Write review on article - security breach

Assignment Help Software Engineering
Reference no: EM132280127

Need to write review on this article with 2 APA references.

A security breach, or data breach crisis, involves the loss of consumer information or the fraudulent use of a credit card information (Kim, Johnson, & Park, 2017).

Although no data is safe from being exploited by hackers, these data breaches targeted specific personally identifiable information as well as financial information. Unlike other data breaches that happened in the US and worldwide, the cases of big retail brands such as Target and Home Depot were more serious in nature (Kim, Johnson, & Park, 2017).

Each of these data breaches resulted in millions of compromised consumer accounts, which can be described as a massive breach crisis (Kim, Johnson, & Park, 2017). Cyber intrusions are becoming more and more common with the advancement of technology and with retailers holding customer databases that are larger than ever before (Kashmiri, Nicol, & Hsu, 2016).

The media continually reports these data breaches in the news. This of course is bad for business because the news of a major customer data breach at one U.S. retail organizations brings an increase in investors' expectations of similar data breaches taking place at other U.S. retailers (Kashmiri, Nicol, & Hsu, 2016).

It is a known fact that organizations similar to the breached company in size and product market characteristics, and those with governance related ties with the breached firm, are more likely to experience a similar breach (Kashmiri, Nicol, & Hsu, 2016). Luke 8:17 states, " For nothing is hidden that will not be made manifest, nor is anything secret that will not be known and come to light."

Data breaches lead to negative media coverage, which in turn, tarnishes a corporate image and consumer trust (Kim, Johnson, & Park, 2017). Individuals involved in public relations cannot necessarily solve all aspects responsible for such data breach crises, but they can and often do serve as forms of communication between an organization, its stakeholder, and the consumers (Kim, Johnson, & Park, 2017). Vulnerabilities in the media helps in evaluating these data breaches to estimate potential reputational and financial damage as well as helps in employing proper crisis response strategies (Kim, Johnson, & Park, 2017).

I believe breaches like these will grow continuously do to the innovation of technology. The bright side is that data breaches could encourage consumers to practice extra precautions when giving out their private information. Job 11:18 states, " And you will feel secure, because there is hope; you will look around and take your rest in security."

Consumers knowing more about these breaches due to the media will keep them informed, and assist them in finding ways to possibly avoid having their data leaked. Psalm 16:8 states, " I have set the Lord always before me; because he is at my right hand, I shall not be shaken." Consumers shall use this verse whenever they feel fear about data breaches. This also helps security professionals.

They will be able to learn the statistics of data breaches to ultimately stay ahead of these attacks. References Kashmiri, S., Nicol, C. D., & Hsu, L. (2016).

Birds of a feather: Intra-industry spillover of the Target customer data breach and the shielding role of IT, marketing, and CSR. Journal of the Academy of Marketing Science, 45(2), 208-228. doi:10.1007/s11747-016-0486-5 Kim, B., Johnson, K., & Park, S. (2017).

Lessons from the five data breaches: Analyzing framed crisis response strategies and crisis severity. Cogent Business & Management, 4(1). doi:10.1080/23311975.2017.1354525

Verified Expert

This article is done in MS word. It reviews two important research arcticles. One is on security breaches and its effect in the retail industry. The other one is regarding the communication to the public regarding security breach. APA references have been added.

Reference no: EM132280127

Questions Cloud

Excision of recurrent pyogenic granuloma : PREOPERATIVE DIAGNOSIS: Pyogenic granuloma, left lateral thigh. POSTOPERATIVE DIAGNOSIS: Pyogenic granuloma, left lateral thigh.
Abnormal form of hemoglobin : A single mutant allele gives rise to an abnormal form of hemoglobin (HbS) instead of HbA. Homozygotes (HbS HbS) develop sickle-cell anemia.
What are fusion proteins : What are fusion proteins? Provide a brief description of steps involved in producing and purification of fusion proteins and two main advantages of using fusion
What are the traits that early humans selected : What are the traits that early humans selected during the domestication of plants. What was the purpose of choosing these particular traits?
Write review on article - security breach : Security breach, or data breach crisis, involves the loss of consumer information or the fraudulent use of a credit card information (Kim, Johnson, & Park
Calculate the projected population size in 2025 and 2050 : Given a 2001 population size of about 285 million, calculate the projected population size in 2025 and 2050.
What does the majority of climate scientists : What does the majority of climate scientists believe is the cause of the current change in climate on earth?
What do the burmese think of orwell : What is he saying about the relationship between colonizer and colonized, between himself and the Burmese?
What are the costs of the two solutions : Suppose you need to back up 50 TB of shared network drives frequently. Find the best solution using a backup tape technology. Compare to an external hard drive.

Reviews

len2280127

4/11/2019 2:03:55 AM

i need to write review on this article with 2 APA references. bj A security breach, or data breach crisis, involves the loss of consumer information or the fraudulent use of a credit card information (Kim, Johnson, & Park, 2017).Analyzing framed crisis response strategies and crisis severity. Cogent Business & Management.

Write a Review

Software Engineering Questions & Answers

  Calculate several metrics based on the compiled code

Compiling and Running: Briefly explain how to compile and run your code from the command-line on one of the Linux lab machines in building 314

  Present an argument against lines of code

Present an argument against lines of code as a measure for software productivity. Will your case hold up when dozens or hundreds of projects are considered?

  State diagram for coffee machine controller

Design behavioral specs by using state diagram for coffee machine controller given below: State events. Machine operates ah hourly interval.

  Explain phase of prototyping model for software development

Explain the phases of the prototyping model for software development? What are the primary advantages of component-based process model for software engineering?

  Describe two major erp systems

Create a 7-to10-slide presentation comparing and contrasting two major ERP systems from different ERP software providers. You may use various sources including the companies' websites

  How has information technology impacted governing bodies

Literature Review - How has Information Technology impacted governing bodies' ability to align public policy with stakeholder needs

  You have been recently employed as the director of

you have been recently employed as the director of operations of a hotel. the hotel is in a relatively large city with

  What protocol game programmers would use udp or tcp

What protocol do you think video game programmers would use UDP or TCP. Why do you think the game uses one or the other protocols

  Explain model-based expert systems

Explain model-based expert systems and frame-based expert systems

  Write a paragraph news brief on the current state of uml

Write a paragraph news brief on the current state of UML (the current version and when it will be released, future improvements, etc.).

  Define the client side and server side requirements

Define the client side and server side requirements

  Draw the ERD Diagram using SDLC for Vic Roads

Prepare a complete report and Draw the ERD Diagram using SDLC for selected Company. The selected company is Vic Roads

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd