1,507 research outputs found

    Dynamics of Data Breaches in Online Social Networks: Understanding Threats to Organizational Information Security Reputation

    Get PDF
    The consequences of data breaches can be severe for the Information Security Reputation (ISR) of organizations. Using social media analytical techniques, this study examines Twitter postings to identify (1) ISR dimensions attributed as being responsible for data breaches and (2) social media sentiments in the aftermath of data breaches. By analyzing tweets related to the data breaches at Home Depot and JPMorgan Chase in 2014, the results suggest that five dimensions of organizational ISR are put into question: Risk and Resilience Structure; Security Ethics and Practices; Structures of Governance and Responsibility; Response Readiness; Social and Moral Benevolence. The attributions and sentiments vary for the five ISR dimensions. Moreover, tweets that attribute data breach responsibility carry more negative sentiments. This study makes an important theoretical contribution by identifying threats to ISR of organizations in social networks. The findings could benefit organizational strategies for social media reputation management and post-data breach intervention

    Journalists or Cyber-Anarchists? A qualitative analysis of professional journalists' commentary about WikiLeaks

    Get PDF
    New media for sharing information online have presented a challenge to professional journalism in a variety of ways, as new tools or media for communicating information allow more of the public to share information in a publicly available way. WikiLeaks, an online site that began publishing secret and classified information in 2007, provides a useful lens through which to examine professional journalists' responses to one such challenge. In responding to these challenges, journalists may engage in paradigm repair, making efforts to reinforce and police their professional norms and practices by identifying and normalizing violations. This study examines the terms and the frames used in commentary about WikiLeaks by professional journalists, in an attempt to understand how professional journalists define and defend their own profession through their efforts at paradigm repair, and to consider the professional, social, and political consequences of those efforts. Journalists primarily framed WikiLeaks as a non-journalist actor, one that threatened the national security of the United States. This framing can be seen as paradigm repair, as journalists excluded WikiLeaks from their profession on the basis of its lack of editorial structure, physical location, and concern for U.S. public interest. The consequences of this exclusion are to leave WikiLeaks and other non-traditional journalistic actors more vulnerable, and to make it more difficult for professional journalists to stay relevant and adopt improved practices in the changing media ecology

    A survey on competitive intelligence practices for strategic decisions

    Get PDF
    Doutoramento em GestãoThis thesis aims to measure the frequency use of competitive intelligence as a support tool to the strategic decision-making in Portuguese organizations. Likewise, the thesis aims to measure the satisfaction level of the decision-maker when making decisions based on competitive intelligence. Based on an extensive literature review, some hypotheses appear to support a survey addressing competitive intelligence issues. Considering a convenient sample, the conclusions drawn about the use and satisfaction level based on competitive intelligence are as expected, as what lies beneath strategic decisions is also answered.Esta tese tem o objectivo de medir a frequência do uso de competitive intelligence como ferramenta de suporte à tomada de decisão estratégica nas empresas Portuguesas. De igual modo, tem o objectivo de medir o grau de satisfação dos decisores quando tomam decisões baseadas em competitive intelligence. Com base numa extensa revisão de literatura, surgem algumas hipóteses que suportam um inquérito sobre competitive intelligence. Considerando uma amostra de conveniência, as conclusões tiradas são as esperadas, e obtém-se a resposta para o que está por detrás da decisão estratégica.info:eu-repo/semantics/publishedVersio

    Transforming CyberSecurity R&D within the Department of Energy: Getting Ahead of The Threat

