A Hybrid in History 1905–1948
Type: Book
ISBN: 978-1-78973-953-4

Open Access
Article
Publication date: 9 November 2021

Zareef Mohammed

Data breaches are an increasing phenomenon in today's digital society. Despite the preparations an organization must take to prevent a data breach, it is still necessary to…

3708

Abstract

Purpose

Data breaches are an increasing phenomenon in today's digital society. Despite the preparations an organization must take to prevent a data breach, it is still necessary to develop strategies in the event of a data breach. This paper explores the key recovery areas necessary for data breach recovery.

Design/methodology/approach

Stakeholder theory and three recovery areas (customer, employee and process recovery) are proposed as necessary theoretical lens to study data breach recovery. Three data breach cases (Anthem, Equifax, and Citrix) were presented to provide merit to the argument of the proposed theoretical foundations of stakeholder theory and recovery areas for data breach recovery research.

Findings

Insights from these cases reveal four areas of recovery are necessary for data breach recovery – customer recovery, employee recovery, process recovery and regulatory recovery.

Originality/value

These areas are presented in the data recovery areas model and are necessary for: (1) organizations to focus on these areas when resolving data breaches and (2) future data breach recovery researchers in developing their research in the field.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Content available
350

Abstract

Details

Library Hi Tech News, vol. 17 no. 3
Type: Research Article
ISSN: 0741-9058

1 – 10 of 80