IDEAS home Printed from https://ideas.repec.org/a/pal/palcom/v10y2023i1d10.1057_s41599-023-01757-0.html
   My bibliography  Save this article

Data security crisis in universities: identification of key factors affecting data breach incidents

Author

Listed:
  • Jin Li

    (Xi’an Jiaotong University)

  • Wei Xiao

    (Xi’an Jiaotong University)

  • Chong Zhang

    (National Computer Network Emergency Response Technical Team/Coordination Center of China)

Abstract

The extremely complex and dynamic digital environments of universities make them highly vulnerable to the risk of data breaches. This study empirically investigated the factors influencing data breach risks in the context of higher education, according to crime opportunity theory and routine activity theory. The data consisted of university samples from China and were collected mainly from the Chinese Education Industry Vulnerability Reporting Platform. After applying Poisson regression for the estimation, increased public disclosure of vulnerabilities was found to escalate the frequency of data breaches, whereas cross-border data flow decreased the number of data breaches. Furthermore, the mechanism by which academic strength affects data breaches was examined through the two mediators of cross-border data flow and vulnerability disclosure. In addition, cloud adoption reduced data breaches, and public clouds were determined to be relatively more secure than private clouds. Cloud adoption also acted as a moderator between the negative impact of vulnerabilities and the positive impact of cross-border data flow on data breaches. The estimation and robustness findings revealed the underlying mechanisms that impacted university data security, clarifying the understanding of data breaches and suggesting practical implications for universities and other institutes to improve information security. The findings of this study provide insights and directions for future research.

