2021
DOI: 10.1057/s41299-021-00121-9
|View full text |Cite
|
Sign up to set email alerts
|

Data Breaches and Effective Crisis Communication: A Comparative Analysis of Corporate Reputational Crises

Abstract: Please provide the closed quote in the sentence 'They coined the term...' "Breach Fatigue" 7. Please provide the closed quotes in the sentence 'The WSJ reported how the MSCI index in...' Equifax "was ill prepared to face the increasing frequency and sophistication of data breaches" [E5: 1]. 8. Please confirm the section level headings add heading for 'Findings and Discussion' 9. In case of major corrections/changes please inform the editors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…planning and response, it can lead to a cascade of adverse effects which includes potential lawsuits and legal challenges, loss of trust and reputation, (Kuipers and Schonheit, 2022). For example, during the 2017 Equifax data breach, the company's initial lack of transparency and proactive measures to protect affected consumers not only resulted in a loss of consumer trust but also led to numerous lawsuits and regulatory penalties, underscoring the link between consumer vulnerability and organisational vulnerability (Kuipers and Schonheit, 2022).…”
Section: Customers Vulnerability Pathwaymentioning
confidence: 99%
See 1 more Smart Citation
“…planning and response, it can lead to a cascade of adverse effects which includes potential lawsuits and legal challenges, loss of trust and reputation, (Kuipers and Schonheit, 2022). For example, during the 2017 Equifax data breach, the company's initial lack of transparency and proactive measures to protect affected consumers not only resulted in a loss of consumer trust but also led to numerous lawsuits and regulatory penalties, underscoring the link between consumer vulnerability and organisational vulnerability (Kuipers and Schonheit, 2022).…”
Section: Customers Vulnerability Pathwaymentioning
confidence: 99%
“…Due to vulnerability, customers may regularly experience feelings of being “underserved, ignored, or excluded” within the marketplace they aim to engage with (Kaufman-Scarborough, 2015). When organisations overlook or mishandle the needs of vulnerable consumers in disaster planning and response, it can lead to a cascade of adverse effects which includes potential lawsuits and legal challenges, loss of trust and reputation, (Kuipers and Schonheit, 2022). For example, during the 2017 Equifax data breach, the company’s initial lack of transparency and proactive measures to protect affected consumers not only resulted in a loss of consumer trust but also led to numerous lawsuits and regulatory penalties, underscoring the link between consumer vulnerability and organisational vulnerability (Kuipers and Schonheit, 2022).…”
Section: Customers Vulnerability Pathwaymentioning
confidence: 99%
“…In order for modern devices to work, they need a set of applications that serve humanity and require several protective measures to prevent intrusions, hacking, attacks, and unauthorized entries. Hacking and data theft constitute a major concern for many companies and institutions [16] [17]. As companies across various industries increasingly recognize the importance of their data, they have started paying attention to cybersecurity, which can be related to several aspects, including the necessary measures to protect communications systems, data, and raw information, virtual and physical elements associated with operating systems, and secure applications that are required to exist within the system and can only be used by certain persons [18][19][20].…”
Section: Practices In Cybersecuritymentioning
confidence: 99%
“…Contemporary technological equipment necessitate applications that cater to the needs of humans while also ensuring safeguards against invasions, hacking, attacks, and unauthorised entrance. Numerous organisations and institutions express concerns regarding the potential risks of hacking and data theft, since they are compelled to safeguard their systems and data [16]. The reference provided is in the form of a numerical citation, indicating that the user is referring Data plays a crucial role in the operations of companies and institutions.…”
Section: Practices Of the Cybersecuritymentioning
confidence: 99%