Academic literature on the topic 'Data Breach'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data Breach.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Data Breach"

1

Du, Shuili, Kholekile L. Gwebu, Jing Wang, and Kun Yu. "Differential Market Reaction to Data Security Breaches: A Screening Perspective." Communications of the Association for Information Systems 54 (2024): 376–401. http://dx.doi.org/10.17705/1cais.05414.

Full text
Abstract:
This paper aims to identify breach- and firm-level characteristics that may account for the heterogenous stock market reaction to data breaches. Drawing upon the screening theory, this paper examines the possibility of three breach characteristics (breach severity, breach locus, and breach controllability) and two firm attributes (CEO stock ownership, and corporate social responsibility (CSR) performance) serving as information screens to influence stock market reaction to a data breach incident. Using an archival dataset compiled from multiple sources, we examine 607 data breaches from 2004 to 2018 and find that the stock market reacts more negatively if a breach is more severe (i.e., involving more data records and financially sensitive consumer data), controllable (i.e., could have been prevented), and if the breached firm has weak corporate governance, as indicated by low CEO stock ownership. Furthermore, CSR provides “insurance-like” protection by attenuating the negative effects of breach severity, breach controllability, and poor corporate governance on firm value. The findings of this research highlight the relevance of screening theory as a theoretical lens for examining the contextual dependence of stock market reaction to data breaches on key breach- and firm-level characteristics.
APA, Harvard, Vancouver, ISO, and other styles
2

Richardson, Vernon J., Rodney E. Smith, and Marcia Weidenmier Watson. "Much Ado about Nothing: The (Lack of) Economic Impact of Data Privacy Breaches." Journal of Information Systems 33, no. 3 (2019): 227–65. http://dx.doi.org/10.2308/isys-52379.

Full text
Abstract:
ABSTRACT In this paper, we examine the consequences of data breaches for a breached company. We find the economic consequences are, on average, very small for breached companies. On average, breaches result in less than −0.3 percent cumulative abnormal returns in the short window around the breach disclosure. Except for a few catastrophic breaches, the nominal difference in cumulative abnormal returns between breach companies and the matched companies disappears within days after the breach. We also test whether data breaches affect future accounting measures of performance, audit and other fees, and future Sarbanes-Oxley Section 404 reports of material internal control weaknesses, but find no differences between breach and matched companies. Our results address the question why companies are not spending more to reduce breaches. We conclude by providing a few explanations of why there appears to be an effect at the economy-wide level, but no noticeable effect on individual company performance.
APA, Harvard, Vancouver, ISO, and other styles
3

Saleem, Hamza, and Muhammad Naveed. "SoK: Anatomy of Data Breaches." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (2020): 153–74. http://dx.doi.org/10.2478/popets-2020-0067.

Full text
Abstract:
AbstractWe systematize the knowledge on data breaches into concise step-by-step breach workflows and use them to describe the breach methods. We present the most plausible workflows for 10 famous data breaches. We use information from a variety of sources to develop our breach workflows, however, we emphasize that for many data breaches, information about crucial steps was absent. We researched such steps to develop complete breach workflows; as such, our workflows provide descriptions of data breaches that were previously unavailable. For generalizability, we present a general workflow of 50 data breaches from 2015. Based on our data breach analysis, we develop requirements that organizations need to meet to thwart data breaches. We describe what requirements are met by existing security technologies and propose future research directions to thwart data breaches.
APA, Harvard, Vancouver, ISO, and other styles
4

Cheng, Xu (Joyce), and Stephanie Walton. "Do Nonprofessional Investors Care About How and When Data Breaches are Disclosed?" Journal of Information Systems 33, no. 3 (2019): 163–82. http://dx.doi.org/10.2308/isys-52410.

Full text
Abstract:
ABSTRACT While prior research suggests that the market responds negatively to data breach disclosures, how nonprofessional investors assess factors surrounding these disclosures has only been assessed anecdotally. We examine whether investor judgments are influenced by whether a breached company is the first to disclose a data breach and whether a significant amount of time has lapsed between the breach and disclosure. We find evidence that investors respond to a company originating disclosure with lower investment judgments than if disclosure comes from an external source, without consistent regard to the timing of disclosure. We also find that investors make the least favorable investment judgments when the breached company initiates the data breach disclosure and when there is a significant delay between the data breach and initial public disclosure. Our study provides a greater understanding of one consequence of data breaches, that is, how timing and disclosure initiative influence nonprofessional investors' judgments. JEL Classifications: G41; M41.
APA, Harvard, Vancouver, ISO, and other styles
5

Mohammed, Zareef. "Data breach recovery areas: an exploration of organization's recovery strategies for surviving data breaches." Organizational Cybersecurity Journal: Practice, Process and People 2, no. 1 (2021): 41–59. http://dx.doi.org/10.1108/ocj-05-2021-0014.

