Skip to main content

Advertisement

Log in

An analysis of the public consequences of cybersecurity incidents in Brazil

  • Original Article
  • Published:
Social Network Analysis and Mining Aims and scope Submit manuscript

Abstract

Cybersecurity incidents, like data breaches and ransomware, are on the rise, and their consequences can affect companies from different perspectives. On the one hand, a well-known consequence involves the technical aspects of ensuring the continuity of companies’ operations. On the other hand, cybersecurity incidents’ repercussions can impact companies’ stock market value and negatively influence customers’ perceptions about companies’ reputations. Currently, social media platforms establish an additional concern for companies because of their capability to intensify incident reactions. This study analyzed tweets, news, and stock prices associated with four Brazilian organizations’ victims of data breaches and ransomware to answer the research question: what are the impacts of cybersecurity incidents’ public consequences on the reputation and the stock value of Brazilian organizations? Through the analysis performed, we proposed an anatomy of incidents’ repercussions covering aspects like the main events observed in the timelines and peculiarities of every incident type. The stock share prices analysis did not allow us to infer a relationship between the disclosure of incidents and stock values. By assessing Twitter’s user-generated content, we observed that data breaches reverberate more than ransomware.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Notes

  1. https://www.securityreport.com.br/email/InfoSR2021_Jan_a_dez.html.

  2. The following link introduces the Twitter API version 2: https://developer.twitter.com/en/docs/twitter-api.

  3. We collected the stock information from B3, the Brazilian stock exchange, using Yahoo services at https://br.financas.yahoo.com.

  4. The news analyzed in this study was collected using the platform published by Google: https://news.google.com.

  5. Tweets and news used in the analysis are available on https://github.com/VitoriaLemos/Unisinos-PFII.

  6. The Python scripts developed by authors are available in the following GitHub repository: https://github.com/VitoriaLemos/Unisinos-PFII.

  7. The Text Analytics features made available as part of the Cognitive Service for Language are explained at https://azure.microsoft.com/en-us/services/cognitive-services/text-analytics/.

References

  • Bachura E, Valecha R, Chen R, Rao HR (2022) The OPM data breach: an investigation of shared emotional reactions on twitter. MIS Q 46(2):881–910

    Article  Google Scholar 

  • Bardin L (2011) Organização da análise. Anál Conteúdo. São Paulo Edições 70:229

    Google Scholar 

  • Barrett MP (2018) Framework for improving critical infrastructure cybersecurity version 1.1

  • Bederna Z, Szádeczky T (2023) Managing the financial impact of cybersecurity incidents. Secur Def Q 41(1):15–35

    Google Scholar 

  • Biancovilli P, Makszin L, Amer F, Csongor A (2022) Celebrities and breast cancer: a multidimensional quali-quantitative analysis of news stories shared on social media. Int J Environ Res Public Health 19(15):9676

    Article  Google Scholar 

  • Blaya C (2019) Cyberhate: a review and content analysis of intervention strategies. Aggress Viol Behav 45:163–172

    Article  Google Scholar 

  • BleepingComputer (2021) Eletrobras, copel energy companies hit by ransomware attacks. https://www.bleepingcomputer.com/news/security/eletrobras-copelenergy-companies-hit-by-ransomware-attacks/

  • Boeckl KR, Lefkovitz NB (2020) Nist privacy framework: a tool for improving privacy through enterprise risk management, version 1.0

  • Brasil Econômico (2022) Bolsonaro e mais 100 milhões de pessoas tiveram os dados de celulares vazados. https://tecnologia.ig.com.br/2021-02-10/bolsonaro-e-mais-cem-milhoesde-pessoas-tiveram-os-dados-de-celulares-vazados.html

  • Brindha R, Nandagopal S, Azath H, Sathana V, Joshi GP, Kim SW (2023) Intelligent deep learning based cybersecurity phishing email detection and classification. CMC Comput Mater Continua 74(3):5901–5914

    Google Scholar 

  • Caregnato RCA, Mutti R (2006) Pesquisa qualitativa: análise de discurso versus análise de conteúdo. Universidade Federal de Santa Catarina, Programa de Pós Graduação em Enfermagem

  • Centrify (2017) The impact of data breaches on reputation & share value

  • Confente I, Siciliano GG, Gaudenzi B, Eickhoff M (2019) Effects of data breaches from user-generated content: a corporate reputation analysis. Eur Manag J 37(4):492–504

    Article  Google Scholar 

  • Couce-Vieira A, Insua DR, Kosgodagan A (2020) Assessing and forecasting cybersecurity impacts. Decis Anal 17(4):356–374

    Article  MathSciNet  Google Scholar 

  • Cybercrime Magazine (2020) Cybercrime to cost the world \$10.5 trillion annually by 2025

