Works matching Data breach
Results: 2034
MORE THAN A SUSPECT: An Investigation into the Connection Between Data Breaches, Identity Theft, and Data Breach Notification Laws.
- Published in:
- Journal of Information Policy, 2020, v. 10, p. 45, doi. 10.5325/jinfopoli.10.2020.0045
- By:
- Publication type:
- Article
AN EMPIRICAL INVESTIGATION OF COMPANY RESPONSE TO DATA BREACHES.
- Published in:
- MIS Quarterly, 2022, v. 46, n. 4, p. 2163, doi. 10.25300/MISQ/2022/16609
- By:
- Publication type:
- Article
THE US LESSONS FOR THE EU PERSONAL DATA BREACH NOTIFICATION: PART I - WHAT IS PERSONAL DATA BREACH AND INTRODUCTION OF THE US REGULATORY PERSPECTIVE.
- Published in:
- Lawyer Quarterly, 2020, n. 4, p. 476
- By:
- Publication type:
- Article
Quantitative Assessment of Cybersecurity Risks for Mitigating Data Breaches in Business Systems.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 8, p. 3678, doi. 10.3390/app11083678
- By:
- Publication type:
- Article
Exploring Key Issues in Cybersecurity Data Breaches: Analyzing Data Breach Litigation with ML-Based Text Analytics.
- Published in:
- Information (2078-2489), 2023, v. 14, n. 11, p. 600, doi. 10.3390/info14110600
- By:
- Publication type:
- Article
Human and Organizational Factors of Healthcare Data Breaches: The Swiss Cheese Model of Data Breach Causation And Prevention.
- Published in:
- International Journal of Healthcare Information Systems & Informatics, 2014, v. 9, n. 1, p. 42, doi. 10.4018/ijhisi.2014010103
- By:
- Publication type:
- Article
Healthcare Data Breaches: Insights and Implications.
- Published in:
- Healthcare (2227-9032), 2020, v. 8, n. 2, p. 133, doi. 10.3390/healthcare8020133
- By:
- Publication type:
- Article
Peretas, Ketakutan, dan Kerugian: Pelanggaran Data dan Keamanan Nasional.
- Published in:
- Global Strategis, 2023, v. 17, n. 1, p. 153, doi. 10.20473/jgs.17.1.2023.153-182
- By:
- Publication type:
- Article
An examination of historic data breach incidents: What cybersecurity big data visualization and analytics can tell us?.
- Published in:
- Online Journal of Applied Knowledge Management, 2021, v. 9, n. 1, p. 31
- By:
- Publication type:
- Article
Are there trade-offs with mandating timely disclosure of cybersecurity incidents? Evidence from state-level data breach disclosure laws.
- Published in:
- Journal of Finance & Data Science, 2022, v. 8, p. 202, doi. 10.1016/j.jfds.2022.08.001
- By:
- Publication type:
- Article
Strategizing Responses to Data Breaches: A Multi-Method Study of Organizational Responsibility and Effective Communication with Stakeholders.
- Published in:
- Journal of Management Information Systems, 2024, v. 41, n. 4, p. 1042, doi. 10.1080/07421222.2024.2415774
- By:
- Publication type:
- Article
Hospital Productivity After Data Breaches: Difference-in-Differences Analysis.
- Published in:
- 2021
- By:
- Publication type:
- journal article
MANDATORY DATA BREACH NOTIFICATION: ITS ROLE IN PROTECTING PERSONAL DATA.
- Published in:
- Journal of International & Comparative Law, 2023, v. 10, n. 1, p. 87
- By:
- Publication type:
- Article
Are data breaches the new norm? Exploring data breach trends, consumer sentiment, and responses to security invasions.
- Published in:
- Journal of Consumer Affairs, 2023, v. 57, n. 3, p. 1089, doi. 10.1111/joca.12554
- By:
- Publication type:
- Article
Data Breach Notification Laws and Corporate Tax Planning.
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 2025, v. 36, n. 2, p. 195, doi. 10.1002/jcaf.22767
- By:
- Publication type:
- Article
Analytical Techniques for Decision Making on Information Security for Big Data Breaches.
- Published in:
- International Journal of Information Technology & Decision Making, 2018, v. 17, n. 2, p. 527, doi. 10.1142/S0219622017500432
- By:
- Publication type:
- Article
Pragmatic Study of Enterprise Data Breach and its Prevention Technique by DLPD.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2, Part 2, p. 1124
- By:
- Publication type:
- Article
Do hospital data breaches affect health information technology investment?
