Security breaches and organization response strategy: Exploring consumers’ threat and coping appraisals
Published 2022 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Security breaches and organization response strategy: Exploring consumers’ threat and coping appraisals
Authors
Keywords
-
Journal
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT
Volume 65, Issue -, Pages 102498
Publisher
Elsevier BV
Online
2022-03-13
DOI
10.1016/j.ijinfomgt.2022.102498
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Emotional reactions and coping responses of employees to a cyber-attack: A case study
- (2021) Patrick Stacey et al. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT
- Putting the IS back into IS research
- (2021) Mylène Struijk et al. INFORMATION SYSTEMS JOURNAL
- Setting the future of digital and social media marketing research: Perspectives and research propositions
- (2020) Yogesh K. Dwivedi et al. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT
- The Role of Corporate Reputation and Crisis Response Strategies in Data Breach Management
- (2018) Kholekile L. Gwebu et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- How people protect their privacy on facebook: A cost-benefit view
- (2018) Arun Vishwanath et al. Journal of the Association for Information Science and Technology
- Using Measures of Risk Perception to Predict Information Security Behavior: Insights from Electroencephalography (EEG)
- (2018) Anthony Vance et al. Journal of the Association for Information Systems
- Examining the intended and unintended consequences of organisational privacy safeguards
- (2017) Rachida Parks et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
- (2017) Paul Benjamin Lowry et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory
- (2017) Philip Menard et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- User Compensation as a Data Breach Recovery Action: An Investigation of the Sony PlayStation Network Breach
- (2017) Sigi Goode et al. MIS QUARTERLY
- Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions
- (2017) Anderson et al. MIS QUARTERLY
- Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults
- (2016) Rajarshi Chakraborty et al. DECISION SUPPORT SYSTEMS
- Dispositional and situational factors: influences on information security policy violations
- (2016) Allen C Johnston et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Influence of Firm’s Recovery Endeavors upon Privacy Breach on Online Customer Behavior
- (2016) Ben C.F. Choi et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- “Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels
- (2016) Paul Benjamin Lowry et al. JOURNAL OF STRATEGIC INFORMATION SYSTEMS
- Information Systems Control: A Review and Framework for Emerging Information Systems Processes
- (2016) W. Alec Cram et al. Journal of the Association for Information Systems
- Trust violation and repair: The information privacy perspective
- (2015) Gaurav Bansal et al. DECISION SUPPORT SYSTEMS
- An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
- (2015) Allen C. Johnston et al. MIS QUARTERLY
- Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective
- (2014) John D'Arcy et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- The impact of information security events on the stock value of firms: the effect of contingency factors
- (2010) Ali Alper Yayla et al. JOURNAL OF INFORMATION TECHNOLOGY
- Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software
- (2009) Younghwa Lee et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Protection motivation and deterrence: a framework for security policy compliance in organisations
- (2009) Tejaswini Herath et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Estimating the market impact of security breach announcements on firm values
- (2009) Sanjay Goel et al. INFORMATION & MANAGEMENT
- Individual Swift Trust and Knowledge-Based Trust in Face-to-Face and Virtual Team Members
- (2009) Lionel P. Robert et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Understanding the Value of Countermeasure Portfolios in Information Systems Security
- (2008) Ram L. Kumar et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started