Auswahl der wissenschaftlichen Literatur zum Thema „Breaches“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Breaches" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Breaches"

1

Richardson, Vernon J., Rodney E. Smith, and Marcia Weidenmier Watson. "Much Ado about Nothing: The (Lack of) Economic Impact of Data Privacy Breaches." Journal of Information Systems 33, no. 3 (2019): 227–65. http://dx.doi.org/10.2308/isys-52379.

Der volle Inhalt der Quelle
Annotation:
ABSTRACT In this paper, we examine the consequences of data breaches for a breached company. We find the economic consequences are, on average, very small for breached companies. On average, breaches result in less than −0.3 percent cumulative abnormal returns in the short window around the breach disclosure. Except for a few catastrophic breaches, the nominal difference in cumulative abnormal returns between breach companies and the matched companies disappears within days after the breach. We also test whether data breaches affect future accounting measures of performance, audit and other fe
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Zafar, Humayun, Myung Ko, and Kweku-Muata Osei-Bryson. "Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors." Information Resources Management Journal 25, no. 1 (2012): 21–37. http://dx.doi.org/10.4018/irmj.2012010102.

Der volle Inhalt der Quelle
Annotation:
Information security breaches pose a growing threat to organizations and individuals, particularly those that are heavily involved in e-business/e-commerce. An information security breach can have wide-ranging impacts, including influencing the behaviors of competitors and vice versa within the context of a competitive marketplace. Therefore, there is a need for further exploration of implications of information security breaches beyond the focus of the breached firm. This study investigates the financial impact of publicly announced information security breaches on breached firms and their no
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Smith, Thomas J. (Tom), Julia L. Higgs, and Robert E. Pinsker. "Do Auditors Price Breach Risk in Their Audit Fees?" Journal of Information Systems 33, no. 2 (2018): 177–204. http://dx.doi.org/10.2308/isys-52241.

Der volle Inhalt der Quelle
Annotation:
ABSTRACT Data security breaches have been shown in the literature to negatively affect firm operations. Auditors serve as an important, external governance mechanism with respect to a firm's overall risk management protocol. Consequently, our study examines whether auditors price breach risk into their fees and if a firm's internal governance can mitigate the potential increases in audit fees. Using a sample of breached firms ranging from 2005–2014, we adapt the Houston, Peters, and Pratt (2005) model to explore how auditors view audit risk related to breach risk. We find that breaches are ass
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Du, Shuili, Kholekile L. Gwebu, Jing Wang, and Kun Yu. "Differential Market Reaction to Data Security Breaches: A Screening Perspective." Communications of the Association for Information Systems 54 (2024): 376–401. http://dx.doi.org/10.17705/1cais.05414.

Der volle Inhalt der Quelle
Annotation:
This paper aims to identify breach- and firm-level characteristics that may account for the heterogenous stock market reaction to data breaches. Drawing upon the screening theory, this paper examines the possibility of three breach characteristics (breach severity, breach locus, and breach controllability) and two firm attributes (CEO stock ownership, and corporate social responsibility (CSR) performance) serving as information screens to influence stock market reaction to a data breach incident. Using an archival dataset compiled from multiple sources, we examine 607 data breaches from 2004 t
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Juma'h, Ahmad H., and Yazan Alnsour. "The effect of data breaches on company performance." International Journal of Accounting & Information Management 28, no. 2 (2020): 275–301. http://dx.doi.org/10.1108/ijaim-01-2019-0006.

Der volle Inhalt der Quelle
Annotation:
Purpose This paper aims to analyze the effect of data breaches – whose concerns and implications can be legal, social and economic – on companies’ overall performance. Design/methodology/approach Information on data breaches was collected from online compilations, and financial data on breached companies was collected from the Mergent Online database. The financial variables used were related to profitability, liquidity, solvency and company size to analyze the financial performance of the breached companies before and after the data breach event. Nonfinancial data, such as the type and the si
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Saleem, Hamza, and Muhammad Naveed. "SoK: Anatomy of Data Breaches." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (2020): 153–74. http://dx.doi.org/10.2478/popets-2020-0067.

Der volle Inhalt der Quelle
Annotation:
AbstractWe systematize the knowledge on data breaches into concise step-by-step breach workflows and use them to describe the breach methods. We present the most plausible workflows for 10 famous data breaches. We use information from a variety of sources to develop our breach workflows, however, we emphasize that for many data breaches, information about crucial steps was absent. We researched such steps to develop complete breach workflows; as such, our workflows provide descriptions of data breaches that were previously unavailable. For generalizability, we present a general workflow of 50
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Johnson, Mark, Min Jung Kang, and Tolani Lawson. "Stock Price Reaction to Data Breaches." Journal of Finance Issues 16, no. 2 (2017): 1–13. http://dx.doi.org/10.58886/jfi.v16i2.2263.

Der volle Inhalt der Quelle
Annotation:
Data Breaches occur in many forms that include bad security practices, hacking, insider attacks, stolen or lost equipment and computer or data theft. Data breaches happen to organizations of all types. In this paper, we present an analysis of the stock market’s assessment of the cost of data breaches through the examination of 467 heterogeneous data breach events that occurred at 261 publicly traded companies between year 2005 and 2014. Our event study findings indicate that publicly traded firms in the U.S. lost, on average, .37% of their equity value when a data breach occurs. Particularly,
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Mulyadi, Rahmad, Witantra Dhamar Hutami, Kevin Dilian Suganda, and Dhiya Farah Khalisha. "Risk of neurologic deficit in medially breached pedicle screws assessed by computed tomography: a systematic review." Asian Spine Journal 18, no. 6 (2024): 903–12. https://doi.org/10.31616/asj.2024.0325.

Der volle Inhalt der Quelle
Annotation:
Pedicle screws are commonly used for vertebral instrumentation, and a postoperative computed tomography (CT) scan is used to evaluate their position within the pedicle. Medial pedicle screw breaching occurs in 20%–40% of cases. This study investigated the correlation between radiographically evident medial breaching and the incidence of nerve injury, shedding light on the clinical implications. A literature search was conducted on biomedical databases regarding neurologic deficits associated with medially breached pedicle screws with pre-defined inclusion and exclusion criteria. The methodolog
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Wang, Tawei, Yen-Yao Wang, and Ju-Chun Yen. "It's Not My Fault." Journal of Database Management 30, no. 3 (2019): 18–37. http://dx.doi.org/10.4018/jdm.2019070102.

Der volle Inhalt der Quelle
Annotation:
This article investigates the transfer of information security breach information between breached firms and their peers. Using a large data set of information security incidents from 2003 to 2013, the results suggest that 1) the effect of information security breach information transfer exists between breached firms and non-breached firms that offer similar products and 2) the effect of information transfer is weaker when the information security breach is due to internal faults or is related to the loss of personally identifiable information. Additional tests demonstrate that the effect of i
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Kude, Thomas, Hartmut Hoehle, and Tracy Ann Sykes. "Big data breaches and customer compensation strategies." International Journal of Operations & Production Management 37, no. 1 (2017): 56–74. http://dx.doi.org/10.1108/ijopm-03-2015-0156.

Der volle Inhalt der Quelle
Annotation:
Purpose Big Data Analytics provides a multitude of opportunities for organizations to improve service operations, but it also increases the threat of external parties gaining unauthorized access to sensitive customer data. With data breaches now a common occurrence, it is becoming increasingly plain that while modern organizations need to put into place measures to try to prevent breaches, they must also put into place processes to deal with a breach once it occurs. Prior research on information technology security and services failures suggests that customer compensation can potentially resto
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Dissertationen zum Thema "Breaches"

1

Talavera, Cano Andrés. "Regulating the Intolerance of Contractual Breaches." IUS ET VERITAS, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/123754.

Der volle Inhalt der Quelle
Annotation:
To penalize contractual breaches allows efficient allocation of risks in a contract, ensuring and maintaining the contractual equilibrium that the parties had in mind and shaped in its contractual regulation. The intelligent use of penalties will safeguard and maintain the economic balance of the contracts, thus maintaining the profitability of business operations pursued through them.<br>Penalizar los incumplimientos permite una asignación eficiente de los riesgos en un contrato, asegurando y conservando el equilibrio contractual que las partes tuvieron en mente y plasmaron en su regulación c
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Smith, Tanshanika Turner. "Examining Data Privacy Breaches in Healthcare." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2623.

