Really, What Are They Offering? A Taxonomy of Companies' Actual Response Strategies after a Data Breach

Till Ole Diesterhöft, Kristin Masuch, Maike Greve, Simon Trang

Research output: Chapter in Book/Report/Conference proceedingConference abstract in proceedingsResearchpeer-review

Abstract

Data breaches have become an everyday phenomenon. As a consequence, organizations no longer solely focus on prevention but also proactively prepare for the next data breach. A key element of these efforts is data breach response strategies that aim to retain trust and loyalty of the affected parties. Prior research provides important insights into the effects, causes, and conditions of effective response strategies. However, an underlying conceptualization of different forms of data breach response strategies is lacking. By analyzing the response strategies of 313 data breaches, we inductively derive a taxonomy of data breach response strategies. Our results suggest that response actions can be classified along eight dimensions including 22 distinct characteristics. Our research provides contributions to research and practice. The taxonomy provides a comprehensive framework and allows to link different research streams logically. Subsequently, the taxonomy helps managers to distinguish different data breach response strategies and implement suitable measures.
Original languageEnglish
Title of host publicationProceedings of the 15th Pre-ICIS Workshop on Information Security and Privacy. WISP 2020
Number of pages17
Place of PublicationAtlanta, GA
PublisherAssociation for Information Systems. AIS Electronic Library (AISeL)
Publication date2020
Article number7
Publication statusPublished - 2020
Externally publishedYes
Event15th Pre-ICIS Workshop on Information Security And Privacy. WISP 2020 - Virtual session, Zoom, WWW
Duration: 12 Dec 202012 Dec 2020
Conference number: 15
https://cybersecurity.fsu.edu/wisp/?page_id=93

Workshop

Workshop15th Pre-ICIS Workshop on Information Security And Privacy. WISP 2020
Number15
LocationVirtual session, Zoom
Country/TerritoryWWW
Period12/12/202012/12/2020
Internet address

Keywords

  • Data breaches
  • Response strategies
  • Response actions
  • Taxonomy
  • Affected companies

Cite this