2024
- Nwoye C.C., Nwagwughiagwu S. (2024) “AI-Driven Anomaly Detection for Proactive Cybersecurity and Data Breach Prevention“
- Ruohonen J., Hjerppe K., von Zastrow M. (2024) “An Exploratory Case Study on Data Breach Journalism”
- Uddin M.R., Akter S., Lee W.J.T (2024) “Developing a data breach protection capability framework in retailing”
- Rodrigues P. et al (2024) “Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review”.
2023
- Christina N., Maria K., Maria C., Vasiliki D. (2023). Security shortcomings in healthcare: a preliminary investigation of Data Protection Authorities’ decisions
- Graham G. (2023). Global Data Privacy Laws: EU Leads US and the Rest of the World in Enforcement by Penalties
- Arif R. H., Kalamullah R., Teddy S. G., Susila W.(2023). A Novel Digital Forensic Framework for Data Breach Investigation
- Hung C., Hieu V.P., Sabatino S. (2023). Data Breach Disclosures and Stock Price Crash Risk: Evidence from Data Breach Notification Laws
- James S. & Sharifah S. (2023). Health data justice: building new norms for health data governance
- Frederik S.(2023).Dark Sides of Data Transparency: Organized Immaturity After GDPR?
2022
-
- Masuch, K., Greve, M., Trang, S., & Kolbe, L. M. (2022). Apologize or justify? Examining the impact of data breach response actions on stock value of affected companies?. Computers & Security, 112, 102502.
-
- X Wang, X Wang, Z Liu, W Chang, Y Hou, Z Zhao (2022). Too generous to be fair? Experiments on the interplay of what, when, and how in data breach recovery of the hotel industry
2021
-
- Khan, F., Kim, J. H., Mathiassen, L., & Moore, R. (2021). Data breach management: An integrated risk model. Information & Management, 58(1), 103392.
-
- Labrecque, L. I., Markos, E., Swani, K., & Peña, P. (2021). When data security goes wrong: Examining the impact of stress, social contract violation, and data type on consumer coping responses following a data breach. Journal of Business Research, 135, 559-571.
-
- Alazab, M., Hong, S. H., & Ng, J. (2021). Louder bark with no bite: Privacy protection through the regulation of mandatory data breach notification in Australia. Future Generation Computer Systems, 116, 22-29.
-
- Neto, N. N., Madnick, S., Paula, A. M. G. D., & Borges, N. M. (2021). Developing a global data breach database and the challenges encountered. Journal of Data and Information Quality (JDIQ), 13(1), 1-33.
-
- Levy, Y., & Gafni, R. (2021). Introducing the concept of cybersecurity footprint. Information & Computer Security.
-
- Algarni, A. M., Thayananthan, V., & Malaiya, Y. K. (2021). Quantitative assessment of cybersecurity risks for mitigating data breaches in business systems. Applied Sciences, 11(8), 3678.
-
- Kaur, G., Habibi Lashkari, Z., & Habibi Lashkari, A. (2021). Introduction to Cybersecurity. In Understanding Cybersecurity Management in FinTech (pp. 17-34). Springer, Cham.
-
- Bana, S., Brynjolfsson, E., Jin, W., Steffen, S., & Wang, X. (2021). Cybersecurity Hiring in Response to Data Breaches. Available at SSRN.
-
- Lankton, N., Price, J. B., & Karim, M. (2021). Cybersecurity Breaches and the Role of Information Technology Governance in Audit Committee Charters. Journal of Information Systems, 35(1), 101-119.
-
- Yusif, S., & Hafeez-Baig, A. (2021). A conceptual model for cybersecurity governance. Journal of Applied Security Research, 16(4), 490-513.
-
- F Khan, JH Kim, L Mathiassen, R Moore (2021). Data Breach management: An Integrated Risk Model
-
- Z Fang, M Xu, S Xu, T Hu (2021). A framework for predicting data breach risk: Leveraging dependence to cope with sparsity
2020
-
- T Yesmin, MW Carter (2020). Evaluation framework for automatic privacy auditing tools for hospital data breach detections: A case study
-
- M Greve, K Masuch, S Trang (2020). The More, the Better? Compensation and Remorse as Data Breach Recovery Actions-An Experimental Scenario-based Investigation.
