Investigating the use of protective technologies after data breach: the roles of psychological distance, technological service type and organizational justice

Emmanuel W. Ayaburi,Francis Kofi Andoh-Baidoo,Jaeung Lee,Mikko Siponen
DOI: https://doi.org/10.1016/j.cose.2024.103900
IF: 5.105
2024-05-20
Computers & Security
Abstract:Protective information technologies (PITs) are crucial for preventing security and privacy issues, but their application by customers following a data breach has not been thoroughly studied in the past. In this work, we define post-data breach protective technologies (PDPT), an initiative-taking protective technology, as the use of PIT in the aftermath of a data breach. Based on the kinds of services violated, we hypothesize that users' psychological understanding of protective technology and the organization's justice procedures affect victims' intent to use PDPT. We validate two theoretical hypotheses for PDPT adoption by utilizing survey responses from consumers across utility-benefit and social-benefit services after data breaches. For practice, our research provides guidance for planning and encouraging the implementation of protective technology in the wake of a privacy crisis or data breach. In general, we draw the conclusion that a data breach tends to heighten the victims' awareness of the breach, impact justice perceptions, and alter the distant psychological knowledge about the service benefits of protective technologies post data breach.
computer science, information systems
What problem does this paper attempt to address?