337
Views
4
CrossRef citations to date
0
Altmetric
Articles

Service security breaches: the impact of comparative optimism

服务企业数据泄露: 乐观偏差的效应

, &
Pages 1190-1210 | Received 23 Jun 2020, Accepted 02 Dec 2020, Published online: 24 Dec 2020

References

  • Ahn, J., & Back, K. J. (2020). The structural effects of affective and cognitive elaboration in formation of customer–brand relationship. The Service Industries Journal, 40(3-4), 226-242. https://doi.org/10.1080/02642069.2018.1460358
  • Asante Boadi, E., He, Z., Bosompem, J., Opata, C. N., & Boadi, E. K. (2020). Employees’ perception of corporate social responsibility (CSR) and its effects on internal outcomes. The Service Industries Journal, 40(9-10), 611-632. https://doi.org/10.1080/02642069.2019.1606906
  • Baek, Y. M., Kim, E. M., & Bae, Y. (2014). My privacy is okay, but theirs is endangered: Why comparative optimism matters in online privacy concerns. Computers in Human Behavior, 31(1), 48-56. https://doi.org/10.1016/j.chb.2013.10.010
  • Berezina, E. (2010). An impact of information security breach on hotel guests’ perception of service quality, satisfaction, word-of-mouth and revisit intentions for Master of Science degree (dissertation). University of Delaware.
  • Berezina, K., Cobanoglu, C., Miller, B. L., & Kwansa, F. A. (2012). The impact of information security breach on hotel guest perception of service quality, satisfaction, revisit intentions and word-of-mouth. International Journal of Contemporary Hospitality Management, 24(7), 991-1010. https://doi.org/10.1108/09596111211258883
  • Bortolotti, L., & Antrobus, M. (2015). Costs and benefits of realism and optimism. Current Opinion in Psychiatry, 28(2), 194-198. https://doi.org/10.1097/YCO.0000000000000143
  • Brown, S. L., & Morley, A. M. (2007). Risk perception, fuzzy representations and comparative optimism. British Journal of Psychology, 98(4), 575-587. https://doi.org/10.1348/000712606X169020
  • Buchanan, T., Paine, C., Joinson, A. N., & Reips, U.D. (2007). Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, 58(2), 157–165. https://doi.org/10.1002/asi.20459
  • Campbell, J., Greenauer, N., Macaluso, K., & End, C. (2007). Unrealistic optimism in internet events. Computers in Human Behavior, 23(3), 1273–1284. https://doi.org/10.1016/j.chb.2004.12.005
  • Cantor, V. J. M., & Li, R. C. (2019). Matching service failures and recovery options toward satisfaction. The Service Industries Journal, 39(13-14), 901-924. https://doi.org/10.1080/02642069.2018.1450868
  • Chambers, J. R., & Windschitl, P. D. (2004). Biases in social comparative judgments: The role of Nonmotivated factors in above-average and comparative-optimism effects. Psychological Bulletin, 130(5), 813-838. https://doi.org/10.1037/0033-2909.130.5.813
  • Chapin, J. R. (2000). Third-person perception and optimistic bias among urban minority at-risk youth. Communication Research, 27(1), 51-81. https://doi.org/10.1177/009365000027001003
  • Chapman, G. B., & Coups, E. J. (2006). Emotions and preventive health behavior: Worry, regret, and influenza vaccination. Health Psychology, 25(1), 82-90. https://doi.org/10.1037/0278-6133.25.1.82
  • Chen, H. S., & Jai, T. M. C. (2019a). Cyber alarm: Determining the impacts of hotel's data breach messages. International Journal of Hospitality Management, 82, 326-334. https://doi.org/10.1016/j.ijhm.2018.10.002
  • Chen, H. S., & Jai, T. M. C. (2019b). Trust fall: Data breach perceptions from loyalty and non-loyalty customers. The Service Industries Journal, 1-17. https://doi.org/10.1080/02642069.2019.1603296
  • Chen, J. V., Li, H.-C., Yen, D. C., & Bata, K. V. (2012). Did IT consulting firms gain when their clients were breached? Computers in Human Behavior, 28(2), 456-464. https://doi.org/10.1016/j.chb.2011.10.017
  • Cho, H., Lee, J.-S. & Chung, S. (2010). Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience. Computers in Human Behavior, 26(5), 987-995. https://doi.org/10.1016/j.chb.2010.02.012
  • Cho, H., Rivera-Sanchez, M., & Lim, S. S. (2009). A multinational study on online privacy: Global concerns and local responses. New Media and Society, 11(3), 409–431. https://doi.org/10.1177/1461444808101618
  • Choi, B. C., Kim, S. S., & Jiang, Z. (2016). Influence of firm's recovery endeavors upon privacy breach on online customer behavior. Journal of Management Information Systems, 33(3), 904-933. https://doi.org/10.1080/07421222.2015.1138375
  • Cobanoglu, C., & Demicco, F.J. (2007). To be secure or not to be: Isn't this the question? A critical look at hotel's network security. International Journal of Hospitality and Tourism Administration, 8(1), 43-59. https://doi.org/10.1300/J149v08n01_03
  • Digital Future Report. (2005). USC Annenberg School Center for the Digital Future. Five years of exploring the digital domain. Retrieved March 29, 2019 from http://www.digitalcenter.org/pages/current_report.asp?intGlobalId=19
  • Dwyer, C., Hiltz, S. R., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. Proceedings of the thirteenth Americas conference on information systems. Keystone, Colorado, USA, paper 339.
