Write review on article - security breach

Assignment Help Software Engineering
Reference no: EM132280127

Need to write review on this article with 2 APA references.

A security breach, or data breach crisis, involves the loss of consumer information or the fraudulent use of a credit card information (Kim, Johnson, & Park, 2017).

Although no data is safe from being exploited by hackers, these data breaches targeted specific personally identifiable information as well as financial information. Unlike other data breaches that happened in the US and worldwide, the cases of big retail brands such as Target and Home Depot were more serious in nature (Kim, Johnson, & Park, 2017).

Each of these data breaches resulted in millions of compromised consumer accounts, which can be described as a massive breach crisis (Kim, Johnson, & Park, 2017). Cyber intrusions are becoming more and more common with the advancement of technology and with retailers holding customer databases that are larger than ever before (Kashmiri, Nicol, & Hsu, 2016).

The media continually reports these data breaches in the news. This of course is bad for business because the news of a major customer data breach at one U.S. retail organizations brings an increase in investors' expectations of similar data breaches taking place at other U.S. retailers (Kashmiri, Nicol, & Hsu, 2016).

It is a known fact that organizations similar to the breached company in size and product market characteristics, and those with governance related ties with the breached firm, are more likely to experience a similar breach (Kashmiri, Nicol, & Hsu, 2016). Luke 8:17 states, " For nothing is hidden that will not be made manifest, nor is anything secret that will not be known and come to light."

Data breaches lead to negative media coverage, which in turn, tarnishes a corporate image and consumer trust (Kim, Johnson, & Park, 2017). Individuals involved in public relations cannot necessarily solve all aspects responsible for such data breach crises, but they can and often do serve as forms of communication between an organization, its stakeholder, and the consumers (Kim, Johnson, & Park, 2017). Vulnerabilities in the media helps in evaluating these data breaches to estimate potential reputational and financial damage as well as helps in employing proper crisis response strategies (Kim, Johnson, & Park, 2017).

I believe breaches like these will grow continuously do to the innovation of technology. The bright side is that data breaches could encourage consumers to practice extra precautions when giving out their private information. Job 11:18 states, " And you will feel secure, because there is hope; you will look around and take your rest in security."

Consumers knowing more about these breaches due to the media will keep them informed, and assist them in finding ways to possibly avoid having their data leaked. Psalm 16:8 states, " I have set the Lord always before me; because he is at my right hand, I shall not be shaken." Consumers shall use this verse whenever they feel fear about data breaches. This also helps security professionals.

They will be able to learn the statistics of data breaches to ultimately stay ahead of these attacks. References Kashmiri, S., Nicol, C. D., & Hsu, L. (2016).

Birds of a feather: Intra-industry spillover of the Target customer data breach and the shielding role of IT, marketing, and CSR. Journal of the Academy of Marketing Science, 45(2), 208-228. doi:10.1007/s11747-016-0486-5 Kim, B., Johnson, K., & Park, S. (2017).

Lessons from the five data breaches: Analyzing framed crisis response strategies and crisis severity. Cogent Business & Management, 4(1). doi:10.1080/23311975.2017.1354525

Verified Expert

This article is done in MS word. It reviews two important research arcticles. One is on security breaches and its effect in the retail industry. The other one is regarding the communication to the public regarding security breach. APA references have been added.

Reference no: EM132280127

Questions Cloud

Excision of recurrent pyogenic granuloma : PREOPERATIVE DIAGNOSIS: Pyogenic granuloma, left lateral thigh. POSTOPERATIVE DIAGNOSIS: Pyogenic granuloma, left lateral thigh.
Abnormal form of hemoglobin : A single mutant allele gives rise to an abnormal form of hemoglobin (HbS) instead of HbA. Homozygotes (HbS HbS) develop sickle-cell anemia.
What are fusion proteins : What are fusion proteins? Provide a brief description of steps involved in producing and purification of fusion proteins and two main advantages of using fusion
What are the traits that early humans selected : What are the traits that early humans selected during the domestication of plants. What was the purpose of choosing these particular traits?
Write review on article - security breach : Security breach, or data breach crisis, involves the loss of consumer information or the fraudulent use of a credit card information (Kim, Johnson, & Park
Calculate the projected population size in 2025 and 2050 : Given a 2001 population size of about 285 million, calculate the projected population size in 2025 and 2050.
What does the majority of climate scientists : What does the majority of climate scientists believe is the cause of the current change in climate on earth?
What do the burmese think of orwell : What is he saying about the relationship between colonizer and colonized, between himself and the Burmese?
What are the costs of the two solutions : Suppose you need to back up 50 TB of shared network drives frequently. Find the best solution using a backup tape technology. Compare to an external hard drive.

Reviews

len2280127

4/11/2019 2:03:55 AM

i need to write review on this article with 2 APA references. bj A security breach, or data breach crisis, involves the loss of consumer information or the fraudulent use of a credit card information (Kim, Johnson, & Park, 2017).Analyzing framed crisis response strategies and crisis severity. Cogent Business & Management.

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd