1. Introduction
The reliance on cyberspace in contemporary societies and businesses has grown exponentially [
1]. While technology has provided many advantages for organisations to develop and improve their operations, there are also disadvantages to the haphazard deployment of computer and networking technologies [
2]. One prominent disadvantage is that inadequate security and business processes can result in significant financial loss to the organisation both materially and immaterially. Although direct financial losses through cyberattacks are often quantifiable, immaterial losses to organisational sentiment, goodwill, and reputation are not. This shadow pricing, a monetary value assigned to currently unknowable costs in the absence of correct market prices, can profoundly impact organisational competitiveness socio-economically. Organisations are also exposed to several cyber risks, including payment diversion fraud, ransomware, data breach, advanced persistent attacks, cyber theft, computer security breaches, cyber espionage, and even cyber terrorism [
3,
4]. Consumers hold the security of their personally identifiable data and other confidential information in high regard, and the protection of user privacy and data is integral to the continuation of consumer confidence [
5]. As organisations view success as financial and material gain, reputation is an important component to manage in ensuring this. Reputation is an intangible asset that affects all stakeholders of an organisation. A myriad of factors can affect reputation, consumer confidence in the organisation, investor confidence, and their perception of the organisation as a respectable and trustable entity [
6].
Cyberattacks are increasing at an alarming rate, and the cost of these attacks is increasing every year. In addition, the global pandemic has changed the operations of organisations and, as a result, the attack and risk profiles of the organisations [
7]. As technology evolves, attacks increase in severity, with the most damage affecting corporate reputation and branding. Unfortunately, most public and private organisations are unaware and unprepared for the effects of these cyber risks. For instance, KPMG surveyed 1000 businesses in the UK and found that a cyber breach can significantly impact their reputation [
8]. Over 58% of the companies surveyed underestimated the true impact that a breach can have on their company. Also, 599 businesses who had experienced a breach reported that breaches affected their reputation.
Responding to cyberattacks, including a comprehensive framework to protect and organise reputation, is critical for organisations. Cyberattacks can taint an organisation’s reputation and render them less competitive. However, there are no studies to date that critically consider factors that contribute to reputational damages suffered from cyber incidents within public and private sector organisations. Further, despite the significant efforts by researchers, there is yet to be publicly available research on reputation damage due to cyber risk within public and private sector organisations.
As an attempt to fill this gap, this study stands out, being the first to identify key factors in determining reputational damage to public and private sector institutions through cyberattacks. This study contributes to knowledge by presenting a master list of verified factors affecting the reputation of both public and private sector organisations through cyberattacks. In practical terms, the findings are expected to help organisations properly position themselves to become more competitive in the post-COVID-19 era. The remainder of the paper is structured as follows:
Section 2 reflects on relevant organisational reputation literature. The methodology adopted for this study is presented in
Section 3.
Section 4 presents the results and discusses the key factors in determining reputational damage to public and private sector institutions through cyberattacks. Finally,
Section 5 concludes the paper and outlines directions for future research.
5. Conclusions and Future Research
Cyber reputation of organisations has recently received increased global attention. This is because of the massive online activities as a result of the COVID-19 pandemic and its associated variants together with the restrictions and lockdowns. As a result, this study was conducted to identify key factors in determining reputational damage to public and private sector institutions caused by cyberattacks. A literature review and interviews with cybersecurity experts led to the identification of 42 potential factors, which were further classified into the STAR model, an organisational design framework. This study is novel, as it is one of the first to establish the factors that affect the cyber reputation of both public and private sector institutions. The findings are more relevant given the heightened cyber activities partly caused by the COVID-19 pandemic and its consequent restrictions affecting organisational business activities.
The results of this study show that a commonly acceptable definition for cyber reputation is also lacking, even though there has been a growing use of the term “online reputation”. The results also show that, firstly, “customer trust and confidentiality”, “customer perception”, and “public dissemination of incident” were the top three factors that affect the cyber reputation of organisations under the classification of strategy. Therefore, an organisation should develop and model communication strategies for different types of cyber incidents. Furthermore, controlling the narrative through an effective community engagement strategy is seen by all stakeholders as imperative.
Secondly, “security effectiveness”, “management and leadership”, and “regulatory risks” were also the top three factors that affect the cyber reputation of organisations under the classification of structure. This demonstrates that regulatory risks may play a larger part in influencing organisations to adopt more security controls, along with the identification of effective security controls, all the while steered through positive management and leadership. This implies that cyberattacks are no longer seen to fall within the limited purview of the IT section of an organisation.
Thirdly, under the classification of process, “cyberattacks and incidents”, “internal coordination and controls”, and “stakeholder response speed” were the top three factors that affect the cyber reputation of organisations. These findings indicate that an effective cyber incident response plan coupled with training exercises are essential to mitigate against damage of cyberattacks, including reputational damage.
Fourthly, “emotional connections and responses” and “employee satisfaction” were the top two factors that affect the cyber reputation of organisations under the classification of rewards. Employee satisfaction is not one currently found in the existing literature. Implications from this finding, including emotional connection in response, indicate that employees should be trained in cyber awareness and preparedness not only to better secure the organisation but to make them feel that they are part of the solution and for an internal validation process.
Finally, the top two factors that affect organisations’ cyber reputation under the classification of people were “training and awareness programmes of organisations” and “sustained credibility”. Therefore, this study contributes to the body of knowledge relating to organisations’ cybersecurity by analysing the key factors affecting the reputation of organisations resulting from cyber incidents. Moreover, the findings of this study are expected to help organisations properly position themselves to meet cyber incidents and become more competitive in the post-COVID-19 era.
Notwithstanding the achievement of the objective, this study was not conducted without limitations. The first limitation is the importance assessment made in the study. This could be influenced by the respondents’ experiences as well as attitudes, since it was subjective. In addition, the study utilised qualitative methodology, somewhat limiting its generalisability. This study analysed only the views of selected cybersecurity experts on the factors; thus, future research could consider quantitative approaches targeting the whole population of relevant organisations. The limitations mentioned above generate fertile grounds for further research and should be considered when interpreting the findings of the research. This study recommends using a wider sample size and additional empirical factors that could broaden the understanding of the views of other risk management and cybersecurity experts. Nevertheless, the study is ground-breaking, as, for the first time, it brings to light a classified and ranked set of factors that affect the cyber reputation of organisations, while highlighting important differences between reputation management of private versus public institutions. Future studies will be able to utilize our ranked set of factors for reputation shadow pricing as well as to assist with social media sentiment analysis and how best to respond to reputation damage. This will pave the way for organisations to integrate cyber risks into management policies and procedures of organisations, enabling better governance of cyber threats.
Author Contributions
Conceptualization, S.P., X.J., A.M. and D.-G.J.O.; methodology, S.P. and D.-G.J.O.; software, S.P. and X.J.; validation, A.M., S.P. and X.J.; formal analysis, D.-G.J.O.; investigation, S.P., A.M. and D.-G.J.O.; resources, S.P., X.J. and A.M.; data curation, D.-G.J.O.; writing—original draft preparation, D.-G.J.O.; writing—review and editing, S.P., X.J. and A.M.; visualization, S.P., X.J., A.M. and D.-G.J.O.; supervision, S.P., X.J. and A.M.; project administration, S.P., A.M. and X.J.; funding acquisition, S.P., X.J. and A.M. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by Western Sydney University through the Grant Assistance Scheme 2020 under the research champion Urban Living Futures and Society.
Institutional Review Board Statement
The study was conducted according to the guidelines of the National Statement on Ethical Conduct in Human Research 2007 (Updated 2018), Australia, and approved by the Western Sydney University Human Research Ethics Committee (H14086 and 9 November 2020).
Informed Consent Statement
Informed consent was obtained from all subjects involved in the study.
