“…In this study, we took an explorative stance to probe the scope of the experiences that ensue from cybersecurity breach situations of connected technology, including IoT devices, smartphones, computers, and communication technology (social networks, email). Although largely exploratory, we used a theory-driven approach, by structuring the open questions and analyzing the responses using categories from emotion theories (Connor-Smith & Flachsbart, 2007;Fontaine et al, 2013;Scherer, 2001) While previous studies explored only one component of emotion experiences towards cyber-security breach situations, namely subjective feelings such as anger or emotion dimension such as emotional arousal (Canetti et al, 2017;Oulasvirta et al, 2012;Pyke et al, 2021;Symantec, 2011), we went further by also exploring appraisals, bodily reactions, expressions and action tendencies. This approach allowed us to explore all facets of emotion experiences in cybersecurity breach situations.…”