  • Festinger, L. (1954). A theory of social comparison processes. Human Relations, 7(2), 117-140. https://doi.org/10.1177/001872675400700202
  • Frese, M., & Keith, N. (2015) Action errors, error management, and learning in organizations. Annual Review of Psychology, 66(1), 661-687. https://doi.org/10.1146/annurev-psych-010814-015205
  • Goel, S., & Shawky, H. A. (2009). Estimating the market impact of security breach announcements on firm values. Information and Management, 46(7), 404-410. https://doi.org/10.1016/j.im.2009.06.005
  • Goodhue, D. L., & Straub, D. W. (1991). Security concerns of system users: A study of perceptions of the adequacy of security. Information and Management, 20(1), 13-27. https://doi.org/10.1016/0378-7206(91)90024-V
  • Guchait, P., Simons, T., & Pasamehmetoglu, A. (2016). Error recovery performance: The impact of leader behavioral integrity and job satisfaction. Cornell Hospitality Quarterly, 57(2), 150-161. https://doi.org/10.1177/1938965515613858
  • Hayes, A. F. (2013). Introduction to mediation, moderation, and conditional process analysis: A regression-based approach. Guilford Press, New York, NY.
  • Helweg-Larsen, M., & Shepperd, J. A. (2001). Do moderators of the optimistic bias affect personal or target risk estimates? A review of literature. Personality and Social Psychology Review, 5(1), 74–95. https://doi.org/10.1207/S15327957PSPR0501_5
  • Hoorens, V., Van Damme, C. V., Helweg-Larsen, M., & Sedikides, C. (2017). The hubris hypothesis: The downside of comparative optimism displays. Consciousness and Cognition, 50, 45-55. https://doi.org/10.1016/j.concog.2016.07.003
  • Jai, T. M. C., & King, N. J. (2016). Privacy versus reward: Do loyalty programs increase consumers’ willingness to share personal information with third-party advertisers and data brokers? Journal of Retailing and Consumer Services, 28, 296-303. https://doi.org/10.1016/j.jretconser.2015.01.005
  • Janakiraman, R., Lim, J. H., & Rishika, R. (2018). The effect of a data breach announcement on customer behavior: Evidence from a multichannel retailer. Journal of Marketing, 82(2), 85-105. https://doi.org/10.1509/jm.16.0124
  • Jianakoplos, N. A., & Bernasek, A. (2008). Family financial risk taking when the wife earns more. Journal of Family and Economic Issues, 29(2), 289-306.
  • Karmarkar, U. R., & Tormala, Z. L. (2010). Believe me, I have no idea what I'm talking about: The effects of source certainty on consumer involvement and persuasion. Journal of Consumer Research, 36(6), 1033–1049. https://doi.org/10.1086/648381
  • King, A., Lenox, M. J., & Barnett, M. L. (2002). Strategic responses to the reputation commons problem, In A. Hoffman & M. Ventresca (Eds.), Organizations, policy and the natural environment: Institutional and strategic perspectives, 393-406. Stanford University Press, Stanford, CA.
