Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
Laura K. Rickett & Deborah Drummond Smith
Abstract
As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central questions: Why has cybercrime remained so pervasive? What underlying factors explain its persistence? Where do we currently stand, and what can be done to reduce the number and scope of events? This study evaluates six of the most influential cybersecurity events from 2005 to 2024 and analyzes them through the lens of the routine activity theory. Other theories such as general deterrence theory, socio‐technical systems theory, and upper echelons theory are then examined to gain a deeper understanding of the cybercrime events. Analyzing these cases through the appropriate theoretical lens not only deepens our understanding of key vulnerabilities but also reveals why such breaches persist. Based on these insights, we offer recommendations to executive leadership teams. The selected cases demonstrate that cybercrime encompasses diverse offender motivations and systemic vulnerabilities that span multiple theoretical domains. The intersection of contributions from routine activity theory (RAT) and other theories reveals weaknesses in technical infrastructure, organizational behavior, and social influence. While technological safeguards can reduce risk, the incentive to exploit vulnerabilities continues to outweigh the investment in prevention, especially given limited legal deterrents and infrequent prosecution. This research offers an analysis of cybersecurity breaches with insight from RAT and broad consideration from three other theories to diagnose recurring patterns in high impact cybersecurity breaches. The analysis not only identifies persistent points of failure but also presents a range of strategic interventions weighing their practical benefits and limitations. The study highlights the inherent limitations of cybersecurity prevention to inspire future research.
Evidence weight
Balanced mode · F 0.40 / M 0.15 / V 0.05 / R 0.40
| F · citation impact | 0.50 × 0.4 = 0.20 |
| M · momentum | 0.50 × 0.15 = 0.07 |
| V · venue signal | 0.50 × 0.05 = 0.03 |
| R · text relevance † | 0.50 × 0.4 = 0.20 |
† Text relevance is estimated at 0.50 on the detail page — for your query’s actual relevance score, open this paper from a search result.