Search results

1 – 10 of over 10000
Open Access
Article
Publication date: 9 November 2022

Santhosh Srinivas and Huigang Liang

While every firm is striving to embrace digital transformation (DT) to form new differentiating business capabilities, there are dark sides to such initiatives, and it is…

2943

Abstract

Purpose

While every firm is striving to embrace digital transformation (DT) to form new differentiating business capabilities, there are dark sides to such initiatives, and it is essential to acknowledge, identify and address them. The purpose of this paper is to identify and emperically demonstrate the impact of such darksides of DT. While a firm's DT effort may have many dark sides, the authors identify data breaches as the most critical one and focus on proving their impact since it can inflict significant damage to the firm.

Design/methodology/approach

Through the lens of paradox theory, the authors argue that the DT efforts of a firm will lead to increased risk and severity of data breaches. The authors developed a one-of-a-kind longitudinal data set by combining data from multiple sources, including 3604 brands over a 10-year period, and employed a DT performance scorecard to evaluate a firm's DT effort across four key digital selling touchpoints: site, mobile, digital marketing and social media.

Findings

The findings of this study show that a firm's DT efforts pertaining to its mobile and digital marketing platforms significantly increase the likelihood and severity of a data breach event indicating that these two channels are most vulnerable and need heightened attention from firms. Furthermore, the findings suggest that the negative repercussions of some DT initiatives may be minimized as the firm becomes more innovative. The findings can help firms re-strategize their DT efforts by promoting security and also encouraging a balanced communication strategy.

Originality/value

This research is one of the first to identify, recognize and empirically illustrate the downsides of a DT effort that is otherwise thought to provide only benefits.

Details

Journal of Electronic Business & Digital Economics, vol. 1 no. 1/2
Type: Research Article
ISSN: 2754-4214

Keywords

Article
Publication date: 30 April 2021

Audra Diers-Lawson, Amelia Symons and Cheng Zeng

Data security breaches are an increasingly common and costly problem for organizations, yet there are critical gaps in our understanding of the role of stakeholder relationship…

Abstract

Purpose

Data security breaches are an increasingly common and costly problem for organizations, yet there are critical gaps in our understanding of the role of stakeholder relationship management and crisis communication in relation to data breaches. In fact, though there have been some studies focusing on data breaches, little is known about what might constitute a “typical” response to data breaches whether those responses are effective at maintaining the stakeholders' relationship with the organization, their commitment to use the organization after the crisis, or the reputational threat of the crisis. Further, even less is known about the factors most influencing response and outcome evaluation during data breaches.

Design/methodology/approach

We identify a “typical” response strategy to data breaches and then evaluate the role of this response in comparison to situation, stakeholder demographics and relationships between stakeholders, the issue and the organization using an experimental design. This experiment focuses on a 2 (type of organization) × 2 (prior knowledge of breach risk) with a control group design.

Findings

Findings suggest that rather than employing reactive crisis response messaging the role of public relations should focus on proactive relationship building between organizations and key stakeholders.

Originality/value

For the last several decades much of the field of crisis communication has assumed that in the context of a crisis the response strategy itself would materially help the organization. These data suggest that the field crisis communication may have been making the wrong assumption. In fact, these data suggest that reactive crisis response has little-to-no effect once we consider the relationships between organizations, the issue and stakeholders. The findings show that an ongoing program of crisis capacity building is to an organization's strategic advantage when data security breaches occur.

Details

Corporate Communications: An International Journal, vol. 26 no. 4
Type: Research Article
ISSN: 1356-3289

Keywords

Article
Publication date: 5 May 2015

Robert E. Holtfreter and Adrian Harrington

The main purpose of this paper is to analyze the trends of various types of data breaches and their compromised records in the USA using a new model recently developed by the…

2579

Abstract

Purpose

The main purpose of this paper is to analyze the trends of various types of data breaches and their compromised records in the USA using a new model recently developed by the authors.

Design/methodology/approach

The 2,280 data breaches and over 512 million related compromised records tracked by the Privacy Rights Clearinghouse from 2005 through 2010 were analyzed and classified into four external, five internal and one non-traceable data breach categories, after which trends were determined for each.

Findings

The findings indicate that although the trends for the annual number of data breaches and each of the internal and external categories and their related compromised records have increased over the six-year period, the changes have not been consistent from year to year.

Practical implications

By classifying data breaches into internal and external categories with the use of this new data breach model provides an excellent methodological framework for organizations to use to develop more workable strategies for safeguarding personal information of consumers, clients, employees and other entities.