Der volle Inhalt der Quelle
Annotation:
Healthcare data can contain sensitive, personal, and confidential information that should remain secure. Despite the efforts to protect patient data, security breaches occur and may result in fraud, identity theft, and other damages. Grounded in the theoretical backdrop of integrated system theory, the purpose of this study was to determine the association between data privacy breaches, data storage locations, business associates, covered entities, and number of individuals affected. Study data consisted of secondary breach information retrieved from the Department of Health and Human Services
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Ho, Jean Qing Ying. "State responsibility for breaches of investment contracts." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708722.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Biggs, Carl T. "Implications of transaction costs for acquisition program cost breaches." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34629.

Der volle Inhalt der Quelle
Annotation:
Approved for public release; distribution is unlimited<br>It is generally accepted that cost growth in federal major defense acquisition programs (MDAPs) is partially attributable to inaccurate cost estimates. Cost analysts exhaustively analyze manpower and resources to provide accurate estimates, however the influence of transaction costs is often ignored in traditional cost estimates. This thesis investigates the association between cost growth and transaction costs, the real cost of business negotiations and program management. We collect MDAP cost threshold breach data and cross reference
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Vorogushyn, Sergiy. "Analysis of flood hazard under consideration of dike breaches." Phd thesis, Aachen Shaker, 2008. http://d-nb.info/994678622/04.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Griffin, Tony. "Strategies to Prevent Security Breaches Caused by Mobile Devices." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4628.

Der volle Inhalt der Quelle
Annotation:
Data breaches happen almost every day in the United States and, according to research, the majority of these breaches occur due to a lack of security with organizations' mobile devices. Although most of the security policies related to mobile devices currently in place may meet the guidelines required by law, they often fail to prevent a data breach caused by a mobile device. The main purpose of this qualitative single case study was to explore the strategies used by security managers to prevent data breaches caused by mobile devices. The study population consisted of security managers working
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Saber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.

Der volle Inhalt der Quelle
Annotation:
Cybercrime is one of the quickest growing areas of criminality. Criminals abuse the speed, accessibility, and privacy of the Internet to commit diverse crimes involving data and identity theft that cause severe damage to victims worldwide. Many small businesses do not have the financial and technological means to protect their systems from cyberattack, making them vulnerable to data breaches. This exploratory multiple case study, grounded in systems thinking theory and routine activities theory, encompassed an investigation of cybersecurity strategies used by 5 small business leaders in Middle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Ofori-Duodu, Michael Samuel. "Exploring Data Security Management Strategies for Preventing Data Breaches." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.

Der volle Inhalt der Quelle
Annotation:
Insider threat continues to pose a risk to organizations, and in some cases, the country at large. Data breach events continue to show the insider threat risk has not subsided. This qualitative case study sought to explore the data security management strategies used by database and system administrators to prevent data breaches by malicious insiders. The study population consisted of database administrators and system administrators from a government contracting agency in the northeastern region of the United States. The general systems theory, developed by Von Bertalanffy, was used as the co
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Zuzak, Catherine Ann. "Liability for breaches of aviation security obligatons : a Canadian perspective." Thesis, McGill University, 1990. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=59859.

Der volle Inhalt der Quelle
Annotation:
Unlawful interference with civil aviation is one of the most pressing and worrisome problems facing the international aviation community today. In the last few decades, violations of aviation security have included acts of sabotage, bombings and bomb threats and the unlawful seizure and total destruction of aircraft in flight. Great efforts have been taken at the national and international levels to increase and standardize security measures at airports throughout the world. The fact remains, however, that even the most stringent security requirements have not been able to guard against all po
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Kershaw, Debra S. "BOUNDARIES AND BREACHES: COMPLEXITIES AND STRATEGIES DOWN ON THE FARM." UKnowledge, 2011. http://uknowledge.uky.edu/gradschool_diss/202.

