To see the other types of publications on this topic, follow the link: Breaches.

Journal articles on the topic 'Breaches'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Breaches.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Richardson, Vernon J., Rodney E. Smith, and Marcia Weidenmier Watson. "Much Ado about Nothing: The (Lack of) Economic Impact of Data Privacy Breaches." Journal of Information Systems 33, no. 3 (2019): 227–65. http://dx.doi.org/10.2308/isys-52379.

Full text
Abstract:
ABSTRACT In this paper, we examine the consequences of data breaches for a breached company. We find the economic consequences are, on average, very small for breached companies. On average, breaches result in less than −0.3 percent cumulative abnormal returns in the short window around the breach disclosure. Except for a few catastrophic breaches, the nominal difference in cumulative abnormal returns between breach companies and the matched companies disappears within days after the breach. We also test whether data breaches affect future accounting measures of performance, audit and other fe
APA, Harvard, Vancouver, ISO, and other styles
2

Zafar, Humayun, Myung Ko, and Kweku-Muata Osei-Bryson. "Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors." Information Resources Management Journal 25, no. 1 (2012): 21–37. http://dx.doi.org/10.4018/irmj.2012010102.

Full text
Abstract:
Information security breaches pose a growing threat to organizations and individuals, particularly those that are heavily involved in e-business/e-commerce. An information security breach can have wide-ranging impacts, including influencing the behaviors of competitors and vice versa within the context of a competitive marketplace. Therefore, there is a need for further exploration of implications of information security breaches beyond the focus of the breached firm. This study investigates the financial impact of publicly announced information security breaches on breached firms and their no
APA, Harvard, Vancouver, ISO, and other styles
3

Smith, Thomas J. (Tom), Julia L. Higgs, and Robert E. Pinsker. "Do Auditors Price Breach Risk in Their Audit Fees?" Journal of Information Systems 33, no. 2 (2018): 177–204. http://dx.doi.org/10.2308/isys-52241.

Full text
Abstract:
ABSTRACT Data security breaches have been shown in the literature to negatively affect firm operations. Auditors serve as an important, external governance mechanism with respect to a firm's overall risk management protocol. Consequently, our study examines whether auditors price breach risk into their fees and if a firm's internal governance can mitigate the potential increases in audit fees. Using a sample of breached firms ranging from 2005–2014, we adapt the Houston, Peters, and Pratt (2005) model to explore how auditors view audit risk related to breach risk. We find that breaches are ass
APA, Harvard, Vancouver, ISO, and other styles
4

Du, Shuili, Kholekile L. Gwebu, Jing Wang, and Kun Yu. "Differential Market Reaction to Data Security Breaches: A Screening Perspective." Communications of the Association for Information Systems 54 (2024): 376–401. http://dx.doi.org/10.17705/1cais.05414.

Full text
Abstract:
This paper aims to identify breach- and firm-level characteristics that may account for the heterogenous stock market reaction to data breaches. Drawing upon the screening theory, this paper examines the possibility of three breach characteristics (breach severity, breach locus, and breach controllability) and two firm attributes (CEO stock ownership, and corporate social responsibility (CSR) performance) serving as information screens to influence stock market reaction to a data breach incident. Using an archival dataset compiled from multiple sources, we examine 607 data breaches from 2004 t
APA, Harvard, Vancouver, ISO, and other styles
5

Juma'h, Ahmad H., and Yazan Alnsour. "The effect of data breaches on company performance." International Journal of Accounting & Information Management 28, no. 2 (2020): 275–301. http://dx.doi.org/10.1108/ijaim-01-2019-0006.

Full text
Abstract:
Purpose This paper aims to analyze the effect of data breaches – whose concerns and implications can be legal, social and economic – on companies’ overall performance. Design/methodology/approach Information on data breaches was collected from online compilations, and financial data on breached companies was collected from the Mergent Online database. The financial variables used were related to profitability, liquidity, solvency and company size to analyze the financial performance of the breached companies before and after the data breach event. Nonfinancial data, such as the type and the si
APA, Harvard, Vancouver, ISO, and other styles
6

Saleem, Hamza, and Muhammad Naveed. "SoK: Anatomy of Data Breaches." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (2020): 153–74. http://dx.doi.org/10.2478/popets-2020-0067.

Full text
Abstract:
AbstractWe systematize the knowledge on data breaches into concise step-by-step breach workflows and use them to describe the breach methods. We present the most plausible workflows for 10 famous data breaches. We use information from a variety of sources to develop our breach workflows, however, we emphasize that for many data breaches, information about crucial steps was absent. We researched such steps to develop complete breach workflows; as such, our workflows provide descriptions of data breaches that were previously unavailable. For generalizability, we present a general workflow of 50
APA, Harvard, Vancouver, ISO, and other styles
7

Johnson, Mark, Min Jung Kang, and Tolani Lawson. "Stock Price Reaction to Data Breaches." Journal of Finance Issues 16, no. 2 (2017): 1–13. http://dx.doi.org/10.58886/jfi.v16i2.2263.

