Antecedents and consequences of data breaches: A systematic review

F Schlackl, N Link, H Hoehle - Information & Management, 2022 - Elsevier
Research on data breaches is scattered across disciplines and methodologies. To help
consolidate it, we review 43 articles on data breaches' antecedents and 83 on their …

Understanding the state of criminological scholarship on cybercrimes

TJ Holt - Computers in Human Behavior, 2023 - Elsevier
Understanding the state of criminological scholarship on cybercrimes - ScienceDirect Skip to
main contentSkip to article Elsevier logo Journals & Books Search RegisterSign in View PDF …

Cyber-analytics: Modeling factors associated with healthcare data breaches

A McLeod, D Dolezel - Decision Support Systems, 2018 - Elsevier
The purpose of this study was to develop a model of factors associated with healthcare data
breaches. Variables were operationalized as the healthcare facilities' level of exposure …

Too good to be true: Firm social performance and the risk of data breach

J D'Arcy, I Adjerid, CM Angst… - Information Systems …, 2020 - pubsonline.informs.org
In this paper, we draw from research in the information systems security and management
fields to theorize that a firm's social performance, as measured by its engagement in socially …

Panel report: the dark side of the digitization of the individual

O Turel, C Matt, M Trenz, CMK Cheung, J D'Arcy*… - Internet …, 2019 - emerald.com
Purpose Digital technologies have diffused into many personal life domains. This has
created many new phenomena that require systematic theorizing, testing and …

Digging deeper into data breaches: An exploratory data analysis of hacking breaches over time

H Hammouchi, O Cherqi, G Mezzour, M Ghogho… - Procedia Computer …, 2019 - Elsevier
Data breaches represent a permanent threat to all types of organizations. Although the types
of breaches are different, the impacts are always the same. This paper focuses on analyzing …

Managing asymmetric events with anticipatory and reactive strategies

CE Short, MD Pfarrer - Journal of Management, 2023 - journals.sagepub.com
Impression management refers to the strategies a firm uses to influence how evaluators view
the firm, a key factor that impacts firm outcomes and that is particularly salient when negative …

Data breaches and effective crisis communication: a comparative analysis of corporate reputational crises

S Kuipers, M Schonheit - Corporate Reputation Review, 2022 - Springer
Online data breaches are recurrent and damaging cyber incidents fors organizations
worldwide. This study examines how organizations can effectively mitigate reputational …

Incorrect compliance and correct noncompliance with information security policies: A framework of rule-related information security behaviour

M Niemimaa - Computers & Security, 2024 - Elsevier
Abstract Information security policy (ISP) compliance is recognized as a key measure for
dealing with human errors when protecting information. A considerable and growing body of …

[HTML][HTML] A cybersecurity risk quantification and classification framework for informed risk mitigation decisions

A Zadeh, B Lavine, H Zolbanin, D Hopkins - Decision Analytics Journal, 2023 - Elsevier
Data breaches have been causing havoc for many years and continue to rise, demanding a
more comprehensive framework to assess their severity. This study proposes a …