{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T08:43:37Z","timestamp":1765961017176,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319696430"},{"type":"electronic","value":"9783319696447"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69644-7_19","type":"book-chapter","created":{"date-parts":[[2017,11,7]],"date-time":"2017-11-07T07:13:18Z","timestamp":1510038798000},"page":"185-191","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An Exploration of Public Reaction to the OPM Data Breach Notifications"],"prefix":"10.1007","author":[{"given":"Rohit","family":"Valecha","sequence":"first","affiliation":[]},{"given":"Eric","family":"Bachura","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Chen","sequence":"additional","affiliation":[]},{"given":"H.","family":"Raghav Rao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,8]]},"reference":[{"key":"19_CR1","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.dss.2015.12.007","volume":"83","author":"R Chakraborty","year":"2016","unstructured":"Chakraborty, R., Lee, J., Bagchi-Sen, S., Upadhyaya, S., Rao, H.R.: Online shopping intention in the context of data breach in online retail stores. Decis. Support Syst. 83, 47\u201356 (2016)","journal-title":"Decis. Support Syst."},{"key":"19_CR2","unstructured":"CSID: Data Breaches Pose a Threat across All Industries. CSID, Austin (2015)"},{"key":"19_CR3","unstructured":"Humphries, D.: Public awareness of security breaches: industry view 2014. In: Software Advice. Gartner (2014)"},{"key":"19_CR4","unstructured":"IRTC: Data Breaches, Identity Theft Resource Center. San Diego (2016)"},{"key":"19_CR5","unstructured":"Lazzarotti, J.: Report says Russian hackers stole 1.2 billion usernames and passwords, but don\u2019t let \u201cbreach fatigue\u201d take hold. In: Workplace Privacy, Data Management and Security Report. Jackson Lewis P.C, White Plains (2014)"},{"key":"19_CR6","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-45408-5_1","volume-title":"E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life","author":"J Lee","year":"2016","unstructured":"Lee, J., Rehman, B.A., Agrawal, M., Rao, H.R.: Sentiment analysis of Twitter users over time: the case of the Boston bombing tragedy. In: Sugumaran, V., Yoon, V., Shaw, Michael J. (eds.) WEB 2015. LNBIP, vol. 258, pp. 1\u201314. Springer, Cham (2016). doi:\n                  10.1007\/978-3-319-45408-5_1"},{"key":"19_CR7","unstructured":"Marzilli, T.: Target perception falls after data breach. In: YouGovBrandIndex. YouGov plc, London (2013)"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Nasukawa, T., Yi, J.: Sentiment analysis: capturing favorability using natural language processing. In: Proceedings of the 2nd International Conference on Knowledge Capture, pp. 70\u201377. ACM (2003)","DOI":"10.1145\/945649.945658"},{"key":"19_CR9","volume-title":"Data Breach Fatigue: Consumers Pay the Highest Price","author":"N O\u2019Farrell","year":"2014","unstructured":"O\u2019Farrell, N.: Data Breach Fatigue: Consumers Pay the Highest Price. CreditSesame.com, Mountain View (2014)"},{"key":"19_CR10","unstructured":"Pennebaker, J.W., Boyd, R.L., Jordan, K., Blackburn, K.: The Development and Psychometric Properties of LIWC2015. UT Faculty\/Researcher Works (2015)"},{"key":"19_CR11","unstructured":"Perlberg, S.: Do consumers have data breach fatigue? In: WSJ.com. New York (2014)"},{"key":"19_CR12","unstructured":"PonemonInstitute: The Aftermath of a Mega Data Breach: Consumer Sentiment. Ponemon Institute (2014)"},{"key":"19_CR13","first-page":"1","volume":"1","author":"S Stieglitz","year":"2011","unstructured":"Stieglitz, S., Kr\u00fcger, N.: Analysis of sentiments in corporate Twitter communication\u2013A case study on an issue of Toyota. Analysis 1, 1\u20132011 (2011)","journal-title":"Analysis"},{"issue":"1","key":"19_CR14","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1177\/0261927X09351676","volume":"29","author":"YR Tausczik","year":"2010","unstructured":"Tausczik, Y.R., Pennebaker, J.W.: The psychological meaning of words: LIWC and computerized text analysis methods. J. Lang. Soc. Psychol. 29(1), 24\u201354 (2010)","journal-title":"J. Lang. Soc. Psychol."},{"key":"19_CR15","volume-title":"Psychiatric-Mental Health Nursing","author":"S Videbeck","year":"2013","unstructured":"Videbeck, S.: Psychiatric-Mental Health Nursing. Lippincott Williams and Wilkins, Philadelphia (2013)"},{"key":"19_CR17","unstructured":"Williamson, W.: Data breaches by teh numbers. In: Security Week. Wired Business Media (2015)"}],"container-title":["Lecture Notes in Business Information Processing","Internetworked World"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69644-7_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T20:39:29Z","timestamp":1558384769000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69644-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319696430","9783319696447"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69644-7_19","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"8 November 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WEB","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Workshop on E-Business","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dublin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ireland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"web2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icis2016.aisnet.org\/15th-workshop-e-business-web-2016\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}