Search

Your search keyword '"Data breach"' showing total 2,193 results

Search Constraints

Start Over You searched for: Descriptor "Data breach" Remove constraint Descriptor: "Data breach" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
2,193 results on '"Data breach"'

Search Results

1. A Preemptive and Curative Solution to Mitigate Data Breaches: Corporate Social Responsibility as a Double Layer of Protection.

2. Information Technology Innovativeness and Data-Breach Risk: A Longitudinal Study.

3. 基于扩散式差分隐私的联邦学习数据保护方法.

5. Securing data and preserving privacy in cloud IoT-based technologies an analysis of assessing threats and developing effective safeguard.

6. How APIs Create Growth by Inverting the Firm.

8. Modelling user notification scenarios in privacy policies

9. Individual Differences in Psychological Stress Associated with Data Breach Experiences

10. Utilizing computational methods for analysing media framing of organizational crises: The 'Datalek' scandal during the COVID‐19 pandemic in the Netherlands.

11. Modelling user notification scenarios in privacy policies.

12. Individual Differences in Psychological Stress Associated with Data Breach Experiences.

13. Privacy Perceptions on Personal Data and Data Breaches in South Africa.

14. The Impact of the Type of Cybersecurity Assurance Service and Cybersecurity Incidents on Investor Perceptions and Decisions.

15. XBRL reporting in firms with data breach incidents.

16. WHERE IS IT IN INFORMATION SECURITY? THE INTERRELATIONSHIP AMONG IT INVESTMENT, SECURITY AWARENESS, AND DATA BREACHES.

18. Scp-bp Framework: Situational Crime Prevention for Managing Data Breaches in Business Processes

19. Research on Data Security Protection of Power Grid Geographic Information

20. Security Vulnerabilities in Facebook Data Breach

22. Characterizing Privacy Risks in Healthcare IoT Systems

23. Impact Versus Frequency on Cybersecurity Breach Trends in the Business and Medical Industry to Identify Human Error

26. Personal Information Leakage Threats and Suggestions for Improvement in China’s Epidemic Prevention and Control

27. AN EMPIRICAL INVESTIGATION OF COMPANY RESPONSE TO DATA BREACHES.

28. Vendor selection in the wake of data breaches: A longitudinal study.

29. Impact, Compliance, and Countermeasures in Relation to Data Breaches in Publicly Traded U.S. Companies.

31. Using Blockchain to Secure Digital Identity and Privacy Across Digital Sectors.

32. Assessing Data Breach Factors Through Modern Crime Theory: A Structural Equation Modeling Approach

33. THE OPM DATA BREACH: AN INVESTIGATION OF SHARED EMOTIONAL REACTIONS ON TWITTER.

34. Edge Computing and IoT Data Breaches: Security, Privacy, Trust, and Regulation.

35. Mitigating the consequences of electronic health record data breaches for patients and healthcare workers.

36. Pepal: Penalizing multimedia breaches and partial leakages.

37. Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review.

38. DEFEAT DATA BREACHERS' MINDS: BLOCKCHAIN WITH BOUNDED RATIONALITY TO ADVANCE INFORMATION SECURITY.

39. Ordeal by innocence in the big‐data era: Intended data breach disclosure, unintended real activities manipulation.

40. Cybersecurity Risk and Audit Pricing—A Machine Learning-Based Analysis.

42. Australia’s Notifiable Data Breach Scheme: An Analysis of Risk Management Findings for Healthcare

43. Cyber Crime Undermines Data Privacy Efforts – On the Balance Between Data Privacy and Security

45. A Systematic Literature Review on Information Security Leakage: Evaluating Security Threat

47. An Analysis of Cybersecurity Data Breach in the State of California

48. Mapping of data breaches in companies listed on the NYSE and NASDAQ: Insights and implications

50. The benefits of a cyber-resilience posture on negative public reaction following data theft.

Catalog

Books, media, physical & digital resources