TY - JOUR
T1 - Social-media-based risk communication for data co-security on the cloud
AU - Gashami, Jean Pierre Guy
AU - Libaque-Saenz, Christian Fernando
AU - Chang, Younghoon
N1 - Publisher Copyright:
© 2019, Emerald Publishing Limited.
Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.
PY - 2020/3/22
Y1 - 2020/3/22
N2 - Purpose: Cloud computing has disrupted the information technology (IT) industry. Associated benefits such as flexibility, payment on an on-demand basis and the lack of no need for IT staff are among the reasons for its adoption. However, these services represent not only benefits to users but also threats, with cybersecurity issues being the biggest roadblock to cloud computing success. Although ensuring data security on the cloud has been the responsibility of providers, these threats seem to be unavoidable. In such circumstances, both providers and users have to coordinate efforts to minimize negative consequences that might occur from these events. The purpose of this paper is to assess how providers and users can rely on social media to communicate risky events. Design/methodology/approach: Based on the Situational Theory of Publics and trust, the authors developed three research questions to analyze stakeholders’ communication patterns after a security breach. By gathering Twitter data, the authors analyzed the data security breach faced by the Premera Blue Cross’ Web application. Findings: The results indicate that Premera acted as the main source of information for Twitter users, while trustworthy actors such as IT security firms, specialists and local news media acted as intermediaries, creating small communities around them. Theoretical and practical implications are also discussed. Originality/value: Social media could be used for diffusing information of potential threats; no research has assessed its usage in a cloud-based security breach context. The study aims to fill this gap and propose a framework to engage cloud users in co-securing their data along with cloud providers when they face similar situations.
AB - Purpose: Cloud computing has disrupted the information technology (IT) industry. Associated benefits such as flexibility, payment on an on-demand basis and the lack of no need for IT staff are among the reasons for its adoption. However, these services represent not only benefits to users but also threats, with cybersecurity issues being the biggest roadblock to cloud computing success. Although ensuring data security on the cloud has been the responsibility of providers, these threats seem to be unavoidable. In such circumstances, both providers and users have to coordinate efforts to minimize negative consequences that might occur from these events. The purpose of this paper is to assess how providers and users can rely on social media to communicate risky events. Design/methodology/approach: Based on the Situational Theory of Publics and trust, the authors developed three research questions to analyze stakeholders’ communication patterns after a security breach. By gathering Twitter data, the authors analyzed the data security breach faced by the Premera Blue Cross’ Web application. Findings: The results indicate that Premera acted as the main source of information for Twitter users, while trustworthy actors such as IT security firms, specialists and local news media acted as intermediaries, creating small communities around them. Theoretical and practical implications are also discussed. Originality/value: Social media could be used for diffusing information of potential threats; no research has assessed its usage in a cloud-based security breach context. The study aims to fill this gap and propose a framework to engage cloud users in co-securing their data along with cloud providers when they face similar situations.
KW - Cloud computing
KW - Information technology
KW - Premera Blue Cross
KW - Risk communication behaviour
KW - Risk mitigation
KW - Social network analysis
KW - Cloud computing
KW - Information technology
KW - Premera Blue Cross
KW - Risk communication behaviour
KW - Risk mitigation
KW - Social network analysis
UR - http://www.scopus.com/inward/record.url?scp=85077554446&partnerID=8YFLogxK
UR - https://www.mendeley.com/catalogue/1f4bcc97-ec3b-3753-8e00-300ca73bc531/
U2 - 10.1108/IMDS-03-2019-0131
DO - 10.1108/IMDS-03-2019-0131
M3 - Article in a journal
SN - 0263-5577
VL - 120
SP - 442
EP - 463
JO - Industrial Management and Data Systems
JF - Industrial Management and Data Systems
IS - 3
ER -