- Published in:
- Digital Health, 2024, p. 1, doi. 10.1177/20552076231224164
- By:
- Publication type:
- Article
Impact, Compliance, and Countermeasures in Relation to Data Breaches in Publicly Traded U.S. Companies.
- Published in:
- Future Internet, 2024, v. 16, n. 6, p. 201, doi. 10.3390/fi16060201
- By:
- Publication type:
- Article
Information Technology Security Leaders' Solutions for Mitigating Data Breaches in a Multigenerational Workforce.
- Published in:
- International Leadership Journal, 2020, v. 12, n. 2, p. 74
- By:
- Publication type:
- Article
DO DATA BREACHES AFFECT OUR BELIEFS? - INVESTIGATING REPUTATION RISK IN SOCIAL MEDIA.
- Published in:
- Journal of Information System Security, 2017, v. 13, n. 2, p. 97
- By:
- Publication type:
- Article
AN ANALYSIS OF DATA BREACH INDUCED TRAUMA: AN EXPLORATORY STUDY.
- Published in:
- Journal of Information System Security, 2016, v. 12, n. 3, p. 151
- By:
- Publication type:
- Article
Acknowledging the "M" in MIS: Managing a Data Breach Crisis.
- Published in:
- Journal of the Academy of Business Education, 2018, v. 19, p. 9
- By:
- Publication type:
- Article
Data Breaches Are Not Just Information Technology Worries!
- Published in:
- Pediatric Nursing, 2019, v. 45, n. 2, p. 59
- By:
- Publication type:
- Article
Organizational Data Breach: Building Conscious Care Behavior in Incident Response.
- Published in:
- Computer Systems Science & Engineering, 2022, v. 40, n. 2, p. 505, doi. 10.32604/csse.2022.018468
- By:
- Publication type:
- Article
When the Data Are Out: Measuring Behavioral Changes Following a Data Breach.
- Published in:
- Marketing Science, 2024, v. 43, n. 2, p. 440, doi. 10.1287/mksc.2019.0208
- By:
- Publication type:
- Article
HUMAN CAPITAL ACQUISITION IN RESPONSE TO DATA BREACHES.
- Published in:
- MIS Quarterly, 2025, v. 49, n. 1, p. 367
- By:
- Publication type:
- Article
HOW MERGERS AND ACQUISITIONS INCREASE DATA BREACHES: A COMPLEXITY PERSPECTIVE.
- Published in:
- MIS Quarterly, 2025, v. 49, n. 1, p. 211
- By:
- Publication type:
- Article
DOES SHARING MAKE MY DATA MORE INSECURE? AN EMPIRICAL STUDY ON HEALTH INFORMATION EXCHANGE AND DATA BREACHES.
- Published in:
- MIS Quarterly, 2024, v. 48, n. 3, p. 873, doi. 10.25300/MISQ/2023/17479
- By:
- Publication type:
- Article
WHERE IS IT IN INFORMATION SECURITY? THE INTERRELATIONSHIP AMONG IT INVESTMENT, SECURITY AWARENESS, AND DATA BREACHES.
- Published in:
- MIS Quarterly, 2023, v. 47, n. 1, p. 317, doi. 10.25300/MISQ/2022/15713
- By:
- Publication type:
- Article
THE OPM DATA BREACH: AN INVESTIGATION OF SHARED EMOTIONAL REACTIONS ON TWITTER.
- Published in:
- MIS Quarterly, 2022, v. 46, n. 2, p. 881, doi. 10.25300/MISQ/2022/15596
- By:
- Publication type:
- Article
IMPACT OF CUSTOMER COMPENSATION STRATEGIES ON OUTCOMES AND THE MEDIATING ROLE OF JUSTICE PERCEPTIONS: A LONGITUDINAL STUDY OF TARGET'S DATA BREACH.
- Published in:
- MIS Quarterly, 2022, v. 46, n. 1, p. 299, doi. 10.25300/MISQ/2022/14740
- By:
- Publication type:
- Article
European Union ∙ Security of Processing and Data Breach Notification: New Guidance in View of Decisions in the One-Stop-Shop Procedure.
