[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

How to Compensate After a Data Breach?: Investigating Compensation Types and Role of Fairness in Customer Repatronage Intentions

Published: 07 February 2023 Publication History

Abstract

Data breach recovery is often likened to service failure recovery. Like service failure recovery, compensation is a major factor toward data breach recovery. However, compensation involves different types, which may have varying effects on data breach recovery. This study investigates the effect of compensation types on customer's repatronage intentions to organizations that have suffered a data breach. Three compensation types were identified in this study: monetary, service, and psychological compensation. The findings of this study indicate that only service and psychological compensation have a significant effect on customers' perceptions of being treated fairly by the organization following a data breach. Furthermore, service compensation impacts the trust a customer regains in the company. Monetary compensation did not play a statistically significant role in the data breach recovery process. In turn, both perceived fairness and regained trust influences customer repatronage intentions. This study contributes to the information privacy field by identifying the types of compensation that are impactful to re-engage individuals who suffered PII related data breach.

References

[1]
Adams, J. S. (1963). Towards an understanding of inequity. The Journal of Abnormal and Social Psychology, 67(5), 422-- 436. https://doi.org/10.1037/h0040968
[2]
Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30(1), 13--28. https://doi.org/10.2307/25148715
[3]
Bagozzi, R. P. (1980). Causal models in marketing. John Wiley & Sons
[4]
Bansal, G., & Zahedi, F. M. (2015). Trust violation and repair: The information privacy perspective. Decision Support Systems, 71, 62-- 77. https://doi.org/10.1016/j.dss.2015.01.009
[5]
Bitner, M. J., Booms, B. H., & Tetreault, M. S. (1990). The service encounter: Diagnosing favorable and unfavorable incidents. Journal of Marketing, 54(1), 71--84. https://doi.org/10.2307/1252174
[6]
Bozic, B. (2017). Consumer trust repair: A critical literature review. European Management Journal, 35(4), 538--547. https://doi.org/10.1016/j.emj.2017.02.007
[7]
Brinberg, D., & Wood, R. (1983). A resource exchange theory analysis of consumer behavior. Journal of Consumer Research, 10(3), 330-- 338. https://doi.org/10.1086/208972
[8]
Campbell, K., Gordon, L. A., Loeb, M. P., & Zhou, L. (2003). The economic cost of publicly announced information security breaches: Empirical evidence from the stock market. Journal of Computer Security, 11(3), 431--448. http://doi.org/10.3233/JCS-2003--11308
[9]
Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers. International Journal of Electronic Commerce, 9(1), 69--104.
[10]
Chang, S. J., van Witteloostuijin, A., & Eden, L. (2010). From the editors: Common method variance in international business research. Journal of International Business Studies, 41, 178--184. https://doi.org/10.1057/jibs.2009.88
[11]
Chen, T., Ma, K., Bian, X., Zheng, C., & Devlin, J. (2018). Is high recovery more effective than expected recovery in addressing service failure? -A moral judgment perspective. Journal of Business Research, 82, 1-- 9. https://doi.org/10.1016/j.jbusres.2017.08.025
[12]
Choi, B. C. F., Kim, S. S., & Jiang, Z. (2016). Influence of firm's recovery endeavors upon privacy breach on online customer behavior. Journal of Management Information Systems, 33(3), 904- 993. https://doi.org/10.1080/07421222.2015.1138375
[13]
Colquitt, J. A., Conlon, D. E., Wesson, M. J., Porter, C. O., & Ng, K. Y. (2001). Justice at the millennium: A meta-analytic review of 25 years of organizational justice research. The Journal of Applied Psychology, 86(3), 425--445. https://doi.org/10.1037/0021--9010.86.3.425
[14]
Colquitt, J. A., Scott, B. A., Rodell, J. B., Long, D. M., Zapata, C. P., Conlon, D. E., & Wesson, M. J. (2013). Justice at the millennium, a decade later: A meta-analytic test of social exchange and affectbased perspectives. Journal of Applied Psychology, 98(2), 199-- 236. https://doi.org/10.1037/a0031757
[15]
Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and interpersonal trust: An empirical investigation. Organizational Science, 10(1), 104--115. https://doi.org/10.1287/orsc.10.1.104
[16]
Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323--342. https://doi.org/10.1111/1540--4560.00067
[17]
Culnan, M. J., & Williams, C. C. (2009). How ethics can enhance organizational privacy: Lessons from ChoicePoint and TJX data breaches. MIS Quarterly, 33(4), 673--687. https://doi.org/10.2307/20650322
[18]
D'Arcy, J., Hovav, A., & Galletta, D. F. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79--98. https://doi.org/10.1287/isre.1070.0160
[19]
DeWitt, T., Nguyen, D. T., & Marshall, R. (2008). Exploring customer loyalty following service recovery: The mediating effects of trust and emotions. Journal of Service Research, 10(3), 269--281. https://doi.org/10.1177/1094670507310767
[20]
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61--80. https://doi.org/10.1287/isre.1060.0080
[21]
Foa, E. B., & Foa, U. G. (1976). Resource theory of social exchange. In J. W. Thibaut (Ed.), Contemporary topics in social psychology, (pp. 99--131). General Learning.
[22]
Fornell, C., & Larcker, D. L. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39--50. https://doi.org/10.1177/002224378101800104
[23]
Garg, A., Curtis, J., & Halper, H. (2003). Quantifying the financial impact of IT security breaches. Information Management and Computer Security, 11(2), 74--83. https//doi.org/10.1108/09685220310468646
[24]
Goel, S. & Shawky, H. A. (2009). Estimating the market impact of security breach announcements on firm values. Information and Management, 46(7), 404--410. https://doi.org/10.1016/j.im.2009.06.005

Cited By

View all
  • (2024)The Influence of Personalization on Consumer SatisfactionData-Driven Marketing for Strategic Success10.4018/979-8-3693-3455-3.ch010(256-292)Online publication date: 12-Jul-2024
  • (2024)It’s better than nothing: The influence of service failures on user reusage intention in AI chatbotElectronic Commerce Research and Applications10.1016/j.elerap.2024.10142167(101421)Online publication date: Sep-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGMIS Database: the DATABASE for Advances in Information Systems
ACM SIGMIS Database: the DATABASE for Advances in Information Systems  Volume 54, Issue 1
February 2023
121 pages
ISSN:0095-0033
EISSN:1532-0936
DOI:10.1145/3583581
Issue’s Table of Contents
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 February 2023
Published in SIGMIS Volume 54, Issue 1

Check for updates

Author Tags

  1. compensation
  2. data breach recovery
  3. organization justice
  4. resource exchange theory
  5. service failure recovery

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)132
  • Downloads (Last 6 weeks)14
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)The Influence of Personalization on Consumer SatisfactionData-Driven Marketing for Strategic Success10.4018/979-8-3693-3455-3.ch010(256-292)Online publication date: 12-Jul-2024
  • (2024)It’s better than nothing: The influence of service failures on user reusage intention in AI chatbotElectronic Commerce Research and Applications10.1016/j.elerap.2024.10142167(101421)Online publication date: Sep-2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media