Academic literature on the topic 'Data Breach'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data Breach.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Data Breach"
Du, Shuili, Kholekile L. Gwebu, Jing Wang, and Kun Yu. "Differential Market Reaction to Data Security Breaches: A Screening Perspective." Communications of the Association for Information Systems 54 (2024): 376–401. http://dx.doi.org/10.17705/1cais.05414.
Full textRichardson, Vernon J., Rodney E. Smith, and Marcia Weidenmier Watson. "Much Ado about Nothing: The (Lack of) Economic Impact of Data Privacy Breaches." Journal of Information Systems 33, no. 3 (2019): 227–65. http://dx.doi.org/10.2308/isys-52379.
Full textSaleem, Hamza, and Muhammad Naveed. "SoK: Anatomy of Data Breaches." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (2020): 153–74. http://dx.doi.org/10.2478/popets-2020-0067.
Full textCheng, Xu (Joyce), and Stephanie Walton. "Do Nonprofessional Investors Care About How and When Data Breaches are Disclosed?" Journal of Information Systems 33, no. 3 (2019): 163–82. http://dx.doi.org/10.2308/isys-52410.
Full textMohammed, Zareef. "Data breach recovery areas: an exploration of organization's recovery strategies for surviving data breaches." Organizational Cybersecurity Journal: Practice, Process and People 2, no. 1 (2021): 41–59. http://dx.doi.org/10.1108/ocj-05-2021-0014.
Full textAivazpour, Zahra, Rohit Valecha, and Rajarshi Chakraborty. "Data Breaches." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 53, no. 4 (2022): 65–82. http://dx.doi.org/10.1145/3571823.3571829.
Full textAnsar, Kainat, Mansoor Ahmed, Markus Helfert, and Jungsuk Kim. "Blockchain-Based Data Breach Detection: Approaches, Challenges, and Future Directions." Mathematics 12, no. 1 (2023): 107. http://dx.doi.org/10.3390/math12010107.
Full textEvans, Corey A., Brooke Beyer, Terry W. Mason, and Ashley N. West. "Data Breach Severity and Debt Market Responses." Accounting and the Public Interest 23, no. 1 (2023): 76–109. http://dx.doi.org/10.2308/api-2023-003.
Full textJohnson, Mark, Min Jung Kang, and Tolani Lawson. "Stock Price Reaction to Data Breaches." Journal of Finance Issues 16, no. 2 (2017): 1–13. http://dx.doi.org/10.58886/jfi.v16i2.2263.
Full textNeto, Nelson Novaes, Stuart Madnick, Anchises Moraes G. De Paula, and Natasha Malara Borges. "Developing a Global Data Breach Database and the Challenges Encountered." Journal of Data and Information Quality 13, no. 1 (2021): 1–33. http://dx.doi.org/10.1145/3439873.
Full textDissertations / Theses on the topic "Data Breach"
Goode, Sigi, Hartmut Hoehle, Viswanath Venkatesh, and Susan A. Brown. "USER COMPENSATION AS A DATA BREACH RECOVERY ACTION: AN INVESTIGATION OF THE SONY PLAYSTATION NETWORK BREACH." SOC INFORM MANAGE-MIS RES CENT, 2017. http://hdl.handle.net/10150/625478.
Full textGalletti, Thomas. "Data breach - services for threat detection, analysis and response." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7026/.
Full textBernabè, Stefania. "Data Breach: definizione, analisi, soluzioni e casistiche riguardanti le violazioni di dati personali." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Find full textSmith, Tanshanika Turner. "Examining Data Privacy Breaches in Healthcare." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2623.
Full textGarcia, Michael Erik. "The Economics of Data Breach: Asymmetric Information and Policy Interventions." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1365784884.
Full textBurdon, Mark. "The conceptual and operational compatibility of data breach notification and information privacy laws." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/47512/1/Mark_Burdon_Thesis.pdf.
Full textOfori-Duodu, Michael Samuel. "Exploring Data Security Management Strategies for Preventing Data Breaches." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.
Full textKongnso, Fedinand Jaiventume. "Best Practices to Minimize Data Security Breaches for Increased Business Performance." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1825.
Full textGiwah, Anthony Duke. "Empirical Assessment of Mobile Device Users’ Information Security Behavior towards Data Breach: Leveraging Protection Motivation Theory." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1073.
Full textLuster, Eric L. "Reducing Internal Theft and Loss in Small Businesses." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5748.
Full textBooks on the topic "Data Breach"
Thomas, Liisa M. Thomas on data breach: A practical guide to handling data breach notifications worldwide. 2nd ed. Thomson Reuters/Westlaw, 2014.
Find full textJoseph, Jonathan M. Data breach notification laws: A fifty state survey. American Health Lawyers Association, 2011.
Find full textP, Hutchins John, Caiola Anne P, and American Bar Association. Section of Science & Technology Law., eds. U.S. data breach notification law: State by state. American Bar Association, Section of Science & Technology Law, 2007.
Find full textJohnson, Anne, and Lynette I. Millett, eds. Data Breach Aftermath and Recovery for Individuals and Institutions. National Academies Press, 2016. http://dx.doi.org/10.17226/23559.
Full textAlexander, Philip. Data breach disclosure laws: A state-by-state perspective. 3rd ed. Aspatore Books, 2012.
Find full textBallon, Ian C. The complete state security breach notification compliance handbook. West, 2009.
Find full textInstitute, Pennsylvania Bar. The final HITECH regs: Dramatic impact on HIPAA privacy, security & breach notification requirements. Pennsylvania Bar Institute, 2013.
Find full textMoriguchi, Chiaki. Did American welfare capitalists breach their implicit contracts?: Preliminary findings from company-level data, 1920-1940. National Bureau of Economic Research, 2003.
Find full textUnited States. Congress. Senate. Committee on the Judiciary. Data Breach Notification Act: Report together with additional views (to accompany S. 139) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 2010.
Find full textBruijn, Hans. The Governance of Privacy. Amsterdam University Press, 2021. http://dx.doi.org/10.5117/9789463729673.
Full textBook chapters on the topic "Data Breach"
Finnigan, Pete. "Data Breach." In Oracle Incident Response and Forensics. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3264-4_1.
Full textTang, Alan. "Data Breach Handling." In Privacy in Practice. CRC Press, 2022. http://dx.doi.org/10.1201/9781003225089-34.
Full textAmanulla, Areeb, and Saadik Niyaz. "Marriot Data Breach." In Information Technology Security and Risk Management. CRC Press, 2024. http://dx.doi.org/10.1201/9781003264415-35.
Full textMakkada, Vignesh, and Ishani Rai. "Capital One Data Breach." In Information Technology Security and Risk Management. CRC Press, 2024. http://dx.doi.org/10.1201/9781003264415-6.
Full textValentine, J. Andrew. "Investigating Large-Scale Data Breach Cases." In Springer’s Forensic Laboratory Science Series. Humana Press, 2010. http://dx.doi.org/10.1007/978-1-60761-772-3_3.
Full textLiu, Liyuan, Meng Han, Yan Wang, and Yiyun Zhou. "Understanding Data Breach: A Visualization Aspect." In Wireless Algorithms, Systems, and Applications. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94268-1_81.
Full textAmanulla, Areeb, and Saadik Niyaz. "Data Breach at Nintendo Co. Ltd." In Information Technology Security and Risk Management. CRC Press, 2024. http://dx.doi.org/10.1201/9781003264415-3.
Full textHua, Jing, and Ping Wang. "Security Vulnerabilities in Facebook Data Breach." In Advances in Intelligent Systems and Computing. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-56599-1_22.
Full textWong, Rebecca. "Proposed Data Protection Regulation 2012: Data Security Breach Notifications." In Data Security Breaches and Privacy in Europe. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7_6.
Full textAbela, Stefan. "Management of a Breach of Data Confidentiality." In Leadership and Management in Healthcare. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-21025-9_16.
Full textConference papers on the topic "Data Breach"
Dolhopolov, Serhii, Tetyana Honcharenko, Olena Fedusenko, Volodymyr Khrolenko, Vladyslav Hots, and Volodymyr Golenkov. "Neural Network Threat Detection Systems for Data Breach Protection." In 2024 IEEE 4th International Conference on Smart Information Systems and Technologies (SIST). IEEE, 2024. http://dx.doi.org/10.1109/sist61555.2024.10629526.
Full textPrasad, Medisetti Durga, Mantha Sri N. V. R. Snigdha Sindusha, Nadendla Jahnavi, Mohammed Waajid Ali, and S. Anjali Devi. "Enabling Cybersecurity Defenses: Advanced Endpoint Detection, Data Breach Identification, and Anomaly Resolution." In 2024 8th International Conference on Inventive Systems and Control (ICISC). IEEE, 2024. http://dx.doi.org/10.1109/icisc62624.2024.00084.
