IS

CHOI, BEN C.F.

Topic Weight Topic Terms
0.197 behavior behaviors behavioral study individuals affect model outcomes psychological individual responses negative influence explain hypotheses
0.160 model research data results study using theoretical influence findings theory support implications test collected tested
0.144 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.139 customer customers crm relationship study loyalty marketing management profitability service offer retention it-enabled web-based interactions

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Jiang, Zhenhui (Jack) 1 Kim, Sung S. 1
online customer behavior 1 privacy 1 privacy breaches 1 psychological responses 1
security 1 structural equation modeling 1

Articles (1)

Influence of Firms Recovery Endeavors upon Privacy Breach on Online Customer Behavior (Journal of Management Information Systems, 2016)
Authors: Abstract:
    The soaring number of privacy breaches has prompted affected firms to learn how to effectively recover damaged customer relationships. In this study we develop and test a model that explains how online customer behavior is influenced by a firm's recovery endeavors when privacy breaches occur. Drawing on a service recovery perspective, we integrate the notions of justice perceptions and psychological responses into a theoretical framework. The proposed model was tested against data collected from 1,007 online customers based on a hypothetical scenario. Results show that three types of justice perceptions, distributive, procedural, and interactional justice, jointly affect psychological responsesÑthat is, perceived breach and feelings of violation. In addition, psychological responses were shown to be important in shaping postincident outcomes such as post-word of mouth and post-likelihood of switching. The study gives researchers and practitioners a useful conceptual tool for analyzing the effectiveness of organizational practices in recovering customer relationship after privacy breaches. > >