Development trends in precision agriculture and its management in china based on data visualization

C Song, W Ma, J Li, B Qi, B Liu - Agronomy, 2022 - mdpi.com
Recent innovations are increasingly recognizing applications in precision agricultural
systems that use data science techniques as well as so-called machine learning techniques …

[HTML][HTML] Mapping the landscape of government data breaches: A bibliometric analysis of literature from 2006 to 2023

S Hamid, MN Huda - Social Sciences & Humanities Open, 2025 - Elsevier
Data breaches in the government sector are severe threats to cybersecurity and illegal acts
that flagrantly violate security and privacy laws. It undermines public trust in government …

A framework for data privacy and security accountability in data breach communications

L Thomas, I Gondal, T Oseni, SS Firmin - Computers & Security, 2022 - Elsevier
Organisations need to take steps to protect the privacy and security of the personal
information they hold. However, when data is breached, how do individuals know whether …

[HTML][HTML] Data breaches in the age of surveillance capitalism: do disclosures have a new role to play?

J Andrew, M Baker, C Huang - Critical Perspectives on Accounting, 2023 - Elsevier
The rise of big data has led to profound changes to the dynamics of accumulation and
profiteering. Today, data is captured, produced, and reproduced with such regularity that its …

CYBER-AIDD: A novel approach to implementing improved cyber security resilience for large Australian healthcare providers using a Unified Modelling Language …

M Dart, M Ahmed - Digital Health, 2023 - journals.sagepub.com
Purpose This paper proposes a novel cyber security risk governance framework and
ontology for large Australian healthcare providers, using the structure and simplicity of the …

[HTML][HTML] Cybersecurity preparedness of small-to-medium businesses: A Western Australia study with broader implications

A Chidukwani, S Zander, P Koutsakis - Computers & Security, 2024 - Elsevier
This study was prompted by the scarcity of focused quantitative research on the
cybersecurity of SMBs. Our research aimed to understand the factors influencing SMBs' …

Implementation of digital law as a legal tool in the current digital Era

J Afzal - 2024 - Springer
This book provides a deep dive into the important issue of digital law. Researchers,
students, and policymakers interested in digital law will find this work valuable for its …

Consumers' change in trust and security after a personal data breach in online shopping

A Strzelecki, M Rizun - Sustainability, 2022 - mdpi.com
This research is dedicated to one of the significant problems connected with purchasing
online: consumers' personal data security. The purpose of the paper is to present the results …

Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review

GA Pimenta Rodrigues, AL Marques Serrano… - Data, 2024 - mdpi.com
Data breaches result in data loss, including personal, health, and financial information that
are crucial, sensitive, and private. The breach is a security incident in which personal and …

Operational shock: A method for estimating cyber security incident costs for large Australian healthcare providers

M Dart, M Ahmed - Journal of Cyber Security Technology, 2024 - Taylor & Francis
This paper introduces a novel cyber incident cost estimation methodology, applicable to
large Australian healthcare providers. A review demonstrates the poor utility of current risk …