- Published in:
- European Data Protection Law Review (EDPL), 2024, v. 10, n. 2, p. 193, doi. 10.21552/edpl/2024/2/10
- By:
- Publication type:
- Article
Data Breach Severity and Debt Market Responses.
- Published in:
- Accounting & the Public Interest, 2023, v. 23, n. 1, p. 76, doi. 10.2308/API-2023-003
- By:
- Publication type:
- Article
Bayesian vine copulas for modelling dependence in data breach losses.
- Published in:
- Annals of Actuarial Science, 2022, v. 16, n. 2, p. 401, doi. 10.1017/S174849952200001X
- By:
- Publication type:
- Article
Can competition law protect consumers in cases of a dominant company breach of data protection rules?
- Published in:
- European Competition Journal, 2020, v. 16, n. 2/3, p. 531, doi. 10.1080/17441056.2020.1824464
- By:
- Publication type:
- Article
Evaluating the Quality and Usefulness of Data Breach Information Systems.
- Published in:
- International Journal of Information Security & Privacy, 2011, v. 5, n. 4, p. 31, doi. 10.4018/jisp.2011100103
- By:
- Publication type:
- Article
‘All that Glitters is not Gold’: The Role of Impression Management in Data Breach Notification.
- Published in:
- Western Journal of Communication, 2014, v. 78, n. 3, p. 337, doi. 10.1080/10570314.2013.866686
- By:
- Publication type:
- Article
A Preemptive and Curative Solution to Mitigate Data Breaches: Corporate Social Responsibility as a Double Layer of Protection.
- Published in:
- Journal of Marketing Research (JMR), 2024, v. 61, n. 4, p. 778, doi. 10.1177/00222437231218969
- By:
- Publication type:
- Article
TIP HUKUKU ÇERÇEVESİNDE KİŞİSEL SAĞLIK VERİLERİNİN İHLALİNDEN DOĞAN HUKUKÎ SORUMLULUK.
- Published in:
- Hacettepe Law Review, 2024, v. 14, n. 2, p. 219, doi. 10.32957/hacettepehdf.1509011
- By:
- Publication type:
- Article
XBRL reporting in firms with data breach incidents.
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 2024, v. 35, n. 3, p. 146, doi. 10.1002/jcaf.22701
- By:
- Publication type:
- Article
Consumers' Change in Trust and Security after a Personal Data Breach in Online Shopping.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 10, p. 5866, doi. 10.3390/su14105866
- By:
- Publication type:
- Article
An analysis of data breaches in the U.S. healthcare industry: diversity, trends, and risk profiling.
- Published in:
- Information Security Journal: A Global Perspective, 2022, v. 31, n. 3, p. 346, doi. 10.1080/19393555.2021.2017522
- By:
- Publication type:
- Article
Market Price Effects of Data Security Breaches.
- Published in:
- Information Security Journal: A Global Perspective, 2011, v. 20, n. 6, p. 263, doi. 10.1080/19393555.2011.611860
- By:
- Publication type:
- Article
Anatomy of a Data Breach.
- Published in:
- Information Security Journal: A Global Perspective, 2008, v. 17, n. 5/6, p. 247, doi. 10.1080/19393550802529734
- By:
- Publication type:
- Article
Analyzing the Implications of Healthcare Data Breaches through Computational Technique.
- Published in:
- Intelligent Automation & Soft Computing, 2022, v. 32, n. 3, p. 1763, doi. 10.32604/iasc.2022.023460
- By:
- Publication type:
- Article
Data Breach Laws: Do They Work?
- Published in:
- Journal of Applied Security Research, 2017, v. 12, n. 4, p. 512, doi. 10.1080/19361610.2017.1354275
- By:
- Publication type:
- Article
The Effects of Service Crises and Recovery Resources on Market Reactions: An Event Study Analysis on Data Breach Announcements.
- Published in:
- Journal of Service Research, 2023, v. 26, n. 1, p. 44, doi. 10.1177/10946705211036944
- By:
- Publication type:
- Article
Measuring the economic effects of data breaches on firm outcomes: Challenges and opportunities.
- Published in:
- Journal of Economic & Social Measurement, 2018, v. 43, n. 1/2, p. 59, doi. 10.3233/JEM-180450
- By:
- Publication type:
- Article
Blockchain-Based Data Breach Detection: Approaches, Challenges, and Future Directions.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 1, p. 107, doi. 10.3390/math12010107
- By:
- Publication type:
- Article