IDEAS home Printed from https://ideas.repec.org/a/baq/taprar/v6y2023i4p20-26.html
   My bibliography  Save this article

Analysing the implications of cybersecurity breaches on firm leadership

Author

Listed:
  • Alexander Oluka

    (Durban University of Technology)

Abstract

The object of this research is the implications of cybersecurity breaches on the leaders of accounting firms in KwaZulu-Natal, South Africa. The research employed a qualitative approach with interviews as the primary data collection technique.The researcher adopted a rigorous analytical framework, utilising different scholarly sources to analyse and explain the intricate experiences of firm leaders. The study revealed that leaders of accounting firms experience psychological, financial, and social consequences due to cybersecurity breaches. It highlights the emotional impact, including anxiety and increased stress. The fear of potential job losses was found to be one issue leaders were worried about after the data breach. The stress from dealing with the aftermath of data breaches affected their family relationships. In addition, leaders experienced low productivity and increased pressure dealing with the media and organization stakeholders and the stigma associated with data breaches. Given the critical role that accounting firms play in the financial ecosystem and the sensitive nature of the data they handle, it is imperative that cybersecurity is prioritised. However, studies have focused on the financial implications of cybersecurity breaches on businesses, but less attention has been paid to the psychological, social, and financial implications of breaches on firm leaders.The findings are significant for academic discourse but also provide leaders with strategies to mitigate the adverse effects of breaches, while also offering a framework for other researchers and practitioners in different regions and sectors to understand and study the phenomenon further.

Suggested Citation

  • Alexander Oluka, 2023. "Analysing the implications of cybersecurity breaches on firm leadership," Technology audit and production reserves, PC TECHNOLOGY CENTER, vol. 6(4(74)), pages 20-26, October.
  • Handle: RePEc:baq:taprar:v:6:y:2023:i:4:p:20-26
    DOI: 10.15587/2706-5448.2023.286985
    as

    Download full text from publisher

    File URL: https://journals.uran.ua/tarp/article/download/286985/284957
    Download Restriction: no

    File URL: https://libkey.io/10.15587/2706-5448.2023.286985?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Sasha Romanosky & David Hoffman & Alessandro Acquisti, 2014. "Empirical Analysis of Data Breach Litigation," Journal of Empirical Legal Studies, John Wiley & Sons, vol. 11(1), pages 74-104, March.
    2. Matteo La Torre & John Dumay & Michele Antonio Rea, 2018. "Breaching intellectual capital: critical reflections on Big Data security," Meditari Accountancy Research, Emerald Group Publishing Limited, vol. 26(3), pages 463-482, July.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Kristin Masuch & Maike Greve & Simon Trang, 2021. "What to do after a data breach? Examining apology and compensation as response strategies for health service providers," Electronic Markets, Springer;IIM University of St. Gallen, vol. 31(4), pages 829-848, December.
    2. Antill, Samuel & Grenadier, Steven R., 2023. "Financing the litigation arms race," Journal of Financial Economics, Elsevier, vol. 149(2), pages 218-234.
    3. Wang, Jimin & Ho, Choy Yeing (Chloe) & Shan, Yuan George, 2024. "Does cybersecurity risk stifle corporate innovation activities?," International Review of Financial Analysis, Elsevier, vol. 91(C).
    4. Jing Chen & Elaine Henry & Xi Jiang, 2023. "Is Cybersecurity Risk Factor Disclosure Informative? Evidence from Disclosures Following a Data Breach," Journal of Business Ethics, Springer, vol. 187(1), pages 199-224, September.
    5. Luca Allodi & Fabio Massacci, 2017. "Security Events and Vulnerability Data for Cybersecurity Risk Estimation," Risk Analysis, John Wiley & Sons, vol. 37(8), pages 1606-1627, August.
    6. Park, Sangchul, 2019. "Why information security law has been ineffective in addressing security vulnerabilities: Evidence from California data breach notifications and relevant court and government records," International Review of Law and Economics, Elsevier, vol. 58(C), pages 132-145.
    7. Guha, Abhijit & Grewal, Dhruv & Kopalle, Praveen K. & Haenlein, Michael & Schneider, Matthew J. & Jung, Hyunseok & Moustafa, Rida & Hegde, Dinesh R. & Hawkins, Gary, 2021. "How artificial intelligence will affect the future of retailing," Journal of Retailing, Elsevier, vol. 97(1), pages 28-41.
    8. Jens Foerderer & Sebastian W. Schuetz, 2022. "Data Breach Announcements and Stock Market Reactions: A Matter of Timing?," Management Science, INFORMS, vol. 68(10), pages 7298-7322, October.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:baq:taprar:v:6:y:2023:i:4:p:20-26. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Iryna Prudius (email available below). General contact details of provider: https://journals.uran.ua/tarp/issue/archive .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.