  • Klein, C. T. F., & Helweg-Larsen, M. (2002). Perceived control and the optimistic bias: A meta-analytic review. Psychology and Health, 17(4), 437–446. https://doi.org/10.1080/0887044022000004920
  • Kosiba, J. P., Boateng, H., Okoe, A. F., & Hinson, R. (2020). Trust and customer engagement in the banking sector in Ghana. The Service Industries Journal, 40(13-14), 960-973. https://doi.org/10.1080/02642069.2018.1520219
  • Kruger, J. (1999). Lake Wobegon be gone! The” below-average effect” and the egocentric nature of comparative ability judgments. Journal of Personality and Social Psychology, 77(2), 221-232. https://doi.org/10.1037/0022-3514.77.2.221
  • Lang, L. H., & Stulz, R. (1992). Contagion and competitive intra-industry effects of bankruptcy announcements: An empirical analysis. Journal of Financial Economics, 32(1), 45-60. https://doi.org/10.1016/0304-405X(92)90024-R
  • Leung, X. Y., Bai, B., & Stahura, K. A. (2015). The marketing effectiveness of social media in the hotel industry: A comparison of Facebook and Twitter. Journal of Hospitality & Tourism Research, 39(2), 147-169. https://doi.org/10.1177/1096348012471381
  • Li, X. (2008). Third-person effect, optimistic bias, and sufficiency resource in internet use. Journal of Communication, 58(3), 586–587. https://doi.org/10.1111/j.1460-2466.2008.00400.x
  • Malhotra, N. K., Kim, S., & Agarwal, J. (2004). Internet users’ information privacy concern (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355. https://doi.org/10.1287/isre.1040.0032
  • Malhotra, A., & Malhotra, K. C. (2011). Evaluating customer information breaches as service failures: An event study approach. Journal of Service Research, 14(1), 44-59. https://doi.org/10.1177/1094670510383409
  • Mariani, M., Baggio, R., Fuchs, M., & Höepken, W. (2018). Business intelligence and big data in hospitality and tourism: A systematic literature review. International Journal of Contemporary Hospitality Management, 30(12), 3514-3554. https://doi.org/10.1108/IJCHM-07-2017-0461
  • Martin, K. D., Borah, A., & Palmatier, R. W. (2017). Data privacy: Effects on customer and firm performance. Journal of Marketing, 81(1), 36-58. https://doi.org/10.1509/jm.15.0497
  • Martin, K. D., & Murphy, P. E. (2017). The role of data privacy in marketing. Journal of the Academy of Marketing Science, 45(2), 135-155. https://doi.org/10.1007/s11747-016-0495-4
  • McComas, K. A. (2006). Defining moments in risk communication research: 1996–2005. Journal of Health Communication, 11(1), 75-91. https://doi.org/10.1080/10810730500461091
  • Metzger, M. J. (2007). Communication privacy management in electronic commerce. Journal of Computer-Mediated Communication, 12(2), 335-361. https://doi.org/10.1111/j.1083-6101.2007.00328.x
  • Metzger, M., Flanagin, A., & Nekmat, E. (2015). Comparative optimism in online credibility evaluation among parents and children. Journal of Broadcasting & Electronic Media, 59(3), 509-529. https://doi.org/10.1080/08838151.2015.1054995
  • Metzger, M. J., & Suh, J. J. (2017). Comparative optimism about privacy risks on Facebook. Journal of Communication, 67(2), 203-232. https://doi.org/10.1111/jcom.12290
  • Milberg, S. J., Burke, S. J., Smith, H. J., & Kallman, E. A. (1995). Values, personal information privacy, and regulatory approaches. Communications of the ACM, 38(12), 65-74. https://doi.org/10.1145/219663.219683
  • Modi, S. B., Wiles, M. A., & Mishra, S. (2015). Shareholder value implications of service failures in triads: The case of customer information security breaches. Journal of Operations Management, 35(1), 21-39. https://doi.org/10.1016/j.jom.2014.10.003
  • Newman, L.H. (2018). How to protect yourself from the giant Marriott hack. Retrieved March 29, 2019 from https://www.wired.com/story/marriott-hack-protect-yourself/
  • Otten, W., & Van Der Pligt, J. (1996). Context effects in the measurement of comparative optimism in probability judgments. Journal of Social and Clinical Psychology, 15(1), 80-101. https://doi.org/10.1521/jscp.1996.15.1.80
  • Phillips, D. J. (2004). Privacy policy and pets: The influence of policy regimes on the development and social implications of privacy enhancing technologies. New Media and Society, 6(6), 691–706. https://doi.org/10.1177/146144804042523
  • Pick, D., Thomas, J. S., Tillmanns, S., & Krafft, M. (2016). Customer win-back: The role of attributions and perceptions in customers’ willingness to return. Journal of the Academy of Marketing Science, 44(2), 218-240. https://doi.org/10.1007/s11747-015-0453-6
  • Pornpitakpan, C., & Green, R. T. (2007). The effect of message appeals countering unrealistic optimism on purchase intentions: A cross-national study. Asia Pacific Journal of Marketing and Logistics, 19(3), 207-226. https://doi.org/10.1108/13555850710772905
  • Rasoulian, S., Grégoire, Y., Legoux, R., & Sénécal, S. (2017). Service crisis recovery and firm performance: Insights from information breach announcements. Journal of the Academy of Marketing Science, 45(6), 789-806. https://doi.org/10.1007/s11747-017-0543-8
  • Rhee, H. S., Ryu, Y., & Kim, C. T. (2005). I am fine but you are not: Optimistic bias and illusion of control on information security. Proceedings of the 26th International Conference on Information Systems, Las Vegas, NV, 381-394.