Originality/value

The topic of data breaches remains salient to profit and nonprofit organizations, researchers, legislators, as well as criminal justice practitioners and consumer advocate groups.

Details

Journal of Financial Crime, vol. 22 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 4 July 2022

Leon Kluiters, Mohit Srivastava and Ladislav Tyll

This study aims to investigate the effects of firm- and governance-specific characteristics on digital trust (DT) and firm value. Firm-specific factors include return on assets…

1424

Abstract

Purpose

This study aims to investigate the effects of firm- and governance-specific characteristics on digital trust (DT) and firm value. Firm-specific factors include return on assets (ROA), market-to-book ratio (M/B ratio), size and leverage, whilst governance-related factors comprise board size, percentage of female board members, board independence and institutional ownership. All listed US firms over the period of 2011–2016 were analysed in this study.

Design/methodology/approach

This study provides a novel method to empirically measure DT by combining multiple variables to create a combined DT score. The variables include security and privacy scores, security rankings and data breaches, amongst others. Subsequently, a linear regression was performed to evaluate the effect of firm- and governance-specific characteristics on DT, as well as the effect of DT on firm value.

Findings

By using signalling theory, this study finds significant evidence that a firm’s profitability (ROA) decreases whilst its size increases DT. This could be due to the fact that firms with lower DT monetise data more actively, decrease DT and increase short-term profitability. Significant evidence also shows that increasing DT leads to an increase in firm value.

Originality/value

Although numerous studies have been conducted on developing customers’ trust by incorporating corporate social responsibility to improve firm value, the literature remains still on its digital analogue. Therefore, this study extends the knowledge of corporate digital responsibility (CDR) by providing a novel method for calculating DT across industries as an antecedent of CDR. Specifically, it sheds light on how firms can enhance DT by utilising firm- and governance-level factors. This enhanced DT can subsequently increase firm value. The study provides important managerial implications by providing empirical evidence that cybersecurity investments increase firm value. This value increase is related to the rise in shareholder value amongst investors and the increase in the organisation’s consumer perceptions as the latter’s interests are better managed.

Details

Society and Business Review, vol. 18 no. 1
Type: Research Article
ISSN: 1746-5680

Keywords

Book part
Publication date: 26 November 2014

Kimberly M. Ellis and Phyllis Y. Keys

To explain for doctoral students and new faculty, the appropriate techniques for using event study methods while identifying problems that make the method difficult for use in the…

Abstract

Purpose

To explain for doctoral students and new faculty, the appropriate techniques for using event study methods while identifying problems that make the method difficult for use in the context of African markets.

Methodology/approach

We review the finance and strategy literature on event studies, provide an illustrative example of the technique, summarize the prior use of the method in research using African samples, and indicate remedies for problems encountered when using the technique in African markets.

Findings

We find limited use of the technique in African markets due to limited data availability which is attributable to problems of infrequent trading, thin markets, and inadequate access to free data.

Research limitations

Our review of the literature on event studies using African data is limited to English-language journals and sources accessible through our library research databases.

Practical implications

More often, researchers will need to use nonparametric techniques to evaluate market responses for companies in or events affecting the African markets.

Originality/value of the chapter

We make a contribution with this chapter by giving a more detailed description of event study methods and by identifying solutions to problems in using the technique in African markets.

Details

Advancing Research Methodology in the African Context: Techniques, Methods, and Designs
Type: Book
ISBN: 978-1-78441-489-4

Keywords

Article
Publication date: 5 June 2017

Jon D. Elhai, Jason C. Levine and Brian J. Hall

Despite concerns about digital privacy, little is known about emotional distress about data hacking and surveillance incidents. The purpose of this paper is to examine variables…

3319

Abstract

Purpose

Despite concerns about digital privacy, little is known about emotional distress about data hacking and surveillance incidents. The purpose of this paper is to examine variables predicting anxiety about data hacking, and the role that such anxiety and other potentially important variables have in explaining the use of digital privacy protection behavior.

Design/methodology/approach

In total, 305 participants from an online labor market were sampled who frequently use the internet, surveyed about recent anxiety (using the Generalized Anxiety Disorder-7 scale (GAD-7)), anxiety about data hacking (GAD-7, in reference to data hacking), and issues of digital privacy: news exposure, perceived importance, self-efficacy, protection behavior, and previous hacking victimization.

Findings

Profession (information technology-related) moderated the symptom structure for recent anxiety, but not data hacking anxiety. Using structural equation modeling, prior hacking victimization predicted anxiety about hacking. Digital privacy protection behavior was related to hacking anxiety and privacy self-efficacy. Data hacking anxiety mediated relations between hacking victimization and privacy protection. Privacy self-efficacy mediated relations between news exposure to hacking incidents and privacy protection.