Suggested Citation

  • Jin Li & Wei Xiao & Chong Zhang, 2023. "Data security crisis in universities: identification of key factors affecting data breach incidents," Palgrave Communications, Palgrave Macmillan, vol. 10(1), pages 1-18, December.
  • Handle: RePEc:pal:palcom:v:10:y:2023:i:1:d:10.1057_s41599-023-01757-0
    DOI: 10.1057/s41599-023-01757-0
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1057/s41599-023-01757-0
    File Function: Abstract
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1057/s41599-023-01757-0?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. GuiDeng Say & Gurneeta Vasudeva, 2020. "Learning from Digital Failures? The Effectiveness of Firms’ Divestiture and Management Turnover Responses to Data Breaches," Strategy Science, INFORMS, vol. 5(2), pages 117-142, June.
    2. Seung Hyun Kim & Juhee Kwon, 2019. "How Do EHRs and a Meaningful Use Initiative Affect Breaches of Patient Information?," Information Systems Research, INFORMS, vol. 30(4), pages 1184-1202, December.
    3. Joshua Paul Meltzer, 2015. "The Internet, Cross-Border Data Flows and International Trade," Asia and the Pacific Policy Studies, Wiley Blackwell, vol. 2(1), pages 90-102, January.
    4. Ruochen Liao & Shenaz Balasinorwala & H. Raghav Rao, 2017. "Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests," Information Systems Frontiers, Springer, vol. 19(3), pages 443-455, June.
    5. Shimaa Ouf & Mona Nasr, 2015. "Cloud Computing: The Future of Big Data Management," International Journal of Cloud Applications and Computing (IJCAC), IGI Global, vol. 5(2), pages 53-61, April.
    6. Coyle, Diane & Nguyen, David, 2019. "Cloud Computing, Cross-Border Data Flows and New Challenges for Measurement in Economics," National Institute Economic Review, National Institute of Economic and Social Research, vol. 249, pages 30-38, August.
    7. Coyle, Diane & Nguyen, David, 2019. "Cloud Computing, Cross-Border Data Flows and New Challenges for Measurement in Economics," National Institute Economic Review, National Institute of Economic and Social Research, vol. 249, pages 30-38, August.
    8. Dasom Lee & David J. Hess, 2022. "Public concerns and connected and automated vehicles: safety, privacy, and data security," Palgrave Communications, Palgrave Macmillan, vol. 9(1), pages 1-13, December.
    9. Zan Zhang & Guofang Nan & Yong Tan, 2020. "Cloud Services vs. On-Premises Software: Competition Under Security Risk and Product Customization," Information Systems Research, INFORMS, vol. 31(3), pages 848-864, September.
    10. Jacob Haislip & Jee-Hae Lim & Robert Pinsker, 2021. "The Impact of Executives’ IT Expertise on Reported Data Security Breaches," Information Systems Research, INFORMS, vol. 32(2), pages 318-334, June.
    11. John D’Arcy & Idris Adjerid & Corey M. Angst & Ante Glavas, 2020. "Too Good to Be True: Firm Social Performance and the Risk of Data Breach," Information Systems Research, INFORMS, vol. 31(4), pages 1200-1223, December.
    12. Joachim Bjørge Ulven & Gaute Wangen, 2021. "A Systematic Review of Cybersecurity Risks in Higher Education," Future Internet, MDPI, vol. 13(2), pages 1-40, February.
    13. Joshua Paul Meltzer, 2015. "The Internet, Cross-Border Data Flows and International Trade," Asia and the Pacific Policy Studies 201508, Crawford School of Public Policy, The Australian National University.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Shuaitao Jiao & Qiubi Sun, 2021. "Digital Economic Development and Its Impact on Econimic Growth in China: Research Based on the Prespective of Sustainability," Sustainability, MDPI, vol. 13(18), pages 1-19, September.
    2. Désiré Avom & Gilles Dufrénot & Sylvie Eyeffa, 2023. "Does ICT access and usage reduce growth inefficiency in Sub-Saharan Africa?," AMSE Working Papers 2306, Aix-Marseille School of Economics, France.
    3. Artur Strzelecki, 2019. "Key Features of E-Tailer Shops in Adaptation to Cross-Border E-Commerce in the EU," Sustainability, MDPI, vol. 11(6), pages 1-13, March.
    4. Qinqin Wu & Mengjie Bi & Faiza Siddiqui & Yao Tang, 2023. "Assessing the Impact of Digital Trade on Enterprise Competitiveness: Evidence from Chinese A-Share Listed Companies," Journal of Industry, Competition and Trade, Springer, vol. 23(3), pages 329-362, December.
    5. Biswas, Trina & Kennedy, P. Lynn, 2016. "The Effect of the Internet on Bilateral Trade," 2016 Annual Meeting, February 6-9, 2016, San Antonio, Texas 229994, Southern Agricultural Economics Association.
    6. Theile, Philipp & Farag, Markos & Kopp, Thomas, 2022. "Does information substitute or complement energy? - A mediation analysis of their relationship in European economies," VfS Annual Conference 2022 (Basel): Big Data in Economics 264123, Verein für Socialpolitik / German Economic Association.
    7. Hui Feng & Yirong Li & Renyan Mu & Lei Wu, 2023. "The Impact of Investment Efficiency in the Digital Economy on Urban Waste Reduction: Evidence from China," Sustainability, MDPI, vol. 15(24), pages 1-15, December.
    8. Hajiheydari, Nastaran & Delgosha, Mohammad Soltani & Olya, Hossein, 2021. "Scepticism and resistance to IoMT in healthcare: Application of behavioural reasoning theory with configurational perspective," Technological Forecasting and Social Change, Elsevier, vol. 169(C).
    9. Yaxin Wang & Haoyu Wen & ZhongQuan Hu & Yuntao Zhang, 2023. "Collaborative Innovation Strategy of Supply Chain in the Context of MCU Domestic Substitution : A Differential Game Analysis," Computational Economics, Springer;Society for Computational Economics, vol. 61(3), pages 1039-1074, March.
    10. Slapničar, Sergeja & Axelsen, Micheal & Bongiovanni, Ivano & Stockdale, David, 2023. "A pathway model to five lines of accountability in cybersecurity governance," International Journal of Accounting Information Systems, Elsevier, vol. 51(C).
    11. Kristin Masuch & Maike Greve & Simon Trang, 2021. "What to do after a data breach? Examining apology and compensation as response strategies for health service providers," Electronic Markets, Springer;IIM University of St. Gallen, vol. 31(4), pages 829-848, December.
    12. Tobias Kretschmer & Aija Leiponen & Melissa Schilling & Gurneeta Vasudeva, 2022. "Platform ecosystems as meta‐organizations: Implications for platform strategies," Strategic Management Journal, Wiley Blackwell, vol. 43(3), pages 405-424, March.
    13. Romanus Izuchukwu Okeke & Max Hashem Eiza, 2023. "The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies," Information Systems Frontiers, Springer, vol. 25(2), pages 451-472, April.
    14. BANA Philbert, 2024. "Model Based On Virtual Private Network: Enhancing Cybersecurity In The Rwandan University Sector," Working papers 2024-50-03, Voice of Research.
    15. Jack Stilgoe & Miloš Mladenović, 2022. "The politics of autonomous vehicles," Palgrave Communications, Palgrave Macmillan, vol. 9(1), pages 1-6, December.
    16. Simon Kratzer & Andreas Drechsler & Markus Westner & Susanne Strahringer, 2022. "The Fractional CIO in SMEs: conceptualization and research agenda," Information Systems and e-Business Management, Springer, vol. 20(3), pages 581-611, September.
    17. Douglas Cumming & Sofia Johan & Denis Schweizer, 2017. "Information systems, agency problems, and fraud," Information Systems Frontiers, Springer, vol. 19(3), pages 421-424, June.
    18. Hemesath, Sebastian & Tepe, Markus, 2023. "Framing the approval to test self-driving cars on public roads. The effect of safety and competitiveness on citizens' agreement," Technology in Society, Elsevier, vol. 72(C).
    19. Xiongfei Cao & Ali Nawaz Khan & Ahsan Ali & Naseer Abbas Khan, 0. "Consequences of Cyberbullying and Social Overload while Using SNSs: A Study of Users’ Discontinuous Usage Behavior in SNSs," Information Systems Frontiers, Springer, vol. 0, pages 1-14.
    20. Xiongfei Cao & Ali Nawaz Khan & Ahsan Ali & Naseer Abbas Khan, 2020. "Consequences of Cyberbullying and Social Overload while Using SNSs: A Study of Users’ Discontinuous Usage Behavior in SNSs," Information Systems Frontiers, Springer, vol. 22(6), pages 1343-1356, December.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:pal:palcom:v:10:y:2023:i:1:d:10.1057_s41599-023-01757-0. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: https://www.nature.com/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.