Data Breaches and the Individual: An Exploratory Study of the OPM Hack
暂无分享,去创建一个
Rui Chen | H. Raghav Rao | Rohit Valecha | Eric Bachura | H. Rao | Rui Chen | Rohit Valecha | Eric Bachura
[1] Rui Chen,et al. Modeling Public Response to Data Breaches , 2017, Americas Conference on Information Systems.
[2] Rui Chen,et al. An Exploration of Public Reaction to the OPM Data Breach Notifications , 2016, WEB.
[3] Don Bush. How data breaches lead to fraud , 2016, Netw. Secur..
[4] Paul German. A new month, a new data breach , 2016, Netw. Secur..
[5] H. Brown. After the data breach: Managing the crisis and mitigating the impact. , 2016, Journal of business continuity & emergency planning.
[6] Ryan L. Boyd,et al. The Development and Psychometric Properties of LIWC2015 , 2015 .
[7] Robert E. Holtfreter,et al. Data breach trends in the United States , 2015 .
[8] Paul A. Watters,et al. A methodology for estimating the tangible cost of data breaches , 2014, J. Inf. Secur. Appl..
[9] R. Sharman,et al. Determinants of Data Breaches: A Categorization-Based Empirical Investigation , 2012 .
[10] Glen T. Cameron,et al. Toward a Publics-Driven, Emotion-Based Conceptualization in Crisis Communication: Unearthing Dominant Emotions in Multi-Staged Testing of the Integrated Crisis Mapping (ICM) Model , 2012 .
[11] Chlotia Posey Garrison,et al. A Longitudinal Analysis of Data Breaches , 2011, Inf. Manag. Comput. Secur..
[12] H. Raghav Rao,et al. Firms' information security investment decisions: Stock market evidence of investors' behavior , 2011, Decis. Support Syst..
[13] Lars Kai Hansen,et al. Good Friends, Bad News - Affect and Virality in Twitter , 2011, ArXiv.
[14] J. Pennebaker,et al. The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods , 2010 .
[15] William Roberds,et al. Data Breaches and Identity Theft , 2008, WEIS.
[16] Alessandro Acquisti,et al. Is There a Cost to Privacy Breaches? An Event Study , 2006, WEIS.
[17] Huseyin Cavusoglu,et al. The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers , 2004, Int. J. Electron. Commer..
[18] Lei Zhou,et al. The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market , 2003, J. Comput. Secur..
[19] J. Pennebaker,et al. The Secret Life of Pronouns , 2003, Psychological science.
[20] J. Pennebaker,et al. Linguistic styles: language use as an individual difference. , 1999, Journal of personality and social psychology.
[21] D. Oken. On Death and Dying: What the Dying Have to Teach Doctors, Nurses, Clergy and Their Own Families. , 1969 .