Authors :
Uduak Ekott; Toyosi Kuteyi; Onyinyechi Enwereazu
Volume/Issue :
Volume 10 - 2025, Issue 9 - September
Google Scholar :
https://tinyurl.com/yw5rwj7a
Scribd :
https://tinyurl.com/43u763xv
DOI :
https://doi.org/10.38124/ijisrt/25sep1507
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
Organizations are constantly at risk from cybersecurity data breaches, which present serious communication
challenges and technical threats. In addition to the operational and financial consequences, stakeholder trust, reputation,
and resilience are all greatly influenced by organizational communication after a breach. Using Horsager's pillars of trust
and communication framework of the National Institute of Standards and Technology's (NIST) Incident Response
Recommendations, the paper discusses the crucial role that trust plays in cybersecurity communication. Using the Uber case
study, it concludes that proactive and strategic communication can help reduce harm. According to the report, effective
strategies for a successful response include employee training, preplanned communication protocols, and real-time
monitoring. Finally, according to the study, companies can use data breaches as an opportunity to show more accountability
and build trust, thereby protecting their reputation and stakeholder relationships in the process.
Keywords :
Cybersecurity Communication, Data Breaches, Crisis Communication, Organisational Trust, Stakeholder Trust, Transparency, Crisis Management, Trust-Building Strategies, Corporate Reputation.
References :
- Appiah, B., & Maharjan, R. (2020). Developing and Maintaining Trust Within Organizations: Tech One Global in Nepal. Master's thesis, University of Gavle. https://www.diva-portal.org/smash/get/diva2:1441710/FULLTEXT01.pdf
- BBC. (2015, October 23). TalkTalk cyber-attack: website hit by ’significant’ breach https://www.bbc.co.uk/news/uk-34611857
- BBC. (2018, September 27). Uber pays $148m over data breach cover-up. https://www.bbc.com/news/technology-45666280?utm
- Chen, SY., Ahlstrom, D., & Uen, JF. (2025). Organizational trust and employee work outcomes: A moderated mediation model. Curr Psychol 44, 6565–6578 (2025). https://doi.org/10.1007/s12144-025-07626-0
- Creswell, J. W., & Creswell, J. D. (2018). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches (5th ed.). Sage.
- Codex Y. (2023). Understanding the impact of data breaches on consumer perception and reputation management: a review of effective communication and trust building strategies. Yubetsu codex computer science, 1(4). https://codex.yubetsu.com/article/eb84a2d618cd40cf9d2e14f1e0689dfd
- Coombs, W.T. (2015). The value of communication during a crisis: Insights from strategic communication research, Business Horizons, 58 (2), 142. https://www.sciencedirect.com/science/article/pii/S0007681314001505
- European Data Protection Board (EDPB). (2023). Guidelines on personal data breach notification under GDPR Version 2.0. https://www.edpb.europa.eu/system/files/2023-04/edpb_guidelines_202209_personal_data_breach_notification_v2.0_en.pdf?utm
- The Guardian (2017, November 22). Uber concealed massive hack that exposed data of 57m users and drivers. https://www.theguardian.com/technology/2017/nov/21/uber-data-hack-cyber-attack?utm
- Gautam, P. K. (2024). Crisis to resilience: cultivating effective internal communication for employee engagement and organizational trust. Quest Journal of Management and Social Sciences, 6(3), 560. https://doi.org/10.3126/qjmss.v6i3.72488
- Gupta, R., Pandey, P., Singh, V.K. & Sinha, K. (2025). Effectiveness of Cybersecurity Measures in Building Customer Trust in Digital NBFC Services. International Journal of Latest Technology in Engineering Management & Applied Science, 14(6), 890-899. https://doi.org/10.51583/IJLTEMAS.2025.140600098
- Harvard Business Review. (2016, Octobeer 7). Your Company Needs a Communications Plan for Data Breaches. https://hbr.org/2016/10/your-company-needs-a-communications-plan-for-data-breaches?utm
- Hendrith, M. (2018). The effects culture and communication have on business. Integrated Studies, 120. https://core.ac.uk/download/pdf/158221587.pdf
- Horsager, D. (2019). Trust: The Leading Indicator (The 8 Pillars of Trust). https://davidhorsager.com/category/8-pillars/?utm_source=chatgpt.com
