Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

Laura K. Rickett & Deborah Drummond Smith

Journal of Corporate Accounting and Finance2026https://doi.org/10.1002/jcaf.70032article
ABDC B
Weight
0.50

Abstract

As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central questions: Why has cybercrime remained so pervasive? What underlying factors explain its persistence? Where do we currently stand, and what can be done to reduce the number and scope of events? This study evaluates six of the most influential cybersecurity events from 2005 to 2024 and analyzes them through the lens of the routine activity theory. Other theories such as general deterrence theory, socio‐technical systems theory, and upper echelons theory are then examined to gain a deeper understanding of the cybercrime events. Analyzing these cases through the appropriate theoretical lens not only deepens our understanding of key vulnerabilities but also reveals why such breaches persist. Based on these insights, we offer recommendations to executive leadership teams. The selected cases demonstrate that cybercrime encompasses diverse offender motivations and systemic vulnerabilities that span multiple theoretical domains. The intersection of contributions from routine activity theory (RAT) and other theories reveals weaknesses in technical infrastructure, organizational behavior, and social influence. While technological safeguards can reduce risk, the incentive to exploit vulnerabilities continues to outweigh the investment in prevention, especially given limited legal deterrents and infrequent prosecution. This research offers an analysis of cybersecurity breaches with insight from RAT and broad consideration from three other theories to diagnose recurring patterns in high impact cybersecurity breaches. The analysis not only identifies persistent points of failure but also presents a range of strategic interventions weighing their practical benefits and limitations. The study highlights the inherent limitations of cybersecurity prevention to inspire future research.

Open via your library →

Cite this paper

https://doi.org/https://doi.org/10.1002/jcaf.70032

Or copy a formatted citation

@article{laura2026,
  title        = {{Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps}},
  author       = {Laura K. Rickett & Deborah Drummond Smith},
  journal      = {Journal of Corporate Accounting and Finance},
  year         = {2026},
  doi          = {https://doi.org/https://doi.org/10.1002/jcaf.70032},
}

Paste directly into BibTeX, Zotero, or your reference manager.

Flag this paper

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

Flags are reviewed by the Arbiter methodology team within 5 business days.


Evidence weight

0.50

Balanced mode · F 0.40 / M 0.15 / V 0.05 / R 0.40

F · citation impact0.50 × 0.4 = 0.20
M · momentum0.50 × 0.15 = 0.07
V · venue signal0.50 × 0.05 = 0.03
R · text relevance †0.50 × 0.4 = 0.20

† Text relevance is estimated at 0.50 on the detail page — for your query’s actual relevance score, open this paper from a search result.