With the increasing number of companies actively collecting data, the number of data breaches has exploded. It can be observed that affected often discontinue their relationship with the company. In order to avoid this kind of response, companies should develop and deploy their own recovery strategies. In our paper, we examined the effectiveness of different recovery strategies geared towards retaining customer satisfaction immediately after a data breach. We examine a data breach of a fitness tracker that varies in severity and tests the recovery actions compensation and remorse. The results found that customer satisfaction depends on the severity of the data breach, while combining compensation and remorse together demonstrates itself as the best strategy for increasing customer satisfaction in almost all cases. However, it was also discovered that in case of a severe data breach, customer satisfaction is difficult to restore and in the end remorse has virtually no effect.
Unlocking and managing flexibility is an important contribution to the integration of renewable energy and an efficient and resilient operation of the power system. In this paper, we discuss how the potential of a fleet of battery-electric transportation vehicles can be used to provide frequency containment reserve. To this end, we first examine the use case in detail and then present the system designed to meet this challenge. We give an overview of the tasks and individual sub-components, consisting of (a) an artificial neural network to predict the availability of Automated Guided Vehicles (AGVs) day-ahead, (b) a heuristic approach to compute marketable flexibility, (c) a simulation to check the plausibility of flexibility schedules, (d) a multi-agent system to continuously monitor and control the AGVs and (e) the integration of fleet flexibility into a virtual power plant. We also present our approach to the economic analysis of this provision of a system-critical service in a logistical context characterised by high uncertainty and variability.
Information security has become an increasingly important aspect in companies and households during this time of digitalization. Cyber attacks and especially ransomware attacks are a growing threat. How people react to and perceive this threat is a central component of this study. This paper is meant to investigate how threat and efficacy influence individuals' information security behavior. For this purpose, a structural equation model was developed using the Extended Parallel Process Model (EPPM). The results show that participants who received a low threat message in their ransom demand were less afraid and more likely to deal with the issue. At the same time, they were not as confident as people who perceived a significant threat. Participants who felt that they had little adequate protection against ransomware were more fearful and therefore dealt with the topic more defensively. Conversely, they also had the intention to behave safely.
Innovative IT-enabled health services promise tremendous benefits for customers and service providers alike. Simultaneously, health services by nature process sensitive customer information, and data breaches have become an everyday phenomenon. The challenge that health service providers face is to find effective recovery strategies after data breaches to retain customer trust and loyalty. We theorize and investigate how two widely applied recovery actions (namely apology and compensation) affect customer reactions after a data breach in the specific context of fitness trackers. Drawing on expectation confirmation theory, we argue that the recovery actions derived from practice, apology, and compensation address the assimilation-contrast model’s tolerance range and, thus, always lead to satisfaction with the recovery strategy, which positively influences customers’ behavior. We employ an experimental investigation and collect data from fitness tracker users during a running event. In the end, we found substantial support for our research model. Health service providers should determine specific customer expectations and align their data breach recovery strategies accordingly.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.