4.5 Article

Enterprise reputation threats on social media: A case of data breach framing

Journal

JOURNAL OF STRATEGIC INFORMATION SYSTEMS
Volume 28, Issue 3, Pages 257-274

Publisher

ELSEVIER
DOI: 10.1016/j.jsis.2018.12.001

Keywords

Enterprise reputation; Reputation threat; Crisis; Data breach; Social media; Framing

Ask authors/readers for more resources

Reputation threats on social media in the aftermath of a data breach is a critical concern to enterprises. We argue that any effort to minimize reputation threats will require an orderly assessment of how reputation threat manifests on social media. Drawing on crisis communication and social media literature, we analyze Twitter postings related to the 2014 Home Depot data breach. We identify a taxonomy of data breach frames and sub-frames and the related reputation threats as manifested by data breach responsibility-attributions and negative emotional responses. Results indicate that reputation threats vary for intentional, accidental, and victim data breach frames. Based on crisis stage theory, we also analyze the dynamics of evolving reputation threats as data breach situation unfolds on social media. Results suggest that the data breach frames and associated reputation threats vary across the crisis stages. Further, intentional and accidental frames increase subsequent responsibility-attributions and negative emotions. Tweets with responsibility-attributions further increase the subsequent generation of reputation-threatening tweets. Negative emotions, particularly anger and disgust, also increase subsequent reputation threats. Our study has implications for enterprise reputation management and word-ofmouth literature. The results yield valuable insights that can guide enterprise strategy for social media reputation management and post data breach intervention.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Management

The Identity Management Value Model: A Design Science Approach to Assess Value Gaps on Social Media

Romilla Syed, Gurpreet Dhillon, Jason Merrick

DECISION SCIENCES (2019)

Article Psychology, Multidisciplinary

What it takes to get retweeted: An analysis of software vulnerability messages

Romilla Syed, Maryam Rahafrooz, Jeffrey M. Keisler

COMPUTERS IN HUMAN BEHAVIOR (2018)

Article Psychology, Multidisciplinary

Value-based information privacy objectives for Internet Commerce

Gurpreet Dhillon, Tiago Oliveira, Romilla Syed

COMPUTERS IN HUMAN BEHAVIOR (2018)

No Data Available