2017
DOI: 10.1057/s41303-017-0065-y
|View full text |Cite
|
Sign up to set email alerts
|

Taking stock of organisations’ protection of privacy: categorising and assessing threats to personally identifiable information in the USA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 27 publications
(17 citation statements)
references
References 72 publications
0
16
0
1
Order By: Relevance
“…In Posey et al (2017), the authors use advanced data-mining techniques to conduct breach analysis and build a taxonomy of eight major types of personally identifiable information breaches that are currently typical for US organisations. They detail differences in exposure to the breaches and their severity.…”
Section: Resultsmentioning
confidence: 99%
“…In Posey et al (2017), the authors use advanced data-mining techniques to conduct breach analysis and build a taxonomy of eight major types of personally identifiable information breaches that are currently typical for US organisations. They detail differences in exposure to the breaches and their severity.…”
Section: Resultsmentioning
confidence: 99%
“…This study heuristically selected eight PII, those were highly engaged with the Android app's permissions. While doing this heuristic modeling of PII, the authors used already available knowledge base and literature [46,73,82]. However, this study used a practical assumption to detect eight risky PII (Table 5) where modeling was logical and rational rather than evidence centric.…”
Section: The Heuristic Methods For Android Application Permission and mentioning
confidence: 99%
“…Personal data is something that reveals an individual's identity or features. PII is a popular jargon used in the USA, Korea and Australia [46]. The European Union uses 'personal information' [47].…”
Section: Personal Information and Privacymentioning
confidence: 99%
See 1 more Smart Citation
“…As a result of these events, ethical rules as they apply to academicians are being re-examined (Editorials Nature, 2018). Despite over a decade of research in privacy and security of information in IS (Acquisti & Gross, 2006;Lowry, Dinev, & Willison, 2017;Posey, Raja, Crossler, & Burns, 2017), we cannot assume that the problem is solved. A new approach to privacy and security may be necessary to overcome these challenges.…”
Section: Axiology: What Is Good and To Be Valued And What Should We mentioning
confidence: 99%