Showing 61 - 80 results of 341 for search '"data breach"', query time: 0.35s Refine Results
  1. 61
  2. 62
  3. 63

    Serious Cyberattack Raises Questions About GDPR Application in Finland by Susanna Lindroos-Hovinheimo

    “…Because of the seriousness of this data breach, the case is likely to become a landmark in Finnish data protection law and a Europe-wide reference point for the application of GDPR rules in data breach situations.…”
    Get full text
    Article
  4. 64

    Essays on legitimacy in the information systems context by Faheem Ahmed Shaikh

    Published 2021
    “…A data breach is one such crisis event. A data breach might lead to unauthorized access of private individual data that might be put to illicit use, increasing the potential for harm. …”
    Get full text
    Thesis-Doctor of Philosophy
  5. 65

    SISTEM INFORMASI BIMBINGAN KONSELING SMA NEGERI 6 PURWOREJO by , NIDYA TARA MUSTIKA, , Nur Rokhman,S.Si,M.kom

    Published 2013
    “…In the systems, re-processing takes record student data and records data breach, as well as preparing report record student violation. …”
    Thesis
  6. 66

    Measuring the Cost of Software Vulnerabilities by Afsah Anwar, Aminollah Khormali, Jinchun Choi, Hisham Alasmary, Sung Choi, Saeed Salem, DaeHun Nyang, David Mohaisen

    Published 2020-06-01
    “…Enterprises are increasingly considering security as an added cost, making it necessary for those enterprises to see a tangible incentive in adopting security measures. Despite data breach laws, prior studies have suggested that only 4% of reported data breach incidents have resulted in litigation in federal courts, showing the limited legal ramifications of security breaches and vulnerabilities. …”
    Get full text
    Article
  7. 67

    A Secure and Practical Authentication Scheme Using Personal Devices by Abdulrahman Alhothaily, Chunqiang Hu, Arwa Alrawais, Tianyi Song, Xiuzhen Cheng, Dechang Chen

    Published 2017-01-01
    “…It not only is secure against password-related attacks, but also can resist replay attacks, shoulder-surfing attacks, phishing attacks, and data breach incidents.…”
    Get full text
    Article
  8. 68

    Facebook Cyber Security Evaluation by Sun Jinnan

    Published 2023-01-01
    “…The evaluation will first list the research of Facebook’s data breach from public information, then will show the analysis of missing control based on the NIST Framework and provide a logical connection between them.…”
    Get full text
    Article
  9. 69

    An analysis of security challenges and their perspective solutions for cloud computing and IoT by Muhammad Muhammad, Tahir Alyas, Faraz Ahmad, Fatima Butt, Wajahat Qazi, Shazia Saqib

    Published 2021-04-01
    “…Our theoretical integrated IoT-cloud theoretical solution is able to achieve unauthorized access control and data breach. RESULTS: Internet of things and cloud computing has intensively used by several real-time applications. …”
    Get full text
    Article
  10. 70

    Data obfuscation by logic synthesis by Tan, Stella Pei Fen

    Published 2016
    “…With the rise in data breach cases in recent years, storing and managing confidential data is becoming increasingly difficult for many individuals and companies. …”
    Get full text
    Final Year Project (FYP)
  11. 71

    Review of Managing Data for Patron Privacy: Comprehensive Strategies for Libraries by Kristin Briney and Becky Yoose by Levi Dolan

    Published 2022-12-01
    “…It addresses a selection of areas where librarians can introduce protocols for minimizing data breach risks through improving data management skills. …”
    Get full text
    Article
  12. 72

    The use of data protection regulatory actions as a data source for privacy economics by Ceross, A, Simpson, A

    Published 2017
    “…It is well understood that security informatics is constrained by the availability of reliable data sources, which limits the development of robust methods for measuring the impact of data breaches. To date, empirical data breach analysis has largely relied upon the use of economic and financial data associated with an organisation as a measure of impact. …”
    Conference item
  13. 73

    Genetic Privacy and Data Protection: A Review of Chinese Direct-to-Consumer Genetic Test Services by Li Du, Meng Wang

    Published 2020-04-01
    “…Lastly, 21.7% of providers clearly stated their liabilities in the event of a data breach, placing more emphasis on the providers’ exemption from any liability.ConclusionsCurrently, the Chinese DTC genetic testing business is running in a regulatory vacuum, governed by self-regulation. …”
    Get full text
    Article
  14. 74

    Ethics for Artificial Intelligence: Focus on the Use of Radiology Images by Seong Ho Park

    Published 2022-07-01
    “…The need for data sharing makes the data security and privacy protection even more important as data sharing increases the risk of data breach.…”
    Get full text
    Article
  15. 75

    Information Security Management by Somepalli Sri Harsha, Tangella Sai Kishore Reddy, Yalamanchili Santosh

    Published 2020-08-01
    “…It is easy for an organization to experience a data breach that can seriously compromise their data. …”
    Get full text
    Article
  16. 76

    Fast Decentralized Data Analytics in IoT Wireless Networks by Liang Zhao

    Published 2019-01-01
    “…Cloud) based solution, our proposed decentralized framework can avoid the problems raised in data collection such as the constraint in high latency, and the associated data breach and privacy issues. The invented mechanism enables each IoT node in the network to independently obtain the global optimal analytics with local computation and communication. …”
    Get full text
    Article
  17. 77

    Hotel data privacy: strategies to reduce customers' emotional violations, privacy concerns, and switching intention by Yu, Jongsik, Moon, Hyoungeun, Chua, Bee-Lia, Han, Heesup

    Published 2022
    “…The results of the analysis show that data privacy reduces data breach and access vulnerability, which increases privacy concerns, emotional violation, and switching intention. …”
    Article
  18. 78

    Legal issues concerning the circulation and processing of data in the digital age by Chiara Iorio

    Published 2022-01-01
    “…Then, the liability regime pursuant to Article 82 GDPR will be examined, with particular reference to data breach committed by an Internet service provider and in the context of a Blockchain. …”
    Get full text
    Article
  19. 79

    Cyber-threat detection and analyzer by Lim, Gerald Jun Ji

    Published 2019
    “…Cyberthreats such as data breach, ransomware, Denial-of-Service (DoS)/Distributed-Denial-of-Service (DDoS) and many other types of attacks targeting everyone around the world is on the rise. …”
    Get full text
    Final Year Project (FYP)
  20. 80

    Information security awareness: case study in stock-broking company by Mohd. Adnan, Faizatul Akma, Che Mohd. Yusoff, Rasimah, Maarop, Nurazean, Megat Zainuddin, Norziha, Ibrahim, Roslina

    Published 2015
    “…However, lack of security awareness among staff who handle the client’s data has the potential to cause data breach or information violation. The study was conducted to determine the information security awareness among staff at a universal stock-broking company in Kuala Lumpur. …”
    Conference or Workshop Item