Advertisement

Corporate Social Responsibility in Times of Internet (In)security

  • Anna Tarabasz
Chapter

Abstract

Parallel to the growth of social networking is the increase in the amount of personally identifiable information that is voluntarily revealed by digital users. This careless approach to Internet use has fueled tremendous data breaches. Hacks into social media accounts, stolen online identities, sales of sensitive data on the black market, and widespread phishing scams are just a few of the most notable attacks. But market reports clearly indicate that the greatest threats to companies’ online security are not third-party hackers but departing employees.

This chapter aims to present an innovative approach to the study of corporate social responsibility (CSR). Drawing on themes in sustainable development, business ethics, and responsible management, it will focus on key issues in privacy management and how digital customers are educated on cyber threats. An extensive literature study and comparative analysis uncovers possible courses of action in the United Arab Emirates (UAE) and Poland.

Keywords

Corporate social responsibility Consumer awareness Online awareness campaigns Cybersecurity Cyber threats 

References

  1. AccountAbility (2017). AccountAbility Standards. Available from https://www.accountability.org/standards/. Accessed 22 Jan 2017.
  2. Agger, B. (2015). Oversharing: The Eclipse of Privacy in the Internet Age. Available from  https://doi.org/10.1016/B978-0-08-097086-8.64122-3.CrossRefGoogle Scholar
  3. AFP. (2017). Japanese Researchers Warn of Fingerprint Theft from ‘Peace’ Sign. Available from https://phys.org/news/2017-01-japan-fingerprint-theftpeace. html. Accessed 11 Jan 2017.
  4. AMEinfo Staff. (2016). Cybercrime Alert: Nearly Half of UAE Users Add People They Don’t Know. Available from http://ameinfo.com/technology/it/social-media-facebook-cyber-threat. Accessed 23 Nov 2016.
  5. Antonucci, D. (2017). The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities. Hoboken: Wiley.CrossRefGoogle Scholar
  6. Arabian Marketer. (2016). UAE Tops Middle East List for Most Employee Data Leaks: Report. Available from https://arabianmarketer.ae/uae-tops-middle-east-list-for-most-employee-data-leaks-report/. Accessed 3 Oct 2016.
  7. Awan, I., & Blakemore, B. (Eds.). (2012). Policing Cyber Hate, Cyber Threats and Cyber Terrorism. London: Routledge.Google Scholar
  8. Bada, M., Sasse, A. M., & Nurse, J. R. C. (2015). Cyber Security Awareness Campaigns: Why Do They Fail to Change Behaviour? In 1st International Conference on Cyber Security for Sustainable Society (pp. 118–131). Nottingham: Sustainable Society Network.Google Scholar
  9. Bałdys, P. (2014). Życie na widoku. Nowe media a kultura transparencji. Media I Społęczeństwo, 4, 42–55.Google Scholar
  10. Breach Live Index. (2018). 2017: A Record Year for Stolen Data. Available from https://breachlevelindex.com/. Accessed 12 Sept 2018.
  11. Brenner, S. W. (2009). Cyberthreats: The Emerging Fault Lines of the Nation State. New York: Oxford University Press.CrossRefGoogle Scholar
  12. Centrum Badania Opinii Społecznej (CBOS). (2015). Bezpieczeństwo w Internecie, CBOS Report 109/2015. Warszawa: Centrum Badania Opinii Społecznej.Google Scholar
  13. Chekalov, V. (2018). Awesome Cyber Security Facts. Available from https://itedgenews.ng/2018/07/27/awesome-cyber-security-facts/. Accessed 27 July 2018.
  14. Clark, J. F. (2016). Growing Threat: Sextortion. Cyber Misbehavior, 64(3), 41–44.Google Scholar