Full text
Abstract:
PurposeData breaches are an increasing phenomenon in today's digital society. Despite the preparations an organization must take to prevent a data breach, it is still necessary to develop strategies in the event of a data breach. This paper explores the key recovery areas necessary for data breach recovery.Design/methodology/approachStakeholder theory and three recovery areas (customer, employee and process recovery) are proposed as necessary theoretical lens to study data breach recovery. Three data breach cases (Anthem, Equifax, and Citrix) were presented to provide merit to the argument of the proposed theoretical foundations of stakeholder theory and recovery areas for data breach recovery research.FindingsInsights from these cases reveal four areas of recovery are necessary for data breach recovery – customer recovery, employee recovery, process recovery and regulatory recovery.Originality/valueThese areas are presented in the data recovery areas model and are necessary for: (1) organizations to focus on these areas when resolving data breaches and (2) future data breach recovery researchers in developing their research in the field.
APA, Harvard, Vancouver, ISO, and other styles
6

Aivazpour, Zahra, Rohit Valecha, and Rajarshi Chakraborty. "Data Breaches." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 53, no. 4 (2022): 65–82. http://dx.doi.org/10.1145/3571823.3571829.

Full text
Abstract:
Recent events have shown that online booking is vulnerable to hacking incidents such as data breaches. The primary purpose of this study is to investigate the effect of the risky decision-making factors on consumer post breach behavior. After a data breach, most of the companies offer monitoring services to restore customer trust and encourage them for future purchases. However, little research has been done to understand the impact of these monitoring services on consumer behavior. In this study, we examine whether monitoring services can mitigate the impact of risk perception on online booking. We utilized the Marriott data breach of November 2018 as the context. We manipulate data breach severity in our vignettes. The research model was tested using data gathered from 298 Mechanical Turk respondents. Our vignette-based survey design allowed us to incorporate situational details thought to be important in risky decision-making in a data breach context. We found strong support for our research model including the positive moderating effect of company suggested monitoring on online booking intention. The findings of this study could help firms in developing more influential post-breach monitoring services.
APA, Harvard, Vancouver, ISO, and other styles
7

Ansar, Kainat, Mansoor Ahmed, Markus Helfert, and Jungsuk Kim. "Blockchain-Based Data Breach Detection: Approaches, Challenges, and Future Directions." Mathematics 12, no. 1 (2023): 107. http://dx.doi.org/10.3390/math12010107.

Full text
Abstract:
In cybersecurity, personal data breaches have become one of the significant issues. This fact indicates that data breaches require unique detection systems, techniques, and solutions, which necessitate the potential to facilitate precise and quick data breach detection. Various research works on data breach detection and related areas in dealing with this problem have been proposed. Several survey studies have been conducted to comprehend insider data breaches better. However, these works did not examine techniques related to blockchain and innovative smart contract technologies to detect data breaches. In this survey, we examine blockchain-based data breach detection mechanisms developed so far to deal with data breach detection. We compare blockchain-based data breach detection techniques based on type, platform, smart contracts, consensus algorithm language/tool, and evaluation measures. We also present a taxonomy of contemporary data breach types. We conclude our study by outlining existing methodologies’ issues, offering ideas for overcoming those challenges, and pointing the way forward.
APA, Harvard, Vancouver, ISO, and other styles
8

Evans, Corey A., Brooke Beyer, Terry W. Mason, and Ashley N. West. "Data Breach Severity and Debt Market Responses." Accounting and the Public Interest 23, no. 1 (2023): 76–109. http://dx.doi.org/10.2308/api-2023-003.

Full text
Abstract:
ABSTRACT Prior literature has become increasingly inconsistent as to the impact of data breaches, in part because researchers have not settled on an appropriate identifier for breach severity. The goal of our study is to develop a breach severity measure and validate the new measure by investigating the relation between breach severity and debt market responses. Using the new measure, we find severe data breaches are positively associated with the cost of debt, the size of new debt facilities, the total number of new debt facilities issued, and the average number of lenders included in the new facilities. We also provide evidence that financially constrained firms are more likely to be adversely affected by a severe data breach. Collectively, the results suggest our new breach severity measure is an effective measure of data breach severity. Data Availability: Data are available from the public sources cited in the text. JEL Classifications: G32; M41.
APA, Harvard, Vancouver, ISO, and other styles
9

Johnson, Mark, Min Jung Kang, and Tolani Lawson. "Stock Price Reaction to Data Breaches." Journal of Finance Issues 16, no. 2 (2017): 1–13. http://dx.doi.org/10.58886/jfi.v16i2.2263.

