Write review on article - security breach

Assignment Help Software Engineering
Reference no: EM132280127

Need to write review on this article with 2 APA references.

A security breach, or data breach crisis, involves the loss of consumer information or the fraudulent use of a credit card information (Kim, Johnson, & Park, 2017).

Although no data is safe from being exploited by hackers, these data breaches targeted specific personally identifiable information as well as financial information. Unlike other data breaches that happened in the US and worldwide, the cases of big retail brands such as Target and Home Depot were more serious in nature (Kim, Johnson, & Park, 2017).

Each of these data breaches resulted in millions of compromised consumer accounts, which can be described as a massive breach crisis (Kim, Johnson, & Park, 2017). Cyber intrusions are becoming more and more common with the advancement of technology and with retailers holding customer databases that are larger than ever before (Kashmiri, Nicol, & Hsu, 2016).

The media continually reports these data breaches in the news. This of course is bad for business because the news of a major customer data breach at one U.S. retail organizations brings an increase in investors' expectations of similar data breaches taking place at other U.S. retailers (Kashmiri, Nicol, & Hsu, 2016).

It is a known fact that organizations similar to the breached company in size and product market characteristics, and those with governance related ties with the breached firm, are more likely to experience a similar breach (Kashmiri, Nicol, & Hsu, 2016). Luke 8:17 states, " For nothing is hidden that will not be made manifest, nor is anything secret that will not be known and come to light."

Data breaches lead to negative media coverage, which in turn, tarnishes a corporate image and consumer trust (Kim, Johnson, & Park, 2017). Individuals involved in public relations cannot necessarily solve all aspects responsible for such data breach crises, but they can and often do serve as forms of communication between an organization, its stakeholder, and the consumers (Kim, Johnson, & Park, 2017). Vulnerabilities in the media helps in evaluating these data breaches to estimate potential reputational and financial damage as well as helps in employing proper crisis response strategies (Kim, Johnson, & Park, 2017).

I believe breaches like these will grow continuously do to the innovation of technology. The bright side is that data breaches could encourage consumers to practice extra precautions when giving out their private information. Job 11:18 states, " And you will feel secure, because there is hope; you will look around and take your rest in security."

Consumers knowing more about these breaches due to the media will keep them informed, and assist them in finding ways to possibly avoid having their data leaked. Psalm 16:8 states, " I have set the Lord always before me; because he is at my right hand, I shall not be shaken." Consumers shall use this verse whenever they feel fear about data breaches. This also helps security professionals.

They will be able to learn the statistics of data breaches to ultimately stay ahead of these attacks. References Kashmiri, S., Nicol, C. D., & Hsu, L. (2016).

Birds of a feather: Intra-industry spillover of the Target customer data breach and the shielding role of IT, marketing, and CSR. Journal of the Academy of Marketing Science, 45(2), 208-228. doi:10.1007/s11747-016-0486-5 Kim, B., Johnson, K., & Park, S. (2017).

Lessons from the five data breaches: Analyzing framed crisis response strategies and crisis severity. Cogent Business & Management, 4(1). doi:10.1080/23311975.2017.1354525

Verified Expert

This article is done in MS word. It reviews two important research arcticles. One is on security breaches and its effect in the retail industry. The other one is regarding the communication to the public regarding security breach. APA references have been added.

Reference no: EM132280127

Questions Cloud

Excision of recurrent pyogenic granuloma : PREOPERATIVE DIAGNOSIS: Pyogenic granuloma, left lateral thigh. POSTOPERATIVE DIAGNOSIS: Pyogenic granuloma, left lateral thigh.
Abnormal form of hemoglobin : A single mutant allele gives rise to an abnormal form of hemoglobin (HbS) instead of HbA. Homozygotes (HbS HbS) develop sickle-cell anemia.
What are fusion proteins : What are fusion proteins? Provide a brief description of steps involved in producing and purification of fusion proteins and two main advantages of using fusion
What are the traits that early humans selected : What are the traits that early humans selected during the domestication of plants. What was the purpose of choosing these particular traits?
Write review on article - security breach : Security breach, or data breach crisis, involves the loss of consumer information or the fraudulent use of a credit card information (Kim, Johnson, & Park
Calculate the projected population size in 2025 and 2050 : Given a 2001 population size of about 285 million, calculate the projected population size in 2025 and 2050.
What does the majority of climate scientists : What does the majority of climate scientists believe is the cause of the current change in climate on earth?
What do the burmese think of orwell : What is he saying about the relationship between colonizer and colonized, between himself and the Burmese?
What are the costs of the two solutions : Suppose you need to back up 50 TB of shared network drives frequently. Find the best solution using a backup tape technology. Compare to an external hard drive.

Reviews

len2280127

4/11/2019 2:03:55 AM

i need to write review on this article with 2 APA references. bj A security breach, or data breach crisis, involves the loss of consumer information or the fraudulent use of a credit card information (Kim, Johnson, & Park, 2017).Analyzing framed crisis response strategies and crisis severity. Cogent Business & Management.

Write a Review

Software Engineering Questions & Answers

  Discuss the benefits of each methodology in their design

Describe in detail the developments as well as psychological considerations in building in HCI systems and applications.

  Explain elicitation of unb course registration system

As a system analyst to do requirement elicitation of UNB course registration system, use an example to tell how you can apply this technique to your elicitation task.

  1 consider the following balance sheeta how does this

1. consider the following balance sheeta. how does this balance sheet differ from the one presented in your

  Design 10 test cases

Design ten test cases and describe the purpose of each of them. The cause is one to two sentences.

  Strategy for addressing the associated risk

For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your..

  Discuss the term cohesion and couplingin software design

Discuss the term cohesion and couplingin software design. In a good software design, why modules should have low coupling and high cohesion?

  Determine the appropriate software engineering tools

ITECH7410 Software Engineering Methodologies Assignment - Individual Roots of Polynomials - Quadratic. determine the appropriate Software Engineering tools

  Describe the scope of the project and control measures

Describe the scope of the project and control measures. Describe the goals and objectives of the project.

  Effectiveness of the new inspection process

Suppose you are tracking the fault density in a series of similar products so that you can monitor the effectiveness of the new inspection process you introduced. Over time, you find that the fault density decreases

  Acceptable policy for the employees

Discuss what factors would you consider. Discuss at least 10 rules that you would consider to put in your acceptable policy list and explain why.

  Software services versus software components

Consider a legacy system and explain how services could be used to implement wrappers to provide access to the system functionality and data for applications built with modern technologies.

  Supplier of office equipment for business

OES LTD is a manufacturer and supplier of office equipment for business. Originally, a family owned business, is now employing over 100 employees with three owners: Joan Smith (Head of Accounts), Peter Saunders (Sales and Marketing) and Raj Kang (..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd