Security breaches and organization response strategy: Exploring consumers’ threat and coping appraisals

Carol Ou, Xiaowei Zhang, Spyros Angelopoulos, Robert Davison*, Noury Janse

*Corresponding author for this work

Research output: Contribution to journalArticleScientificpeer-review

21 Citations (Scopus)
592 Downloads (Pure)

Abstract

We address a long-standing lacuna in the Information Management literature on the relationships among security breaches, organization response strategy as well as consumers’ threat and coping appraisal. Security breaches can involve the leak of sensitive data, and potentially lead to negative consumer reactions. It is, thus, timely and critical to theorize and empirically investigate the ways in which organization can respond effectively to security breaches and how consumers’ threat and coping appraisals vary according to the different response strategies. Our study addresses this lacuna by developing a conceptual model of i) security breach, ii) organization response strategies, and iii) consumer appraisal, grounded on the risk theory and protection motivation theory. We use the principal and agent perspectives to portray the breached organization as the agent providing the coping strategy, and consumers as the principal actors who evaluate the strategy. We incorporated a vignette-based survey to test the model with empirical data. We identify that the variations in the response strategy of organization after a security breach can lead to significantly different consumers’ reactions. We discuss the implications of our findings for theory and practice and delineate an agenda for future research.
Original languageEnglish
Article number102498
JournalInternational Journal of Information Management
Volume65
DOIs
Publication statusPublished - Aug 2022

Keywords

  • Corporate reputation
  • Intention to re-transact
  • Organization response strategy (ORS)
  • Perceived risk
  • Protection motivation theory (PMT)
  • Security breach

Fingerprint

Dive into the research topics of 'Security breaches and organization response strategy: Exploring consumers’ threat and coping appraisals'. Together they form a unique fingerprint.

Cite this