Global Data Breaches Responsible for the Disclosure of Personal Information: 2015 & 2016

Sparad:
Bibliografiska uppgifter
I publikationen:European Conference on Cyber Warfare and Security (Jun 2017), p. 63
Huvudupphov: Botha, Johnny
Övriga upphov: Grobler, Marthie, Eloff, Mariki
Utgiven:
Academic Conferences International Limited
Ämnen:
Länkar:Citation/Abstract
Full Text
Full Text - PDF
Taggar: Lägg till en tagg
Inga taggar, Lägg till första taggen!

MARC

LEADER 00000nab a2200000uu 4500
001 1966799315
003 UK-CbPIL
035 |a 1966799315 
045 2 |b d20170601  |b d20170630 
084 |a 142231  |2 nlm 
100 1 |a Botha, Johnny  |u Council for Scientific and Industrial Research (CSIR), South Africa 
245 1 |a Global Data Breaches Responsible for the Disclosure of Personal Information: 2015 & 2016 
260 |b Academic Conferences International Limited  |c Jun 2017 
513 |a Conference Proceedings 
520 3 |a Data breaches have gained extensive coverage as businesses and organisations of all sizes become more dependent on digital data, cloud computing and workforce mobility. Companies store sensitive or confidential data on local machines, enterprise databases and cloud servers. To breach a company's data one needs to gain access to restricted networks. Although this is a difficult task that requires specialised skills, hackers continuously identify vulnerabilities and loopholes to gain access and conduct data breaches. The Privacy Rights Clearinghouse1 recorded 901,010,077 data breaches since 2005, with only 5,220 data breaches made public. In 2015 some of the world's largest recorded data breaches occurred; yet a total of only 266 data breaches were made public. 2016 still had a number of major data breaches and a total of 472 breaches were made public. When conducting business in the modern era, data protection and management of personal information have become an integral aspect for organisations and individuals. Despite increased focus on personal information and the existence of data protection legislation internationally, data breaches remain a common occurrence resulting in major cost implications. This paper investigates the most significant data breaches in 2015 and 2016 responsible for the leakage of personal information, with the aim of identifying a general trend in terms of data breaches and personal identifiable (PII) leakage. 
653 |a Data integrity 
653 |a Legislation 
653 |a Security management 
653 |a Information management 
653 |a Right of privacy 
653 |a Digital data 
653 |a Leakage 
653 |a Cloud computing 
653 |a Cybercrime 
653 |a Identity theft 
653 |a Cybersecurity 
653 |a Databases 
653 |a Personal information 
653 |a Workforce 
653 |a Breaches 
653 |a Companies 
653 |a Mobility 
653 |a Access 
653 |a Data 
653 |a Privacy 
653 |a Information 
653 |a Protection 
653 |a Hacking 
653 |a Machinery 
700 1 |a Grobler, Marthie  |u Data61, Commonwealth Scientific and Industrial Organisation, Australia 
700 1 |a Eloff, Mariki  |u Institute for Corporate Citizenship, University of South Africa (UNISA), South Africa 
773 0 |t European Conference on Cyber Warfare and Security  |g (Jun 2017), p. 63 
786 0 |d ProQuest  |t Political Science Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/1966799315/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/1966799315/fulltext/embedded/6A8EOT78XXH2IG52?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/1966799315/fulltextPDF/embedded/6A8EOT78XXH2IG52?source=fedsrch