Full textO'Neil, Fer. "Target data breach." In SIGDOC '15: The 33rd ACM International Conference on the Design of Communication. ACM, 2015. http://dx.doi.org/10.1145/2775441.2775456.
Full textPayton, Anne M. "Data security breach." In the 3rd annual conference. ACM Press, 2006. http://dx.doi.org/10.1145/1231047.1231084.
Full textK, Periasamy J., Cindy Catherine A, Elamathi R, and Subhiksha S. "Guarding Against Data Breach." In 2023 Intelligent Computing and Control for Engineering and Business Systems (ICCEBS). IEEE, 2023. http://dx.doi.org/10.1109/iccebs58601.2023.10449222.
Full textMorgan, Montrel D., Md Minhaz Chowdhury, and Shadman Latif. "Protecting Business from Data Breach." In 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME). IEEE, 2021. http://dx.doi.org/10.1109/iceccme52200.2021.9590975.
Full textVarshney, Shipra, Dheeraj Munjal, Orijit Bhattacharya, Shagun Saboo, and Nikunj Aggarwal. "Big Data Privacy Breach Prevention Strategies." In 2020 IEEE International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC). IEEE, 2020. http://dx.doi.org/10.1109/isssc50941.2020.9358878.
Full textSrinivasan, S. "Privacy Protection and Data Breaches." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2261.
Full textKamurthi, Ravi Teja, Shakti Raj Chopra, and Rahul Sharma. "Confrontation-Wi-Fi Risks and Data Breach." In 2021 International Conference on Emerging Smart Computing and Informatics (ESCI). IEEE, 2021. http://dx.doi.org/10.1109/esci50559.2021.9397047.
Full textRahulamathavan, Yogachandran, Muttukrishnan Rajarajan, Omer F. Rana, Malik S. Awan, Pete Burnap, and Sajal K. Das. "Assessing Data Breach Risk in Cloud Systems." In 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 2015. http://dx.doi.org/10.1109/cloudcom.2015.58.
Full textReports on the topic "Data Breach"
Belangia, David Warren. Data Breach Preparation. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1172869.
Full textGaines, Roger, Stephen Sanborn, William McAnally, and Christopher Wallen. Mississippi River Adaptive Hydraulics model development and evaluation, Commerce to New Madrid, Missouri, Reach. Engineer Research and Development Center (U.S.), 2020. http://dx.doi.org/10.21079/11681/39519.
Full textBrauer, Edward, Stephen Sanborn, Thomas Pokrefke, William McAnally, and Christopher Wallen. Mississippi River AdH model modification and evaluation, Thebes, Illinois, to Birds Point, Missouri, Reach. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48758.
Full textMoriguchi, Chiaki. Did American Welfare Capitalists Breach their Implicit Contracts? Preliminary Findings from Company-level Data, 1920-1940. National Bureau of Economic Research, 2003. http://dx.doi.org/10.3386/w9868.
Full textde Abreu Castro, Jonas, and Mariana Cunha e Melo. Password management: Where LastPass got it wrong and how to approach the issue in organizations. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/ce3fc7.
Full textSullivan, T. M., R. R. Kinsey, A. Aronson, M. Divadeenam, and R. J. MacKinnon. BLT-MS (Breach, Leach, and Transport -- Multiple Species) data input guide. A computer model for simulating release of contaminants from a subsurface low-level waste disposal facility. Office of Scientific and Technical Information (OSTI), 1996. http://dx.doi.org/10.2172/414349.
Full textMacKinnon, R. J., T. M. Sullivan, and R. R. Kinsey. BLT-EC (Breach, Leach and Transport-Equilibrium Chemistry) data input guide. A computer model for simulating release and coupled geochemical transport of contaminants from a subsurface disposal facility. Office of Scientific and Technical Information (OSTI), 1997. http://dx.doi.org/10.2172/491476.
Full textLin, Yawei, Yi Chen, Rongrong Liu, and Baohua Cao. Effect of exercise on rehabilitation of breast cancer surgery patients: A systematic review and meta-analysis of randomized controlled trials. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, 2022. http://dx.doi.org/10.37766/inplasy2022.10.0065.
Full textFisher, Bill. Data Confidentiality: Identifying and Protecting Assets Against Data Breaches. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1800-28.
Full textFisher, Bill. Data Confidentiality: Detect, Respond to, and Recover from Data Breaches. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1800-29.
Full text