Search

Your search keyword '"Data breach"' showing total 35 results

Search Constraints

Start Over You searched for: Descriptor "Data breach" Remove constraint Descriptor: "Data breach" Database Directory of Open Access Journals Remove constraint Database: Directory of Open Access Journals
35 results on '"Data breach"'

Search Results

1. Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data

2. Modelling user notification scenarios in privacy policies

3. Individual Differences in Psychological Stress Associated with Data Breach Experiences

4. Assessing Data Breach Factors Through Modern Crime Theory: A Structural Equation Modeling Approach

5. Mapping of data breaches in companies listed on the NYSE and NASDAQ: Insights and implications

6. Insecurity to Consumer Data Protection in The eHealth Sector

7. Analyzing Health Data Breaches: A Visual Analytics Approach

8. A Novel Digital Forensic Framework for Data Breach Investigation

9. Impact, Compliance, and Countermeasures in Relation to Data Breaches in Publicly Traded U.S. Companies

10. Threats in Cloud Computing System and Security Enhancement

11. Can Strategically Prioritizing Ransomware Protection and Implementing Specific Recommended Actions Potentially Reduce the Effects of a Ransomware Attack on an Organization?

12. Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review

13. Personal Data as a Market Commodity in the GDPR Era: A Systematic Review of Social and Economic Aspects

14. Threat Actors’ Tenacity to Disrupt: Examination of Major Cybersecurity Incidents

15. Exploring Key Issues in Cybersecurity Data Breaches: Analyzing Data Breach Litigation with ML-Based Text Analytics

16. Predicting the Occurrence of a Data Breach

17. Evaluating the Behavior of Users of Mobile Electronic Devices with the Emphasis on Protection Motivation Theory of Data Breach: a Case Study of Graduate Students

18. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional)

19. An Unsupervised Model for Identifying and Characterizing Dark Web Forums

20. Appunti sulla sicurezza nel trattamento dei dati e 𝑑𝑎𝑡𝑎 𝑏𝑟𝑒𝑎𝑐ℎ

21. Securing personal data in public cloud

22. Communication and Notification of Personal Data Breaches Pursuant to the General Data Protection Regulation

23. Analysis of Insider Threats in the Healthcare Industry: A Text Mining Approach

24. Human factor, a critical weak point in the information security of an organization's Internet of things

25. Privacy and Cybersecurity Insights

26. Analyzing and Identifying Data Breaches in Underground Forums

27. FINANCIAL CONSEQUENCES OF CYBER ATTACKS LEADING TO DATA BREACHES IN HEALTHCARE SECTOR

28. A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure

29. An Analysis of Cyber-Incidents in South Africa

30. Digital Health Data: A Comprehensive Review of Privacy and Security Risks and Some Recommendations

31. Observable Cyber Risk on Cournot Oligopoly Data Storage Markets

32. The Effect of Data Theft on a Firm’s Short-Term and Long-Term Market Value

33. Wearable Technologies and Smart Clothes in the Fashion Business: Some Issues Concerning Cybersecurity and Data Protection

34. FINANCIAL CONSEQUENCES OF CYBER ATTACKS LEADING TO DATA BREACHES IN HEALTHCARE SECTOR

35. Lessons from the five data breaches: Analyzing framed crisis response strategies and crisis severity

Catalog

Books, media, physical & digital resources