Skip to main content
Erschienen in: Social Network Analysis and Mining 1/2023

01.12.2023 | Original Article

An analysis of the public consequences of cybersecurity incidents in Brazil

verfasst von: Vitória de Lemos, Luciano Ignaczak

Erschienen in: Social Network Analysis and Mining | Ausgabe 1/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cybersecurity incidents, like data breaches and ransomware, are on the rise, and their consequences can affect companies from different perspectives. On the one hand, a well-known consequence involves the technical aspects of ensuring the continuity of companies’ operations. On the other hand, cybersecurity incidents’ repercussions can impact companies’ stock market value and negatively influence customers’ perceptions about companies’ reputations. Currently, social media platforms establish an additional concern for companies because of their capability to intensify incident reactions. This study analyzed tweets, news, and stock prices associated with four Brazilian organizations’ victims of data breaches and ransomware to answer the research question: what are the impacts of cybersecurity incidents’ public consequences on the reputation and the stock value of Brazilian organizations? Through the analysis performed, we proposed an anatomy of incidents’ repercussions covering aspects like the main events observed in the timelines and peculiarities of every incident type. The stock share prices analysis did not allow us to infer a relationship between the disclosure of incidents and stock values. By assessing Twitter’s user-generated content, we observed that data breaches reverberate more than ransomware.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Fußnoten
2
The following link introduces the Twitter API version 2: https://​developer.​twitter.​com/​en/​docs/​twitter-api.
 
3
We collected the stock information from B3, the Brazilian stock exchange, using Yahoo services at https://​br.​financas.​yahoo.​com.
 
4
The news analyzed in this study was collected using the platform published by Google: https://​news.​google.​com.
 
5
Tweets and news used in the analysis are available on https://​github.​com/​VitoriaLemos/​Unisinos-PFII.
 
6
The Python scripts developed by authors are available in the following GitHub repository: https://​github.​com/​VitoriaLemos/​Unisinos-PFII.
 
7
The Text Analytics features made available as part of the Cognitive Service for Language are explained at https://​azure.​microsoft.​com/​en-us/​services/​cognitive-services/​text-analytics/​.
 