Full text
Abstract:
Data Breaches occur in many forms that include bad security practices, hacking, insider attacks, stolen or lost equipment and computer or data theft. Data breaches happen to organizations of all types. In this paper, we present an analysis of the stock market’s assessment of the cost of data breaches through the examination of 467 heterogeneous data breach events that occurred at 261 publicly traded companies between year 2005 and 2014. Our event study findings indicate that publicly traded firms in the U.S. lost, on average, .37% of their equity value when a data breach occurs. Particularly,
APA, Harvard, Vancouver, ISO, and other styles
8

Mulyadi, Rahmad, Witantra Dhamar Hutami, Kevin Dilian Suganda, and Dhiya Farah Khalisha. "Risk of neurologic deficit in medially breached pedicle screws assessed by computed tomography: a systematic review." Asian Spine Journal 18, no. 6 (2024): 903–12. https://doi.org/10.31616/asj.2024.0325.

Full text
Abstract:
Pedicle screws are commonly used for vertebral instrumentation, and a postoperative computed tomography (CT) scan is used to evaluate their position within the pedicle. Medial pedicle screw breaching occurs in 20%–40% of cases. This study investigated the correlation between radiographically evident medial breaching and the incidence of nerve injury, shedding light on the clinical implications. A literature search was conducted on biomedical databases regarding neurologic deficits associated with medially breached pedicle screws with pre-defined inclusion and exclusion criteria. The methodolog
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Tawei, Yen-Yao Wang, and Ju-Chun Yen. "It's Not My Fault." Journal of Database Management 30, no. 3 (2019): 18–37. http://dx.doi.org/10.4018/jdm.2019070102.

Full text
Abstract:
This article investigates the transfer of information security breach information between breached firms and their peers. Using a large data set of information security incidents from 2003 to 2013, the results suggest that 1) the effect of information security breach information transfer exists between breached firms and non-breached firms that offer similar products and 2) the effect of information transfer is weaker when the information security breach is due to internal faults or is related to the loss of personally identifiable information. Additional tests demonstrate that the effect of i
APA, Harvard, Vancouver, ISO, and other styles
10

Kude, Thomas, Hartmut Hoehle, and Tracy Ann Sykes. "Big data breaches and customer compensation strategies." International Journal of Operations & Production Management 37, no. 1 (2017): 56–74. http://dx.doi.org/10.1108/ijopm-03-2015-0156.

Full text
Abstract:
Purpose Big Data Analytics provides a multitude of opportunities for organizations to improve service operations, but it also increases the threat of external parties gaining unauthorized access to sensitive customer data. With data breaches now a common occurrence, it is becoming increasingly plain that while modern organizations need to put into place measures to try to prevent breaches, they must also put into place processes to deal with a breach once it occurs. Prior research on information technology security and services failures suggests that customer compensation can potentially resto
APA, Harvard, Vancouver, ISO, and other styles
11

Cheng, Xu (Joyce), and Stephanie Walton. "Do Nonprofessional Investors Care About How and When Data Breaches are Disclosed?" Journal of Information Systems 33, no. 3 (2019): 163–82. http://dx.doi.org/10.2308/isys-52410.

Full text
Abstract:
ABSTRACT While prior research suggests that the market responds negatively to data breach disclosures, how nonprofessional investors assess factors surrounding these disclosures has only been assessed anecdotally. We examine whether investor judgments are influenced by whether a breached company is the first to disclose a data breach and whether a significant amount of time has lapsed between the breach and disclosure. We find evidence that investors respond to a company originating disclosure with lower investment judgments than if disclosure comes from an external source, without consistent
APA, Harvard, Vancouver, ISO, and other styles
12

Sebastian, Glorin. "Cyber Kill Chain Analysis of Five Major US Data Breaches." International Journal of Cyber Warfare and Terrorism 12, no. 1 (2022): 1–15. http://dx.doi.org/10.4018/ijcwt.315651.

Full text
Abstract:
Data breaches are a major concern for both US and global corporations. With more companies allowing their employees to be working remote, providing them a secure work environment has been a priority for employers. The Interpol 2020 report on cyber breaches mentions that the number of cyber-attacks has multiplied in the last year. The IBM Data Breach Report of 2021 notes that data breach costs rose from USD 3.86 million to USD 4.24 million, while the average cost was USD 1.07 Mil higher in breaches where remote work was a factor in causing the breach. Given this environment of increased cyber b
APA, Harvard, Vancouver, ISO, and other styles
13

Nikkhah, Hamid, and Varun Grover. "An Empirical Investigation of Company Response to Data Breaches." MIS Quarterly 46, no. 4 (2022): 2163–96. http://dx.doi.org/10.25300/misq/2022/16609.

