Showing 101 - 120 results of 341 for search '"data breach"', query time: 0.17s Refine Results
  1. 101
  2. 102

    Securing Blockchain-Based Supply Chain Workflow against Internal and External Attacks by Sana Al-Farsi, Halima Bensmail, Spiridon Bakiras

    Published 2022-05-01
    “…Therefore, the goal of this work was to develop a methodology that enhances the protection of BSW against various internal (e.g., Stuxnet) and external (e.g., local data breach of a stakeholder) cyber threats through monitoring the stakeholder business process. …”
    Get full text
    Article
  3. 103

    Implementasi BGP dan Resource Public Key Infrastructure menggunakan BIRD untuk Keamanan Routing by Valen Brata Pranaya, Theophilus Wellem

    Published 2021-12-01
    “…This attack aims to disrupt connections between AS and divert routing to destinations that are not appropriate for crimes, such as fraud and data breach. One of the methods developed to prevent prefix hijacking is the Resource Public Key Infrastructure (RPKI). …”
    Get full text
    Article
  4. 104

    Negotiating Privacy and Mobile Socializing: Chinese University Students’ Concerns and Strategies for Using Geosocial Networking Applications by Haili Li

    Published 2020-03-01
    “…Privacy risks have significant increase with the widespread use of geosocial networking applications (GSNAs). The Facebook data breach case in 2018 triggered many users’ concerns and focused attention on the debate about the trustworthiness of GSNAs globally. …”
    Get full text
    Article
  5. 105

    Fingerprinting of Relational Databases for Stopping the Data Theft by Eesa Al Solami, Muhammad Kamran, Mohammed Saeed Alkatheiri, Fouzia Rafiq, Ahmed S. Alghamdi

    Published 2020-07-01
    “…Some recipients of this data can also become traitors by leaking the important data. As a result, the data breaches due to data leakage are also increasing. …”
    Get full text
    Article
  6. 106

    Security breaches and modifications on cybersecurity disclosures by Jacob Peng, Chang-Wei Li

    Published 2022-09-01
    “…Data: We extracted cybersecurity breach incidents from the Data Breach Database, a centralized and global database of data breaches maintained by a leading security company. …”
    Get full text
    Article
  7. 107

    Cyberterrorism as a global threat: a review on repercussions and countermeasures by Saman Iftikhar

    Published 2024-01-01
    “…The past ten years have seen several cyber-attacks around the globe including WannaCry attack (2017), Yahoo data breaches (2013–2014), OPM data breach (2015), SolarWinds supply chain attack (2020) etc. …”
    Get full text
    Article
  8. 108

    An Analytical Review of Industrial Privacy Frameworks and Regulations for Organisational Data Sharing by Seyed Ramin Ghorashi, Tanveer Zia, Michael Bewong, Yinhao Jiang

    Published 2023-11-01
    “…A key component of this study is the analysis of the Facebook–Cambridge Analytica data breach, which illustrates the significant privacy violations and their wider implications. …”
    Get full text
    Article
  9. 109

    A Hybrid Deep Learning-Driven SDN Enabled Mechanism for Secure Communication in Internet of Things (IoT) by Danish Javeed, Tianhan Gao, Muhammad Taimoor Khan, Ijaz Ahmad

    Published 2021-07-01
    “…Despite providing several benefits, the heterogeneous nature and the extensive connectivity of the devices make it a target of different cyberattacks that result in data breach and financial loss. There is a severe need to secure the IoT environment from such attacks. …”
    Get full text
    Article
  10. 110

    BiVA : Bitcoin network visualization & analysis by Oggier, Frédérique, Phetsouvanh, Silivanxay, Datta, Anwitaman

    Published 2019
    “…Its functionalities are demonstrated with a case study of extortion of Ashley Madison data breach victims.…”
    Get full text
    Get full text
    Conference Paper
  11. 111

    Trusted cloud computing framework in critical industrial application by Bamiah, Mervat Adib

