2021
DOI: 10.1016/j.im.2020.103392
|View full text |Cite
|
Sign up to set email alerts
|

Data Breach Management: An Integrated Risk Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(22 citation statements)
references
References 76 publications
0
22
0
Order By: Relevance
“…However, in terms of managerial actions aimed directly at improving cybersecurity following breaches, research is scarce. Some of it has focused on risk models emphasizing the role of containment and recovery after a data breach ( Khan et al, 2021 ), as well as on the importance of a business continuity plan to minimize disruption ( Cerullo and Cerullo, 2004 ).…”
Section: Cybersecuritymentioning
confidence: 99%
“…However, in terms of managerial actions aimed directly at improving cybersecurity following breaches, research is scarce. Some of it has focused on risk models emphasizing the role of containment and recovery after a data breach ( Khan et al, 2021 ), as well as on the importance of a business continuity plan to minimize disruption ( Cerullo and Cerullo, 2004 ).…”
Section: Cybersecuritymentioning
confidence: 99%
“…In addition, Nikkhah and Grover (2022) suggested that corrective actions represent companies' primary efforts to minimize the negative consequences of crises and attempt to prevent similar events in the future. From a risk management perspective, Khan et al (2021) proposed data breach containment as a recovery category and provided several recovery actions for emerging data breach incidents. Data breach containment refers to interventions aimed at limiting the scale and scope of a data breach immediately upon detection.…”
Section: Organizational Remedies After a Data Breachmentioning
confidence: 99%
“…In this study, financial strategies refers to the company accepting responsibility for the data breach by offering an apology and providing financial compensation (Gwebu et al ., 2018). Rather than influencing the attributions of responsibilities, functional strategies focus on implementing technical actions to minimize the severity of a data breach (Khan et al. , 2021).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Is the storage service provider compliant with local laws and regulations? Finally, more efforts have to be made to develop procedures to automatically detect, report, and investigate data breaches [131].…”
Section: Visibility and Transparencymentioning
confidence: 99%