Data breach: analysis, countermeasures and challenges

X Zhang, MM Yadollahi, S Dadkhah… - … of Information and …, 2022 - inderscienceonline.com
The increasing use or abuse of online personal data leads to a big data breach challenge
for individuals, businesses, and even the government. Due to the scale of online data and …

A framework for data privacy and security accountability in data breach communications

L Thomas, I Gondal, T Oseni, SS Firmin - Computers & Security, 2022 - Elsevier
Organisations need to take steps to protect the privacy and security of the personal
information they hold. However, when data is breached, how do individuals know whether …

Building data management capabilities to address data protection regulations: Learnings from EU-GDPR

C Labadie, C Legner - Journal of Information Technology, 2023 - journals.sagepub.com
The European Union's General Data Protection Regulation (EU-GDPR) has initiated a
paradigm shift in data protection toward greater choice and sovereignty for individuals and …

Louder bark with no bite: Privacy protection through the regulation of mandatory data breach notification in Australia

M Alazab, SH Hong, J Ng - Future Generation Computer Systems, 2021 - Elsevier
The disruptive shift of technologies in the Internet age poses the challenge of securing our
digital asset and cyberspace from large-scale, sophisticatedly targeted offenses and …

GDPR interference with next generation 5G and IoT networks

S Rizou, E Alexandropoulou-Egyptiadou… - ieee …, 2020 - ieeexplore.ieee.org
This article examines the specific data protection framework with regards to 5G networks,
which is the current high-end evolution of the previous four generations of cellular …

[PDF][PDF] Understanding data protection regulations from a data management perspective: a capability-based approach to EU-GDPR

C Labadie, C Legner - … of the 14th International Conference on …, 2019 - serval.unil.ch
The European General Data Protection Regulation (EU-GDPR) has entered into force in
May 2018. Its emphasis on individual control and organizational accountability constitutes a …

The role of IS in the conflicting interests regarding GDPR

T Jakobi, M von Grafenstein, C Legner… - Business & Information …, 2020 - Springer
Since May 25 2018, the General Data Protection Regulation (GDPR) regulates the handling
of personal data both for companies in the European Union and European Citizens. It is part …

When Data Breaches Happen, Where Does the Buck Stop?... and where should it stop?

P Das Chowdhury, K Renaud, A Rashid - Proceedings of the New …, 2024 - dl.acm.org
A digital-first society requires its citizens to carry out essential activities online eg, applying
for a passport, managing pension funds or scheduling medical appointments. Sensitive and …

A Review Method for Analysis of the Causes of Data Breach in the Pasca Pandemic

A Yuswanto, L Hafiz - Jurnal Komputer dan Elektro …, 2025 - ejournal.sultanpublisher.com
The vulnerability of personal data breaches makes countries aware of the importance of
regulations governing the protection of personal data Therefore, the importance of this …

Social-media-based risk communication for data co-security on the cloud

JPG Gashami, CF Libaque-Saenz… - Industrial Management & …, 2020 - emerald.com
Purpose Cloud computing has disrupted the information technology (IT) industry. Associated
benefits such as flexibility, payment on an on-demand basis and the lack of no need for IT …