Write review on article - security breach

Assignment Help Software Engineering
Reference no: EM132280127

Need to write review on this article with 2 APA references.

A security breach, or data breach crisis, involves the loss of consumer information or the fraudulent use of a credit card information (Kim, Johnson, & Park, 2017).

Although no data is safe from being exploited by hackers, these data breaches targeted specific personally identifiable information as well as financial information. Unlike other data breaches that happened in the US and worldwide, the cases of big retail brands such as Target and Home Depot were more serious in nature (Kim, Johnson, & Park, 2017).

Each of these data breaches resulted in millions of compromised consumer accounts, which can be described as a massive breach crisis (Kim, Johnson, & Park, 2017). Cyber intrusions are becoming more and more common with the advancement of technology and with retailers holding customer databases that are larger than ever before (Kashmiri, Nicol, & Hsu, 2016).

The media continually reports these data breaches in the news. This of course is bad for business because the news of a major customer data breach at one U.S. retail organizations brings an increase in investors' expectations of similar data breaches taking place at other U.S. retailers (Kashmiri, Nicol, & Hsu, 2016).

It is a known fact that organizations similar to the breached company in size and product market characteristics, and those with governance related ties with the breached firm, are more likely to experience a similar breach (Kashmiri, Nicol, & Hsu, 2016). Luke 8:17 states, " For nothing is hidden that will not be made manifest, nor is anything secret that will not be known and come to light."

Data breaches lead to negative media coverage, which in turn, tarnishes a corporate image and consumer trust (Kim, Johnson, & Park, 2017). Individuals involved in public relations cannot necessarily solve all aspects responsible for such data breach crises, but they can and often do serve as forms of communication between an organization, its stakeholder, and the consumers (Kim, Johnson, & Park, 2017). Vulnerabilities in the media helps in evaluating these data breaches to estimate potential reputational and financial damage as well as helps in employing proper crisis response strategies (Kim, Johnson, & Park, 2017).

I believe breaches like these will grow continuously do to the innovation of technology. The bright side is that data breaches could encourage consumers to practice extra precautions when giving out their private information. Job 11:18 states, " And you will feel secure, because there is hope; you will look around and take your rest in security."

Consumers knowing more about these breaches due to the media will keep them informed, and assist them in finding ways to possibly avoid having their data leaked. Psalm 16:8 states, " I have set the Lord always before me; because he is at my right hand, I shall not be shaken." Consumers shall use this verse whenever they feel fear about data breaches. This also helps security professionals.

They will be able to learn the statistics of data breaches to ultimately stay ahead of these attacks. References Kashmiri, S., Nicol, C. D., & Hsu, L. (2016).

Birds of a feather: Intra-industry spillover of the Target customer data breach and the shielding role of IT, marketing, and CSR. Journal of the Academy of Marketing Science, 45(2), 208-228. doi:10.1007/s11747-016-0486-5 Kim, B., Johnson, K., & Park, S. (2017).

Lessons from the five data breaches: Analyzing framed crisis response strategies and crisis severity. Cogent Business & Management, 4(1). doi:10.1080/23311975.2017.1354525

Verified Expert

This article is done in MS word. It reviews two important research arcticles. One is on security breaches and its effect in the retail industry. The other one is regarding the communication to the public regarding security breach. APA references have been added.

Reference no: EM132280127

Questions Cloud

Excision of recurrent pyogenic granuloma : PREOPERATIVE DIAGNOSIS: Pyogenic granuloma, left lateral thigh. POSTOPERATIVE DIAGNOSIS: Pyogenic granuloma, left lateral thigh.
Abnormal form of hemoglobin : A single mutant allele gives rise to an abnormal form of hemoglobin (HbS) instead of HbA. Homozygotes (HbS HbS) develop sickle-cell anemia.
What are fusion proteins : What are fusion proteins? Provide a brief description of steps involved in producing and purification of fusion proteins and two main advantages of using fusion
What are the traits that early humans selected : What are the traits that early humans selected during the domestication of plants. What was the purpose of choosing these particular traits?
Write review on article - security breach : Security breach, or data breach crisis, involves the loss of consumer information or the fraudulent use of a credit card information (Kim, Johnson, & Park
Calculate the projected population size in 2025 and 2050 : Given a 2001 population size of about 285 million, calculate the projected population size in 2025 and 2050.
What does the majority of climate scientists : What does the majority of climate scientists believe is the cause of the current change in climate on earth?
What do the burmese think of orwell : What is he saying about the relationship between colonizer and colonized, between himself and the Burmese?
What are the costs of the two solutions : Suppose you need to back up 50 TB of shared network drives frequently. Find the best solution using a backup tape technology. Compare to an external hard drive.

Reviews

len2280127

4/11/2019 2:03:55 AM

i need to write review on this article with 2 APA references. bj A security breach, or data breach crisis, involves the loss of consumer information or the fraudulent use of a credit card information (Kim, Johnson, & Park, 2017).Analyzing framed crisis response strategies and crisis severity. Cogent Business & Management.

Write a Review

Software Engineering Questions & Answers

  Create graph which shows congestion window size

Design another scenario as duplicate of Drop_Fast scenario. Write the new scenario Drop_Fast_Buffer. In new scenario, edit attributes of Client_East node and assign 65535 to its Receiver Buffer.

  How complexity of software project influence the guidelines

Analyze how the complexity of a software project and the size of a team influence the guidelines you selected in Part 1 of this discussion.

  Basic information about customers

Your business needs a program to enter basic information about your customers.

  Make changes to the format class

Be sure to notice that the supplied program already handles compound statements, which are delimited by braces, so the code that you add should not treat compound statements as a special case.

  Software engineer working as a performance engineer

Prepare and submit a paper dealing with a topic from your current course that could be applied to your workplace. The paper should be a minimum of 750 words (about 3 double-spaced pages) and contain a minimum of two (2) outside references from peer-r..

  Draw an erd for the parrot palace information system

Parrot Palace works with TV and movie producers who need birds that can perform special tricks, such as playing dead, reciting poetry, ladder climbs, and various other tricks.

  Create the software test document

ITECH7409 - Software Testing - Develop and maintain plans for scheduling quality assurance tasks including software testing-Implementation of project management

  Develop a mock-up for the high-level interface screens

Develop a mock-up or storyboard for the high-level interface screens - Design, and Implementation Specification title page with new date. Update the previously completed sections based on the instructor's feedback.

  How the xml equivalent capabilities were used

Write a short essay to discuss how the XML equivalent capabilities were used in the past in WBIS and what changes are expected in XML in future?

  Explain why you selected the architecture of this case study

Read the case study titled "A Patient Information System for Mental Health Care", located in Chapter 1 of your textbook (attached). Develop an overall architecture for the system described in the assigned reading. Explain why you selected the arch..

  Question choose a local store or service organization which

question choose a local store or service organization which will form the case study for your group assignment.the

  1how does the heckscher-ohlin theory differ from ricardian

1.how does the heckscher-ohlin theory differ from ricardian theory in explaining international trade patterns?2.the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd