Data Breaches and the Individual: An Exploratory Study of the OPM Hack

In this document we present a validation of the adaptation of the Kübler-Ross model of the public emotional response cycles to a data breach event. We accomplish this through Tukeys HSD subgrouping analysis in comparison to a visualization of sentiment over time. We also perform a negative binomial regression against retweet count to validate the proposition that emotion is negatively correlated with retweet count and information is positively correlated with retweet count. The data set used to test these theories is contextualized by the OPM data breach of 2015 and consists of twitter data corresponding to the ensuing discussion following public notification that the breach had occurred. The resulting analysis indicates support for the Kübler-Ross adaptation as well as support for the proposed relationship between emotion, information, and retweet count. apathy or even fatigue. Below we present statistical analysis of the activity to identify any statistical significance supporting the Kübler-Ross adaptation.

[1]  Rui Chen,et al.  Modeling Public Response to Data Breaches , 2017, Americas Conference on Information Systems.

[2]  Rui Chen,et al.  An Exploration of Public Reaction to the OPM Data Breach Notifications , 2016, WEB.

[3]  Don Bush How data breaches lead to fraud , 2016, Netw. Secur..

[4]  Paul German A new month, a new data breach , 2016, Netw. Secur..

[5]  H. Brown After the data breach: Managing the crisis and mitigating the impact. , 2016, Journal of business continuity & emergency planning.

[6]  Ryan L. Boyd,et al.  The Development and Psychometric Properties of LIWC2015 , 2015 .

[7]  Robert E. Holtfreter,et al.  Data breach trends in the United States , 2015 .

[8]  Paul A. Watters,et al.  A methodology for estimating the tangible cost of data breaches , 2014, J. Inf. Secur. Appl..

[9]  R. Sharman,et al.  Determinants of Data Breaches: A Categorization-Based Empirical Investigation , 2012 .

[10]  Glen T. Cameron,et al.  Toward a Publics-Driven, Emotion-Based Conceptualization in Crisis Communication: Unearthing Dominant Emotions in Multi-Staged Testing of the Integrated Crisis Mapping (ICM) Model , 2012 .

[11]  Chlotia Posey Garrison,et al.  A Longitudinal Analysis of Data Breaches , 2011, Inf. Manag. Comput. Secur..

[12]  H. Raghav Rao,et al.  Firms' information security investment decisions: Stock market evidence of investors' behavior , 2011, Decis. Support Syst..

[13]  Lars Kai Hansen,et al.  Good Friends, Bad News - Affect and Virality in Twitter , 2011, ArXiv.

[14]  J. Pennebaker,et al.  The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods , 2010 .

[15]  William Roberds,et al.  Data Breaches and Identity Theft , 2008, WEIS.

[16]  Alessandro Acquisti,et al.  Is There a Cost to Privacy Breaches? An Event Study , 2006, WEIS.

[17]  Huseyin Cavusoglu,et al.  The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers , 2004, Int. J. Electron. Commer..

[18]  Lei Zhou,et al.  The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market , 2003, J. Comput. Secur..

[19]  J. Pennebaker,et al.  The Secret Life of Pronouns , 2003, Psychological science.

[20]  J. Pennebaker,et al.  Linguistic styles: language use as an individual difference. , 1999, Journal of personality and social psychology.

[21]  D. Oken On Death and Dying: What the Dying Have to Teach Doctors, Nurses, Clergy and Their Own Families. , 1969 .