The high price of data breaches

被引:0
|
作者
机构
[1] Kellow, Si
来源
Kellow, S. | 1600年 / Elsevier Ltd卷 / 2013期
关键词
D O I
10.1016/S1361-3723(13)70029-0
中图分类号
X9 [安全科学];
学科分类号
0837 ;
摘要
引用
收藏
相关论文
共 50 条
  • [41] Transient Customer Response to Data Breaches of Their Information
    Agarwal, Sumit
    Ghosh, Pulak
    Ruan, Tianyue
    Zhang, Yunqi
    MANAGEMENT SCIENCE, 2024, 70 (06) : 4105 - 4114
  • [42] Earnings Management in Firms with Data Security Breaches
    Xu, Howard
    Guo, Savannah
    Haislip, Jacob Z.
    Pinsker, Robert E.
    JOURNAL OF INFORMATION SYSTEMS, 2019, 33 (03) : 267 - 284
  • [43] Protecting organisations from personal data breaches
    Phua, Clifton
    Computer Fraud and Security, 2009, 2009 (01): : 13 - 18
  • [44] Pwned: The Risk of Exposure From Data Breaches
    Sood, Gaurav
    Cor, Ken
    PROCEEDINGS OF THE 11TH ACM CONFERENCE ON WEB SCIENCE (WEBSCI'19), 2019, : 289 - 292
  • [45] What Giant Data Breaches Mean for You
    Guarino, Ben
    SCIENTIFIC AMERICAN, 2024, 331 (05) : 82 - 83
  • [46] To Report or Not Report Health Care Data Breaches
    Walden, Amanda
    Cortelyou-Ward, Kendall
    Gabriel, Meghan Hufstader
    Noblin, Alice
    AMERICAN JOURNAL OF MANAGED CARE, 2020, 26 (12): : E395 - +
  • [47] An event study of data breaches and hospital IT spending
    Choi, Sung J.
    Johnson, M. Eric
    Lee, Jinhyung
    HEALTH POLICY AND TECHNOLOGY, 2020, 9 (03) : 372 - 378
  • [48] Focusing on the Ethical Challenges of Data Breaches and Applications
    Joisten, Karen
    Thiemer, Nicole
    Renner, Tobias
    Janssen, Anke
    Scheffler, Alexander
    2022 IEEE INTERNATIONAL CONFERENCE ON ASSURED AUTONOMY (ICAA 2022), 2022, : 74 - 82
  • [49] Secure Service to prevent Data Breaches in Cloud
    Doc, Nina Pearl
    Suganya, V
    2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,
  • [50] Protecting Against Data Breaches; Living with Mistakes
    Hong, Jason
    Linden, Greg
    COMMUNICATIONS OF THE ACM, 2012, 55 (06) : 10 - 11