2011
DOI: 10.1108/09685221111173049
|View full text |Cite
|
Sign up to set email alerts
|

A longitudinal analysis of data breaches

Abstract: Purpose -The purpose of this research is to provide companies and consumers with information about the potential connections between data breach types and institutions. This study also aims to add to the body of knowledge about data breaches. Design/methodology/approach -This study analyzes a chronology of five years of data breaches. The data were classified and analyzed by breach and institution type, record size, and state. Multiple statistical tests were performed. Findings -Breach types stolen and exposed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
26
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(27 citation statements)
references
References 3 publications
1
26
0
Order By: Relevance
“…We began this paper by observing that critical software problems in security [7,10], financial calamities [23], software-based infrastructure [24], and automotive recalls [18] are on the rise. Our findings provide a broader picture for interpreting these domain-specific trends:…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…We began this paper by observing that critical software problems in security [7,10], financial calamities [23], software-based infrastructure [24], and automotive recalls [18] are on the rise. Our findings provide a broader picture for interpreting these domain-specific trends:…”
Section: Discussionmentioning
confidence: 99%
“…Security breaches are now more prevalent and more costly than ever before [7,10]; spreadsheet errors are leading to an increasing number of financial calamities [23]; software infrastructure failures rose between 1994 and 2005 [24]; and cars are recalled more frequently than ever because of software defects [18].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Accordingly, we define "insider threat" as the action or inaction of an insider that can jeopardize the safety of data, whether at rest or in motion. We also use the term "insider threat" to refer to existing or former employees who misuse their computer-access privilege and/or authority (Garrison & Ncube, 2011).This threat can arise either intentionally or accidentally, usually as a result of ignorance, mistakes, or deliberate acts (Durgin, 2007;Lee & Lee, 2002;Lee, Lee, & Yoo , 2003, cited in Bulgurcu, Cavusoglu, & Benbasat, 2010. In addition, we use the terms "data breach", "attack", "cyber-attack", and "malicious act" interchangeably in this study.…”
Section: Highlightmentioning
confidence: 99%
“…There have been high profile data breaches in the United Kingdom, which has resulted in guidance and recommendations to help organizations to implement and monitor policies on personal information standards (Young, 2010). Garrison and Ncube (2011) states that organizations could lose consumer confidence and market share as a result of data breaches, which could, therefore, be very costly to the organization. According to Fisher (2013), data breaches could result in fraudulent activities taking place.…”
Section: Introductionmentioning
confidence: 99%