Abstract
With the number of data breaches swelling, people are likely to not respond adequately and ignore the breach notifications altogether. Ignorance of breach notifications creates a perfect storm of cyclical outrage and apathy that criminals can use to their advantage. In this research-in-progress paper, we explore public reactions to breach notifications for addressing two research questions: (1) with more and more information related to the breach, do people become apathetic towards that breach? (2) at what point do people simply tune out information related to the breach? The results of the sentiment analysis show that public express anxiety when there is a fear of being affected by the breach, and public express anger when there are lack of measures to safeguard the data. Sadness is the most strongly expressed emotion in response to the severity of the breach. After the public has received sufficient details about the event, they start to tune out information related to the breach event.
Similar content being viewed by others
References
Chakraborty, R., Lee, J., Bagchi-Sen, S., Upadhyaya, S., Rao, H.R.: Online shopping intention in the context of data breach in online retail stores. Decis. Support Syst. 83, 47–56 (2016)
CSID: Data Breaches Pose a Threat across All Industries. CSID, Austin (2015)
Humphries, D.: Public awareness of security breaches: industry view 2014. In: Software Advice. Gartner (2014)
IRTC: Data Breaches, Identity Theft Resource Center. San Diego (2016)
Lazzarotti, J.: Report says Russian hackers stole 1.2 billion usernames and passwords, but don’t let “breach fatigue” take hold. In: Workplace Privacy, Data Management and Security Report. Jackson Lewis P.C, White Plains (2014)
Lee, J., Rehman, B.A., Agrawal, M., Rao, H.R.: Sentiment analysis of Twitter users over time: the case of the Boston bombing tragedy. In: Sugumaran, V., Yoon, V., Shaw, Michael J. (eds.) WEB 2015. LNBIP, vol. 258, pp. 1–14. Springer, Cham (2016). doi:10.1007/978-3-319-45408-5_1
Marzilli, T.: Target perception falls after data breach. In: YouGovBrandIndex. YouGov plc, London (2013)
Nasukawa, T., Yi, J.: Sentiment analysis: capturing favorability using natural language processing. In: Proceedings of the 2nd International Conference on Knowledge Capture, pp. 70–77. ACM (2003)
O’Farrell, N.: Data Breach Fatigue: Consumers Pay the Highest Price. CreditSesame.com, Mountain View (2014)
Pennebaker, J.W., Boyd, R.L., Jordan, K., Blackburn, K.: The Development and Psychometric Properties of LIWC2015. UT Faculty/Researcher Works (2015)
Perlberg, S.: Do consumers have data breach fatigue? In: WSJ.com. New York (2014)
PonemonInstitute: The Aftermath of a Mega Data Breach: Consumer Sentiment. Ponemon Institute (2014)
Stieglitz, S., Krüger, N.: Analysis of sentiments in corporate Twitter communication–A case study on an issue of Toyota. Analysis 1, 1–2011 (2011)
Tausczik, Y.R., Pennebaker, J.W.: The psychological meaning of words: LIWC and computerized text analysis methods. J. Lang. Soc. Psychol. 29(1), 24–54 (2010)
Videbeck, S.: Psychiatric-Mental Health Nursing. Lippincott Williams and Wilkins, Philadelphia (2013)
Williamson, W.: Data breaches by teh numbers. In: Security Week. Wired Business Media (2015)
Acknowledgement
This research has been funded by NSF under grants 1554373, 1554480, and 1651060. The usual disclaimer applies.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Valecha, R., Bachura, E., Chen, R., Raghav Rao, H. (2017). An Exploration of Public Reaction to the OPM Data Breach Notifications. In: Fan, M., Heikkilä, J., Li, H., Shaw, M., Zhang, H. (eds) Internetworked World. WEB 2016. Lecture Notes in Business Information Processing, vol 296. Springer, Cham. https://doi.org/10.1007/978-3-319-69644-7_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-69644-7_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69643-0
Online ISBN: 978-3-319-69644-7
eBook Packages: Computer ScienceComputer Science (R0)