EconPapers    
Economics at your fingertips  
 

Leadership in the cyber warfare era: Formulating a data breach reporting and management strategy

Garikai Chimuka

Cyber Security: A Peer-Reviewed Journal, 2019, vol. 2, issue 4, 336-345

Abstract: This paper focuses on one of the fundamental requirements of the General Data Protection Regulation (GDPR), namely the duty to inform data protection regulators and users promptly when there has been breach of user data. It notes that many corporate leaders fear this requirement, which is generally viewed as an unnecessary expense on the organisation. It argues, however, that responsible leaders must embrace this requirement and view it not as a threat but an opportunity to continuously improve their systems. It posits that responsible leaders must not fear this, whether they are governed by the GDPR or not. The paper highlights, with some examples, the major data breaches that have compromised user information in arguing that while investment in robust end-to-end security systems is imperative, it cannot guarantee against data breach due to the increasing sophistication of both state and non-state hackers. It analyses some reasons why many leaders often try to conceal data breach and concludes by proffering some advice, backed by practical examples of how responsible leadership can formulate novel and holistic data breach reporting and management strategies that go beyond the traditional crisis management and continuity models.

Keywords: data breach; responsible leadership; GDPR; crisis management; continuity models (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2019
References: Add references at CitEc
Citations:

Downloads: (external link)
https://hstalks.com/article/1774/download/ (application/pdf)
https://hstalks.com/article/1774/ (text/html)
Requires a paid subscription for full access.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2019:v:2:i:4:p:336-345

Access Statistics for this article

More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

 
Page updated 2025-03-19
Handle: RePEc:aza:csj000:y:2019:v:2:i:4:p:336-345