The Role of Uncertainty in Data Breach Response Processes-A Reactance Theory Perspective

  • Till Ole Diesterhöft
  • , Saskia Isabel Schweneker
  • , Kristin Masuch
  • , Aycan Aslan
  • , Marvin Braun

Research output: Conference Article in Proceeding or Book/Report chapterArticle in proceedingsResearchpeer-review

Abstract

Data breaches lead to inherent uncertainty among customers due to the compromise of information and its potential consequences for customers, e.g., identity theft or credit card misuse. Previous research has focused on outcome-based strategies to address these negative impacts. However, informed by reactance theory, we argue that customers feel a loss of control due to the induced uncertainty and that companies need to tackle these impacts. We test our hypotheses in two empirical studies. The results of Study 1 suggest that data breaches indeed lead to an increased perception of uncertainty among customers. Study 2 examines to what extent the establishment of control can mitigate the negative uncertainty effects. We highlight that by providing customers with control, companies can reduce the degree of uncertainty and increase satisfaction with the response. By conceptualizing choice as a catalyst for perceived control, we offer practitioners a novel strategy for responding to data breaches.
Original languageEnglish
Title of host publicationICIS 2022 Proceedings
Publication date2022
Publication statusPublished - 2022
Externally publishedYes
EventInternational Conference of Information Systems : Digitizing for the Next Generation - Copenhagen, Copenhagen, Denmark
Duration: 11 Dec 202214 Dec 2022
https://icis2022.aisconferences.org

Conference

ConferenceInternational Conference of Information Systems
LocationCopenhagen
Country/TerritoryDenmark
CityCopenhagen
Period11/12/202214/12/2022
Internet address

Keywords

  • Data breach response
  • reactance theory
  • perceived control

Fingerprint

Dive into the research topics of 'The Role of Uncertainty in Data Breach Response Processes-A Reactance Theory Perspective'. Together they form a unique fingerprint.

Cite this