Aftermath of data security breaches continues

被引:0
|
作者
不详
机构
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:481 / 481
页数:1
相关论文
共 50 条
  • [1] Data Security: Data Breaches
    Cooper, Deborah L.
    PROCEEDINGS OF THE 2015 INFORMATION SECURITY CURRICULUM DEVELOPMENT CONFERENCE, 2015,
  • [2] Notification of data security breaches
    Schwartz, Paul M.
    Janger, Edward J.
    MICHIGAN LAW REVIEW, 2007, 105 (05) : 913 - 984
  • [3] Aftermaths of data security breaches continue
    不详
    COMPUTERS & SECURITY, 2006, 25 (08) : 561 - 561
  • [4] Earnings Management in Firms with Data Security Breaches
    Xu, Howard
    Guo, Savannah
    Haislip, Jacob Z.
    Pinsker, Robert E.
    JOURNAL OF INFORMATION SYSTEMS, 2019, 33 (03) : 267 - 284
  • [5] Market Price Effects of Data Security Breaches
    Morse, Edward A.
    Raval, Vasant
    Wingender, John R., Jr.
    INFORMATION SECURITY JOURNAL, 2011, 20 (06): : 263 - 273
  • [6] Security breaches threaten personal and financial data
    Schultz, E
    COMPUTERS & SECURITY, 2004, 23 (04) : 269 - 270
  • [7] TrustBox: A Security Architecture for Preventing Data Breaches
    Schmidt, Matthias
    Fahl, Sascha
    Schwarzkopf, Roland
    Freisleben, Bernd
    PROCEEDINGS OF THE 19TH INTERNATIONAL EUROMICRO CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING, 2011, : 635 - 639
  • [8] Ascribing responsibility for online security and data breaches
    Carre, Jessica Rose
    Curtis, Shelby R.
    Jones, Daniel Nelson
    MANAGERIAL AUDITING JOURNAL, 2018, 33 (04) : 436 - 446
  • [9] Chernobyl Aftermath Continues
    Abdul, Mubeen Khan Mohammed
    AMERICAN JOURNAL OF GASTROENTEROLOGY, 2012, 107 : S65 - S66
  • [10] Data breaches in healthcare: security mechanisms for attack mitigation
    Zlatolas, Lili Nemec
    Welzer, Tatjana
    Lhotska, Lenka
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (07): : 8639 - 8654