Acknowledgments
The authors acknowledge the forum experts for providing their opinions, which were incorporated in producing this study.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Arcuri, M.C.; Brogi, M.; Gandolfi, G. Cyber risk: A big challenge in developed and emerging markets. In Identity Theft: Breakthroughs in Research and Practice; IGI Global: Hershey, PA, USA, 2016; pp. 292–307. [Google Scholar]
- Aydin, F.; Pusatli, O.T. Cyber attacks and preliminary steps in cyber security in national protection. In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications; IGI Global: Hershey, PA, USA, 2018; pp. 213–229. [Google Scholar]
- Lallie, H.S.; Shepherd, L.A.; Nurse, J.R.; Erola, A.; Epiphaniou, G.; Maple, C.; Bellekens, X. Cyber security in the age of covid-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 2021, 105, 102248. [Google Scholar] [CrossRef]
- Edwards, B.; Hofmeyr, S.; Forrest, S. Hype and heavy tails: A closer look at data breaches. J. Cybersecur. 2016, 2, 3–14. [Google Scholar] [CrossRef] [Green Version]
- Poremba, S. The Cyber-Risk Paradox: Benefits of New Technologies Bring Hidden Security Risks; Security Boulevard: Boca Raton, FL, USA, 2019. [Google Scholar]
- Adeosun, L.P.K.; Ganiyu, R.A. Corporate reputation as a strategic asset. Int. J. Bus. Soc. Sci. 2013, 4, 220–225. [Google Scholar]
- FireEye. M-Trends Report 2021; FireEye, Inc.: Milpitas, CA, USA, 2021. [Google Scholar]
- Raineri, E.M.; Resig, J. Evaluating Self-Efficacy Pertaining to Cybersecurity for Small Businesses. J. Appl. Bus. Econ. 2020, 22, 13–23. [Google Scholar]
- Bergh, D.D.; Ketchen, D.J., Jr.; Boyd, B.K.; Bergh, J. New frontiers of the reputation—Performance relationship: Insights from multiple theories. J. Manag. 2010, 36, 620–632. [Google Scholar] [CrossRef] [Green Version]
- Rindova, V.P.; Williamson, I.O.; Petkova, A.P. Reputation as an intangible asset: Reflections on theory and methods in two empirical studies of business school reputations. J. Manag. 2010, 36, 610–619. [Google Scholar] [CrossRef]
- Morrison, A.D.; White, L. Reputational contagion and optimal regulatory forbearance. J. Financ. Econ. 2013, 110, 642–658. [Google Scholar] [CrossRef] [Green Version]
- Gatzert, N.; Schmit, J. Supporting strategic success through enterprise-wide reputation risk management. J. Risk Financ. 2016, 17, 26–45. [Google Scholar] [CrossRef]
- Fiordelisi, F.; Soana, M.-G.; Schwizer, P. The determinants of reputational risk in the banking sector. J. Bank. Financ. 2013, 37, 1359–1371. [Google Scholar] [CrossRef]
- Fombrun, C. Reputation: Realizing Value from the Corporate Image; Harvard Business School Press: Boston, MA, USA, 1996. [Google Scholar]
- Walker, K. A systematic review of the corporate reputation literature: Definition, measurement, and theory. Corp. Reput. Rev. 2010, 12, 357–387. [Google Scholar] [CrossRef]
- Fombrun, C.; Van Riel, C. The reputational landscape. Corp. Reput. Rev. 1997, 1, 5–13. [Google Scholar] [CrossRef] [Green Version]
- Barnett, M.L.; Jermier, J.M.; Lafferty, B.A. Corporate reputation: The definitional landscape. Corp. Reput. Rev. 2006, 9, 26–38. [Google Scholar] [CrossRef]
- Hendrikx, F.; Bubendorfer, K.; Chard, R. Reputation systems: A survey and taxonomy. J. Parallel Distrib. Comput. 2015, 75, 184–197. [Google Scholar] [CrossRef]
- Lange, D.; Lee, P.M.; Dai, Y. Organizational reputation: A review. J. Manag. 2011, 37, 153–184. [Google Scholar] [CrossRef] [Green Version]
- Dyer, W.G., Jr.; Whetten, D.A. Family firms and social responsibility: Preliminary evidence from the S&P 500. Entrep. Theory Pract. 2006, 30, 785–802. [Google Scholar]
- Fombrun, C.; Gardberg, N.A.; Sever, J.M. The Reputation Quotient SM: A multi-stakeholder measure of corporate reputation. J. Brand Manag. 2000, 7, 241–255. [Google Scholar] [CrossRef]
- Roberts, P.W.; Dowling, G.R. Corporate reputation and sustained superior financial performance. Strateg. Manag. J. 2002, 23, 1077–1093. [Google Scholar] [CrossRef]
- Rhee, M.; Valdez, M.E. Contextual factors surrounding reputation damage with potential implications for reputation repair. Acad. Manag. Rev. 2009, 34, 146–168. [Google Scholar] [CrossRef] [Green Version]
- Clardy, A. Organizational reputation: Issues in conceptualization and measurement. Corp. Reput. Rev. 2012, 15, 285–303. [Google Scholar] [CrossRef]
- Dutot, V.; Castellano, S. Designing a measurement scale for e-reputation. Corp. Reput. Rev. 2015, 18, 294–313. [Google Scholar] [CrossRef]