Full text
Abstract:
Data Breaches occur in many forms that include bad security practices, hacking, insider attacks, stolen or lost equipment and computer or data theft. Data breaches happen to organizations of all types. In this paper, we present an analysis of the stock market’s assessment of the cost of data breaches through the examination of 467 heterogeneous data breach events that occurred at 261 publicly traded companies between year 2005 and 2014. Our event study findings indicate that publicly traded firms in the U.S. lost, on average, .37% of their equity value when a data breach occurs. Particularly, we find that breaches resulting from payment card fraud contributed more to negative announcement returns than the other breach types. Such negative announcement effects are most heavily felt when firms with card breaches are larger than the average, resulting in a 3% decline in firm equity value. Contrary to previous studies, we find that repeated breaches do not impact firm stock value differently than first-time-breaches. However, we find that there is a high correlation between firm sizeand the existence of multiple, repeat, data breaches. This implies that large firms hit by a data breach are more likely to experience subsequent breaches than small firms.
APA, Harvard, Vancouver, ISO, and other styles
10

Neto, Nelson Novaes, Stuart Madnick, Anchises Moraes G. De Paula, and Natasha Malara Borges. "Developing a Global Data Breach Database and the Challenges Encountered." Journal of Data and Information Quality 13, no. 1 (2021): 1–33. http://dx.doi.org/10.1145/3439873.

Full text
Abstract:
If the mantra “data is the new oil” of our digital economy is correct, then data leak incidents are the critical disasters in the online society. The initial goal of our research was to present a comprehensive database of data breaches of personal information that took place in 2018 and 2019. This information was to be drawn from press reports, industry studies, and reports from regulatory agencies across the world. This article identified the top 430 largest data breach incidents among more than 10,000 data breach incidents. In the process, we encountered many complications, especially regarding the lack of standardization of reporting. This article should be especially interesting to the readers of JDIQ because it describes both the range of data quality and consistency issues found as well as what was learned from the database created. The database that was created, available at https://www.databreachdb.com, shows that the number of data records breached in those top 430 incidents increased from around 4B in 2018 to more than 22B in 2019. This increase occurred despite the strong efforts from regulatory agencies across the world to enforce strict rules on data protection and privacy, such as the General Data Protection Regulation (GDPR) that went into effect in Europe in May 2018. Such regulatory effort could explain the reason why there is such a large number of data breach cases reported in the European Union when compared to the U.S. (more than 10,000 data breaches publicly reported in the U.S. since 2018, while the EU reported more than 160,000 1 data breaches since May 2018). However, we still face the problem of an excessive number of breach incidents around the world. This research helps to understand the challenges of proper visibility of such incidents on a global scale. The results of this research can help government entities, regulatory bodies, security and data quality researchers, companies, and managers to improve the data quality of data breach reporting and increase the visibility of the data breach landscape around the world in the future.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Data Breach"

1

Goode, Sigi, Hartmut Hoehle, Viswanath Venkatesh, and Susan A. Brown. "USER COMPENSATION AS A DATA BREACH RECOVERY ACTION: AN INVESTIGATION OF THE SONY PLAYSTATION NETWORK BREACH." SOC INFORM MANAGE-MIS RES CENT, 2017. http://hdl.handle.net/10150/625478.

Full text
Abstract:
Drawing on expectation confirmation research, we develop hypotheses regarding the effect of compensation on key customer outcomes following a major data breach and consequent service recovery effort. Data were collected in a longitudinal field study of Sony customers during their data breach in 2011. A total of 144 customers participated in the two-phase data collection that began when the breach was announced and concluded after reparations were made. Using polynomial modeling and response surface analysis, we demonstrate that a modified assimilation-contrast model explained perceptions of service quality and continuance intention and a generalized negativity model explained repurchase intention. The results of our work contribute to research on data breaches and service failure by demonstrating the impacts of compensation on customer outcomes. We discuss theoretical and practical implications.
APA, Harvard, Vancouver, ISO, and other styles
2

Galletti, Thomas. "Data breach - services for threat detection, analysis and response." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7026/.

Full text
Abstract:
Nel mondo della sicurezza informatica, le tecnologie si evolvono per far fronte alle minacce. Non è possibile prescindere dalla prevenzione, ma occorre accettare il fatto che nessuna barriera risulterà impenetrabile e che la rilevazione, unitamente ad una pronta risposta, rappresenta una linea estremamente critica di difesa, ma l’unica veramente attuabile per poter guadagnare più tempo possibile o per limitare i danni. Introdurremo quindi un nuovo modello operativo composto da procedure capaci di affrontare le nuove sfide che il malware costantemente offre e allo stesso tempo di sollevare i comparti IT da attività onerose e sempre più complesse, ottimizzandone il processo di comunicazione e di risposta.
APA, Harvard, Vancouver, ISO, and other styles
3

Bernabè, Stefania. "Data Breach: definizione, analisi, soluzioni e casistiche riguardanti le violazioni di dati personali." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.

