2014
DOI: 10.1080/10570314.2013.866686
|View full text |Cite
|
Sign up to set email alerts
|

‘All that Glitters is not Gold’: The Role of Impression Management in Data Breach Notification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 31 publications
0
9
0
Order By: Relevance
“…Despite extensive prior work measuring password reuse, very few studies have examined password-reuse notifications. Jenkins et al evaluated the efficacy of just-in-time fear appeals in warnings -"persuasive messages intended to better help someone be aware of a threat and to persuade them to engage in protective action" -at preventing users from reusing passwords, finding that such appeals resulted in a significant decrease in password reuse [33]. This suggests that notifications could encourage better password creation and management strategies.…”
Section: Security Warnings and Notificationsmentioning
confidence: 99%
“…Despite extensive prior work measuring password reuse, very few studies have examined password-reuse notifications. Jenkins et al evaluated the efficacy of just-in-time fear appeals in warnings -"persuasive messages intended to better help someone be aware of a threat and to persuade them to engage in protective action" -at preventing users from reusing passwords, finding that such appeals resulted in a significant decrease in password reuse [33]. This suggests that notifications could encourage better password creation and management strategies.…”
Section: Security Warnings and Notificationsmentioning
confidence: 99%
“…Although mostly used to study interpersonal communication, IMT has recently been used to study how organizations attempt to construct a positive image after an image-threatening event. Some scholars have studied how organizations manage their public image using prosocial claims (McDonnell & King, 2013) or how they inform consumers of data breaches that will reduce the damage to organizational reputation (Jenkins et al, 2014). Other scholars also have studied how organizations use impression management tactics after a crisis (Allen & Caillouet, 1994;Marcus & Goodman, 1991).…”
Section: Impression Management Theorymentioning
confidence: 99%
“…IMT has infrequently been applied to an online, organizational communication setting or to such a unique product category such as JUUL. IMT was originally conceptualized to apply to interpersonal communication (Leary and Kowalski, 1990) and was later applied to organizations to understand how they construct a positive image after image-threatening events or crises (Allen & Caillouet, 1994;Jenkins et al, 2014;Marcus & Goodman, 1991;McDonnell & King, 2013). What is unique about this study is that JUUL is an organization that is paradoxical as it can be seen as both promoting prosocial and nonprosocial behaviors.…”
Section: Theoretical Implicationsmentioning
confidence: 99%