Full text
Abstract:
Companies may face serious adverse consequences as a result of a data breach event. To repair the potential damage to relationships with stakeholders after data breaches, companies adopt a variety of response strategies. However, the effects of these response strategies on the behavior of stakeholders after a data breach are unclear; differences in response times may also affect these outcomes, depending on the notification laws that apply to each company. As part of a multimethod study, we first identified the adopted response strategies in Study 1 based on content analysis of the response le
APA, Harvard, Vancouver, ISO, and other styles
14

Mahlaola, Tintswalo B., and Barbara Van Dyk. "Reasons for Picture Archiving and Communication System (PACS) data security breaches: Intentional versus non-intentional breaches." Health SA Gesondheid 21 (October 11, 2016): 271–79. http://dx.doi.org/10.4102/hsag.v21i0.966.

Full text
Abstract:
Background: The Picture Archiving and Communication System (PACS) has led to an increase in breached health records and violation of patient confidentiality. The South African constitution makes provision for human dignity and privacy, virtues which confidentiality seeks to preserve. Confidentiality thus constitutes a human right which is challenged by the use of technology. Humans, as managers of information technology, constitute the weakest link in safeguarding confidentiality. Nonetheless, it is argued that most security breaches are nonintentionally committed by well-meaning employees dur
APA, Harvard, Vancouver, ISO, and other styles
15

Raasck, Kyle, Jason Khoury, Ahmed Aoude, et al. "The Effect of Thoracolumbar Pedicle Isthmus on Pedicle Screw Accuracy." Global Spine Journal 10, no. 4 (2019): 393–98. http://dx.doi.org/10.1177/2192568219850143.

Full text
Abstract:
Study Design: Retrospective analysis. Objectives: Aberrant pedicle screws can cause serious neurovascular complications. We propose that a predominant factor of pedicle screw breach is the vertebral anatomy at a given spinal level. We aim to investigate the inverse correlation between breach incidence and vertebral isthmus width. Methods: The computed tomography scans of patients undergoing thoracolumbar surgery were retrospectively reviewed. Breaches were categorized as minor (<2 mm) or major (>2 mm). Breach incidence was stratified by spinal level. Average isthmus width was then compar
APA, Harvard, Vancouver, ISO, and other styles
16

Raghupathi, Wullianallur, Viju Raghupathi, and Aditya Saharia. "Analyzing Health Data Breaches: A Visual Analytics Approach." AppliedMath 3, no. 1 (2023): 175–99. http://dx.doi.org/10.3390/appliedmath3010011.

Full text
Abstract:
This research studies the occurrence of data breaches in healthcare provider settings regarding patient data. Using visual analytics and data visualization tools, we study the distribution of healthcare breaches by state. We review the main causes and types of breaches, as well as their impact on both providers and patients. The research shows a range of data breach victims. Network servers are the most popular location for common breaches, such as hacking and information technology (IT) incidents, unauthorized access, theft, loss, and improper disposal. We offer proactive recommendations to p
APA, Harvard, Vancouver, ISO, and other styles
17

Ansar, Kainat, Mansoor Ahmed, Markus Helfert, and Jungsuk Kim. "Blockchain-Based Data Breach Detection: Approaches, Challenges, and Future Directions." Mathematics 12, no. 1 (2023): 107. http://dx.doi.org/10.3390/math12010107.

Full text
Abstract:
In cybersecurity, personal data breaches have become one of the significant issues. This fact indicates that data breaches require unique detection systems, techniques, and solutions, which necessitate the potential to facilitate precise and quick data breach detection. Various research works on data breach detection and related areas in dealing with this problem have been proposed. Several survey studies have been conducted to comprehend insider data breaches better. However, these works did not examine techniques related to blockchain and innovative smart contract technologies to detect data
APA, Harvard, Vancouver, ISO, and other styles
18

Boraste, Toshnil H. "Breach Analysis of Earthen Dam." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30477.

Full text
Abstract:
Failure of a levee or dam breach can result in severe economic losses and loss of human life. To minimize these consequences, it's imperative to assess the risks associated with levee breaches. This involves accurately predicting the volume of water released during a breach and simulating the propagation of flood waves across the floodplain to create inundation maps. Despite extensive observation and research into representing dam breaches and deriving crucial breach parameters like width, height, and side slope, there is no universally accepted method for determining these parameters. This st
APA, Harvard, Vancouver, ISO, and other styles
19

Higgs, Julia L., Robert E. Pinsker, Thomas J. Smith, and George R. Young. "The Relationship between Board-Level Technology Committees and Reported Security Breaches." Journal of Information Systems 30, no. 3 (2016): 79–98. http://dx.doi.org/10.2308/isys-51402.

Full text
Abstract:
ABSTRACT After several high-profile data security breaches (e.g., Target Corporation, Michaels Stores, Inc., The Home Depot), corporate boards are prioritizing the oversight of Information Technology (IT) risk. Firms are also increasingly faced with disclosure decisions regarding IT security breaches. This study proposes that firms can use the creation of a board-level technology committee as part of the firm's information technology governance (ITG) to signal the firm's ability to detect and respond to security breaches. Using reported security breaches during the time period 2005–2014, resul
APA, Harvard, Vancouver, ISO, and other styles
20

Grandi, Laurie D., and Joanna R. Adler. "A Study into Breaches of Youth Justice Orders and the Young People Who Breach Them." Youth Justice 16, no. 3 (2016): 205–25. http://dx.doi.org/10.1177/1473225415618463.