  • dos Santos FM (2012) Análise de conteúdo: a visão de Laurence Bardin

  • Emsisoft (2021) The cost of ransomware in 2021: A country-by-country analysis: Emsisoft: Security blog. https://blog.emsisoft.com/en/38426/the-cost-of-ransomware-in-2021-acountry-by-country-analysis/

  • García JMG-V, García-Carmona M, Trujillo Torres JM, Moya-Fernández P (2022) Teacher training for educational change: the view of international experts. Contemp Educ Technol 14(1)

  • IBM (2020) What is natural language processing? https://www.ibm.com/cloud/learn/natural-language-processing

  • IBM Security (2022) Cost of a data breach report 2022. https://www.ibm.com/reports/data-breach

  • Iosifidis P, Nicoli N (2020) The battle to end fake news: a qualitative content analysis of Facebook announcements on how it combats disinformation. Int Commun Gaz 82(1):60–81

    Article  Google Scholar 

  • Jarjoui S, Murimi R, Murimi R (2021) Hold my beer: a case study of how ransomware affected an Australian beverage company. In: 2021 International conference on cyber situational awareness, data analytics and assessment (cybersa), pp 1–6

  • Jorge S, Nogueira S, Jesus MA (2023) Financial information use in parliamentary debates in a changing context. Public Organization Review, pp 1–28

  • Kaspersky (2021) How data breaches happen. https://www.kaspersky.com/resource-center/definitions/data-breach

  • National Cyber Security Centre (2018) What is a cyber incident. online. https://www.ncsc.gov.uk/information/what-cyberincident

  • Newman CA, Messing MJ (2018) Bull or bear? How the market reacts to data breach news. https://corpgov.law.harvard.edu/2018/11/20/bull-or-bear-how-themarket-reacts-to-data-breach-news/

  • NIS Cooperation Group (2018) Cybersecurity incident taxonomy—European commission. https://ec.europa.eu/

  • Onwuegbuzie A, Leech N, Collins K (2015) Qualitative analysis techniques for the review of the literature. The Qualitative Report

  • Perera S, Jin X, Maurushat A, Opoku D-GJ (2022) Factors affecting reputational damage to organisations due to cyberattacks. Informatics 9:28

    Article  Google Scholar 

  • Reinsel D, Gantz J, Rydning J (2017) Data age 2025: the evolution of data to life-critical. IDC White Paper. https://www.import.io/wp-content/uploads/2017/04/Seagate-WPDataAge2025-March-2017.pdf

  • Sandescu C, Dinisor A, Vladescu C-V, Grigorescu O, Corlatescu D, Dascalu M, Rughinis R (2022) Extracting exploits and attack vectors from cybersecurity news using nlp. UPB Sci Bull Ser C Electr Eng Comput Sci Politech Univ Buchar 84(2):63–78

    Google Scholar 

  • Schlackl F, Link N, Hoehle H (2022) Antecedents and consequences of data breaches: a systematic review. Inf Manag 59:103638

    Article  Google Scholar 

  • Sinanaj G, Muntermann J, Cziesla T (2015) How data breaches ruin firm reputation on social media!-insights from a sentiment-based event study. Wirtschaftsinformatik 2015:902–916

    Google Scholar 

  • Sinanaj G, Zafar H (2016) Who wins in a data breach?-a comparative study on the intangible costs of data breach incidents. Pacis, p 60

  • Syed R (2019) Enterprise reputation threats on social media: a case of data breach framing. J Strateg Inf Syst 28(3):257–274

    Article  Google Scholar 

  • Syed R, Dhillon G (2015) Dynamics of data breaches in online social networks: understanding threats to organizational information security reputation

  • Tayaksi C, Ada E, Kazancoglu Y, Sagnak M (2022) The financial impacts of information systems security breaches on publicly traded companies: reactions of different sectors. J Enterp Inf Manag 35(2):650–668

    Article  Google Scholar 

  • Trellix (2021) What is ransomware? https://www.mcafee.com/enterprise/en-us/securityawareness/ransomware.html

  • Tweneboah-Kodua S, Atsu F, Buchanan W (2018) Impact of cyberattacks on stock performance: a comparative study. Inf Comput Secur 26:637–652

    Article  Google Scholar 

  • Yayla AA, Hu Q (2011) The impact of information security events on the stock value of firms: the effect of contingency factors. J Inf Technol 26(1):60–77

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

VL wrote the main manuscript text and prepared the figures. All authors reviewed the manuscript.

Corresponding author

Correspondence to Luciano Ignaczak.

Ethics declarations

Conflict of interest

The authors declare no competing interests.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

de Lemos, V., Ignaczak, L. An analysis of the public consequences of cybersecurity incidents in Brazil. Soc. Netw. Anal. Min. 13, 106 (2023). https://doi.org/10.1007/s13278-023-01113-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13278-023-01113-9

Keywords

Navigation

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy