The existing literature has been silent on individuals’ decision making and reactions in response to data breaches. In 2015, the Office of Personnel Management (OPM) discovered that data of several million Federal employee was stolen in cyber-attacks. Within the context of the OPM breaches, we propose a conceptual model that helps reveal the core decision making process of incident victims in responding to the OPM breach. We also explore the key decision factors including data breach fatigue. Expected findings of study will explain the individual differences in post-breach actions. Further, the study may offer directions to the practitioners and policy makers in conceiving tactics and strategies that promote data breach protections in the a...
In 2020, four United States key federal agencies, from the Department of Homeland Security to the ag...
While the discussion about a federal law on data breach notification is ongoing and a rash of large,...
This study examines how organizations could potentially overcome the fallout of data breaches and ac...
In this document we describe a theoretical approach to modeling public emotional response cycles to ...
Companies may face serious adverse consequences as a result of a data breach event. To repair the po...
Many security experts have addressed the financial and personal security risks involved with the rec...
This paper investigates the shared emotional responses of Twitter users in the aftermath of a massiv...
One data breach in the summer of 2015 against the United States government cost taxpayers more than ...
In the past decade, the world has experienced numerous severe and impactful data breaches, without i...
This report provides an overview of the current understanding of the recent U.S. Office of Personnel...
In response to evolving cybersecurity challenges, global spending on information security has grown ...
We address a long-standing lacuna in the Information Management literature on the relationships amon...
In this document we present a validation of the adaptation of the Kübler-Ross model of the public em...
We address a long-standing lacuna in the Information Management literature on the relationships amon...
This report provides information on the types of data that may be collected in a typical personnel s...
In 2020, four United States key federal agencies, from the Department of Homeland Security to the ag...
While the discussion about a federal law on data breach notification is ongoing and a rash of large,...
This study examines how organizations could potentially overcome the fallout of data breaches and ac...
In this document we describe a theoretical approach to modeling public emotional response cycles to ...
Companies may face serious adverse consequences as a result of a data breach event. To repair the po...
Many security experts have addressed the financial and personal security risks involved with the rec...
This paper investigates the shared emotional responses of Twitter users in the aftermath of a massiv...
One data breach in the summer of 2015 against the United States government cost taxpayers more than ...
In the past decade, the world has experienced numerous severe and impactful data breaches, without i...
This report provides an overview of the current understanding of the recent U.S. Office of Personnel...
In response to evolving cybersecurity challenges, global spending on information security has grown ...
We address a long-standing lacuna in the Information Management literature on the relationships amon...
In this document we present a validation of the adaptation of the Kübler-Ross model of the public em...
We address a long-standing lacuna in the Information Management literature on the relationships amon...
This report provides information on the types of data that may be collected in a typical personnel s...
In 2020, four United States key federal agencies, from the Department of Homeland Security to the ag...
While the discussion about a federal law on data breach notification is ongoing and a rash of large,...
This study examines how organizations could potentially overcome the fallout of data breaches and ac...