Find full text
Abstract:
L'elaborato presentato ha l'obiettivo di esporre e definire le violazioni di dati personali (conosciute anche con il termine Data Breach) e la loro gestione sia dal punto di vista normativo, che dal punto di vista informatico, esplicitando soluzioni utili per prevenire tali irregolarità. Inoltre è stato illustrato il Regolamento Europeo in materia di Protezione dei Dati Personali (GDPR), relativo alle persone fisiche con riguardo al trattamento e alla libera circolazione dei dati personali, proseguendo poi con l'esposizione di indicazioni tratte dalle Linee guida sulla notifica delle violazioni di dati personali ai sensi del regolamento (UE) 2016/679 riguardanti le misure e le pratiche da adottare nel caso in cui ci si renda conto di aver subito una violazione, in modo da poter notificare nel più breve tempo possibile l'accaduto per poter attuare misure contenitive adeguate. In chiusura dell'elaborato sono stati riportati due differenti casi di violazioni di dati, nelle modalità più chiare possibili, utilizzando materiale reperito in rete o concesso da tecnici esperti nel settore. Da quest'ultima parte emerge quanto possa essere semplice incombere in un data breach, anche se si dispone di tecniche di protezione di ultima generazione. Nel corso dell'elaborato è stato documentato quando sia importante essere pronti a notificare l'accaduto, per poter applicare prontamente misure tecniche ed organizzative conformi a limitare il danno subito e provvedere ad un pronto intervento di aggiornamento e manutenzione dei sistemi danneggiati.
APA, Harvard, Vancouver, ISO, and other styles
4

Smith, Tanshanika Turner. "Examining Data Privacy Breaches in Healthcare." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2623.

Full text
Abstract:
Healthcare data can contain sensitive, personal, and confidential information that should remain secure. Despite the efforts to protect patient data, security breaches occur and may result in fraud, identity theft, and other damages. Grounded in the theoretical backdrop of integrated system theory, the purpose of this study was to determine the association between data privacy breaches, data storage locations, business associates, covered entities, and number of individuals affected. Study data consisted of secondary breach information retrieved from the Department of Health and Human Services Office of Civil Rights. Loglinear analytical procedures were used to examine U.S. healthcare breach incidents and to derive a 4-way loglinear model. Loglinear analysis procedures included in the model yielded a significance value of 0.000, p > .05 for the both the likelihood ratio and Pearson chi-square statistics indicating that an association among the variables existed. Results showed that over 70% of breaches involve healthcare providers and revealed that security incidents often consist of electronic or other digital information. Findings revealed that threats are evolving and showed that likely factors other than data loss and theft contribute to security events, unwanted exposure, and breach incidents. Research results may impact social change by providing security professionals with a broader understanding of data breaches required to design and implement more secure and effective information security prevention programs. Healthcare leaders might affect social change by utilizing findings to further the security dialogue needed to minimize security risk factors, protect sensitive healthcare data, and reduce breach mitigation and incident response costs.
APA, Harvard, Vancouver, ISO, and other styles
5

Garcia, Michael Erik. "The Economics of Data Breach: Asymmetric Information and Policy Interventions." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1365784884.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Burdon, Mark. "The conceptual and operational compatibility of data breach notification and information privacy laws." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/47512/1/Mark_Burdon_Thesis.pdf.

Full text
Abstract:
Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.
APA, Harvard, Vancouver, ISO, and other styles
7

Ofori-Duodu, Michael Samuel. "Exploring Data Security Management Strategies for Preventing Data Breaches." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.

Full text
Abstract:
Insider threat continues to pose a risk to organizations, and in some cases, the country at large. Data breach events continue to show the insider threat risk has not subsided. This qualitative case study sought to explore the data security management strategies used by database and system administrators to prevent data breaches by malicious insiders. The study population consisted of database administrators and system administrators from a government contracting agency in the northeastern region of the United States. The general systems theory, developed by Von Bertalanffy, was used as the conceptual framework for the research study. The data collection process involved interviewing database and system administrators (n = 8), organizational documents and processes (n = 6), and direct observation of a training meeting (n = 3). By using methodological triangulation and by member checking with interviews and direct observation, efforts were taken to enhance the validity of the findings of this study. Through thematic analysis, 4 major themes emerged from the study: enforcement of organizational security policy through training, use of multifaceted identity and access management techniques, use of security frameworks, and use of strong technical control operations mechanisms. The findings of this study may benefit database and system administrators by enhancing their data security management strategies to prevent data breaches by malicious insiders. Enhanced data security management strategies may contribute to social change by protecting organizational and customer data from malicious insiders that could potentially lead to espionage, identity theft, trade secrets exposure, and cyber extortion.
APA, Harvard, Vancouver, ISO, and other styles
8

Kongnso, Fedinand Jaiventume. "Best Practices to Minimize Data Security Breaches for Increased Business Performance." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1825.

