报告网络安全漏洞:组织如何应对

IF 3.1 3区 经济学 Q2 BUSINESS International Journal of Business Communication Pub Date : 2024-03-11 DOI:10.1177/23294884241236201
Jef Naidoo, Ron Dulek, Seth Butler, Brooke Baily
{"title":"报告网络安全漏洞:组织如何应对","authors":"Jef Naidoo, Ron Dulek, Seth Butler, Brooke Baily","doi":"10.1177/23294884241236201","DOIUrl":null,"url":null,"abstract":"Cyber breaches and ransomware attacks now occur so frequently that they have become facets of organizational life. These breaches are unique in that they are initially silent; a limited number of organizational members know about the incident so firms usually have ample time to prepare a Cyber Breach Revelation (CBR). This study analyzes 378 press releases acknowledging a cyber security breach. It finds four response clusters that highlight how compromised organizations reveal cyberattacks to external stakeholders: (1) empathetic acknowledgment; (2) assurance of the organization’s breach-handling capability; (3) restoration of confidence; and, (4) re-establishment of trust and loyalty. These clusters provide meaningful insights as to how firms reveal cyber breaches to their stakeholders and, equally as important, open the door for further studies as to the effectiveness and sequencing of these approaches.","PeriodicalId":45593,"journal":{"name":"International Journal of Business Communication","volume":null,"pages":null},"PeriodicalIF":3.1000,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Reporting a Cyber Security Breach: How Organizations Respond\",\"authors\":\"Jef Naidoo, Ron Dulek, Seth Butler, Brooke Baily\",\"doi\":\"10.1177/23294884241236201\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber breaches and ransomware attacks now occur so frequently that they have become facets of organizational life. These breaches are unique in that they are initially silent; a limited number of organizational members know about the incident so firms usually have ample time to prepare a Cyber Breach Revelation (CBR). This study analyzes 378 press releases acknowledging a cyber security breach. It finds four response clusters that highlight how compromised organizations reveal cyberattacks to external stakeholders: (1) empathetic acknowledgment; (2) assurance of the organization’s breach-handling capability; (3) restoration of confidence; and, (4) re-establishment of trust and loyalty. These clusters provide meaningful insights as to how firms reveal cyber breaches to their stakeholders and, equally as important, open the door for further studies as to the effectiveness and sequencing of these approaches.\",\"PeriodicalId\":45593,\"journal\":{\"name\":\"International Journal of Business Communication\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":3.1000,\"publicationDate\":\"2024-03-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Business Communication\",\"FirstCategoryId\":\"96\",\"ListUrlMain\":\"https://doi.org/10.1177/23294884241236201\",\"RegionNum\":3,\"RegionCategory\":\"经济学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"BUSINESS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Business Communication","FirstCategoryId":"96","ListUrlMain":"https://doi.org/10.1177/23294884241236201","RegionNum":3,"RegionCategory":"经济学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"BUSINESS","Score":null,"Total":0}
引用次数: 0

摘要

现在,网络漏洞和勒索软件攻击频繁发生,已经成为组织生活的一部分。这些外泄事件的独特之处在于,它们最初都是无声无息的;知道事件的组织成员数量有限,因此公司通常有充足的时间准备网络外泄启示(CBR)。本研究分析了 378 篇承认网络安全漏洞的新闻稿。研究发现了四个反应集群,它们强调了受损组织如何向外部利益相关者揭露网络攻击:(1)感同身受的承认;(2)保证组织的漏洞处理能力;(3)恢复信心;以及(4)重建信任和忠诚。这些分组为企业如何向利益相关者揭示网络漏洞提供了有意义的见解,同样重要的是,为进一步研究这些方法的有效性和顺序打开了大门。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Reporting a Cyber Security Breach: How Organizations Respond
Cyber breaches and ransomware attacks now occur so frequently that they have become facets of organizational life. These breaches are unique in that they are initially silent; a limited number of organizational members know about the incident so firms usually have ample time to prepare a Cyber Breach Revelation (CBR). This study analyzes 378 press releases acknowledging a cyber security breach. It finds four response clusters that highlight how compromised organizations reveal cyberattacks to external stakeholders: (1) empathetic acknowledgment; (2) assurance of the organization’s breach-handling capability; (3) restoration of confidence; and, (4) re-establishment of trust and loyalty. These clusters provide meaningful insights as to how firms reveal cyber breaches to their stakeholders and, equally as important, open the door for further studies as to the effectiveness and sequencing of these approaches.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
7.70
自引率
14.30%
发文量
28
期刊介绍: The International Journal of Business Communication (IJBC) publishes manuscripts that contribute to knowledge and theory of business communication as a distinct, multifaceted field approached through the administrative disciplines, the liberal arts, and the social sciences. Accordingly, IJBC seeks manuscripts that address all areas of business communication including but not limited to business composition/technical writing, information systems, international business communication, management communication, and organizational and corporate communication. In addition, IJBC welcomes submissions concerning the role of written, verbal, nonverbal and electronic communication in the creation, maintenance, and performance of profit and not for profit business.
期刊最新文献
The Impact of Organization-Employee Dialogic Communication on Employee Engagement in Remote Work Brand Communication Through Social Media Influencers: Trust Building and Trust Transfer Mechanisms Entrepreneurial Podcasting: A Linguistic Ethnographic Perspective Looking Back, Moving Forward: A Systematic Review of Entrepreneurship Studies in Communication Research Notes From the Editors: Communication for Persuasion, Emotions, and Customers
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1