- Ibrahim, A., Thiruvady D., Schneider J.G, & Abdelrazek .M. (2020). The challenges of leveraging threat intelligence to stop data breaches. Frontiers in Computer Science, 2. https://www.frontiersin.org/journals/computer-science/articles/10.3389/fcomp.2020.00036/full
- Kebande, V.R., Karie, N.K., Ikuesan, R.A. (2020). Real-time monitoring as a supplementary security component of vigilantism in modern network environments. International Journal of Information & Technology. 4. https://arxiv.org/pdf/2012.03622
- Knight R., & Nurse, J.R.C. (2020). A framework for effective corporate communication after cyber security incidents. Computer and Security Journal, 99. https://www.sciencedirect.com/science/article/pii/S0167404820303096
- Muzatko, S. & Bansal, G. (2024); It pays to be forthcoming: timing of data breach announcement, trust violation, and trust restoration. Internet Research; 34 (5): 1629–1663. https://www.emerald.com/intr/article/34/5/1629/1224207/It-pays-to-be-forthcoming-timing-of-data-breach
- National Institute for Standards and Technology (NIST). (2012). Computer security incident handling guide. United States of America https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf?utm
- National Institute for Standards and Technology (NIST). (2024). Data confidentiality: Detect, respond to, and recover from data breaches. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-29.pdf
- National Institute for Standards and Technology (NIST). (2025). Incident response recommendations and considerations for cybersecurity risk management. United States. of America. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r3.pdf
- Nikkhah, H. R., & Grover, V. (2024). Strategizing Responses to data breaches: a multi-method study of organizational responsibility and effective communication with stakeholders. Journal of Management Information Systems, 41(4), 1042–1077. https://doi.org/10.1080/07421222.2024.2415774 https://www.tandfonline.com/doi/epdf/10.1080/07421222.2024.2415774?needAccess=true
- Oldfield, N.D. & Kushniryk, A. (2017). Building and protecting organizational trust with external publics: Canadian senior executives’ perspectives. Canadian Journal of Communication 42 (5), 768. https://cjc.utppublishing.com/doi/pdf/10.22230/cjc.2017v42n5a3076
- Ou, C.X., Zhang, X., Angelopoulos, S. Davison, R.M., Janse, N. (2022). Security breaches and organization response strategy: Exploring consumers’ threat and coping appraisals. https://www.sciencedirect.com/science/article/pii/S0268401222000299?utm_source=chatgpt.com
- Perera, S., Jin, X., Maurushat, A., & Opoku, G. J. (2022). Factors affecting reputational damage to organisations due to cyberattacks. Informatics, 9(1), 28. https://doi.org/10.3390/informatics9010028
- ProAssurance. (2024). Crisis communication strategies after a healthcare data breach. https://riskmanagement.proassurance.com/article-library/crisis-communication-strategies-after-a-data-breach?utm_source=chatgpt.com
- Vokić, P., Bilušić, M.R., Najjar, D. (2020). Building organizational trust through internal communication. Corporate Communications: An International Journal 26 (1), 70. https://www.emerald.com/ccij/article-pdf/26/1/70/408900/ccij-01-2020-0023.pdf
Organizations are constantly at risk from cybersecurity data breaches, which present serious communication
challenges and technical threats. In addition to the operational and financial consequences, stakeholder trust, reputation,
and resilience are all greatly influenced by organizational communication after a breach. Using Horsager's pillars of trust
and communication framework of the National Institute of Standards and Technology's (NIST) Incident Response
Recommendations, the paper discusses the crucial role that trust plays in cybersecurity communication. Using the Uber case
study, it concludes that proactive and strategic communication can help reduce harm. According to the report, effective
strategies for a successful response include employee training, preplanned communication protocols, and real-time
monitoring. Finally, according to the study, companies can use data breaches as an opportunity to show more accountability
and build trust, thereby protecting their reputation and stakeholder relationships in the process.
Keywords :
Cybersecurity Communication, Data Breaches, Crisis Communication, Organisational Trust, Stakeholder Trust, Transparency, Crisis Management, Trust-Building Strategies, Corporate Reputation.