Full text
Abstract:
In the United States, businesses have reported over 2,800 data compromises of an estimated 543 million records, with security breaches costing firms approximately $7.2 million annually. Scholars and industry practitioners have indicated a significant impact of security breaches on consumers and organizations. However, there are limited data on the best practices for minimizing the impact of security breaches on organizational performance. The purpose of this qualitative multicase study was to explore best practices technology leaders use to minimize data security breaches for increased business performance. Systems theory served as the conceptual framework for this study. Fourteen participants were interviewed, including 2 technology executives and 5 technical staff, each from a banking firm in the Northcentral United States and a local government agency in the Southcentral United States. Data from semistructured interviews, in addition to security and privacy policy statements, were analyzed for methodological triangulation. Four major themes emerged: a need for implementation of security awareness education and training to mitigate insider threats, the necessity of consistent organization security policies and procedures, an organizational culture promoting data security awareness, and an organizational commitment to adopt new technologies and innovative processes. The findings may contribute to the body of knowledge regarding best practices technology leaders can use for securing organizational data and contribute to social change since secure organizational data might reduce consumer identity theft.
APA, Harvard, Vancouver, ISO, and other styles
9

Giwah, Anthony Duke. "Empirical Assessment of Mobile Device Users’ Information Security Behavior towards Data Breach: Leveraging Protection Motivation Theory." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1073.

Full text
Abstract:
User information security behavior has been an area of growing demand in information systems (IS) research. Unfortunately, most of the previous research done in user information security behavior have been in broad contexts, therefore creating a gap in the literature of similar research that focuses on specific emerging technologies and trends. With the growing reliance on mobile devices to increase the flexibility, speed and efficiency in how we work, communicate, shop, seek information and entertain ourselves, it is obvious that these devices have become data warehouses and platform for data in transit. This study was an empirical and quantitative study that gathered data leveraging a web-survey. Prior to conducting the survey for the main data collection, a Delphi study and pilot study were conducted. Convenience sampling was the category of nonprobability sampling design used to gather data. The 7-Point Likert Scale was used on all survey items. Pre-analysis data screening was conducted prior to data analysis. The Partial Least Square Structural Equation Modeling (PLS-SEM) was used to analyze the data gathered from a total of 390 responses received. The results of this study showed that perceived threat severity has a negative effect on protection motivation, while perceived threat susceptibility has a positive effect on protection motivation. Contrarily, the results from this study did not show that perceived response cost influences protection motivation. Response efficacy and mobile self-efficacy had a significant positive influence on protection motivation. Mobile device security usage showed to be significantly influenced positively by protection motivation. This study brings additional insight and theoretical implications to the existing literature. The findings reveal the PMT’s capacity to predict user behavior based on threat and coping appraisals within the context of mobile device security usage. Additionally, the extension of the PMT for the research model of this study implies that mobile devices users also can take recommended responses to protect their devices from security threats.
APA, Harvard, Vancouver, ISO, and other styles
10

Luster, Eric L. "Reducing Internal Theft and Loss in Small Businesses." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5748.

Full text
Abstract:
Every year, several documented data breaches happen in the United States, resulting in the exposure of millions of electronic records. The purpose of this single-case study was to explore strategies some information technology managers used to monitor employees and reduce internal theft and loss. The population for this study consisted of 5 information technology managers who work within the field of technology in the southwestern region of the United States. Participants were selected using purposeful sampling. The conceptual framework for this study included elements from information and communication boundary theories. Data were collected from semistructured interviews, company standard operating procedures, and policy memorandums, which provided detailed information about technology managers' experiences with data security. The collected data were transcribed, member checked, and triangulated to validate credibility and trustworthiness. Two themes emerged from data analysis: the development of policies, procedures, and standards on internal theft and loss, and the use of technology-driven systems to monitor employees and control theft and loss. Technology-based interventions allow leaders within an organization to protect the integrity of systems and networks while monitoring employee actions and behaviors. Study findings could be used by leaders of business organizations to identify and respond to theft and fraud in the workplace. Business leaders may also be able to use study findings to develop employee monitoring programs that help to prevent the loss of both organizational and customers' data, enhancing public trust as a potential implication for positive social change.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Data Breach"