Literatur
Zurück zum Zitat Bachura E, Valecha R, Chen R, Rao HR (2022) The OPM data breach: an investigation of shared emotional reactions on twitter. MIS Q 46(2):881–910CrossRef Bachura E, Valecha R, Chen R, Rao HR (2022) The OPM data breach: an investigation of shared emotional reactions on twitter. MIS Q 46(2):881–910CrossRef
Zurück zum Zitat Bardin L (2011) Organização da análise. Anál Conteúdo. São Paulo Edições 70:229 Bardin L (2011) Organização da análise. Anál Conteúdo. São Paulo Edições 70:229
Zurück zum Zitat Barrett MP (2018) Framework for improving critical infrastructure cybersecurity version 1.1 Barrett MP (2018) Framework for improving critical infrastructure cybersecurity version 1.1
Zurück zum Zitat Bederna Z, Szádeczky T (2023) Managing the financial impact of cybersecurity incidents. Secur Def Q 41(1):15–35 Bederna Z, Szádeczky T (2023) Managing the financial impact of cybersecurity incidents. Secur Def Q 41(1):15–35
Zurück zum Zitat Biancovilli P, Makszin L, Amer F, Csongor A (2022) Celebrities and breast cancer: a multidimensional quali-quantitative analysis of news stories shared on social media. Int J Environ Res Public Health 19(15):9676CrossRef Biancovilli P, Makszin L, Amer F, Csongor A (2022) Celebrities and breast cancer: a multidimensional quali-quantitative analysis of news stories shared on social media. Int J Environ Res Public Health 19(15):9676CrossRef
Zurück zum Zitat Blaya C (2019) Cyberhate: a review and content analysis of intervention strategies. Aggress Viol Behav 45:163–172CrossRef Blaya C (2019) Cyberhate: a review and content analysis of intervention strategies. Aggress Viol Behav 45:163–172CrossRef
Zurück zum Zitat Boeckl KR, Lefkovitz NB (2020) Nist privacy framework: a tool for improving privacy through enterprise risk management, version 1.0 Boeckl KR, Lefkovitz NB (2020) Nist privacy framework: a tool for improving privacy through enterprise risk management, version 1.0
Zurück zum Zitat Brindha R, Nandagopal S, Azath H, Sathana V, Joshi GP, Kim SW (2023) Intelligent deep learning based cybersecurity phishing email detection and classification. CMC Comput Mater Continua 74(3):5901–5914 Brindha R, Nandagopal S, Azath H, Sathana V, Joshi GP, Kim SW (2023) Intelligent deep learning based cybersecurity phishing email detection and classification. CMC Comput Mater Continua 74(3):5901–5914
Zurück zum Zitat Caregnato RCA, Mutti R (2006) Pesquisa qualitativa: análise de discurso versus análise de conteúdo. Universidade Federal de Santa Catarina, Programa de Pós Graduação em Enfermagem Caregnato RCA, Mutti R (2006) Pesquisa qualitativa: análise de discurso versus análise de conteúdo. Universidade Federal de Santa Catarina, Programa de Pós Graduação em Enfermagem
Zurück zum Zitat Centrify (2017) The impact of data breaches on reputation & share value Centrify (2017) The impact of data breaches on reputation & share value
Zurück zum Zitat Confente I, Siciliano GG, Gaudenzi B, Eickhoff M (2019) Effects of data breaches from user-generated content: a corporate reputation analysis. Eur Manag J 37(4):492–504CrossRef Confente I, Siciliano GG, Gaudenzi B, Eickhoff M (2019) Effects of data breaches from user-generated content: a corporate reputation analysis. Eur Manag J 37(4):492–504CrossRef
Zurück zum Zitat Couce-Vieira A, Insua DR, Kosgodagan A (2020) Assessing and forecasting cybersecurity impacts. Decis Anal 17(4):356–374MathSciNetCrossRef Couce-Vieira A, Insua DR, Kosgodagan A (2020) Assessing and forecasting cybersecurity impacts. Decis Anal 17(4):356–374MathSciNetCrossRef
Zurück zum Zitat Cybercrime Magazine (2020) Cybercrime to cost the world \$10.5 trillion annually by 2025 Cybercrime Magazine (2020) Cybercrime to cost the world \$10.5 trillion annually by 2025
Zurück zum Zitat dos Santos FM (2012) Análise de conteúdo: a visão de Laurence Bardin dos Santos FM (2012) Análise de conteúdo: a visão de Laurence Bardin
Zurück zum Zitat García JMG-V, García-Carmona M, Trujillo Torres JM, Moya-Fernández P (2022) Teacher training for educational change: the view of international experts. Contemp Educ Technol 14(1) García JMG-V, García-Carmona M, Trujillo Torres JM, Moya-Fernández P (2022) Teacher training for educational change: the view of international experts. Contemp Educ Technol 14(1)
Zurück zum Zitat Iosifidis P, Nicoli N (2020) The battle to end fake news: a qualitative content analysis of Facebook announcements on how it combats disinformation. Int Commun Gaz 82(1):60–81CrossRef Iosifidis P, Nicoli N (2020) The battle to end fake news: a qualitative content analysis of Facebook announcements on how it combats disinformation. Int Commun Gaz 82(1):60–81CrossRef
