Organizational data breach: Building conscious care behavior in incident response

Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses. This research study draws upon the literature in the areas of information security, incident response, theory of planned behaviour, and protec...

Full description

Saved in:
Bibliographic Details
Main Authors: Teoh, Adlyn Adam, Ghani, Norjihan Binti Abdul, Ahmad, Muneer, Jhanjhi, Nz, Alzain, Mohammed A., Masud, Mehedi
Format: Article
Published: Tech Science Press 2022
Subjects:
Online Access:http://eprints.um.edu.my/35739/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85116062374&doi=10.32604%2fCSSE.2022.018468&partnerID=40&md5=0b9f454f30d183774dcd480e4b056b35
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses. This research study draws upon the literature in the areas of information security, incident response, theory of planned behaviour, and protection motivation theory to expand and empirically validate a modified framework of information security conscious care behaviour formation. The applicability of the theoretical framework is shown through a case study labelled as a cyber-attack of unprecedented scale and sophistication in Singapore's history to-date, the 2018 SingHealth data breach. The single in-depth case study observed information security awareness, policy, experience, attitude, subjective norms, perceived behavioral control, threat appraisal and self-efficacy as emerging prominently in the framework's applicability in incident handling. The data analysis did not support threat severity relationship with conscious care behaviour. The findings from the above-mentioned observations are presented as possible key drivers in the shaping information security conscious care behaviour in real-world cyber incident management. © 2021 CRL Publishing. All rights reserved.