Full text
Abstract:
This study concerns the incidence and aetiology of breach of youth community sentences. A between-groups archival study compared those who breached with those who did not, on socio-demographic and criminogenic factors. Breachers were a minority, likely to breach repeatedly and were similar to those who re-offended. Whether they breach or re-offend may depend on something other than the characteristics of the Order and the young person’s situation. Youth Justice Professionals should be mindful of the identified areas of need and responsivity when considering compliance.
APA, Harvard, Vancouver, ISO, and other styles
21

Lee, Jinhyung, and Sung J. Choi. "Hospital Productivity After Data Breaches: Difference-in-Differences Analysis." Journal of Medical Internet Research 23, no. 7 (2021): e26157. http://dx.doi.org/10.2196/26157.

Full text
Abstract:
Background Data breaches are an inevitable risk to hospitals operating with information technology. The financial costs associated with data breaches are also growing. The costs associated with a data breach may divert resources away from patient care, thus negatively affecting hospital productivity. Objective After a data breach, the resulting regulatory enforcement and remediation are a shock to a hospital’s patient care delivery. Exploiting this shock, this study aimed to investigate the association between hospital data breaches and productivity by using a generalized difference-in-differe
APA, Harvard, Vancouver, ISO, and other styles
22

Wang, Michael Y., Guillermo Pineiro, and Praveen V. Mummaneni. "Stimulus-evoked electromyography testing of percutaneous pedicle screws for the detection of pedicle breaches: a clinical study of 409 screws in 93 patients." Journal of Neurosurgery: Spine 13, no. 5 (2010): 600–605. http://dx.doi.org/10.3171/2010.5.spine09536.

Full text
Abstract:
Object Percutaneous pedicle screws have recently become popularized for lumbar spinal fixation. However, successful anatomical hardware placement is highly dependent on intraoperative imaging. In traditional open surgery, stimulus-evoked electromyography (EMG) responses can be useful for detecting pedicle screw breaches. The use of insulated sleeves for percutaneous screws has allowed for EMG testing in minimally invasive surgery; however, no reports on the reliability of this testing modality have been published. Methods A total of 409 lumbar percutaneous pedicle screws were placed in 93 pati
APA, Harvard, Vancouver, ISO, and other styles
23

Cross, Cassandra, Megan Parker, and Daniel Sansom. "Media discourses surrounding ‘non-ideal’ victims: The case of the Ashley Madison data breach." International Review of Victimology 25, no. 1 (2018): 53–69. http://dx.doi.org/10.1177/0269758017752410.

Full text
Abstract:
Data breaches are an increasingly common event across businesses globally. Many companies have been subject to large-scale breaches. Consequently, the exposure of 37 million customers of the Ashley Madison website is not an extraordinary event in and of itself. However, Ashley Madison is an online dating website predominantly known for facilitating extramarital affairs. Therefore, the nature of this website (and business) is very different from those that have previously been breached. This article examines one of the media discourses surrounding the victims of the Ashley Madison data breach.
APA, Harvard, Vancouver, ISO, and other styles
24

Gwebu, Kholekile, and Clayton W. Barrows. "Data breaches in hospitality: is the industry different?" Journal of Hospitality and Tourism Technology 11, no. 3 (2020): 511–27. http://dx.doi.org/10.1108/jhtt-11-2019-0138.

Full text
Abstract:
Purpose The purpose of this study is to expand on the existing literature by specifically examining data security incidents within the hospitality industry, assessing origins and causes, comparing breaches within the industry with those of other industries and identifying areas of concern. Design/methodology/approach A sample of data breach incidents is drawn from the Verizon VERIS Community Database (VCDB). Statistical comparisons between hospitality and non-hospitality industry firms are conducted following the Verizon A4 threat framework. Findings The results reveal that breaches between ho
APA, Harvard, Vancouver, ISO, and other styles
25

Kim, Yunsieg P. "Redefining “No Evidence of a Breach” in Election Security." SMU Law Review Forum 76, no. 1 (2023): 131. http://dx.doi.org/10.25172/slrf.76.1.6.

Full text
Abstract:
For legal purposes, we rightly understand the lack of evidence to mean a lack of existence. For example, many candidates in the 2022 elections baselessly claimed that the 2020 presidential election was stolen. But, absent evidence of systemic fraud, the law correctly determines that President Biden was duly elected. If the law entertained any outlandish assertion regardless of evidentiary support, accusers could peddle whatever claims they please, forcing the accused to disprove them. Similar to the legal understanding of “no evidence,” many appear to believe that no evidence of a security bre
APA, Harvard, Vancouver, ISO, and other styles
26

Neto, Nelson Novaes, Stuart Madnick, Anchises Moraes G. De Paula, and Natasha Malara Borges. "Developing a Global Data Breach Database and the Challenges Encountered." Journal of Data and Information Quality 13, no. 1 (2021): 1–33. http://dx.doi.org/10.1145/3439873.