Zurück zum Zitat Jarjoui S, Murimi R, Murimi R (2021) Hold my beer: a case study of how ransomware affected an Australian beverage company. In: 2021 International conference on cyber situational awareness, data analytics and assessment (cybersa), pp 1–6 Jarjoui S, Murimi R, Murimi R (2021) Hold my beer: a case study of how ransomware affected an Australian beverage company. In: 2021 International conference on cyber situational awareness, data analytics and assessment (cybersa), pp 1–6
Zurück zum Zitat Jorge S, Nogueira S, Jesus MA (2023) Financial information use in parliamentary debates in a changing context. Public Organization Review, pp 1–28 Jorge S, Nogueira S, Jesus MA (2023) Financial information use in parliamentary debates in a changing context. Public Organization Review, pp 1–28
Zurück zum Zitat Onwuegbuzie A, Leech N, Collins K (2015) Qualitative analysis techniques for the review of the literature. The Qualitative Report Onwuegbuzie A, Leech N, Collins K (2015) Qualitative analysis techniques for the review of the literature. The Qualitative Report
Zurück zum Zitat Perera S, Jin X, Maurushat A, Opoku D-GJ (2022) Factors affecting reputational damage to organisations due to cyberattacks. Informatics 9:28CrossRef Perera S, Jin X, Maurushat A, Opoku D-GJ (2022) Factors affecting reputational damage to organisations due to cyberattacks. Informatics 9:28CrossRef
Zurück zum Zitat Sandescu C, Dinisor A, Vladescu C-V, Grigorescu O, Corlatescu D, Dascalu M, Rughinis R (2022) Extracting exploits and attack vectors from cybersecurity news using nlp. UPB Sci Bull Ser C Electr Eng Comput Sci Politech Univ Buchar 84(2):63–78 Sandescu C, Dinisor A, Vladescu C-V, Grigorescu O, Corlatescu D, Dascalu M, Rughinis R (2022) Extracting exploits and attack vectors from cybersecurity news using nlp. UPB Sci Bull Ser C Electr Eng Comput Sci Politech Univ Buchar 84(2):63–78
Zurück zum Zitat Schlackl F, Link N, Hoehle H (2022) Antecedents and consequences of data breaches: a systematic review. Inf Manag 59:103638CrossRef Schlackl F, Link N, Hoehle H (2022) Antecedents and consequences of data breaches: a systematic review. Inf Manag 59:103638CrossRef
Zurück zum Zitat Sinanaj G, Muntermann J, Cziesla T (2015) How data breaches ruin firm reputation on social media!-insights from a sentiment-based event study. Wirtschaftsinformatik 2015:902–916 Sinanaj G, Muntermann J, Cziesla T (2015) How data breaches ruin firm reputation on social media!-insights from a sentiment-based event study. Wirtschaftsinformatik 2015:902–916
Zurück zum Zitat Sinanaj G, Zafar H (2016) Who wins in a data breach?-a comparative study on the intangible costs of data breach incidents. Pacis, p 60 Sinanaj G, Zafar H (2016) Who wins in a data breach?-a comparative study on the intangible costs of data breach incidents. Pacis, p 60
Zurück zum Zitat Syed R (2019) Enterprise reputation threats on social media: a case of data breach framing. J Strateg Inf Syst 28(3):257–274CrossRef Syed R (2019) Enterprise reputation threats on social media: a case of data breach framing. J Strateg Inf Syst 28(3):257–274CrossRef
Zurück zum Zitat Syed R, Dhillon G (2015) Dynamics of data breaches in online social networks: understanding threats to organizational information security reputation Syed R, Dhillon G (2015) Dynamics of data breaches in online social networks: understanding threats to organizational information security reputation
Zurück zum Zitat Tayaksi C, Ada E, Kazancoglu Y, Sagnak M (2022) The financial impacts of information systems security breaches on publicly traded companies: reactions of different sectors. J Enterp Inf Manag 35(2):650–668CrossRef Tayaksi C, Ada E, Kazancoglu Y, Sagnak M (2022) The financial impacts of information systems security breaches on publicly traded companies: reactions of different sectors. J Enterp Inf Manag 35(2):650–668CrossRef
Zurück zum Zitat Tweneboah-Kodua S, Atsu F, Buchanan W (2018) Impact of cyberattacks on stock performance: a comparative study. Inf Comput Secur 26:637–652CrossRef Tweneboah-Kodua S, Atsu F, Buchanan W (2018) Impact of cyberattacks on stock performance: a comparative study. Inf Comput Secur 26:637–652CrossRef
Zurück zum Zitat Yayla AA, Hu Q (2011) The impact of information security events on the stock value of firms: the effect of contingency factors. J Inf Technol 26(1):60–77CrossRef Yayla AA, Hu Q (2011) The impact of information security events on the stock value of firms: the effect of contingency factors. J Inf Technol 26(1):60–77CrossRef
Metadaten
Titel
An analysis of the public consequences of cybersecurity incidents in Brazil
verfasst von
Vitória de Lemos
Luciano Ignaczak
Publikationsdatum
01.12.2023
Verlag
Springer Vienna
Erschienen in
Social Network Analysis and Mining / Ausgabe 1/2023
Print ISSN: 1869-5450
Elektronische ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-023-01113-9

Weitere Artikel der Ausgabe 1/2023

Social Network Analysis and Mining 1/2023 Zur Ausgabe

Premium Partner