1

Thomas, Liisa M. Thomas on data breach: A practical guide to handling data breach notifications worldwide. 2nd ed. Thomson Reuters/Westlaw, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Joseph, Jonathan M. Data breach notification laws: A fifty state survey. American Health Lawyers Association, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

P, Hutchins John, Caiola Anne P, and American Bar Association. Section of Science & Technology Law., eds. U.S. data breach notification law: State by state. American Bar Association, Section of Science & Technology Law, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Johnson, Anne, and Lynette I. Millett, eds. Data Breach Aftermath and Recovery for Individuals and Institutions. National Academies Press, 2016. http://dx.doi.org/10.17226/23559.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Alexander, Philip. Data breach disclosure laws: A state-by-state perspective. 3rd ed. Aspatore Books, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ballon, Ian C. The complete state security breach notification compliance handbook. West, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Institute, Pennsylvania Bar. The final HITECH regs: Dramatic impact on HIPAA privacy, security & breach notification requirements. Pennsylvania Bar Institute, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Moriguchi, Chiaki. Did American welfare capitalists breach their implicit contracts?: Preliminary findings from company-level data, 1920-1940. National Bureau of Economic Research, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United States. Congress. Senate. Committee on the Judiciary. Data Breach Notification Act: Report together with additional views (to accompany S. 139) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bruijn, Hans. The Governance of Privacy. Amsterdam University Press, 2021. http://dx.doi.org/10.5117/9789463729673.

Full text
Abstract:
We can hardly underestimate the importance of privacy in our data-driven world. Privacy breaches are not just about disclosing information. Personal data is used to profile and manipulate us – sometimes on such a large scale that it affects society as a whole. What can governments do to protect our privacy? In The Governance of Privacy Hans de Bruijn first analyses the complexity of the governance challenge, using the metaphor of a journey. At the start, users have strong incentives to share data. Harvested data continue the journey that might lead to a privacy breach, but not necessarily – it can also lead to highly valued services. That is why both preparedness at the start of the journey and resilience during the journey are crucial to privacy protection. The book then explores three strategies to deal with governments, the market, and society. Governments can use the power of the law; they can exploit the power of the market by stimulating companies to compete on privacy; and they can empower society, strengthening its resilience in a data-driven world.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Data Breach"

1

Finnigan, Pete. "Data Breach." In Oracle Incident Response and Forensics. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3264-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tang, Alan. "Data Breach Handling." In Privacy in Practice. CRC Press, 2022. http://dx.doi.org/10.1201/9781003225089-34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Amanulla, Areeb, and Saadik Niyaz. "Marriot Data Breach." In Information Technology Security and Risk Management. CRC Press, 2024. http://dx.doi.org/10.1201/9781003264415-35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Makkada, Vignesh, and Ishani Rai. "Capital One Data Breach." In Information Technology Security and Risk Management. CRC Press, 2024. http://dx.doi.org/10.1201/9781003264415-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Valentine, J. Andrew. "Investigating Large-Scale Data Breach Cases." In Springer’s Forensic Laboratory Science Series. Humana Press, 2010. http://dx.doi.org/10.1007/978-1-60761-772-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Liyuan, Meng Han, Yan Wang, and Yiyun Zhou. "Understanding Data Breach: A Visualization Aspect." In Wireless Algorithms, Systems, and Applications. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94268-1_81.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Amanulla, Areeb, and Saadik Niyaz. "Data Breach at Nintendo Co. Ltd." In Information Technology Security and Risk Management. CRC Press, 2024. http://dx.doi.org/10.1201/9781003264415-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hua, Jing, and Ping Wang. "Security Vulnerabilities in Facebook Data Breach." In Advances in Intelligent Systems and Computing. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-56599-1_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wong, Rebecca. "Proposed Data Protection Regulation 2012: Data Security Breach Notifications." In Data Security Breaches and Privacy in Europe. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Abela, Stefan. "Management of a Breach of Data Confidentiality." In Leadership and Management in Healthcare. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-21025-9_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Data Breach"