    Published 2015
    “…This raises the risks of insider and outsider threats besides the data breach and misuse. A Trusted Cloud Computing Framework (TCCF) is designed to overcome these SPT concerns. …”
    Get full text
    Thesis
  12. 112

    Economic perspective analysis of protecting big data security and privacy by Tao, Hai, Md Zakirul Alam, Bhuiyan, Rahman, Md. Arafatur, Wang, Guojun, Tian, Wang, Md. Manjur, Ahmed

    Published 2019
    “…That is, do we need to protect big data in a secure, private, and most effective manner, while the growing amount of security threats, attacks, and data breaches together with the increasing market for security products arises? …”
    Get full text
    Article
  13. 113

    An empirical investigation into the information management systems at a South African financial institution by Ridoh Adonis, Bethuel Sibongiseni Ngcamu

    Published 2016-10-01
    “…Such organizations may have policies and procedures, strategies and systems in place in order to mitigate the risk of information breaches, but data breaches are still on the rise. The objectives of this study are to explore the shortfalls of information security on a South African financial institution and further investigate whether business processes are responsive to organization’s needs. …”
    Get full text
    Article
  14. 114

    An IoT-Based Anonymous Function for Security and Privacy in Healthcare Sensor Networks by Xiao Chun Yin, Zeng Guang Liu, Bruce Ndibanje, Lewis Nkenyereye, S. M. Riazul Islam

    Published 2019-07-01
    “…Nevertheless, this integration comes with security risks such as data breach that might be caused by credential-stealing malware. …”
    Get full text
    Article
  15. 115

    A Deep Learning Model for Information Loss Prevention From Multi-Page Digital Documents by Abhijit Guha, Debabrata Samanta, Amit Banerjee, Daksh Agarwal

    Published 2021-01-01
    “…Along with the revolution arose the need for data security and consumer privacy protection, primarily concerning financial institutions. The data breach of Equifax in 2017 and personal information leaks from Facebook in 2021 led to general skepticism among the customers of large corporations. …”
    Get full text
    Article
  16. 116

    Keyboard Data Protection Technique Using GAN in Password-Based User Authentication: Based on C/D Bit Vulnerability by Jaehyuk Lee, Wonbin Jeong, Kyungroul Lee

    Published 2024-02-01
    “…However, according to Verizon’s “2022 Data Breach Investigations Report”, among all security incidents, security incidents caused by password exposures accounted for 82%. …”
    Get full text
    Article
  17. 117

    A Higher-Level Security Scheme for Key Access on Cloud Computing by Baris Celiktas, Ibrahim Celikbilek, Enver Ozdemir

    Published 2021-01-01
    “…Since the key does not need to be held anywhere, the problem of a data breach based on key disclosure risk is also eliminated.…”
    Get full text
    Article
  18. 118

    Improved Detection and Response via Optimized Alerts: Usability Study by Griffith Russell McRee

    Published 2022-05-01
    “…Organizations thus risk data breach, loss of valuable human resources, reputational damage, and impact to revenue when excessive security alert volume and a lack of fidelity degrade detection services. …”
    Get full text
    Article
  19. 119

    A Review of Blockchain’s Role in E-Commerce Transactions: Open Challenges, and Future Research Directions by Latifa Albshaier, Seetah Almarri, M. M. Hafizur Rahman

    Published 2024-01-01
    “…Owing to the sensitivity of customer data, employee records, and customer records, organizations must ensure their protection. A data breach not only affects an enterprise’s financial performance but also erodes clients’ confidence in the platform. …”
    Get full text
    Article
  20. 120

    Privacy-preserving user profile matching in social networks by Yi, Xun, Bertino, Elisa, Rao, Fang-Yu, Lam, Kwok-Yan, Nepal, Surya, Bouguettaya, Athman

    Published 2020
    “…Most recently, an online dating website, Ashley Madison, was hacked, which results in disclosure of a large number of dating user profiles. This data breach has urged researchers to explore practical privacy protection for user profiles in a social network. …”
    Get full text
    Journal Article