  15. Cohen-Almagor, R. (2015). Confronting the Internet’s Dark Side: Moral and Social Responsibility on the Free Highway. New York: Cambridge University Press.CrossRefGoogle Scholar
  16. Dewey, C. (2015). What the Offensive Tweets of Jeb Bush’s New Aide Say About Growing Up in the Oversharing Age. Available from. https://www.washingtonpost.com/news/the-intersect/wp/2015/02/10/what-the-offensive-tweets-of-jeb-bushs-new-aide-say-about-growing-up-in-the-oversharingage/. Accessed 14 Feb 2015.
  17. Diehl, S., Karmasin, M., Mueller, B., Terlutter, R., & Weder, F. (Eds.). (2017). Handbook of Integrated CSR Communication. New York: Springer.Google Scholar
  18. du. (2017). Be Safe. Available from http://www.du.ae/personal/helpandsupport/mobile/besafe. Accessed 10 Nov 2017.
  19. Duszczak, P. (2015). Internetowe grzechy Polaków. Available from http://www.networkmagazyn.pl/internetowe_grzechy_polakow. Accessed 13 Nov 2015.
  20. Eurobarometer. (2015). Special Eurobarometer 423 Cyber Security Report. Available from http://ec.europa.eu/public_opinion/archives/ebs/ebs_423_en.pdf. Accessed 1 Feb 2015.
  21. Fereira, O. (2016). The Dangers of Social Media and Oversharing. Available from http://singlegadget.com/the-dangers-of-social-media-and-oversharing/. Accessed 30 Nov 2017.
  22. Fidelis Cybersecurity. (2016). CyberEdge Group: 2016 Cyberthreat Defense Report. Available from https://www.fidelissecurity.com/resources/cyberedge-group-2016-cyberthreat-defense-report-0. Accessed 20 Nov 2017.
  23. George Washington University. (2017). Cybersecurity by the Numbers. Available from https://security.online.gwu.edu/blog/cybersecurity-by-the-numbers. Accessed 12 May 2017.
  24. Gharibi, W., & Shaabi, M. (2012). Cyber Threats in Social Networking Websites. International Journal of Distributed and Parallel Systems (IJDPS), 3(1), 119–126.CrossRefGoogle Scholar
  25. Grey Wizard. (2015). Internetowe grzechy Polaków. Available from https://infowire.pl/generic/release/303737/internetowe-grzechy-polakow/. Accessed 13 Nov 2015.
  26. Griffor, E. (Ed.). (2016). Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems. Cambridge: Syngress Publishing.Google Scholar
  27. Harthorne, M. (2017). Flashing the Peace Sign Can Get Your Identity Stolen. Available from http://www.newser.com/story/236719/researchers-warnfingerprints-can-be-stolen-from-selfies.html. Accessed 12 Jan 2017.
  28. ICDL Arabia. (2015). Cyber Safety Report: Research into the Online Behaviour of Arab Youth and Risks they Face. Dubai: ICDL Arabia.Google Scholar
  29. ICDL Arabia. (2016). Social Media: Influencing Young Minds. Dubai: ICDL Arabia.Google Scholar
  30. Ihlen, Ø., Bartlett, J., & May, S. (Eds.). (2011). The Handbook of Communication and Corporate Social Responsibility. Hoboken: Wiley.Google Scholar
  31. International Telecommunication Union (ITU). (2017). Global Cybersecurity Index (GCI) 2017. Geneva: ITU.Google Scholar
  32. Internet World Stats. (2017). World Internet Usage and Population Statistics. Available from https://www.internetworldstats.com/stats.htm. Accessed 27 Feb 2018.
  33. Kupczyk, P. (2016). Użytkownicy nie dbają o prywatność na portalach społecznościowych. Available from http://di.com.pl/uzytkownicy-nie-dbaja-o-prywatnosc-na-portalach-spolecznosciowych-54106. Accessed 7 Jan 2016.
  34. Leiter, M. (2016). How to Choose Social Media Platforms. Available from http://www.melissaleiter.com/blog/how-to-choose-social-media-platforms. Accessed 6 Apr 2016.
  35. mBank. (2017). Uważni w sieci. Available from https://www.mbank.pl/uwazniwsieci/page/o-kampanii/. Accessed 21 Jan 2017.
