Access the full text.
Sign up today, get DeepDyve free for 14 days.
About the Privacy Rights Clearinghouse, Privacy Rights Clearinghouse
Open Security Foundation
OSF Data Loss – Reports
(2009)
Data breaches, malware attacks on rise
PRC
A Chronology of Data Breaches
Consumer Sentinel Network Data Book
FTC
Consumer Sentinel Network Data Book January – December 2009
W. Baker, A. Hutton, C. Hylender, Christopher Novak, Christopher Porter, B. Sartin, P. Tippett, Andrew Valentine, Thijs Bosschert, Eric Brohm, Calvin Chang, Ron Dormido, K. Gentry, Mark Goudie, Ricky Ho, Stan Kang, Wayne Lee, J. Niemantsverdriet, D. Ostertag, Michael Rosen, Enrico Telemaque, Matthijs Wel, Ben Erck (2009)
2009 Data Breach Investigations Report
PRC
About the Privacy Rights Clearinghouse
C. Curtin, Lee Ayres (2008)
Using Science to Combat Data Loss: Analyzing Breaches by Type and Industry
Namjoo Choi, D. Kim, Jahyun Goo, A. Whitmore (2008)
Knowing is doing: An empirical validation of the relationship between managerial information security awareness and actionInf. Manag. Comput. Secur., 16
Akshat Kapoor, D. Nazareth (2013)
Medical Data Breaches: What the Reported Data Illustrates, and Implications for Transitioning to Electronic Medical RecordsJournal of Applied Security Research, 8
R. Vamosi, M. Monahan, R. Kim
The 2010 Identity Fraud Survey Report
Information Management Journal
ITRC Reports 2009 Data Breaches
ITRC
2009 Data Breach Stats
USA Mohammad I. MerhiDepartment of Computer Information Systems and Quantitative Methods
FTC
Fiscal Year 2011 Congressional Budget Justification Summary
Open Security Foundation
Data Loss Statistics
ITRC
Data breaches
(2008)
Sec: Best practices lost or stolen data: minimizing fallout
A Chronology of Data Breaches, Privacy Rights Clearinghouse
(2010)
Lessons learned from university data breaches
Are There State-specific Breach Listings?
P. Belsis, S. Kokolakis, E. Kiountouzis (2005)
Information systems security from a knowledge management perspectiveInf. Manag. Comput. Security, 13
George Pike (2009)
Congress Debates Data Breach Legislation
Julia Allen (2005)
Governing for Enterprise Security
(2010)
Are data breach headlines steering you down the wrong security path?
Atul Gupta, R. Hammond (2005)
Information systems security issues and decisions for small businesses: An empirical examinationInf. Manag. Comput. Security, 13
(2009)
Analysis of data breaches ITRC
Purpose – The purpose of this research is to provide companies and consumers with information about the potential connections between data breach types and institutions. This study also aims to add to the body of knowledge about data breaches. Design/methodology/approach – This study analyzes a chronology of five years of data breaches. The data were classified and analyzed by breach and institution type, record size, and state. Multiple statistical tests were performed. Findings – Breach types stolen and exposed are statistically more likely to occur. Educational institutions are more likely to have a breach and it is more probable that educational breaches will be of type hacker or exposed. The proportion of insider incidents is smaller than the other breach types. The number of records breached is independent of institution and breach type. Research limitations/implications – Only those breaches with a specified number of records are included. The information used may have been updated after our analysis, usually a change in the number of records identified. Practical implications – Additional knowledge about characteristics of data breaches and the relationship between breach types and institution types will enable both businesses and consumers to be more effective in protecting sensitive information. Businesses will be able to create security budgets based on risk factors and consumers will be more aware of the risks of providing sensitive information. Originality/value – This study provides a longitudinal analysis covering five years of data breaches and analyzes the relationship between five breach types and six types of institutions.
Information Management & Computer Security – Emerald Publishing
Published: Oct 11, 2011
Keywords: Data breach; Identity theft; Computer security; Data security; Personally identifiable information; Security breach; Computer crime
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.