- Hand, M. Making Digital Cultures: Access, Interactivity, and Authenticity; Routledge: London, UK, 2016. [Google Scholar]
- Vogler, D.; Eisenegger, M. CSR communication, corporate reputation, and the role of the news media as an agenda-setter in the digital age. Bus. Soc. 2020, 60, 1957–1986. [Google Scholar] [CrossRef]
- Benitez, J.; Ruiz, L.; Castillo, A.; Llorens, J. How corporate social responsibility activities influence employer reputation: The role of social media capability. Decis. Support Syst. 2020, 129, 113223. [Google Scholar] [CrossRef]
- Confente, I.; Siciliano, G.G.; Gaudenzi, B.; Eickhoff, M. Effects of data breaches from user-generated content: A corporate reputation analysis. Eur. Manag. J. 2019, 37, 492–504. [Google Scholar] [CrossRef]
- Sandu, M.C. The factors responsible with corporate reputation: A structural equation modelling approach. Rom. J. Econ. 2015, 40, 144–157. [Google Scholar]
- Shim, K.; Yang, S.-U. The effect of bad reputation: The occurrence of crisis, corporate social responsibility, and perceptions of hypocrisy and attitudes toward a company. Public Relat. Rev. 2016, 42, 68–78. [Google Scholar] [CrossRef]
- Lai, C.-S.; Chiu, C.J.; Yang, C.F.; Pai, D.C. The effects of corporate social responsibility on brand performance: The mediating effect of industrial brand equity and corporate reputation. J. Bus. Ethics 2010, 95, 457–469. [Google Scholar] [CrossRef]
- García-Madariaga, J.; Rodríguez-Rivera, F. Corporate social responsibility, customer satisfaction, corporate reputation, and firms’ market value: Evidence from the automobile industry. Span. J. Mark.-ESIC 2017, 21, 39–53. [Google Scholar] [CrossRef]
- Cox Pahnke, E.; McDonald, R.; Wang, D.; Hallen, B. Exposed: Venture capital, competitor ties, and entrepreneurial innovation. Acad. Manag. J. 2015, 58, 1334–1360. [Google Scholar] [CrossRef]
- Zhu, Y.; Sun, L.-Y.; Leung, A.S. Corporate social responsibility, firm reputation, and firm performance: The role of ethical leadership. Asia Pac. J. Manag. 2014, 31, 925–947. [Google Scholar] [CrossRef]
- Khojastehpour, M.; Johns, R. The effect of environmental CSR issues on corporate/brand reputation and corporate profitability. Eur. Bus. Rev. 2014, 26, 330–339. [Google Scholar] [CrossRef]
- de Bie, C. Exploring Ways to Model Reputation Loss. Master’s Thesis, Erasmus University Rotterdam, Rotterdam, The Netherlands, 2006. [Google Scholar]
- Ponemon Institute. The Impact of Data Breaches on Reputation & Share Value. A Study of U.S. Marketers, IT Practitioners and Consumers; Ponemon Institute Report; Ponemon Institute: Traverse City, MI, USA, 2017. [Google Scholar]
- Pérez-Cornejo, C.; de Quevedo-Puente, E.; Delgado-García, J.B. How to manage corporate reputation? The effect of enterprise risk management systems and audit committees on corporate reputation. Eur. Manag. J. 2019, 37, 505–515. [Google Scholar] [CrossRef]
- Agrafiotis, I.; Nurse, J.R.; Goldsmith, M.; Creese, S.; Upton, D. A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. J. Cybersecur. 2018, 4, tyy006. [Google Scholar] [CrossRef] [Green Version]
- Whitler, K.A.; Farris, P.W. The impact of cyber attacks on brand image: Why proactive marketing expertise is needed for managing data breaches. J. Advert. Res. 2017, 57, 3–9. [Google Scholar] [CrossRef]
- Bada, M.; Nurse, J.R. The social and psychological impact of cyberattacks. In Emerging Cyber Threats and Cognitive Vulnerabilities; Elsevier: Amsterdam, The Netherlands, 2020; pp. 73–92. [Google Scholar]
- Sadeghi, A.; Ghujali, T.; Bastam, H. The Effect of Organizational Reputation on E-loyalty: The Roles of E-trust and E-satisfaction. ASEAN Mark. J. 2019, 10, 1–16. [Google Scholar]
- Sabharwal, S.; Sharma, S. Ransomware Attack: India Issues Red Alert. In Emerging Technology in Modelling and Graphics; Springer: Singapore, 2020; pp. 471–484. [Google Scholar]
- Aharoni, G.; Grundy, B.; Zeng, Q. Stock returns and the Miller Modigliani valuation formula: Revisiting the Fama French analysis. J. Financ. Econ. 2013, 110, 347–357. [Google Scholar] [CrossRef]
- Leippold, M.; Wang, Q.; Zhou, W. Machine learning in the Chinese stock market. J. Financ. Econ. 2021, in press. [CrossRef]
- Di Maggio, M.; Egan, M.; Franzoni, F. The value of intermediation in the stock market. J. Financ. Econ. 2021, in press. [CrossRef]
- Alva. Corporate Reputation. 2020. Available online: https://www.alva-group.com/blog/what-are-the-advantages-of-a-good-corporate-reputation/ (accessed on 11 October 2020).
