Search

Your search keyword '"Data breach"' showing total 2,580 results

Search Constraints

Start Over You searched for: Descriptor "Data breach" Remove constraint Descriptor: "Data breach"
2,580 results on '"Data breach"'

Search Results

1. A Preemptive and Curative Solution to Mitigate Data Breaches: Corporate Social Responsibility as a Double Layer of Protection.

3. Information Technology Innovativeness and Data-Breach Risk: A Longitudinal Study.

4. 基于扩散式差分隐私的联邦学习数据保护方法.

6. Securing data and preserving privacy in cloud IoT-based technologies an analysis of assessing threats and developing effective safeguard.

7. How APIs Create Growth by Inverting the Firm.

9. Modelling user notification scenarios in privacy policies

10. Individual Differences in Psychological Stress Associated with Data Breach Experiences

11. Utilizing computational methods for analysing media framing of organizational crises: The 'Datalek' scandal during the COVID‐19 pandemic in the Netherlands.

12. Modelling user notification scenarios in privacy policies.

13. Individual Differences in Psychological Stress Associated with Data Breach Experiences.

14. Privacy Perceptions on Personal Data and Data Breaches in South Africa.

15. The Impact of the Type of Cybersecurity Assurance Service and Cybersecurity Incidents on Investor Perceptions and Decisions.

16. XBRL reporting in firms with data breach incidents.

17. WHERE IS IT IN INFORMATION SECURITY? THE INTERRELATIONSHIP AMONG IT INVESTMENT, SECURITY AWARENESS, AND DATA BREACHES.

19. Scp-bp Framework: Situational Crime Prevention for Managing Data Breaches in Business Processes

20. Research on Data Security Protection of Power Grid Geographic Information

21. Security Vulnerabilities in Facebook Data Breach

23. Characterizing Privacy Risks in Healthcare IoT Systems

24. Impact Versus Frequency on Cybersecurity Breach Trends in the Business and Medical Industry to Identify Human Error

27. Personal Information Leakage Threats and Suggestions for Improvement in China’s Epidemic Prevention and Control

28. AN EMPIRICAL INVESTIGATION OF COMPANY RESPONSE TO DATA BREACHES.

29. Vendor selection in the wake of data breaches: A longitudinal study.

30. Impact, Compliance, and Countermeasures in Relation to Data Breaches in Publicly Traded U.S. Companies.

32. Using Blockchain to Secure Digital Identity and Privacy Across Digital Sectors.

33. Assessing Data Breach Factors Through Modern Crime Theory: A Structural Equation Modeling Approach

34. THE OPM DATA BREACH: AN INVESTIGATION OF SHARED EMOTIONAL REACTIONS ON TWITTER.

35. Edge Computing and IoT Data Breaches: Security, Privacy, Trust, and Regulation.

36. Mitigating the consequences of electronic health record data breaches for patients and healthcare workers.

37. Pepal: Penalizing multimedia breaches and partial leakages.

38. Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review.

39. DEFEAT DATA BREACHERS' MINDS: BLOCKCHAIN WITH BOUNDED RATIONALITY TO ADVANCE INFORMATION SECURITY.

40. Ordeal by innocence in the big‐data era: Intended data breach disclosure, unintended real activities manipulation.

41. Cybersecurity Risk and Audit Pricing—A Machine Learning-Based Analysis.

43. Australia’s Notifiable Data Breach Scheme: An Analysis of Risk Management Findings for Healthcare

44. Cyber Crime Undermines Data Privacy Efforts – On the Balance Between Data Privacy and Security

46. A Systematic Literature Review on Information Security Leakage: Evaluating Security Threat

48. An Analysis of Cybersecurity Data Breach in the State of California

49. Mapping of data breaches in companies listed on the NYSE and NASDAQ: Insights and implications

Catalog

Books, media, physical & digital resources