Purpose Data security breaches are an increasingly common and costly problem for organizations, yet there are critical gaps in our understanding of the role of stakeholder relationship management and crisis communication in relation to data breaches. In fact, though there have been some studies focusing on data breaches, little is known about what might constitute a “typical” response to data breaches whether those responses are effective at maintaining the stakeholders' relationship with the organization, their commitment to use the organization after the crisis, or the reputational threat of the crisis. Further, even less is known about the factors most influencing response and outcome evaluation during data breaches. Design/methodology/a...
This study examines how organizations could potentially overcome the fallout of data breaches and ac...
In this document we describe a theoretical approach to modeling public emotional response cycles to ...
This study examines how organizations could potentially overcome the fallout of data breaches and ac...
Online data breaches are recurrent and damaging cyber incidents for organizations worldwide. This st...
Online data breaches are recurrent and damaging cyber incidents for organizations worldwide. This st...
Companies may face serious adverse consequences as a result of a data breach event. To repair the po...
To fill a gap of research that explores cyber crisis management, this study analyzed news stories of...
For organizations they are pervasive, difficult to keep quiet in today‘s global multimedia environme...
This paper examines how Target Corporation dealt with their data breach when their network was infil...
Data breaches pose severe risks to companies. In fact, those incidents generate adverse effects on t...
Data security breaches are an increasingly common problem for organizations, yet there are critical ...
Data security breaches are an increasingly common problem for organizations, yet there are critical ...
Organisations are susceptible and vulnerable to crisis situations. These organisations have been abl...
As data breaches continue to rise, customers exhibit heterogeneous expectations regarding the compan...
This chapter argues that because of the changing nature of crises, global environments, and reputati...
This study examines how organizations could potentially overcome the fallout of data breaches and ac...
In this document we describe a theoretical approach to modeling public emotional response cycles to ...
This study examines how organizations could potentially overcome the fallout of data breaches and ac...
Online data breaches are recurrent and damaging cyber incidents for organizations worldwide. This st...
Online data breaches are recurrent and damaging cyber incidents for organizations worldwide. This st...
Companies may face serious adverse consequences as a result of a data breach event. To repair the po...
To fill a gap of research that explores cyber crisis management, this study analyzed news stories of...
For organizations they are pervasive, difficult to keep quiet in today‘s global multimedia environme...
This paper examines how Target Corporation dealt with their data breach when their network was infil...
Data breaches pose severe risks to companies. In fact, those incidents generate adverse effects on t...
Data security breaches are an increasingly common problem for organizations, yet there are critical ...
Data security breaches are an increasingly common problem for organizations, yet there are critical ...
Organisations are susceptible and vulnerable to crisis situations. These organisations have been abl...
As data breaches continue to rise, customers exhibit heterogeneous expectations regarding the compan...
This chapter argues that because of the changing nature of crises, global environments, and reputati...
This study examines how organizations could potentially overcome the fallout of data breaches and ac...
In this document we describe a theoretical approach to modeling public emotional response cycles to ...
This study examines how organizations could potentially overcome the fallout of data breaches and ac...