-
- T Diesterhöft, K Masuch, M Greve, S Trang (2020). Really, What Are They Offering? A Taxonomy of Companies’ Actual Response Strategies after a Data Breach
-
- NN Neto, SE Madnick, AMG de Paula, NM Borges (2020). A case study of the capital one data breach
-
- L Horvath, S Banducci, O James (2020). Citizens’ attitudes to contact tracing apps
-
- OI Poyraz, M Canan, M McShane, CA Pinto, TS Cotter (2020). Cyber assets at risk: monetary impact of U.S. personally identifiable information mega data breaches
-
- P Langlois (2020). 2020 Data Breach Investigations Report
-
- D’Arcy, J., Adjerid I., Angst M.C.& Glavas, A. (2020, September). Too Good to Be True: Firm Social Performance and the Risk of Data Breach
-
- RK Jamra, B Anggorojati, DI Sensuse, RR Suryono (2020). Systematic Review of Issues and Solutions for Security in E-commerce
-
- H Shim, C Kim, YH Choi (2020). Volatility clustering in data breach counts
-
- KA Gangloff, MC Hersel, S Kuban, MS Nalick (2020). Legitimacy Loss Following Data Breach: Examining Government Contract Awards and Firm Lobbying
-
- DM Chudasama, K Patel, P Dand (2020). Awareness of data privacy breach in society
-
- H Saleem, M Naveed (2020). SoK: Anatomy of Data Breaches
-
- SJ Jathar (2020). EMAIL DATA BREACH ANALYSIS AND PREVENTION USING HOOK AND EYE SYSTEM
-
- AH Seh, M Zarour, M Alenezi, AK Sarkar, A Agrawal, R Kumar, RA Khan (2020). Healthcare Data Breaches: Insights and Implications
-
- FS Alharbi (2020). Dealing with Data Breaches Amidst Changes In Technology
-
- T Kahler (2020). Data breach: 72 hours period extended on weekend?
-
- A Ibrahim, D Thiruvady, JG Schneider, M Abdelrazek (2020). The Challenges of Leveraging Threat Intelligence to Stop Data Breaches
2019
-
- SJ Choi, ME Johnson, CU Lehmann (2019). Data breach remediation efforts and their implications for hospital quality
-
- P Rosati, P Deeney, M Cummins, L van der Werff (2019). Social media and stock price reaction to data breach announcements: Evidence from US listed companies
-
- S Chatterjee, X Gao, S Sarkar, C Uzmanoglu (2019). Reacting to the scope of a data breach: The differential role of fear and anger
-
- Y Zou, S Danino, K Sun, F Schaub (2019). You Might’Be Affected: An Empirical Analysis of Readability and Usability Issues in Data Breach Notifications
-
- L Zhang, W Wei, N Hua (2019). Impact of data breach locality and error management on attitude and engagement
-
- C Cross, M Parker, D Sansom (2019). Media discourses surrounding ‘non-ideal’victims: The case of the Ashley Madison data breach
-
- R Murciano-Goroff (2019). Do Data Breach Disclosure Laws Increase Firms’ Investment in Securing Their Digital Infrastructure?
-
- D Turjeman, FM Feinberg (2019). When the data are out: measuring behavioral changes following a data breach
-
- GS Gaglione Jr – Buff. L. Rev. (2019). The equifax data breach: an opportunity to improve consumer protection and cybersecurity efforts in America
-
- X Chen, G Hilary, XS Tian (2019). Data Breach Disclosure and Insider Trading
-
- G Vojković, M Milenković, T Katulić (2019). IoT and Smart Home Data Breach Risks from the Perspective of Croatian Data Protection and Information Security Law
-
- H Hammouchi, O Cherqi, G Mezzour, M Ghogho, ME Koutbi (2019). Digging Deeper into Data Breaches: An Exploratory Data Analysis of Hacking Breaches Over Time
-
- VM Harshini, S Danai, HR Usha, MR Kounte (2019). Health Record Management through Blockchain Technology
-
- M Chernyshev, S Zeadally, Z Baig (2019). Healthcare data breaches: Implications for digital forensic readiness
-
- S Paudel (2019). Data Breach a Cyber Security Issue in Cloud
-
- I Confente, GG Siciliano, B Gaudenzi, M Eickhoff (2019). Effects of data breaches from user-generated content: A corporate reputation analysis
-
- SC Ayo (2019). Data Breach e-Crime, A Case Study and Legal Analysis
-
- H Koch, N Adeleye (2019). Psychological Injury, Cyber Crime and Data Breach Damages
-
- T Zarsky (2019). Data Breach Harms-Bringing in the Courts, or Leaving Them out
-
- J Foerderer, SW Schuetz (2019). Data Breach Announcements and Stock Market Reactions: A Matter of Timing?
-
- VJ Richardson, RE Smith (2019). Much ado about nothing: The (lack of) economic impact of data privacy breaches
2018
-
- Y Zou, AH Mhaidli, A McCall, F Schaub (2018). “I’ve Got Nothing to Lose”: Consumers’ Risk Perceptions and Protective Actions after the Equifax Data Breach
-
- KL Gwebu, J Wang, L Wang (2018). The role of corporate reputation and crisis response strategies in data breach management
-
- R Janakiraman, JH Lim, R Rishika (2018). The effect of a data breach announcement on customer behavior: Evidence from a multichannel retailer
-
- MH Gabriel, A Noblin, A Rutherford, A Walden, K Cortelyou-Ward (2018). Data breach locations, types, and associated characteristics among US hospitals
-
- M Eling, K Jung (2018). Copula approaches for modeling cross-sectional dependence of data breach losses
-
- SR Curtis, JR Carre, DN Jones (2018). Consumer security behaviors and trust following a data breach
-
- B Nieuwesteeg, M Faure (2018). An analysis of the effectiveness of the EU data breach notification obligation
-
- A McLeod, D Dolezel (2018). Cyber-analytics: Modeling factors associated with healthcare data breaches
-
- JG Bellika, A Makhlysheva, PA Bakkevoll (2018). A significant increase in the risk for exposure of health information in the United States: result from analysing the US data breach registry
-
- B Dayanim, E George (2018). Data breach litigation and regulatory enforcement: A survey of our present and how to prepare for the future
-
- C Lending, K Minnick, PJ Schorno (2018). Corporate governance, social responsibility, and data breaches
-
- D Yao (2018). Data Breach and Multiple Points to Stop It
-
- P Finnigan (2018). Data Breach
2017
-
- Bisogni, F., Asghari, H., van Eeten, M. (2017). Estimating the size of the iceberg from its tip : An investigation into unreported data breach notifications. 16th Annual Workshop on the Economics of Information Security.
-
- L Cheng, F Liu, D Yao (2017). Enterprise data breach: causes, challenges, prevention, and future directions
-
- S Goode, H Hoehle, V Venkatesh, SA Brown (2017). User compensation as a data breach recovery action: An investigation of the Sony PlayStation network breach
-
- S Kashmiri, CD Nicol, L Hsu (2017). Birds of a feather: intra-industry spillover of the Target customer data breach and the shielding role of IT, marketing, and CSR
-
- DJ Solove, DK Citron (2017). Risk and anxiety: A theory of data-breach harms
-
- JL Mills, K Harclerode (2017). Privacy, Mass Intrusion, and the Modern Data Breach
-
- G Bai, JX Jiang, R Flasher (2017). Hospital risk of data breaches
-
- D Fabbri, ME Frisse, B Malin (2017). The Need for Better Data Breach Statistics
-
- DJ Baldwin, JP Buckley, DR Slaugh (2017). Insuring Against Privacy Claims Following a Data Breach
-
- JH Schuessler, D Nagy, HK Fulk & A Dearing (2017). Data Breach Laws: Do They Work?
-
- C Greene, J Stavins (2017). Did the Target data breach change consumer assessments of payment card security?
-
- KA Whitler, PW Farris (2017). The Impact of Cyber Attacks On Brand Image. Why Proactive Marketing Expertise Is Needed for Managing Data Breaches
-
- G Reitberger, S Wetzel (2017). Investigating the impact of media coverage on data breach fatigue
-
- NL Colvin, TC Dougherty (2017). Trends for Potential Insurance Coverage for Losses Arising from a Data Breach
-
- A Panou, C Ntantogian, C Xenakis (2017). RiSKi: A framework for modeling cyber threats to estimate risk for data breach insurance
-
- KD Martin, A Borah, RW Palmatier (2017). Data privacy: Effects on customer and firm performance
-
- B Kim, K Johnson, SY Park (2017). Lessons from the five data breaches: Analyzing framed crisis response strategies and crisis severity
-
- R Lange, EW Burger (2017). Long-term market implications of data breaches, not
-
- OC Ferrell (2017). Broadening marketing’s contribution to data privacy
-
- SH Hong, M Alazab (2017). Cybercrime and Data Breach: Privacy Protection through the Regulation of Voluntary Notification
-
- J Botha, M Grobler, M Eloff (2017). Global data breaches responsible for the disclosure of personal information: 2015 & 2016
-
- S Alavi (2017). Allocating Risk and Preparing for a Data Breach
2016
-
- Bisogni, F. (2016). Proving Limits of State Data Breach Notification Laws: Is a Federal Law the Most Adequate Solution?. Journal of Information Policy, 6, 154-205, 2016, Penn State University Press.
-
- M Souccar (2016). Data Breach: What YOU can do about it?.
-
- LJ Trautman, PC Ormerod (2016). Corporate directors’ and officers’ cybersecurity standard of care: The Yahoo data breach
-
- AG Dunn (2016). The Data Breach Realm
-
- R Wilson, SJ Shine (2016). Is Your Data Protected? A Look at Cybersecurity Regulations in the US and EU
-
- S Wheatley, T Maillart, D Sornette (2016). The extreme risk of personal data breaches and the erosion of privacy
-
- D Hanner, GZ Jin, M Luppino, T Rosenbaum (2016). Economics at the FTC: Horizontal mergers and data security
-
- C Campbell (2016). Protect your System from Cyberattacks!