1

Dolhopolov, Serhii, Tetyana Honcharenko, Olena Fedusenko, Volodymyr Khrolenko, Vladyslav Hots, and Volodymyr Golenkov. "Neural Network Threat Detection Systems for Data Breach Protection." In 2024 IEEE 4th International Conference on Smart Information Systems and Technologies (SIST). IEEE, 2024. http://dx.doi.org/10.1109/sist61555.2024.10629526.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Prasad, Medisetti Durga, Mantha Sri N. V. R. Snigdha Sindusha, Nadendla Jahnavi, Mohammed Waajid Ali, and S. Anjali Devi. "Enabling Cybersecurity Defenses: Advanced Endpoint Detection, Data Breach Identification, and Anomaly Resolution." In 2024 8th International Conference on Inventive Systems and Control (ICISC). IEEE, 2024. http://dx.doi.org/10.1109/icisc62624.2024.00084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

O'Neil, Fer. "Target data breach." In SIGDOC '15: The 33rd ACM International Conference on the Design of Communication. ACM, 2015. http://dx.doi.org/10.1145/2775441.2775456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Payton, Anne M. "Data security breach." In the 3rd annual conference. ACM Press, 2006. http://dx.doi.org/10.1145/1231047.1231084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

K, Periasamy J., Cindy Catherine A, Elamathi R, and Subhiksha S. "Guarding Against Data Breach." In 2023 Intelligent Computing and Control for Engineering and Business Systems (ICCEBS). IEEE, 2023. http://dx.doi.org/10.1109/iccebs58601.2023.10449222.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Morgan, Montrel D., Md Minhaz Chowdhury, and Shadman Latif. "Protecting Business from Data Breach." In 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME). IEEE, 2021. http://dx.doi.org/10.1109/iceccme52200.2021.9590975.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Varshney, Shipra, Dheeraj Munjal, Orijit Bhattacharya, Shagun Saboo, and Nikunj Aggarwal. "Big Data Privacy Breach Prevention Strategies." In 2020 IEEE International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC). IEEE, 2020. http://dx.doi.org/10.1109/isssc50941.2020.9358878.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Srinivasan, S. "Privacy Protection and Data Breaches." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2261.

Full text
Abstract:
Data breach is the act of accessing a central data repository without the consent of the data owner. Data breaches are occurring frequently and involve millions of records. Major breaches have been reported since 2005. Often data breaches occur due to someone with malicious intent accessing the stored data. In this paper we look at the types of data breaches and how they impact people’s privacy, we introduce a data protection model with the goal of protecting people’s privacy. Given today’s mobile information needs it is essential to have access to personal data. Social networks are making it difficult to keep personal information private. We provide several different summaries to show the effect of data breaches and data losses on people. We conclude this paper with a set of recommendations to protect people’s privacy.
APA, Harvard, Vancouver, ISO, and other styles
9

Kamurthi, Ravi Teja, Shakti Raj Chopra, and Rahul Sharma. "Confrontation-Wi-Fi Risks and Data Breach." In 2021 International Conference on Emerging Smart Computing and Informatics (ESCI). IEEE, 2021. http://dx.doi.org/10.1109/esci50559.2021.9397047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rahulamathavan, Yogachandran, Muttukrishnan Rajarajan, Omer F. Rana, Malik S. Awan, Pete Burnap, and Sajal K. Das. "Assessing Data Breach Risk in Cloud Systems." In 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 2015. http://dx.doi.org/10.1109/cloudcom.2015.58.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Data Breach"

1

Belangia, David Warren. Data Breach Preparation. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1172869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gaines, Roger, Stephen Sanborn, William McAnally, and Christopher Wallen. Mississippi River Adaptive Hydraulics model development and evaluation, Commerce to New Madrid, Missouri, Reach. Engineer Research and Development Center (U.S.), 2020. http://dx.doi.org/10.21079/11681/39519.

Full text
Abstract:
A numerical, two-dimensional hydrodynamic model of the Mississippi River, from Thebes, IL, to Tiptonville, TN (128 miles/206 km), was developed using the Adaptive Hydraulics model. The study objective assessed current patterns and flow distributions and their possible impacts on navigation due to Birds Point New Madrid Floodway (BPNMF) operations and the Len Small (LS) levee break. The model was calibrated to stage, discharge, and velocity data for the 2011, 2015–2016, and 2017 floods. The calibrated model was used to run four scenarios, with the BPNMF and the LS breach alternately active/open and inactive/closed. Effects from the LS breach being open are increased river velocities upstream of the breach, decreased velocities from the breach to Thompson Landing, no effects on velocity below the confluence, and cross-current velocities greater than 3.28 ft/s (1.0 m/s) within 1186.8 ft (60 m) of the bankline revetment. Effects from BPNMF operation are increased river velocities above the confluence, decreased velocities from the BPNMF upper inflow crevasse (Upper Fuseplug) to New Madrid, cross-current velocities greater than 1.5 ft/s (0.5 m/s) only near the right bank where flow re-enters the river from the BPNMF lower inflow/outflow crevasse Number 2 (Lower Fuseplug) and St. Johns Bayou.
APA, Harvard, Vancouver, ISO, and other styles
3

Brauer, Edward, Stephen Sanborn, Thomas Pokrefke, William McAnally, and Christopher Wallen. Mississippi River AdH model modification and evaluation, Thebes, Illinois, to Birds Point, Missouri, Reach. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48758.