  36. McKean, J. S. (2014). Customer’s New Voice: Extreme Relevancy and Experience Through Volunteered Customer Information. Hoboken: Wiley.CrossRefGoogle Scholar
  37. Oxford English Dictionary. (2018). Available from https://en.oxforddictionaries.com/definition/cyberthreat. Accessed 7 Mar 2018.
  38. Paullet, K., & Pinchot, J. (2012). Cybercrime: The Unintentional Effects of Oversharing Information on Facebook. In 2012 Proceedings of the Conference on Information Systems Applied Research v5 n2231, pp. 1–7, New Orleans, Louisiana: ISCA.Google Scholar
  39. Pew Research Center. (2015). Teens, Social Media & Technology Overview 2015. Available from. http://www.pewresearch.org/wpcontent/uploads/sites/9/2015/04/PI_TeensandTech_Update2015_0409151.pdf. Accessed 9 Apr 2015.
  40. PricewaterhouseCoopers. (2018). 21st CEO Survey the Anxious Optimist in the Corner Office. Available from https://www.pwc.com/gx/en/ceo-survey/2018/pwc-ceo-survey-report-2018.pdf. Accessed 9 Mar 2018.
  41. SAI (2017). SA8000® Standard. Available from http://www.sa-intl.org/index.cfm?fuseaction=Page.ViewPage&PageID=1689. Accessed 21 Jan 2017.
  42. Shambler, T. (2017). UAE Is Most at Risk for Employee Data Leaks in the Middle East. Available from http://www.arabianbusiness.com/uae-is-most-at-risk-for-employee-data-leaks-in-middle-east-647029.html. Accessed 4 Dec 2017.
  43. Smith, A. (2014). Half of Online Americans Don’t Know What a Privacy Policy Is. Available from http://www.pewresearch.org/fact-tank/2014/12/04/half-of-americans-dont-know-what-a-privacy-policy-is/. Accessed 4 Dec 2017.
  44. Sophos. (2017). Cyber-Security. Available from http://blog.titania.com/cyber-security-hereford-worcestershire-business-manifesto-2017/. Accessed 20 Aug 2018.
  45. Symantec. (2015). 2015 Internet Security Threat Report. Available from https://www.symantec.com/content/en/us/enterprise/other_resources/21347933_GA_RPT-internet-security-threat-report-volume-20-2015.pdf. Accessed 1 Apr 2015.
  46. Tarabasz, A. (2017). Cyber Threat Awareness in Digital Marketing Campaigns: Comparative Analysis of UAE and Poland. Available from  https://doi.org/10.13140/RG.2.2.32736.69127.
  47. Trim, P., & Lee, Y. (2014). Cyber Security Management: A Governance, Risk and Compliance Framework. New York: Routledge.Google Scholar
  48. Twenge, J. M., & Campbell, W. K. (2013). The Narcissism Epidemic: Living in the Age of Entitlement. New York: Atria Paperback.Google Scholar
  49. Ulsch, M. (2014). Cyber Threat! How to Manage the Growing Risk of Cyber Attacks. Hoboken: Wiley.Google Scholar
  50. Verizon. (2018). 2017 Data Breach Investigations Report: Executive Summary. Available from https://www.knowbe4.com/hubfs/rp_DBIR_2017_Report_execsummary_en_xg.pdf. Accessed 2 Sept 2018.
  51. Visser, W., Magureanu, I., & Yadav, K. (2015). The CSR International Research Compendium – Volume 3: Society. London: Kaleidoscope Futures.Google Scholar
  52. WirtualneMedia. (2015). ”Nie robisz tego w realu? Nie rób tego w sieci!”- mBank ostrzega przed cyberprzestępcami (wideo). Available from https://www.wirtualnemedia.pl/artykul/nie-robisz-tego-w-realu-nie-rob-tego-w-sieci-mbank-ostrzega-przed-cyberprzestepcami-wideo. Accessed 17 Dec 2015.
  53. Zaharia, A. (2016). 10 Alarming Cyber Security Facts that Threaten Your Data. Available from https://heimdalsecurity.com/blog/10-surprising-cyber-security-facts-that-may-affect-your-online-safety/. Accessed 12 May 2016.

Copyright information

© The Author(s) 2019

Authors and Affiliations

  • Anna Tarabasz
    • 1
  1. 1.SP Jain School of Global ManagementDubaiUAE

Personalised recommendations