- Romanosky, S. Examining the costs and causes of cyber incidents. J. Cybersecur. 2016, 2, 121–135. [Google Scholar] [CrossRef] [Green Version]
- Benaroch, M. Third-party induced cyber incidents—Much ado about nothing? J. Cybersecur. 2021, 7, tyab020. [Google Scholar] [CrossRef]
- Slotnick, S.A. Lead-time quotation when customers are sensitive to reputation. Int. J. Prod. Res. 2014, 52, 713–726. [Google Scholar] [CrossRef] [Green Version]
- Ismail, F.; Mustapa, M.; Mustapa, F.D. Risk factors of contractor’s corporate reputation. In Proceedings of the 5th IEEE International Conference on Cognitive Informatics, Beijing, China, 17–19 July 2006. [Google Scholar]
- Deloitte. Global Survey on Reputation Risk. 2015. Available online: https://www2.deloitte.com/content/dam/Deloitte/za/Documents/risk/NEWReputationRiskSurveyReport_25FEB.pdf (accessed on 10 October 2020).
- Liao, Z. Environmental policy instruments, environmental innovation and the reputation of enterprises. J. Clean. Prod. 2018, 171, 1111–1117. [Google Scholar] [CrossRef]
- Makridis, C.A. Do data breaches damage reputation? Evidence from 45 companies between 2002 and 2018. J. Cybersecur. 2021, 7, tyab021. [Google Scholar] [CrossRef]
- Vlastelica, T.; Kostic, S.C.; Okanovic, M.; Milosavljevic, M. How corporate social responsibility affects corporate reputation: Evidence from an emerging market. JEEMS J. East Eur. Manag. Stud. 2018, 23, 10–29. [Google Scholar] [CrossRef]
- Bakić, T.V.; Mijatović, I.; Marinović, N. Key CSR initiatives in Serbia: A new concept with new challenges. In Key Initiatives in Corporate Social Responsibility; Springer: Cham, Switzerland, 2016; pp. 201–220. [Google Scholar]
- Herrmann, A.; Brenner, W.; Stadler, R. Cyber security and data privacy. In Autonomous Driving; Emerald Publishing Limited: Bingley, UK, 2018. [Google Scholar]
- Goldman, R. What We Know and Don’t Know about the International Cyberattack. 2017. Available online: www.nytimes.com/2017/05/12/world/europe/international-cyberattack-ransomware.html?_r=0 (accessed on 10 September 2020).
- Paoli, L.; Visschers, J.; Verstraete, C. The impact of cybercrime on businesses: A novel conceptual framework and its application to Belgium. Crime Law Soc. Chang. 2018, 70, 397–420. [Google Scholar] [CrossRef]
- Saremi, M.R.; Rezaei, A.; Torabi, G. The Changing Concept of Power in International Relations and Challenges of Iran’s Cyber Strategies. Int. J. Political Sci. 2020, 10, 101–125. [Google Scholar]
- Dijkmans, C.; Kerkhof, P.; Beukeboom, C.J. A stage to engage: Social media use and corporate reputation. Tour. Manag. 2015, 47, 58–67. [Google Scholar] [CrossRef] [Green Version]
- Anderson, R.; Barton, C.; Böhme, R.; Clayton, R.; Van Eeten, M.J.G.; Levi, M.; Moore, T.; Savage, S. Measuring the cost of cybercrime. In The Economics of Information Security and Privacy; Springer: Berlin/Heidelberg, Germany, 2013; pp. 265–300. [Google Scholar]
- Klahr, R.; Shah, J.N.; Sheriffs, P.; Rossington, T.; Pestell, G.; Button, M.; Wang, V. Cyber Security Breaches Survey 2017. 2017. Available online: www.gov.uk/government/statistics/cyber-security-breaches-survey-2017 (accessed on 10 September 2021).
- Kilinc, H.H.; Cagal, U. A reputation based trust center model for cyber security. In Proceedings of the 2016 4th International Symposium on Digital Forensic and Security (ISDFS), Little Rock, AR, USA, 25–27 April 2016; IEEE: Piscataway, NJ, USA, 2016. [Google Scholar]
- Kamiya, S.; Kang, J.K.; Kim, J.; Milidonis, A.; Stulz, R.M. Risk management, firm reputation, and the impact of successful cyberattacks on target firms. J. Financ. Econ. 2021, 139, 719–749. [Google Scholar] [CrossRef]
- Lee, Y.-M.; Hu, J.-L. Integrated approaches for business sustainability: The perspective of corporate social responsibility. Sustainability 2018, 10, 2318. [Google Scholar] [CrossRef] [Green Version]
- The Institute of Cyber Risk Management. Cyber Risk—Resources for Practitioners. 2014. Available online: https://www.iia.org.uk/media/560694/irm/_cyber/_risk/_for/_practitioners.pdf (accessed on 17 September 2021).
- McAfee. Ecinomic Impact of Cybercrime, No Slowing Down. 2018. Available online: https://www.mcafee.com/enterprise/enus/solutions/lp/economicscybercrime.html/ (accessed on 17 September 2021).
- Ponemon Institute Report. Cost of Data Breach Study: Global Overview. 2020. Available online: https://www.ibm.com/security/data-breach (accessed on 16 September 2021).
- Sharf, E. Information exchanges: Regulatory changes to the cyber-security industry after Brexit: Making security awareness training work. Comput. Fraud. Secur. 2016, 2016, 9–12. [Google Scholar] [CrossRef]
- Wangen, G.; Hallstensen, C.; Snekkenes, E. A framework for estimating information security risk assessment method completeness. Int. J. Inf. Secur. 2018, 17, 681–699. [Google Scholar] [CrossRef] [Green Version]
- Nurliyani, A. Assessment IT Risk Management at The Computer and Network Laboratory School. J. Inform. Telecommun. Eng. 2019, 3, 115–124. [Google Scholar] [CrossRef] [Green Version]
- Gordon, L.A.; Loeb, M.P.; Zhou, L. Integrating cost–benefit analysis into the NIST Cybersecurity Framework via the Gordon–Loeb Model. J. Cybersecur. 2020, 6, tyaa005. [Google Scholar] [CrossRef]
- Sheehan, B.; Murphy, F.; Mullins, M.; Ryan, C. Connected and autonomous vehicles: A cyber-risk classification framework. Transp. Res. Part A Policy Pract. 2019, 124, 523–536. [Google Scholar] [CrossRef]
- Rossebo, J.E.; Fransen, F.; Luiijf, E. Including threat actor capability and motivation in risk assessment for Smart GRIDs. In Proceedings of the 2016 Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG), Vienna, Austria, 12 April 2016; IEEE: Piscataway, NJ, USA, 2016. [Google Scholar]
- Alberts, C.J.; Behrens, S.G.; Pethia, R.D.; Wilson, W.R. Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Framework; Version 1.0; Carnegie-Mellon University, Software Engineering Institute: Pittsburgh, PA, USA, 1999. [Google Scholar]
- Lund, M.S.; Solhaug, B.; Stølen, K. Model-Driven Risk Analysis: The CORAS Approach; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2010. [Google Scholar]
- Moore, J.W. From phishing to advanced persistent threats: The application of cybercrime risk to the enterprise risk management model. Rev. Bus. Inf. Syst. RBIS 2010, 14, 27–36. [Google Scholar] [CrossRef]
- Nocco, B.W.; Stulz, R.M. Enterprise risk management: Theory and practice. J. Appl. Corp. Financ. 2006, 18, 8–20. [Google Scholar] [CrossRef]
- Harris Poll Reputation Quotient, The Harris Poll Releases Annual Reputation Rankings for the 100 Most Visible Companies in the U.S. 2019. Available online: https://theharrispoll.com/the-harris-pollr-today-released-its-17th-annual-reputation-quotientr-rqr-summary-report-revealing-corporate-reputation-ratings-for-the-100-most-visible-companies-in-the-u-s-as-perceived-by/ (accessed on 20 August 2020).
- Jones, J. Measuring Reputation Damage in Cyber Risk Analysis—Part 1. 2017. Available online: https://www.fairinstitute.org/blog/measuring-reputation-damage-in-cyber-risk-analysis-part-1 (accessed on 11 August 2020).
- Kim, S.; Gurman, M.; Min, J.L.; Samsung’s Reputation Founders on Rush for Lead in Folding Phones. Bloomberg Wire Service. 2019. Available online: http://ezproxy.uws.edu.au/login?url=https://search-proquest-com.ezproxy.uws.edu.au/docview/2212951400?accountid=36155 (accessed on 16 August 2020).
- Witcher, B.J.; Chau, V.S. Varieties of capitalism and strategic management: Managing performance in multinationals after the global financial crisis. Br. J. Manag. 2012, 23, S58–S73. [Google Scholar] [CrossRef]
- Sansa, M.; Badreddine, A.; Romdhane, T.B. Sustainable design based on LCA and operations management methods: SWOT, PESTEL, and 7S. In Methods in Sustainability Science; Elsevier: Amsterdam, The Netherlands, 2021; pp. 345–364. [Google Scholar]
- Bell, G.G.; Rochford, L. Rediscovering SWOT’s integrative nature: A new understanding of an old framework. Int. J. Manag. Educ. 2016, 14, 310–326. [Google Scholar] [CrossRef]
- Li, F.; Papagiannidis, S.; Bourlakis, M. Living in ‘multiple spaces’: Extending our socioeconomic environment through virtual worlds. Environ. Plan. D Soc. Space 2010, 28, 425–446. [Google Scholar] [CrossRef]
- Bakir, D.; Engels, F.; Bakir, J. Innovators 5 forces approach to increase the strategic accuracy of technological sme-innovations. Int. J. Qual. Res. 2019, 13, 875–886. [Google Scholar] [CrossRef]
- Galbraith, J.R. Designing Organizations: Strategy, Structure, and Process at the Business Unit and Enterprise Levels; John Wiley & Sons: Hoboken, NJ, USA, 2014. [Google Scholar]
- Gavrilova, T.; Andreeva, T. Knowledge elicitation techniques in a knowledge management context. J. Knowl. Manag. 2012, 16, 523–537. [Google Scholar] [CrossRef] [Green Version]
- Dehghani, M.; Akhavan, P. An experimental investigation of knowledge acquisition techniques. J. Manag. Dev. 2017, 36, 493–514. [Google Scholar] [CrossRef]
- Yip, J.Y.; Lee, R.W.; Tsui, E. Examining knowledge audit for structured and unstructured business processes: A comparative study in two Hong Kong companies. J. Knowl. Manag. 2015, 19, 514–529. [Google Scholar] [CrossRef] [Green Version]
- Opoku, D.J.; Agyekum, K.; Ayarkwa, J. Drivers of environmental sustainability of construction projects: A thematic analysis of verbatim comments from built environment consultants. Int. J. Constr. Manag. 2019, 1–9. [Google Scholar] [CrossRef]
- Agyekum, K.; Opoku, A.; Oppon, A.J.; Opoku DG, J. Obstacles to green building project financing: An empirical study in Ghana. Int. J. Constr. Manag. 2020, 1–9. [Google Scholar] [CrossRef]
- Cheung, E.; Chan, A.P.; Kajewski, S. The public sector’s perspective on procuring public works projects-comparing the views of practitioners in Hong Kong and Australia. J. Civ. Eng. Manag. 2010, 16, 19–32. [Google Scholar] [CrossRef] [Green Version]
- Opoku, D.J.; Ayarkwa, J.; Agyekum, K. Barriers to environmental sustainability of construction projects. Smart Sustain. Built Environ. 2019, 8, 292–306. [Google Scholar] [CrossRef]
- Javed, A.A.; Lam, P.T.; Chan, A.P. A model framework of output specifications for hospital PPP/PFI projects. Facilities 2013, 31, 610–633. [Google Scholar] [CrossRef]
- Soss, J. Talking our way to meaningful explanations: A practice-centered view of interviewing for interpretive research. In Interpretation and Method; Routledge: London, UK, 2015; pp. 161–182. [Google Scholar]
- Eccles, R.G.; Newquist, S.C.; Schatz, R. Reputation and its risks. Harv. Bus. Rev. 2007, 85, 104. [Google Scholar]
- Bakke, T.-E.; Mahmudi, H.; Fernando, C.S.; Salas, J.M. The causal effect of option pay on corporate risk management. J. Financ. Econ. 2016, 120, 623–643. [Google Scholar] [CrossRef]
- Schmoeller, D. Pros and Cons of the FAIR Framework. 2020. Available online: https://reciprocity.com/pros-and-cons-of-the-fair-framework/ (accessed on 5 February 2021).