Der volle Inhalt der Quelle
Annotation:
Employing a wide range of theoretical and methodological tools, practitioners within an array of disciplines have attempted to gain new understanding about the structural changes in the agricultural system in the United States and around the world. From Agricultural Economists to Sociologists, quantitative and qualitative research has attempted to shed light on structural change in agriculture and its implications for the real lives of farmers, their families, and consumers of their goods. The current research adopts a comparative-historical approach to examining the particular affects of stru
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Bücher zum Thema "Breaches"

1

Daswani, Neil, and Moudy Elbayadi. Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

S, Logweller Cary, ed. Identity theft breaches. Nova Science Publishers, 2009.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Y, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. MCLE, 2009.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Y, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. MCLE, 2009.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Centre, National Computing, ed. The Information Security Breaches Survey 1996. National Computing Centre, 1996.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Foster, Peter C., Sara E. Cable, Kathleen M. Porter, and Walter C. Boyd. Fundamentals of data security law & breaches. MCLE New England, 2014.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Arena, Mark V. Management perspectives pertaining to root cause analyses of Nunn-McCurdy breaches: Contractor motivations and anticipating breaches. Rand Corporation, 2014.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Van Roosebeke, Bert. State Liability for Breaches of European Law. DUV, 2007. http://dx.doi.org/10.1007/978-3-8350-9494-9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Wong, Rebecca. Data Security Breaches and Privacy in Europe. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Rita, Tehan, ed. Data security breaches: Context and incident summaries. Nova Science Publishers, 2008.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Buchteile zum Thema "Breaches"

1

Anesko, Michael. "Breaches." In Henry James and Queer Filiation. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94538-5_13.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Daswani, Neil, and Moudy Elbayadi. "The Root Causes of Data Breaches." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Daswani, Neil, and Moudy Elbayadi. "The Equifax Breach." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Daswani, Neil, and Moudy Elbayadi. "The Seven Habits of Highly Effective Security." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Daswani, Neil, and Moudy Elbayadi. "Facebook Security Issues and the 2016 US Presidential Election." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Daswani, Neil, and Moudy Elbayadi. "Advice to Cybersecurity Investors." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_14.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Daswani, Neil, and Moudy Elbayadi. "The Capital One Breach." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Daswani, Neil, and Moudy Elbayadi. "Technology Defenses to Fight the Root Causes of Breach: Part One." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_12.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Daswani, Neil, and Moudy Elbayadi. "The Yahoo Breaches of 2013 and 2014." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Daswani, Neil, and Moudy Elbayadi. "Applying Your Skills to Cybersecurity." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_16.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Breaches"

1

K, Santha Sheela, Mrithula M, Varshni Priya A, and Selvalakshmi C.B. "Cyber Hacking Breaches Prediction and Detection Using Machine Learning." In 2024 IEEE 2nd International Conference on Innovations in High Speed Communication and Signal Processing (IHCSP). IEEE, 2024. https://doi.org/10.1109/ihcsp63227.2024.10960232.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Sandeep, V., Jyotirmaya Sahoo, and Pawan Bhambu. "Defending Machine Learning in Agriculture Against Data Breaches and Misuse." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10726152.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Julie, Gabriel, Bas Dit Nugues Manon, Flouzat-Lachaniette Charles Henri, et al. "Preventing cortical breaches with impact analysis during spinal instrumentation surgery." In 2024 46th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). IEEE, 2024. https://doi.org/10.1109/embc53108.2024.10781753.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Angelis, John N., and Rajendran S. Murthy. "Blame Shifting, Shopping Intensity, and Revisit Likelihood in Data Breaches." In 2024 Portland International Conference on Management of Engineering and Technology (PICMET). IEEE, 2024. http://dx.doi.org/10.23919/picmet64035.2024.10653185.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Xiang, Hui, Yifan Wu, Xuebin Wang, Jinqiao Shi, Can Zhao, and Jiapeng Zhao. "Identifying Data Breaches in Dark Web through Prompt Active Learning." In 2024 IEEE 9th International Conference on Data Science in Cyberspace (DSC). IEEE, 2024. https://doi.org/10.1109/dsc63484.2024.00016.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Tomasov, Adrian, Petr Dejdar, Petr Munster, and Tomas Horvath. "Utilizing a State of Polarization Change Detector and Machine Learning for Enhanced Security in Fiber-Optic Networks." In CLEO: Applications and Technology. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_at.2024.jtu2a.217.

