Start Date
12-13-2015
Description
The consequences of data breaches can be severe for the Information Security Reputation (ISR) of organizations. Using social media analytical techniques, this study examines Twitter postings to identify (1) ISR dimensions attributed as being responsible for data breaches and (2) social media sentiments in the aftermath of data breaches. By analyzing tweets related to the data breaches at Home Depot and JPMorgan Chase in 2014, the results suggest that five dimensions of organizational ISR are put into question: Risk and Resilience Structure; Security Ethics and Practices; Structures of Governance and Responsibility; Response Readiness; Social and Moral Benevolence. The attributions and sentiments vary for the five ISR dimensions. Moreover, tweets that attribute data breach responsibility carry more negative sentiments. This study makes an important theoretical contribution by identifying threats to ISR of organizations in social networks. The findings could benefit organizational strategies for social media reputation management and post-data breach intervention.
Recommended Citation
Syed, Romilla and Dhillon, Gurpreet, "Dynamics of Data Breaches in Online Social Networks: Understanding Threats to Organizational Information Security Reputation" (2015). ICIS 2015 Proceedings. 14.
https://aisel.aisnet.org/icis2015/proceedings/SocialMedia/14
Dynamics of Data Breaches in Online Social Networks: Understanding Threats to Organizational Information Security Reputation
The consequences of data breaches can be severe for the Information Security Reputation (ISR) of organizations. Using social media analytical techniques, this study examines Twitter postings to identify (1) ISR dimensions attributed as being responsible for data breaches and (2) social media sentiments in the aftermath of data breaches. By analyzing tweets related to the data breaches at Home Depot and JPMorgan Chase in 2014, the results suggest that five dimensions of organizational ISR are put into question: Risk and Resilience Structure; Security Ethics and Practices; Structures of Governance and Responsibility; Response Readiness; Social and Moral Benevolence. The attributions and sentiments vary for the five ISR dimensions. Moreover, tweets that attribute data breach responsibility carry more negative sentiments. This study makes an important theoretical contribution by identifying threats to ISR of organizations in social networks. The findings could benefit organizational strategies for social media reputation management and post-data breach intervention.