    Full text link

    Case study : Facebook in face of crisis

    Get PDF
    Created to connect people in a limited academic environment, Facebook rapidly became the world’s largest social media network, containing numerous, and highly valued features. Despite its rapid growth and outstanding performance, Facebook has seen better days. In March 2018, the giant was caught up in a large-scale data breach scandal, in which the British political consulting firm Cambridge Analytica acquired the personal data of around 87 million users without their consent and used it for political purposes, namely in the 2016 U.S. Presidential elections but also in the Brexit Vote Leave campaign. The scandal caused Facebook to face the wrath of all those affected by the privacy breach but also of those who were indirectly, in some way, concerned by what happened. Several challenges confronted the company afterwards, such as legal actions for the lack of users’ privacy protection. Nevertheless, even if Facebook put in place several measures to prevent such an event from happening again, the biggest challenge was definitely to regain stakeholder’s trust and to rebuild the organization’s reputation. The crisis response strategies adopted by Facebook were considered not enough to reassure users and all those troubled by the breach. This case study provides appropriate data that allows students to assess the crisis situation and to put themselves in a position of Facebook’s CMO, in order to come up with crisis management path suggestions, through the combination of theories and real-life facts.Criado para interligar pessoas num meio académico limitado, o Facebook rapidamente se tornou na maior rede social do mundo, contendo inúmeras características muito valorizadas pelas pessoas. Apesar do seu rápido crescimento e performance distinguível, o Facebook já viu melhores dias. Em Março de 2018, o gigante foi apanhado num escândalo de violação de dados em larga escala, no qual a empresa britânica de consultoria política Cambridge Analytica adquiriu os dados de cerca de 87 milhões de utilizadores sem o seu consentimento e usou-os para fins políticos, nomeadamente nas eleições presidenciais dos E.U.A em 2016, mas também na campanha Vote Leave do Brexit. O escândalo fez o Facebook enfrentar a ira de todos os afetados, mas também daqueles que estavam indiretamente, de alguma forma, preocupados com o que aconteceu. Vários desafios confrontaram a empresa posteriormente, como ações judiciais por falta de proteção da privacidade dos utilizadores. Contudo, mesmo com as medidas aplicadas pelo Facebook para evitar a recorrência deste tipo de eventos no futuro, o maior desafio foi definitivamente recuperar a confiança das partes interessadas e reconstruir a reputação da organização. As estratégias de resposta à crise adotadas pelo Facebook foram consideradas insuficientes para tranquilizar os utilizadores e todos os afetados. Este estudo de caso fornece dados apropriados que permitem que os alunos avaliem a situação de crise e se posicionem como CMO do Facebook, para apresentar sugestões de caminhos para a gestão de crises, através da combinação de teorias e acontecimentos reais

    Secure Communication in Disaster Scenarios

    Get PDF
    Während Naturkatastrophen oder terroristischer Anschläge ist die bestehende Kommunikationsinfrastruktur häufig überlastet oder fällt komplett aus. In diesen Situationen können mobile Geräte mithilfe von drahtloser ad-hoc- und unterbrechungstoleranter Vernetzung miteinander verbunden werden, um ein Notfall-Kommunikationssystem für Zivilisten und Rettungsdienste einzurichten. Falls verfügbar, kann eine Verbindung zu Cloud-Diensten im Internet eine wertvolle Hilfe im Krisen- und Katastrophenmanagement sein. Solche Kommunikationssysteme bergen jedoch ernsthafte Sicherheitsrisiken, da Angreifer versuchen könnten, vertrauliche Daten zu stehlen, gefälschte Benachrichtigungen von Notfalldiensten einzuspeisen oder Denial-of-Service (DoS) Angriffe durchzuführen. Diese Dissertation schlägt neue Ansätze zur Kommunikation in Notfallnetzen von mobilen Geräten vor, die von der Kommunikation zwischen Mobilfunkgeräten bis zu Cloud-Diensten auf Servern im Internet reichen. Durch die Nutzung dieser Ansätze werden die Sicherheit der Geräte-zu-Geräte-Kommunikation, die Sicherheit von Notfall-Apps auf mobilen Geräten und die Sicherheit von Server-Systemen für Cloud-Dienste verbessert

    National Cyber Security Program of Taiwan (2021-2024)

    Get PDF
    • …
    corecore