Der volle Inhalt der Quelle
Annotation:
The paper presents a novel method for securing fiber-optic infrastructures using a state of polarization analyzer combined with machine learning algorithms. The proposed system detects vibrations indicative of security breaches, achieving an F1-score above 95.65 %.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Srinivasan, S. "Privacy Protection and Data Breaches." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2261.

Der volle Inhalt der Quelle
Annotation:
Data breach is the act of accessing a central data repository without the consent of the data owner. Data breaches are occurring frequently and involve millions of records. Major breaches have been reported since 2005. Often data breaches occur due to someone with malicious intent accessing the stored data. In this paper we look at the types of data breaches and how they impact people’s privacy, we introduce a data protection model with the goal of protecting people’s privacy. Given today’s mobile information needs it is essential to have access to personal data. Social networks are making it
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Singh, Ram Govind, and Naveenkumar D. "Are we undermining data breaches? Protecting education sector from data breaches." In 2023 International Conference on Computer, Electronics & Electrical Engineering & their Applications (IC2E3). IEEE, 2023. http://dx.doi.org/10.1109/ic2e357697.2023.10262570.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Fleury-Charles, Aaron, Md Minhaz Chowdhury, and Nafiz Rifat. "Data Breaches: Vulnerable Privacy." In 2022 IEEE International Conference on Electro Information Technology (eIT). IEEE, 2022. http://dx.doi.org/10.1109/eit53891.2022.9814044.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Alaminov, Hristo. "DATA BREACHES AND DIGITALISATION." In PROTECTION OF THE PERSONAL DATA AND THE DIGITALIZATION 2021. University publishing house "Science and Economics", University of Economics - Varna, 2021. http://dx.doi.org/10.36997/ppdd2021.29.

Der volle Inhalt der Quelle
Annotation:
The report provides an overview of the importance and benefits of examining personal data breaches in the context of a global trend such as digitalisation. Regardless of the extremely negative consequences that security breaches have, both for the individuals whose data are affected and for the data controllers / processors, data breaches are valuable sources of information.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Breaches"

1

Woodhams, Josephine. Breaches in Research Integrity. UK Research Integrity Office, 2023. http://dx.doi.org/10.37672/ukrio.2023.07.breachesinresearchintegrity.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Sainsbury, Nicola. Whistleblowing and Breaches of Good Research Practice. UK Research Integrity Office, 2024. http://dx.doi.org/10.37672/ukrio.2024.04.whistleblowingandbreaches.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Hurtle, Jackie C. Decrease the Number of Glovebox Glove Breaches and Failures. Office of Scientific and Technical Information (OSTI), 2013. http://dx.doi.org/10.2172/1113782.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Taylor, R. B., and D. Frobel. Barrier breaches and washover features, Martinique Beach, Nova Scotia. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1999. http://dx.doi.org/10.4095/211075.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Fisher, Bill. Data Confidentiality: Identifying and Protecting Assets Against Data Breaches. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1800-28.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Biggs, Carl T., Diana I. Angelis, Laura Armey, and Raymond Franck. Transaction Costs and Cost Breaches in Major Defense Acquisition Programs. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada612617.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

POND, DANIEL J., F. KAY HOUGHTON, and WALTER E. GILMORE. CONTRIBUTORS TO HUMAN ERRORS AND BREACHES IN NATIONAL SECURITY APPLICATIONS. Office of Scientific and Technical Information (OSTI), 2002. http://dx.doi.org/10.2172/801246.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Fisher, Bill. Data Confidentiality: Detect, Respond to, and Recover from Data Breaches. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1800-29.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Bratton, Robert Lawrence. Quick Look Report for Chemical Reactivity Modeling of Various Multi-Canister Overpack Breaches. Office of Scientific and Technical Information (OSTI), 2002. http://dx.doi.org/10.2172/911538.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Angelis, Diana I., Laura Armey, and Carl T. Biggs. A Model for Understanding the Relationship Between Transaction Costs and Acquisition Cost Breaches. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada612854.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!