IDEAS home Printed from https://ideas.repec.org/a/eme/majpps/maj-11-2017-1692.html
   My bibliography  Save this article

Consumer security behaviors and trust following a data breach

Author

Listed:
  • Shelby R. Curtis
  • Jessica Rose Carre
  • Daniel Nelson Jones

Abstract

Purpose - The purpose of this study was to determine how security statement certainty (overconfident, underconfident and realistic) and behavioral intentions of potential consumers impact the perceptions of companies in the presence or absence of a past security breach. Design/methodology/approach - The study exposed participants to three types of security statements and randomly assigned them to the presence or absence of a previous breach. Participants then evaluated the company and generated a hypothetical password for that company. Findings - This study found that the presence or absence of a previous breach had a large impact on company perceptions, but a minimal impact on behavioral intentions to be personally more secure. Research limitations/implications - The authors found that the presence or absence of a previous breach had a large impact on company perceptions, but minimal impact on behavioral intentions to be personally more secure. Practical implications - Companies need to be cautious about how much confidence they convey to consumers. Companies should not rely on consumers engaging in secure online practices, even following a breach. Social implications - Companies need to communicate personal security behaviors to consumers in a way that still instills confidence in the company but encourages personal responsibility. Originality/value - The confidence of company security statements and presence of a previous breach were examined for their impact on company perception and a novel dependent variable of password complexity.

Suggested Citation

  • Shelby R. Curtis & Jessica Rose Carre & Daniel Nelson Jones, 2018. "Consumer security behaviors and trust following a data breach," Managerial Auditing Journal, Emerald Group Publishing Limited, vol. 33(4), pages 425-435, April.
  • Handle: RePEc:eme:majpps:maj-11-2017-1692
    DOI: 10.1108/MAJ-11-2017-1692
    as

    Download full text from publisher

    File URL: https://www.emerald.com/insight/content/doi/10.1108/MAJ-11-2017-1692/full/html?utm_source=repec&utm_medium=feed&utm_campaign=repec
    Download Restriction: Access to full text is restricted to subscribers

    File URL: https://www.emerald.com/insight/content/doi/10.1108/MAJ-11-2017-1692/full/pdf?utm_source=repec&utm_medium=feed&utm_campaign=repec
    Download Restriction: Access to full text is restricted to subscribers

    File URL: https://libkey.io/10.1108/MAJ-11-2017-1692?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Artur Strzelecki & Mariia Rizun, 2022. "Consumers’ Change in Trust and Security after a Personal Data Breach in Online Shopping," Sustainability, MDPI, vol. 14(10), pages 1-17, May.
    2. Purwanto Edi & Deviny July & Mutahar Ahmed M., 2020. "The Mediating Role of Trust in the Relationship Between Corporate Image, Security, Word of Mouth and Loyalty in M-Banking Using among the Millennial Generation in Indonesia," Management & Marketing, Sciendo, vol. 15(2), pages 255-274, June.
    3. Uddin, Mohammad Rajib & Akter, Shahriar & Lee, Wai Jin Thomas, 2024. "Developing a data breach protection capability framework in retailing," International Journal of Production Economics, Elsevier, vol. 271(C).

    More about this item

    Keywords

    Cyber security; Security statements;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eme:majpps:maj-11-2017-1692. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Emerald Support (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.