Full text
Abstract:
If the mantra “data is the new oil” of our digital economy is correct, then data leak incidents are the critical disasters in the online society. The initial goal of our research was to present a comprehensive database of data breaches of personal information that took place in 2018 and 2019. This information was to be drawn from press reports, industry studies, and reports from regulatory agencies across the world. This article identified the top 430 largest data breach incidents among more than 10,000 data breach incidents. In the process, we encountered many complications, especially regard
APA, Harvard, Vancouver, ISO, and other styles
27

D'Arcy, John, and Asli Basoglu. "The Influences of Public and Institutional Pressure on Firms’ Cybersecurity Disclosures." Journal of the Association for Information Systems 23, no. 3 (2022): 779–805. http://dx.doi.org/10.17705/1jais.00740.

Full text
Abstract:
Cybersecurity disclosures in reports filed with the US Securities and Exchange Commission (SEC) inform investors about firms’ cybersecurity incidents, risks, and related risk management efforts. Firms have traditionally chosen to communicate such information on a quarterly or annual basis, if at all, and prior research on the topic has largely focused on regulatory factors as driving forces. In this paper, we focus on timely disclosures (via 8-K filings) and derive hypotheses regarding the influences of two alternate forms of pressure as drivers of cybersecurity disclosures—(1) public pressure
APA, Harvard, Vancouver, ISO, and other styles
28

Hile, Jack. "Dude, Where’s My Data? The Effectiveness of Laws Governing Data Breaches in Australia." Journal of Telecommunications and the Digital Economy 9, no. 2 (2021): 47–68. http://dx.doi.org/10.18080/jtde.v9n2.381.

Full text
Abstract:
The increasing prevalence of large-scale data breaches prompted Australia to strengthen the Privacy Act by enacting the Privacy Amendment (Notifiable Data Breaches) Act to regulate the behaviour of entities entrusted with personal data. However, this paper argues that these legislative instruments are ineffective when dealing with data breaches and their associated problems. In supporting this conclusion, this paper first develops a criterion for effective data breach law, and then evaluates the Australian framework against this criterion to determine its operational effectiveness. In addition
APA, Harvard, Vancouver, ISO, and other styles
29

Whigham, Kerry. "States of conception: Renegotiating the mnemonic order amid crisis." Memory Studies 14, no. 6 (2021): 1333–46. http://dx.doi.org/10.1177/17506980211054339.

Full text
Abstract:
A memory breach is an action, statement, or sociopolitical crisis that calls into dispute the mnemonic order, which is defined as an underlying orientation toward the past that serves to justify the political order and social order within a society. Following a memory breach, the society enters a “state of conception.” Related to the “state of exception” commonly associated with political crisis, the state of conception is a liminal space that follows a memory breach in which a society reexamines the mnemonic order. This article examines three recent memory breaches in Argentina, Germany, and
APA, Harvard, Vancouver, ISO, and other styles
30

Li, You Tang, Zhi Yuan Rui, and Chang Feng Yan. "Uniform Model and Fracture Criteria of Annularly Breached Bars under Bending." Key Engineering Materials 321-323 (October 2006): 751–54. http://dx.doi.org/10.4028/www.scientific.net/kem.321-323.751.

Full text
Abstract:
A uniform model, in which the crack, V-notch, U-notch and arc are described as breach uniformly, is put forward in this paper. The tip radius, depth and field angle of breach are regarded as the parameter of annularly breached bar. The stress field and displacement field near the tip of the annularly breached bar under bending, in which takes fα(a/b) as its descriptive parameter, was given. All forms of breaches according to the change of tip radius, depth and field angle were discussed. The effects of parameters on fα(a/b) in bending were analyzed. The criteria for the safety design and fract
APA, Harvard, Vancouver, ISO, and other styles
31

Ali, Syed Emad Azhar, Fong-Woon Lai, Ameenullah Aman, Muhammad Furquan Saleem, and Salaheldin Hamad. "Do Information Security Breach and Its Factors Have a Long-Run Competitive Effect on Breached Firms’ Equity Risk?" Journal of Competitiveness 14, no. 1 (2022): 23–42. http://dx.doi.org/10.7441/joc.2022.01.02.

Full text
Abstract:
A breach in information security (infosec) can materially impact a firm’s long-term competitiveness. For publicly listed firms, an infosec breach can have a long-lasting effect on their competitive stock performance, including their equity risk. Despite its significance, past research has focused primarily on examining the short-term effect of infosec breaches while ignoring its long-term effect on the firm’s equity risk. Therefore, in this research, we examined the long-run effect of 276 infosec breaches at publicly traded firms on equity risk from 2009 to 2018. We analyzed each firm’s equity
APA, Harvard, Vancouver, ISO, and other styles
32

Holtfreter, Robert E., and Adrian Harrington. "Data breach trends in the United States." Journal of Financial Crime 22, no. 2 (2015): 242–60. http://dx.doi.org/10.1108/jfc-09-2013-0055.

