2019
DOI: 10.1002/asi.24188
|View full text |Cite
|
Sign up to set email alerts
|

An Investigation of the Impact of Data Breach Severity on the Readability of Mandatory Data Breach Notification Letters: Evidence From U.S. Firms

Abstract: The aim of this article is to investigate the impact of data breach severity on the readability of mandatory data breach notification letters. Using a content analysis approach to determine data breach severity attributes (measured by the total number of breached records, type of data accessed, the source of the data breach, and how the data were used), in conjunction with readability measures (reading complexity, numerical intensity, length of letter, word size, and unique words), 512 data breach incidents fr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 48 publications
0
2
0
Order By: Relevance
“…44 Diction has already been used in the literature to analyze texts from different fields, such as accounting (Arslan-Ayaydin et al, 2016;Cho et al, 2010), management (Sydserff and Weetman, 2002), political science (e.g. Hart and Childers, 2005), and -more recentlyalso legal disclosures (Jackson et al, 2019). As a recognized rigorous empirical method (for a review, see Patelli and Pedrini, 2014), it seems appropriate also for analyzing judicial decisions.…”
Section: A Appendix A: Data Sourcesmentioning
confidence: 99%
“…44 Diction has already been used in the literature to analyze texts from different fields, such as accounting (Arslan-Ayaydin et al, 2016;Cho et al, 2010), management (Sydserff and Weetman, 2002), political science (e.g. Hart and Childers, 2005), and -more recentlyalso legal disclosures (Jackson et al, 2019). As a recognized rigorous empirical method (for a review, see Patelli and Pedrini, 2014), it seems appropriate also for analyzing judicial decisions.…”
Section: A Appendix A: Data Sourcesmentioning
confidence: 99%
“…Even today, some organizations such as phone companies and banks still use DOB as one of several authentication questions when users phone in (Kaur et al 2020;Lee et al 2020;Robinson 2019). The treatment of DOB as private data can also be seen in the European GDPR regulation where DOB is legally considered to be personal data (Commission 2020) and is also regularly reported in data breach reports to the public as important personal information that may or may not have been lost during the breach (Jackson, Vanteeva, and Fearon 2019). Still, the use of DOB in authentication these days is significantly lower compared to a couple of decades ago before the spread of social media.…”
Section: Introductionmentioning
confidence: 99%