- Snider, K.L.; Shandler, R.; Zandani, S.; Canetti, D. Cyberattacks, cyber threats, and attitudes toward cybersecurity policies. J. Cybersecur. 2021, 7, tyab019. [Google Scholar] [CrossRef]
- Pomering, A.; Johnson, L.W. Advertising corporate social responsibility initiatives to communicate corporate image: Inhibiting scepticism to enhance persuasion. Corp. Commun. Int. J. 2009, 14, 420–439. [Google Scholar] [CrossRef]
- Fernández Miguélez, S.M. Reputación Corporativa: Modelos para el Análisis y Valoración de la Dimensión Financiera de Entes Públicos y Privados. Ph.D. Thesis, Universidad de Málaga, Málaga, Spain, 2021. [Google Scholar]
- Fama, E.F.; French, K.R. International tests of a five-factor asset pricing model. J. Financ. Econ. 2017, 123, 441–463. [Google Scholar] [CrossRef]
- Wilding, N. Cyber resilience: How important is your reputation? How effective are your people? Bus. Inf. Rev. 2016, 33, 94–99. [Google Scholar] [CrossRef]
- Piggin, R. Cyber security trends: What should keep CEOs awake at night. Int. J. Crit. Infrastruct. Prot. 2016, 100, 36–38. [Google Scholar] [CrossRef]
- Radichel, T. Case Study: Critical Controls That Could Have Prevented Target Breach; SANS Institute InfoSec Reading Room: North Bethesda, MD, USA, 2014. [Google Scholar]
- Tunggal, A. What Is the Cost of a Data Breach in 2021. 2022. Available online: https://www.upguard.com/blog/cost-of-data-breach (accessed on 8 March 2022).
- Weber, K. Western Sydney University Splits Head of IT Role—Strategy-Training & Development-iTnews. 2022. Available online: https://www.itnews.com.au/news/western-sydney-university-splits-head-of-it-role-574846 (accessed on 8 March 2022).
- James, K. How to Become a Cybersecurity Risk Manager? Career Overview (USA 2022)—Cybersecurity for Me. 2022. Available online: https://cybersecurityforme.com/how-to-become-a-cybersecurity-risk-manager/ (accessed on 9 March 2022).
- Tung, L. Zero Trust and Cybersecurity: Here’s What It Means and Why It Matters|ZDNet. 2021. Available online: https://www.zdnet.com/article/zero-trust-and-cybersecurity-heres-what-it-means-and-why-it-matters/ (accessed on 8 March 2022).
- Cisco. Cybersecurity Threat Trends: Phishing, Crypto Top the List—Cisco Umbrella. 2022. Available online: https://umbrella.cisco.com/info/2021-cyber-security-threat-trends-phishing-crypto-top-the-list?utm_medium=search-paid&utm_source=google&utm_campaign=UMB_22Q3_ANZ_EN_GS_Nonbrand_Threats&utm_term=pgm&utm_content=UMB-FY21-Q4-content-ebook-2021-cyber-security-threat-trends&_bt=535025126387&_bk=top+cybersecurity+threats+2021&_bm=p&_bn=g&_bg=123414586285&gclid=Cj0KCQiAmpyRBhC-ARIsABs2EAr19YMnk4RpG1xGGqHz2w04Y33_mDq8rOKRiBY-8Dntd9iSYB3WPM0aAuqbEALw_wcB (accessed on 8 March 2022).
| Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).