Full text
Abstract:
Purpose – The main purpose of this paper is to analyze the trends of various types of data breaches and their compromised records in the USA using a new model recently developed by the authors. Design/methodology/approach – The 2,280 data breaches and over 512 million related compromised records tracked by the Privacy Rights Clearinghouse from 2005 through 2010 were analyzed and classified into four external, five internal and one non-traceable data breach categories, after which trends were determined for each. Findings – The findings indicate that although the trends for the annual number of
APA, Harvard, Vancouver, ISO, and other styles
33

Yakkaluri Narendra and Shaik Haseena. "MODELING ORGANIZATIONAL VULNERABILITY TO DATA BREACHES USING MODERN CRIME THEORY." International Journal of Engineering Research and Science & Technology 21, no. 2 (2025): 942–51. https://doi.org/10.62643/ijerst.2025.v21.i2.pp942-951.

Full text
Abstract:
Research on data security generally highlights the need to identify the variables associated to security breaches, hoping to avoid future information security disasters. The complexity of protecting sensitive data inside an organisation has increased with the development of digital technologies. Even while data security research is expanding, there aren't many studies that particularly look at the causes of information security breaches in businesses. Previous studies have focused studied the security posture of firms and organizations, concentrating on the breach kind and location. Few studie
APA, Harvard, Vancouver, ISO, and other styles
34

Ko, Dongwoo, Joongu Kang, Sungjoong Kim, and Yonguk Ryu. "Experimental study on the performance analysis of river levee using new substance for improving earth surface resistance." E3S Web of Conferences 40 (2018): 03022. http://dx.doi.org/10.1051/e3sconf/20184003022.

Full text
Abstract:
The reasons why levee breaches during floods are largely due to overtopping, seepage, and structurally induced piping. According to an analysis of domestic and overseas reported cases of levee breaches, overtopping was found to be the cause for approximately 40% of all cases of breach. Despite such efforts of previous research to establish disaster prevention plans associated with levee breaches, to enhance our understanding of the processes and reasons, further research regarding the prediction of levee breaches must be undertaken by accumulating test data under several different conditions a
APA, Harvard, Vancouver, ISO, and other styles
35

Smrithi, Sukesh, Hephzibah Miriam D. Doreen, and Robin C. R. Rene. "An analysis of the increasing cases of data breaches in india." i-manager’s Journal on Software Engineering 17, no. 3 (2023): 38. http://dx.doi.org/10.26634/jse.17.3.19791.

Full text
Abstract:
The number of data breaches in India has increased significantly in recent years. This is due to a number of factors, including the growing use of digital technologies, the lack of adequate data security measures, and the increasing sophistication of cybercriminals. The impact of data breaches can be far-reaching. Individuals may suffer financial losses, identity theft, and other forms of harm. Businesses may lose customers, suffer reputational damage, and incur significant costs to remediate the breach. The Indian government has taken some steps to address the problem of data breaches. Howeve
APA, Harvard, Vancouver, ISO, and other styles
36

Avery, Atiya. "After the disclosure: measuring the short-term and long-term impacts of data breach disclosures on the financial performance of organizations." Information & Computer Security 29, no. 3 (2021): 500–525. http://dx.doi.org/10.1108/ics-10-2020-0161.

Full text
Abstract:
Purpose This study aims to evaluate changes to the financial performance of organizations in the 1–4 quarters following a data breach event. The study introduces two new variables, “intangible assets” and “extraordinary losses” to the discussion on the impact of data breaches on an organization’s financial performance. Intangible assets allow us to gauge the data breach’s impact on the organization’s brand reputation and intellectual capital reserves. Extraordinary losses allow us to gauge if organizations considered data breaches truly detrimental to their operations that they rose to the lev
APA, Harvard, Vancouver, ISO, and other styles
37

Seh, Adil Hussain, Mohammad Zarour, Mamdouh Alenezi, et al. "Healthcare Data Breaches: Insights and Implications." Healthcare 8, no. 2 (2020): 133. http://dx.doi.org/10.3390/healthcare8020133.

Full text
Abstract:
The Internet of Medical Things, Smart Devices, Information Systems, and Cloud Services have led to a digital transformation of the healthcare industry. Digital healthcare services have paved the way for easier and more accessible treatment, thus making our lives far more comfortable. However, the present day healthcare industry has also become the main victim of external as well as internal attacks. Data breaches are not just a concern and complication for security experts; they also affect clients, stakeholders, organizations, and businesses. Though the data breaches are of different types, t
APA, Harvard, Vancouver, ISO, and other styles
38

Pimenta Rodrigues, Gabriel Arquelau, André Luiz Marques Serrano, Amanda Nunes Lopes Espiñeira Lemos, et al. "Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review." Data 9, no. 2 (2024): 27. http://dx.doi.org/10.3390/data9020027.

Full text
Abstract:
Data breaches result in data loss, including personal, health, and financial information that are crucial, sensitive, and private. The breach is a security incident in which personal and sensitive data are exposed to unauthorized individuals, with the potential to incur several privacy concerns. As an example, the French newspaper Le Figaro breached approximately 7.4 billion records that included full names, passwords, and e-mail and physical addresses. To reduce the likelihood and impact of such breaches, it is fundamental to strengthen the security efforts against this type of incident and,
APA, Harvard, Vancouver, ISO, and other styles
39

Warren, Alexandra O., Sharon A. Wilson, Alan Howard, Axel Noblet, and Edwin S. Kite. "Multiple Overspill Flood Channels from Young Craters Require Surface Melting and Hundreds of Meters of Midlatitude Ice Late in Mars’s History." Planetary Science Journal 5, no. 8 (2024): 174. http://dx.doi.org/10.3847/psj/ad5e6f.