Full text
Abstract:
A calibrated hydrodynamic and sediment transport model of the Upper Mississippi River, from Thebes, Illinois, to Birds Point, Missouri, was created to investigate hydraulics and sediment transport in the river channel and across the Dogtooth Island Peninsula (DIP) as the result of the Len Small levee breach. A hydrodynamic model was developed for the reach and calibrated to stage and breach outflow discharge data for the floods of 2011, 2015–2016, and 2017. The hydrodynamic model was used to investigate breach outflow discharges and shear stress distribution over the DIP. Soil and geologic maps were investigated to determine soil parameters and the long-term stability of soil formations on the DIP. The Upper Mississippi River sediment transport model was built upon the hydrodynamic model and soil mapping efforts. The sediment transport model was calibrated to the 2015 and 2017 flood events. Calibration data were limited to changes in elevation, which were then areally averaged, computed from comprehensive channel surveys and lidar data for the DIP. This model provides a solid foundation for comparing alternative measures to minimize further erosion of the DIP and for analyzing the risk of a channel cutoff occurring.
APA, Harvard, Vancouver, ISO, and other styles
4

Moriguchi, Chiaki. Did American Welfare Capitalists Breach their Implicit Contracts? Preliminary Findings from Company-level Data, 1920-1940. National Bureau of Economic Research, 2003. http://dx.doi.org/10.3386/w9868.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

de Abreu Castro, Jonas, and Mariana Cunha e Melo. Password management: Where LastPass got it wrong and how to approach the issue in organizations. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/ce3fc7.

Full text
Abstract:
In August 2022, LastPass suffered two cyberattacks that breached customer data and encrypted passwords. LastPass acknowledged the attacks, but their communication was not transparent enough. In November 2022, a follow-up attack compromised customer data further. LastPass communicated that this was a low-risk attack and that customers did not need to take any action. However, in December 2022, LastPass admitted the actual scale of the breach, and that all customer vaults were compromised. It is important to note that every company suffers frequent attacks, but the proper security posture under this type of attack is to assume that everything will eventually get compromised. The incident makes a case for why companies should always deploy additional defenses, such as employing security keys, to stay secure in the long term.
APA, Harvard, Vancouver, ISO, and other styles
6

Sullivan, T. M., R. R. Kinsey, A. Aronson, M. Divadeenam, and R. J. MacKinnon. BLT-MS (Breach, Leach, and Transport -- Multiple Species) data input guide. A computer model for simulating release of contaminants from a subsurface low-level waste disposal facility. Office of Scientific and Technical Information (OSTI), 1996. http://dx.doi.org/10.2172/414349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

MacKinnon, R. J., T. M. Sullivan, and R. R. Kinsey. BLT-EC (Breach, Leach and Transport-Equilibrium Chemistry) data input guide. A computer model for simulating release and coupled geochemical transport of contaminants from a subsurface disposal facility. Office of Scientific and Technical Information (OSTI), 1997. http://dx.doi.org/10.2172/491476.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lin, Yawei, Yi Chen, Rongrong Liu, and Baohua Cao. Effect of exercise on rehabilitation of breast cancer surgery patients: A systematic review and meta-analysis of randomized controlled trials. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, 2022. http://dx.doi.org/10.37766/inplasy2022.10.0065.

Full text
Abstract:
Review question / Objective: Exercise after breast cancer surgery has proved beneficial to rehabilitation. We evaluate the best exercise for different post-surgery complications. Information sources: China National Knowledge Infrastructure, Wanfang Data Knowledge Service Platform, VIP China Science and Technology Journal Database, China Biology Medicine, EMBASE and PubMed databases were searched. Combinations of breast cancer (“breast tumor”,“breast carcinoma”,“mammary carcinoma”,“breast neoplasm”) and rehabilitation exercise (“exercise”,“physical therapy”) were employed when screening abstracts/keywords of articles. Two researchers independently searched, read the title and abstract of the literature, read the full text of the preliminary included literature, and extracted the data. In case of divergence, a third researcher was consulted.
APA, Harvard, Vancouver, ISO, and other styles
9

Fisher, Bill. Data Confidentiality: Identifying and Protecting Assets Against Data Breaches. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1800-28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fisher, Bill. Data Confidentiality: Detect, Respond to, and Recover from Data Breaches. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1800-29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography