Vol. 4 No. 2 (2025): April
RESEARCH ARTICLES

A Structural Equation Modelling Approach to Understanding Data Breach Factors Through Modern Crime Theory

B. Sravani
Department of Computer Science and Engineering, Annamacharya Institute of Technology and Sciences, Kadapa, Andhra Pradesh, India
G Bhumika
Department of Computer Science and Engineering, Annamacharya Institute of Technology and Sciences, Kadapa, Andhra Pradesh, India
J Prashanth
Department of Computer Science and Engineering, Annamacharya Institute of Technology and Sciences, Kadapa, Andhra Pradesh, India
B Pavan
Department of Computer Science and Engineering, Annamacharya Institute of Technology and Sciences, Kadapa, Andhra Pradesh, India
S Asha Haseena
Department of Computer Science and Engineering, Annamacharya Institute of Technology and Sciences, Kadapa, Andhra Pradesh, India

Published 2025-04-09

Keywords

  • Data breach,
  • cybersecurity,
  • Modern Crime Theory,
  • structural equation modelling,
  • organizational risk assessment

How to Cite

B. Sravani, G Bhumika, J Prashanth, B Pavan, & S Asha Haseena. (2025). A Structural Equation Modelling Approach to Understanding Data Breach Factors Through Modern Crime Theory. International Journal of Computational Learning & Intelligence, 4(2), 473–479. https://doi.org/10.5281/zenodo.15184367

Abstract

With the increasing reliance on digital infrastructure, data breaches have become a critical concern for organizations worldwide. Despite extensive research in cybersecurity, limited studies have examined the external factors influencing an organization’s vulnerability to data breaches. This study applies Modern Crime Theory (MCT) to analyze the external conditions contributing to data breaches, incorporating elements such as attractiveness, visibility, and guardianship as key predictors. A Covariance-Based Structural Equation Modeling (CB-SEM) framework was employed to investigate how these factors influence the likelihood of organizations experiencing data breaches. The study utilized a dataset comprising 4,868 organizations, assessing both victimized and non-victimized entities to determine the relationships between the proposed variables. The results confirm that organizations with high data value (attractiveness), increased public exposure (visibility), and weak security measures (guardianship deficits) face a significantly higher risk of data breaches. The findings validate the application of MCT in cybersecurity research, providing actionable insights into how organizations can proactively reduce breach risks by strengthening protective measures.

References

  1. Glez-Peña, D., et al. (2014). Web scraping technologies in an API world. Briefings in Bioinformatics, 15(5), 788–797.
  2. Gupta, S., et al. (2003). DOM-based content extraction of HTML documents. In Proceedings of the 12th International Conference on World Wide Web (pp. 207–214).
  3. Siméon, J., et al. (2007). XQuery 1.0: An XML query language. W3C Recommendation.
  4. Kline, R. B. (2023). Principles and practice of structural equation modeling. Guilford Publications.
  5. Werts, C. E., et al. (1973). Identification and estimation in path analysis with unmeasured variables. American Journal of Sociology, 78(6), 1469–1484.
  6. Sarstedt, M., et al. (2016). Estimation issues with PLS and CB-SEM. Journal of Business Research, 69(10), 3998–4010.
  7. Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice. Psychological Bulletin, 103(3), 411–423.
  8. Bagozzi, R. P. (1981). Causal modeling in consumer research. Advances in Consumer Research, 8(1).
  9. Hayduk, L. A., & Glaser, D. N. (2000). Jiving the four-step, waltzing around factor analysis. Structural Equation Modeling, 7(1), 1–35.
  10. Arbuckle, J. L., et al. (1996). Full information estimation in the presence of incomplete data. In Advances in Structural Equation Modeling (pp. 243–277).
  11. Cronbach, L. J. (1951). Coefficient alpha and internal structure of tests. Psychometrika, 16(3), 297–334.
  12. Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models. Journal of Marketing Research, 18(1), 39.
  13. Bentler, P. M. (1990). Comparative fit indexes in structural models. Psychological Bulletin, 107(2), 238–246.
  14. Hu, L., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis. Structural Equation Modeling, 6(1), 1–55.
  15. Li, X., & Li, H. (2018). Visual analysis of information security risk research using CiteSpace. IEEE Access, 6, 63243–63257.
  16. Mayer, P., et al. (2023). Awareness, intention, (in)action: Reactions to data breaches. ACM Transactions on Computer-Human Interaction, 30(5), 1–53.
  17. Ashraf, M. (2021). Consequences of the SEC restricting managerial discretion. SSRN. https://doi.org/10.2139/ssrn.3807487
  18. Bouveret, A. (2018). Cyber risk for the financial sector. IMF Working Papers, 18(143), 1.
  19. Fang, Z., et al. (2021). Framework for predicting data breach risk. IEEE Transactions on Information Forensics and Security, 16, 2186–2201.
  20. Ngo, F. T., et al. (2020). Victimization in cyberspace. Criminal Justice Review, 45(4), 430–451.
  21. Madapuri, R. K., & Mahesh, P. C. S. (2017). HBS-CRA: Scaling impact of change request towards fault proneness: Defining a heuristic and biases scale (HBS) of change request artifacts (CRA). Cluster Computing, 22(S5), 11591–11599. https://doi.org/10.1007/s10586-017-1424-0
  22. Dwaram, J. R., & Madapuri, R. K. (2022). Crop yield forecasting by long short‐term memory network with Adam optimizer and Huber loss function in Andhra Pradesh, India. Concurrency and Computation: Practice and Experience, 34(27). https://doi.org/10.1002/cpe.7310
  23. Ahmed, S. T., Sivakami, R., Banik, D., Khan, S. B., Dhanaraj, R. K., Mahesh, T. R., & Almusharraf, A. (2024). Federated learning framework for consumer IoMT-edge resource recommendation under telemedicine services. IEEE Transactions on Consumer Electronics.
  24. Fathima, A. S., Basha, S. M., Ahmed, S. T., Khan, S. B., Asiri, F., Basheer, S., & Shukla, M. (2025). Empowering consumer healthcare through sensor-rich devices using federated learning for secure resource recommendation. IEEE Transactions on Consumer Electronics.
  25. Ahmed, S. T., Patil, K. K., Shanraj, R. K., Khan, S. B., Alzahrani, S., & Rani, S. (2024). 6GTelMED: Resources recommendation framework on 6G enabled distributed telemedicine using Edge-AI. IEEE Transactions on Consumer Electronics.
  26. Ramaiah, N. S., & Ahmed, S. T. (2022). An IoT-based treatment optimization and priority assignment using machine learning. ECS Transactions, 107(1), 1487.
  27. Pasha, A., Ahmed, S. T., Painam, R. K., Mathivanan, S. K., Karthikeyan, P., Mallik, S., & Qin, H. (2024). Leveraging ANFIS with Adam and PSO optimizers for Parkinson's disease. Heliyon, 10(9).
  28. Reddy, B. S. H. (2025). Deep learning-based detection of hair and scalp diseases using CNN and image processing. Milestone Transactions on Medical Technometrics, 3(1), 145–155. https://doi.org/10.5281/zenodo.14965660
  29. Reddy, B. S. H., Venkatramana, R., & Jayasree, L. (2025). Enhancing apple fruit quality detection with augmented YOLOv3 deep learning algorithm. International Journal of Human Computations & Intelligence, 4(1), 386–396. https://doi.org/10.5281/zenodo.14998944