Research limitations/implications

Limitations include the self-report nature of the instruments, and use of a selective, non-random sample.

Practical implications

Results highlight knowledge, self-efficacy, and threat appraisal among IT managers in motivating better digital security practices.

Originality/value

This is the first study using a standardized instrument of anxiety to examine distress about hacking and predictors of digital privacy protection behavior.

Details

Internet Research, vol. 27 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 16 January 2024

Călin Mihail Rangu, Leonardo Badea, Mircea Constantin Scheau, Larisa Găbudeanu, Iulian Panait and Valentin Radu

In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented…

Abstract

Purpose

In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented insurers with operational challenges and increased costs. The assessment of risks for health systems and cyber–physical systems (CPS) necessitates a heightened degree of attention. The significant values of potential damages and claims request a solid insurance system, part of cyber-resilience. This research paper focuses on the emerging cyber insurance market that is currently in the process of standardizing and improving its risk analysis concerning the potential insured entity.

Design/methodology/approach

The authors' approach involves a quantitative analysis utilizing a Likert-style questionnaire designed to survey cyber insurance professionals. The authors' aim is to identify the current methods used in gathering information from potential clients, as well as the manner in which this information is analyzed by the insurers. Additionally, the authors gather insights on potential improvements that could be made to this process.

Findings

The study the authors elaborated it has a particularly important cyber and risk components for insurance area, because it addresses a “niche” area not yet proper addressed in specialized literature – cyber insurance. Cyber risk management approaches are not uniform at the international level, nor at the insurer level. Also, not all insurers can perform solid assessments, especially since their companies should first prove that they are fully compliant with international cyber security standards.

Research limitations/implications

This research has concentrated on analyzing the current practices in terms of gathering information about the insured entity before issuing the cyber insurance policy, level of details concerning the cyber security posture of the insured entity and way such information should be analyzed in a standardized and useful manner. The novelty of this research resides in the analysis performed as detailed above and the proposals in terms of information gathered, depth of analysis and standardization of approach made. Future work on the topic can focus on the standardization process for analyzing cyber risk for insurance clients, to improve the proposal based also on historical elements and trends in the market. Thus, future research can further refine the standardization process to analyze in more depth the way this can be implemented and included in relevant legislation at the EU level.

Practical implications

Proposed improvements include proposals in terms of the level of detail and the usefulness of an independent centralized approach for information gathering and analysis, especially given the re-insurance and brokerage activities. The authors also propose a common practical procedural approach in risk management, with the involvement of insurance companies and certification institutions of cyber security auditors.

Originality/value

The study investigates the information gathered by insurers from potential clients of cyber insurance and the way this is analyzed and updated for issuance of the insurance policy.

Details

The Journal of Risk Finance, vol. 25 no. 2
Type: Research Article
ISSN: 1526-5943

Keywords

Article
Publication date: 8 April 2024

Princely Ifinedo, Francine Vachon and Anteneh Ayanso

This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.

Abstract

Purpose

This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.

Design/methodology/approach

A cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO) model and Social Cognitive Theory. A research model was proposed and tested with empirical data collected from 213 participants based in Canada.

Findings

The exogenous factors of external privacy training and external privacy self-assessment tool significantly and positively impact the study's endogenous factors of individual privacy awareness, organizational resources allocated to privacy concerns, and group behavior concerning privacy laws. Further, the proximal determinants of data privacy breaches (dependent construct) are negatively influenced by individual privacy awareness, group behavior related to privacy laws, and organizational resources allocated to privacy concerns. The endogenous factors fully mediated the relationships between the exogenous factors and the dependent construct.

Research limitations/implications

This study contributes to the budding data privacy breach literature by highlighting the impacts of personal and environmental factors in the discourse.

Practical implications

The results offer management insights on mitigating data privacy breach incidents arising from employees' actions. Roles of external privacy training and privacy self-assessment tools are signified.

Originality/value

Antecedents of data privacy breaches have been underexplored. This paper is among the first to elucidate the roles of select exogenous and endogenous antecedents encompassing personal and environmental imperatives on data privacy breaches.

Article
Publication date: 20 August 2020

Kholekile Gwebu and Clayton W. Barrows

The purpose of this study is to expand on the existing literature by specifically examining data security incidents within the hospitality industry, assessing origins and causes…

1229

Abstract

Purpose

The purpose of this study is to expand on the existing literature by specifically examining data security incidents within the hospitality industry, assessing origins and causes, comparing breaches within the industry with those of other industries and identifying areas of concern.

Design/methodology/approach

A sample of data breach incidents is drawn from the Verizon VERIS Community Database (VCDB). Statistical comparisons between hospitality and non-hospitality industry firms are conducted following the Verizon A4 threat framework.

Findings

The results reveal that breaches between hospitality and non-hospitality firms differ significantly in terms of actors, actions, assets and attributes. Specifically, proportions of breaches in the hospitality industry are larger in terms of external actors, hacking and malware, user devices compromised and integrity violations. Additionally, compared to other industries, point-of-sales (POS) system breaches occur at a higher rate in the hospitality industry. The study finds that company size, hacking and malware predict the likelihood of a POS breach.

Research limitations/implications

The study uses secondary data and does not include the entire universe of data breaches.

Originality/value

In the quest to reduce data breach incidents, it is imperative to identify and assess the nature of data breach incidents between industries. Doing so permits the development of targeted industry-specific solutions rather than generic ones. This study systematically identifies differences between hospitality and non-hospitality data security incidents and then suggests areas where hospitality companies should focus future attention to mitigate breach incidents.

研究目的

本论文延展了现有文献, 检测了酒店业中的数据安全事故, 评估其起因, 比较其他产业和酒店产业数据泄露的区别, 以及找出关键区域。

研究设计/方法/途径

样本数据为 Verizon VERIS 社区数据库(VCDB)中的数据泄露事件。研究遵循Verizon A4 危险模型, 对酒店业和非酒店业之间事件进行了数据分析比较。

研究结果

研究结果表明酒店公司和非酒店公司的数据泄露在当事人、行为、资产、和属性方面, 有着很大不同。其中, 酒店业中的数据泄露比例在外部因素、黑客、病毒、用户端失灵、和违反道德方面比较大。此外, 相对其他产业, POS系统在酒店产业中的数据泄露概率较高。本论文发现公司规模、黑客、和病毒对POS数据泄露的影响有着重大决定作用。

研究理论限制/意义

本论文使用二手数据, 并未检测整体数据泄露数据。

研究原创性/价值

为了减少数据泄露事件, 产业之间数据泄露事件属性的认定和评价至关重要。因此, 可以针对具体产业具体事件制定出特定的解决方案。本论文系统上指出了酒店和非酒店业的数据安全事件的区别, 以及指出哪些方面, 酒店业应该重点关注, 以减少未来数据泄露事件。

Article
Publication date: 10 June 2021

Cansu Tayaksi, Erhan Ada, Yigit Kazancoglu and Muhittin Sagnak

Today, information systems and technology provides a wide set of tools for companies to increase the efficiency of their businesses. Although technology offers many benefits to…

1118

Abstract

Purpose

Today, information systems and technology provides a wide set of tools for companies to increase the efficiency of their businesses. Although technology offers many benefits to businesses, it also brings risks as the information systems security breaches. Security breaches and their financial impact is a constant concern of the researchers and practitioners. This paper explores information systems breaches and their financial impacts on the publicly traded companies in different sectors.

Design/methodology/approach

After a comprehensive data collection process, data from 192 events are analyzed by employing Event Study Methodology and a comparison of the results between the four highly affected sectors (Consumer Goods, Technology, Financial and Communications) is presented. The abnormal returns on the prices of stocks after the events are calculated with the Market Model. Also, the results of the Market Adjusted Model and Mean Adjusted Model are presented to support the results.

Findings

While information systems security breaches have a significant negative impact on the Financials and the Technology sectors for all the event windows in the study ([−5, 0], [−5, 1], [−5, 5], and [−5, 10]), the significant negative impact is observed only on the [−5, 5] and [−5, 10] event windows for the Consumer Goods sector. No significant negative impact is observed in the Communications sector, in fact, the cumulative abnormal returns are positive for this sector.

Originality/value

The contribution of this paper to provide evidence about the financial impacts of the information systems breaches for businesses in different sectors. While there are studies that have previously focused on the information systems breaches and their financial impacts on businesses, to the best of our knowledge, this is the first study that compares this effect between the four highly impacted sectors. With a relatively larger sample size and broader event windows than the past studies in the literature, statistical evidence is provided to managers to justify their investments in information security and build preventive measures to secure the market value of their firms.

Details

Journal of Enterprise Information Management, vol. 35 no. 2
Type: Research Article
ISSN: 1741-0398

Keywords

1 – 10 of over 10000