The OPM data breach: An investigation of shared emotional reactions on Twitter.

E Bachura, R Valecha, R Chen, HR Rao - MIS quarterly, 2022 - search.ebscohost.com
This paper investigates the shared emotional responses of Twitter users in the aftermath of a
massive data breach, a crisis event known as the Office of Personnel Management (OPM) …

Enterprise reputation threats on social media: A case of data breach framing

R Syed - The Journal of Strategic Information Systems, 2019 - Elsevier
Reputation threats on social media in the aftermath of a data breach is a critical concern to
enterprises. We argue that any effort to minimize reputation threats will require an orderly …

Reacting to the scope of a data breach: The differential role of fear and anger

S Chatterjee, X Gao, S Sarkar, C Uzmanoglu - Journal of Business …, 2019 - Elsevier
We investigate how fearful and angry consumers react to the scope (number of customers
affected) of a data breach. In two laboratory studies, we show that whereas fear makes …

What it takes to get retweeted: An analysis of software vulnerability messages

R Syed, M Rahafrooz, JM Keisler - Computers in Human Behavior, 2018 - Elsevier
A large body of research has examined the public disclosure of software vulnerability, but
little attention has been paid to sharing software vulnerability information on social media …

The Digital Operational Resilience Act for Financial Services: A Comparative Gap Analysis and Literature Review

A Neumannová, EWN Bernroider… - … Mediterranean, and Middle …, 2022 - Springer
Regulatory bodies, driven by enhanced speed of digital transformations, seek to strengthen
the resilience of information and communication technologies (ICT) to ensure their …

Security and privacy of smart homes: issues and solutions

M Lundgren, A Padyab - Security and Privacy in the Internet of …, 2021 - Wiley Online Library
The current discussion and adoption of new technologies such as Internet of Things and
smart technologies, like smart homes, have blossomed over the last decade. The user …

An analysis of the public consequences of cybersecurity incidents in Brazil

V de Lemos, L Ignaczak - Social Network Analysis and Mining, 2023 - Springer
Cybersecurity incidents, like data breaches and ransomware, are on the rise, and their
consequences can affect companies from different perspectives. On the one hand, a well …

[PDF][PDF] Six Board Roles for Information Security Governance

S Nodehi, T Huygh, L Bollen - International Conference on …, 2024 - scitepress.org
As cyber threats evolve, board engagement is becoming increasingly essential to ensure
Information Security (InfoSec) is integrated into an organization's strategic fabric, ensuring …

A Deep Dive Into Cybersecurity Risk Assessment and Countermeasures in Online Social Networks

A Zineddine, Y Belfaik, Y Sadqi - Risk Assessment and …, 2024 - igi-global.com
In the evolving realm of online social networks (OSNs), assessing cybersecurity risks and
implementing effective countermeasures are crucial for practitioners. This chapter confronts …

Online Privacy Protection: An Analysis of Social Media Reactions to Data Breaches

S Seo, Y Go, HJ Lee - Knowledge Management Research, 2024 - koreascience.kr
This study analyzed the changes in social media reactions of data subjects to major
personal data breach incidents in South Korea from January 2014 to October 2022. We …