Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/28114
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBoakye, D-
dc.contributor.authorSarpong, D-
dc.contributor.authorMeissner, D-
dc.contributor.authorOfosu, G-
dc.date.accessioned2024-01-28T16:33:07Z-
dc.date.available2024-01-28T16:33:07Z-
dc.date.issued2023-05-26-
dc.identifier.citationBoakye, D. et al. (2023) 'How TalkTalk did the walk-walk: strategic reputational repair in a cyber-attack', Information Technology and People, 0 (ahead of print), pp. 1 - 32. doi: 10.1108/ITP-08-2022-0589.en_US
dc.identifier.issn0959-3845-
dc.identifier.urihttps://bura.brunel.ac.uk/handle/2438/28114-
dc.description.abstractPurpose: Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary organisation. This paper explores the reputation repair strategies undertaken by organisations in the event of becoming victims of cyber-attacks. Design/methodology/approach: For developing the authors’ contribution in the context of the Internet service providers' industry, the authors draw on a qualitative case study of TalkTalk, a British telecommunications company providing business to business (B2B) and business to customer (B2C) Internet services, which was a victim of a “significant and sustained” cyber-attack in October 2015. Data for the enquiry is sourced from publicly available archival documents such as newspaper articles, press releases, podcasts and parliamentary hearings on the TalkTalk cyber-attack. Findings: The findings suggest a dynamic interplay of technical and rhetorical responses in dealing with cyber-attacks. This plays out in the form of marshalling communication and mortification techniques, bolstering image and riding on leader reputation, which serially combine to strategically orchestrate reputational repair and stigma erasure in the event of a cyber-attack. Originality/value: Analysing a prototypical case of an organisation in dire straits following a cyber-attack, the paper provides a systematic characterisation of the setting-in-motion of strategic responses to manage, revamp and ameliorate damaged reputation during cyber-attacks, which tend to negatively shape the evaluative perceptions of the organisation's salient audience.en_US
dc.format.extent1 - 32-
dc.format.mediumPrint-Electronic-
dc.languageEnglish-
dc.language.isoenen_US
dc.publisherEmerald Publishingen_US
dc.rightsCopyright © 2023, Emerald Publishing Limited. This author accepted manuscript is deposited under a Creative Commons Attribution Non-commercial 4.0 International (CC BY-NC) licence (https://creativecommons.org/licenses/by-nc/4.0/). This means that anyone may distribute, adapt, and build upon the work for non-commercial purposes, subject to full attribution. If you wish to use this manuscript for commercial purposes, please contact permissions@emerald.com (see: https://www.emeraldgrouppublishing.com/publish-with-us/author-policies/our-open-research-policies#green).-
dc.rights.urihttps://creativecommons.org/licenses/by-nc/4.0/-
dc.subjectcyber-attacken_US
dc.subjectinformation technologyen_US
dc.subjectorganisational reputationen_US
dc.subjectstigmaen_US
dc.subjectTalkTalken_US
dc.titleHow TalkTalk did the walk-walk: strategic reputational repair in a cyber-attacken_US
dc.typeArticleen_US
dc.identifier.doihttps://doi.org/10.1108/ITP-08-2022-0589-
dc.relation.isPartOfInformation Technology and People-
pubs.issueahead of print-
pubs.publication-statusPublished-
pubs.volume0-
dc.identifier.eissn1758-5813-
dc.rights.holderEmerald Publishing Limited-
Appears in Collections:Brunel Business School Research Papers

Files in This Item:
File Description SizeFormat 
FullText.pdfCopyright © 2023, Emerald Publishing Limited. This author accepted manuscript is deposited under a Creative Commons Attribution Non-commercial 4.0 International (CC BY-NC) licence (https://creativecommons.org/licenses/by-nc/4.0/). This means that anyone may distribute, adapt, and build upon the work for non-commercial purposes, subject to full attribution. If you wish to use this manuscript for commercial purposes, please contact permissions@emerald.com (see: https://www.emeraldgrouppublishing.com/publish-with-us/author-policies/our-open-research-policies#green).518.61 kBAdobe PDFView/Open


This item is licensed under a Creative Commons License Creative Commons