Organizations often respond to cyber security breaches by blaming and shaming the employees who were involved. There is an intuitive natural justice to using such strategies in the belief that the need to avoid repeated shaming occurrences will encourage them to exercise more care. However, psychology highlights significant short- and long-term impacts and harmful consequences of felt shame. To explore and investigate this in the cyber domain, we asked those who had inadvertently triggered an adverse cyber security incident to tell us about their responses and to recount the emotions they experienced when this occurred. We also examined the impact of the organization’s management of the incident on the “culprit’s” future behaviors and attit...
Information security is of vital importance to organizations. Breaches in security very often stem f...
Context Online harassment and stalking have been identified with growing accordance as anti-social ...
In order to find out whether victims adequately recover from cybercrime incidents, it is important t...
Organizations often respond to cyber security breaches by blam- ing and shaming the employees who we...
When employees are shamed after a cybersecurity lapse, they often respond defensively by withdrawing...
New technologies at work broaden the scope of bullying behaviours to the online context, creating op...
Workplace bullying has already been proven to be a major work stressor (Baillien et al., 2011), havi...
James Baldwin says: "though we would like to live without regrets, and sometimes proudly insist that...
Shame as an emotion has been under-explored until recently and its role in the workplace unexplored....
It is well known that workplace bullying is a major stressor at work (Baillien et al., 2011), with i...
Workplace bullying has already been proven to be a major work stressor (Baillien et al., 2011), havi...
The introduction of new technologies created avenues for new forms of bullying. Despite an impressiv...
Security is a priority to most, but studies show that users commonly fail to adopt recommended cyber...
Cyber crime is rising at an unprecedented rate. Organisations are spending more than ever combating ...
Technological advances have resulted in organizations digitalizing many parts of their operations. T...
Information security is of vital importance to organizations. Breaches in security very often stem f...
Context Online harassment and stalking have been identified with growing accordance as anti-social ...
In order to find out whether victims adequately recover from cybercrime incidents, it is important t...
Organizations often respond to cyber security breaches by blam- ing and shaming the employees who we...
When employees are shamed after a cybersecurity lapse, they often respond defensively by withdrawing...
New technologies at work broaden the scope of bullying behaviours to the online context, creating op...
Workplace bullying has already been proven to be a major work stressor (Baillien et al., 2011), havi...
James Baldwin says: "though we would like to live without regrets, and sometimes proudly insist that...
Shame as an emotion has been under-explored until recently and its role in the workplace unexplored....
It is well known that workplace bullying is a major stressor at work (Baillien et al., 2011), with i...
Workplace bullying has already been proven to be a major work stressor (Baillien et al., 2011), havi...
The introduction of new technologies created avenues for new forms of bullying. Despite an impressiv...
Security is a priority to most, but studies show that users commonly fail to adopt recommended cyber...
Cyber crime is rising at an unprecedented rate. Organisations are spending more than ever combating ...
Technological advances have resulted in organizations digitalizing many parts of their operations. T...
Information security is of vital importance to organizations. Breaches in security very often stem f...
Context Online harassment and stalking have been identified with growing accordance as anti-social ...
In order to find out whether victims adequately recover from cybercrime incidents, it is important t...