Full text
Abstract:
Abstract Mars’s tadpole craters are small, young craters whose crater rims are incised by one or more exit breaches but lack visible inlets. The tadpole-forming climate records the poorly understood drying of Mars since the Early Hesperian. A third of tadpole craters have multiple breaches; therefore, the climate must have been able to generate crater rim incision in multiple locations. We use HiRISE data for four multiple-breach tadpole craters to measure their crater fill, rims, and exit breaches. We compare these measurements and other data with our calculations of liquid water supply by ra
APA, Harvard, Vancouver, ISO, and other styles
40

Das, Pradip Kumar. "An Insight into Data Breaches: Challenges and Prevention." Middle East Research Journal of Humanities and Social Sciences 3, no. 01 (2022): 1–8. http://dx.doi.org/10.36348/merjhss.2023.v03i01.001.

Full text
Abstract:
Data breach is a deliberate or desultory denudation of classified materials to proscribed bodies. In the fast- evolving technology era, data has evolved into one of the most core elements of an organization. Data spill causes grim impendence to organizations and tarnishes its solvency. As the volume of data is flowering wantonly and data breaches are happing spasmodically all the more, diagnosing and forestalling data breaches have been one of the most crying invincibility presentiments for organizations. Despite copious exploratory studies on safeguarding sensitive information from being divu
APA, Harvard, Vancouver, ISO, and other styles
41

B., Sravani, Bhumika G, Prashanth J, Pavan B, and Asha Haseena S. "A Structural Equation Modelling Approach to Understanding Data Breach Factors Through Modern Crime Theory." International Journal of Computational Learning & Intelligence 4, no. 2 (2025): 473–79. https://doi.org/10.5281/zenodo.15184367.

Full text
Abstract:
With the increasing reliance on digital infrastructure, data breaches have become a critical concern for organizations worldwide. Despite extensive research in cybersecurity, limited studies have examined the external factors influencing an organization’s vulnerability to data breaches. This study applies Modern Crime Theory (MCT) to analyze the external conditions contributing to data breaches, incorporating elements such as attractiveness, visibility, and guardianship as key predictors. A Covariance-Based Structural Equation Modeling (CB-SEM) framework was employed to investigate how t
APA, Harvard, Vancouver, ISO, and other styles
42

Oghene, Augustine. "Data breach and privacy in the digital era." BOHR International Journal of Computer Science 2, no. 1 (2023): 95–111. http://dx.doi.org/10.54646/bijcs.2023.26.

Full text
Abstract:
The trend of data breaches globally is attracting concerns from business owners and the government of different countries. Notwithstanding the multiple pieces of legislation and strict requirements for reducing crime, there has been an exponential increase in data breach incidents. These crimes result in the loss of billions of dollars annually from small entities and large enterprises. Data breaches did not only start during the digital era with technological advancement; they started when individuals and organizations stored and maintained their data and records on-premises. However, as tech
APA, Harvard, Vancouver, ISO, and other styles
43

Erkan-Barlow, Asligul, Thanh Ngo, Rajni Goel, and Denise Streeter. "An in-depth analysis of the impact of cyberattacks on the profitability of commercial banks in the United States." Journal of Global Business Insights 8, no. 2 (2023): 120–35. http://dx.doi.org/10.5038/2640-6489.8.2.1246.

Full text
Abstract:
This study examined the effects of cyberattacks on the profitability of U.S. public and private commercial banks using a sample of 120 data breaches across various institutions. The results showed that cyberattacks negatively influence bank profitability, with effects more robust in the 12 quarters following a breach, especially from non-hack breaches. Large and private banks suffer more than small and public banks, with breaches resulting in decreased deposits and loans and increased liquidity. These changes are confirmed as independent channels reducing bank profitability. The results were r
APA, Harvard, Vancouver, ISO, and other styles
44

Kamoun, Faouzi, and Mathew Nicho. "Human and Organizational Factors of Healthcare Data Breaches." International Journal of Healthcare Information Systems and Informatics 9, no. 1 (2014): 42–60. http://dx.doi.org/10.4018/ijhisi.2014010103.

Full text
Abstract:
Over the past few years, concerns related to healthcare data privacy have been mounting since healthcare information has become more digitized, distributed and mobile. However, very little is known about the root cause of data breach incidents; making it difficult for healthcare organizations to establish proper security controls and defenses. Through a systematic review and synthesis of data breaches literature, and using databases of earlier reported healthcare data breaches, the authors re-examine and analyze the causal factors behind healthcare data breaches. The authors then use the Swiss
APA, Harvard, Vancouver, ISO, and other styles
45

Bisogni, Fabio, and Hadi Asghari. "More Than a Suspect: An Investigation into the Connection Between Data Breaches, Identity Theft, and Data Breach Notification Laws." Journal of Information Policy 10, no. 1 (2020): 45–82. http://dx.doi.org/10.5325/jinfopoli.10.1.0045.

