Journal of Cybersecurity最新文献

筛选
英文 中文
Do data breaches damage reputation? Evidence from 45 companies between 2002 and 2018 数据泄露会损害声誉吗?来自2002年至2018年45家公司的证据
IF 3.9
Journal of Cybersecurity Pub Date : 2021-09-01 DOI: 10.1093/cybsec/tyab021
Christos A Makridis
{"title":"Do data breaches damage reputation? Evidence from 45 companies between 2002 and 2018","authors":"Christos A Makridis","doi":"10.1093/cybsec/tyab021","DOIUrl":"https://doi.org/10.1093/cybsec/tyab021","url":null,"abstract":"While data breaches have become more common, there is little evidence that companies that incur them experience a persistent decline in financial performance or security prices. Using new firm-level data between 2002 and 2018, this paper finds that firms experience a 26–29% increase in reputational intangible capital following an average data breach. However, the largest and most salient breaches are associated with a 5–9% decline in reputational intangible capital following a data breach. These effects are concentrated among firms in consumer-facing industries: smaller (larger) data breaches are associated with more positive (negative) effects. These results suggest that current regulatory guidance may not provide complete incentives for firms to invest in cybersecurity capabilities, particularly for small- to medium-sized breaches.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":"38 1","pages":""},"PeriodicalIF":3.9,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138538490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
"Passwords protect my stuff"-a study of children's password practices. “密码保护我的东西”——一项关于儿童使用密码习惯的研究。
IF 3.9
Journal of Cybersecurity Pub Date : 2019-01-01
Yee-Yin Choong, Mary F Theofanos, Karen Renaud, Suzanne Prior
{"title":"\"Passwords protect my stuff\"-a study of children's password practices.","authors":"Yee-Yin Choong,&nbsp;Mary F Theofanos,&nbsp;Karen Renaud,&nbsp;Suzanne Prior","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>Children use technology from a very young age and often have to authenticate. The goal of this study is to explore children's practices, perceptions, and knowledge regarding passwords. Given the limited work to date and that the world's cyber posture and culture will be dependent on today's youth, it is imperative to conduct cyber-security research with children. We conducted surveys of 189 3rd to 8th graders from two Midwest schools in the USA. We found that children have on average two passwords for school and three to four passwords for home. They kept their passwords private and did not share with others. They created passwords with an average length of 7 (3rd to 5th graders) and 10 (6-8th graders). But, only about 13% of the children created very strong passwords. Generating strong passwords requires mature cognitive and linguistic capabilities which children at this developmental stage have not yet mastered. They believed that passwords provide access control, protect their privacy and keep their \"stuff\" safe. Overall, children had appropriate mental models of passwords and demonstrated good password practices. Cyber-security education should strive to reinforce these positive practices while continuing to provide and promote age-appropriate developmental security skills. Given the study's sample size and limited generalizability, we are expanding our research to include children from 3rd to 12th graders across multiple US school districts.</p>","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":"5 1","pages":""},"PeriodicalIF":3.9,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7542556/pdf/nihms-1613458.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"38578619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信