  • Rosati, P., Cummins, M., Deeney, P., Gogolin, F., van der Werff, L., & Lynn, T. (2017). The effect of data breach announcements beyond the stock price: Empirical evidence on market activity. International Review of Financial Analysis, 49, 146-154. https://doi.org/10.1016/j.irfa.2017.01.001
  • Rose, J. P. (2010). Are direct or indirect measures of comparative risk better predictors of concern and behavioural intentions? Psychology and Health, 25(2), 149-165. https://doi.org/10.1080/08870440802340164
  • Rose, J. P. (2012). Debiasing comparative optimism and increasing worry for health outcomes. Journal of Health Psychology, 17(8), 1121-1131. https://doi.org/10.1177/1359105311434051
  • Shepperd, J. A., Helweg-Larsen, M., & Orgega, L. (2003). Are comparative risk judgments consistent across time and events? Personality and Social Psychology Bulletin, 29(9), 1169–1180. https://doi.org/10.1177/0146167203254598
  • Solove, D. J. (2007). The future of reputation: Gossip, rumor, and privacy on the internet. Yale University Press, New Haven, CT.
  • Solove, D. J. (2011). Nothing to hide: False tradeoff between privacy and security. Yale University Press, New Haven, CT.
  • Stern, P., & Fineberg, H. (1996). The idea of risk characterization. In P. Stern & H. Fineberg (Eds.). Understanding risk: Informing decisions in a democratic society (pp.11–36). National Academy Press, Washington DC.
  • Tenczar, J. (2008). PCI Sharpens its Teeth: Are You Ready? Hospitality Technology. Retrived from Macrh 3, 2019 from http://www.htmagazine.com/ME2/Sites/dirmod.asp?sid=andnm=andtype=MultiPublishingandmod = PublishingTitlesandmid=3E19674330734FF1BBDA3D67B50C82F1andtier = 4andid=1A8333A1BA3E428B90E9BED3550176B7andSiteID = AAED287C668148CCB10E4FBA73326A07
  • Tufekci, Z. (2008). Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology and Society, 28(1), 20–36. https://doi.org/10.1177/0270467607311484
  • USA Today. (2018). Your data was probably stolen in cyberattack in 2018 - and you should care. Retrived January 20, 2019 from https://www.usatoday.com/story/money/2018/12/28/data-breaches-2018-billions-hit-growing-number-cyberattacks/2413411002/
  • Van Dyck, C., Frese, M., Baer, M., & Sonnentag, S. (2005). Organizational error management culture and its impact on performance: A two-study replication. Journal of Applied Psychology, 90(6), 1228-1240. https://doi.org/10.1037/0021-9010.90.6.1228
  • Viglia, G., & Dolnicar, S. (2020). A review of experiments in tourism and hospitality. Annals of Tourism Research, 80, 102858. https://doi.org/10.1016/j.annals.2020.102858
  • Wei, W., Hua, N., Fu, X., & Guchait, P. (2017). The impacts of hotels’ error management culture on customer engagement behaviors (CEBs). International Journal of Contemporary Hospitality Management, 29(12), 3119-3137. https://doi.org/10.1108/IJCHM-04-2016-0226
  • Wei, W., Zhang, L., & Hua, N. (2019). Error management in service security breaches. Journal of Services Marketing, 33(7), 783-797. https://doi.org/10.1108/JSM-04-2018-0114
  • Weinstein, N. D. (1980). Unrealistic optimism about future life events. Journal of Personality and Social Psychology, 39(5), 806-820. https://doi.org/10.1037/0022-3514.39.5.806
  • Wills, T. A. (1981). Downward comparison principles in social psychology. Psychological Bulletin, 90(2), 245-271. https://doi.org/10.1037/0033-2909.90.2.245
  • Yao, M. Z., Rice, R. E., & Wallis, K. (2007). Predicting user concerns about online privacy. Journal of American Society for Information Science and Technology, 58(5), 710–722. https://doi.org/10.1002/asi.20530
  • Youn, S., & Hall, K. (2008). Gender and online privacy among teens: Risk perception, privacy concerns, and protection behaviors. Cyber Psychology and Behaviors, 11(6), 763–765. https://doi.org/10.1089/cpb.2007.0240
  • Yun, H., Lee, C. C., & Kettinger, W. J. (2012). Personal information breach as a service failure: examining relationships among recovery efforts, justice, and customer responses. Retrieved January 20, 2019 from https://aisel.aisnet.org/cgi/viewcontent.cgi?referer=https://www.google.com/andhttpsredir=1andarticle=1207andcontext=icis2012
  • Yurieff, K. (2018). What to do if you're affected by the Marriott data breach. Retrieved March 3, 2019 from https://www.cnn.com/2018/11/30/tech/marriott-breach-what-to-do/index.html
  • Zhang, L., Wei, W., & Hua, N. (2019). Impact of data breach locality and error management on attitude and engagement. International Journal of Hospitality Management, 78, 159-168. https://doi.org/10.1016/j.ijhm.2018.12.001

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.