Full text
Abstract:
Abstract This article investigates the relationship between data breaches and identity theft, including the impact of Data Breach Notification Laws (DBNL) on these incidents (using empirical data and Bayesian modeling). We collected incident data on breaches and identity thefts over a 13-year timespan (2005–2017) in the United States. Our analysis shows that the correlation is driven by the size of a state. Enacting a DBNL still slightly reduces rates of identity theft; while publishing breaches notifications by Attorney Generals helps the broader security community learning about them. We con
APA, Harvard, Vancouver, ISO, and other styles
46

Molitor, Dominik, Wullianallur Raghupathi, Aditya Saharia, and Viju Raghupathi. "Exploring Key Issues in Cybersecurity Data Breaches: Analyzing Data Breach Litigation with ML-Based Text Analytics." Information 14, no. 11 (2023): 600. http://dx.doi.org/10.3390/info14110600.

Full text
Abstract:
While data breaches are a frequent and universal phenomenon, the characteristics and dimensions of data breaches are unexplored. In this novel exploratory research, we apply machine learning (ML) and text analytics to a comprehensive collection of data breach litigation cases to extract insights from the narratives contained within these cases. Our analysis shows stakeholders (e.g., litigants) are concerned about major topics related to identity theft, hacker, negligence, FCRA (Fair Credit Reporting Act), cybersecurity, insurance, phone device, TCPA (Telephone Consumer Protection Act), credit
APA, Harvard, Vancouver, ISO, and other styles
47

Oluka, Alexander. "Analysing the implications of cybersecurity breaches on firm leadership." Technology audit and production reserves 6, no. 4(74) (2023): 20–26. http://dx.doi.org/10.15587/2706-5448.2023.286985.

Full text
Abstract:
The object of this research is the implications of cybersecurity breaches on the leaders of accounting firms in KwaZulu-Natal, South Africa. The research employed a qualitative approach with interviews as the primary data collection technique. The researcher adopted a rigorous analytical framework, utilising different scholarly sources to analyse and explain the intricate experiences of firm leaders. The study revealed that leaders of accounting firms experience psychological, financial, and social consequences due to cybersecurity breaches. It highlights the emotional impact, including anxiet
APA, Harvard, Vancouver, ISO, and other styles
48

Gunatileka, Shannel. "“Big Data Breaches”, sovereignty of states and the challenges in attribution." University of Colombo Review 5, no. 1 (2024): 104–29. http://dx.doi.org/10.4038/ucr.v5i1.99.

Full text
Abstract:
“Big data” refers to large sets of data, which are computationally analyzed to reveal patterns or trends in human behavior and interactions. At present, with the increased use of cyberspace for day-to-day activities, sensitive personal data is stored in computer servers. This massive number of data sets could be used to generate predictive models for a variety of uses such as policy-making and the prediction of societal changes. This has propelled nation-state adversaries to amass “big data” of another state through low-threshold data breaches. This article focuses on “big data breaches” commi
APA, Harvard, Vancouver, ISO, and other styles
49

Spasenko, К. "SIGNIFICANT INVESTIGATIONS OF SITUATION AND VERSIONS IN INVESTIGATION VIOLATION OF SAFETY RULES DURING WORKS WITH HIGH-RISK." Theory and Practice of Forensic Science and Criminalistics 20, no. 2 (2019): 62–71. http://dx.doi.org/10.32353/khrife.2.2019.04.

Full text
Abstract:
The article proposes a system of typical investigative versions in the process of investigating breaches of security rules when performing high-risk work. An investigator’s program of verification of the proposed versions has been opened.
 Separate depending on the content of the above elements of group 3 of typical investigative situations of breaches of security rules at the initial stage of the investigation. In the first investigative situation, the fact and manner of breach of the security rules, as well as the person who committed the breach, was established, the notification of the
APA, Harvard, Vancouver, ISO, and other styles
50

Brown, Nolan James, Basel Musmar, Zach Pennington, et al. "284 CT-Based Assessment of Prone Versus Lateral Pedicle Screw Placement Accuracy: A Retrospective Single-surgeon Study." Neurosurgery 70, Supplement_1 (2024): 80–81. http://dx.doi.org/10.1227/neu.0000000000002809_284.

Full text
Abstract:
INTRODUCTION: Lateral lumbar interbody fusion (LLIF) including the anterior-to-psoas oblique lumbar interbody fusion (OLIF) has conventionally relied on pedicle screw placement (PSP) for construct stabilization. Single-position surgery with lumbar interbody fusion (LIF) in the lateral decubitus position with concomitant PSP has been associated with increased operative efficiency. What remains unclear is the accuracy of PSP with robotic guidance when compared to the more familiar prone patient positioning. METHODS: We identified all consecutive patients treated with interbody fusion and PSP in
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!