2023
- Christina N., Maria K., Maria C., Vasiliki D. (2023). Security shortcomings in healthcare: a preliminary investigation of Data Protection Authorities’ decisions
- Graham G. (2023). Global Data Privacy Laws: EU Leads US and the Rest of the World in Enforcement by Penalties
- Arif R. H., Kalamullah R., Teddy S. G., Susila W.(2023). A Novel Digital Forensic Framework for Data Breach Investigation
- Hung C., Hieu V.P., Sabatino S. (2023). Data Breach Disclosures and Stock Price Crash Risk: Evidence from Data Breach Notification Laws
- James S. & Sharifah S. (2023). Health data justice: building new norms for health data governance
- Frederik S.(2023).Dark Sides of Data Transparency: Organized Immaturity After GDPR?
2022
- Masuch, K., Greve, M., Trang, S., & Kolbe, L. M. (2022). Apologize or justify? Examining the impact of data breach response actions on stock value of affected companies?. Computers & Security, 112, 102502.
- Chen, J., Henry, E., & Jiang, X. (2022). Is Cybersecurity Risk Factor Disclosure Informative? Evidence from Disclosures Following a Data Breach. Evidence from Disclosures Following a Data Breach (February 11, 2022).
- X Wang, X Wang, Z Liu, W Chang, Y Hou, Z Zhao (2022). Too generous to be fair? Experiments on the interplay of what, when, and how in data breach recovery of the hotel industry
2021
- Khan, F., Kim, J. H., Mathiassen, L., & Moore, R. (2021). Data breach management: An integrated risk model. Information & Management, 58(1), 103392.
- Z. Fang, M. Xu, S. Xu and T. Hu, “A Framework for Predicting Data Breach Risk: Leveraging Dependence to Cope With Sparsity,” in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2186-2201, 2021,
- Masuch, K., Greve, M. & Trang, S. What to do after a data breach? Examining apology and compensation as response strategies for health service providers. Electron Markets 31, 829–848 (2021).
- Labrecque, L. I., Markos, E., Swani, K., & Peña, P. (2021). When data security goes wrong: Examining the impact of stress, social contract violation, and data type on consumer coping responses following a data breach. Journal of Business Research, 135, 559-571.
- Alazab, M., Hong, S. H., & Ng, J. (2021). Louder bark with no bite: Privacy protection through the regulation of mandatory data breach notification in Australia. Future Generation Computer Systems, 116, 22-29.
- Neto, N. N., Madnick, S., Paula, A. M. G. D., & Borges, N. M. (2021). Developing a global data breach database and the challenges encountered. Journal of Data and Information Quality (JDIQ), 13(1), 1-33.
- Jung, K. (2021). Extreme data breach losses: An alternative approach to estimating probable maximum loss for data breach risk. North American Actuarial Journal, 25(4), 580-603.
- Africk, E., & Levy, Y. (2021). An examination of historic data breach incidents: What cybersecurity big data visualization and analytics can tell us?. Online Journal of Applied Knowledge Management (OJAKM), 9(1), 31-45.
- Choi, S. J., & Johnson, M. E. (2021). The relationship between cybersecurity ratings and the risk of hospital data breaches. Journal of the American Medical Informatics Association, 28(10), 2085-2092.
- Levy, Y., & Gafni, R. (2021). Introducing the concept of cybersecurity footprint. Information & Computer Security.
- Algarni, A. M., Thayananthan, V., & Malaiya, Y. K. (2021). Quantitative assessment of cybersecurity risks for mitigating data breaches in business systems. Applied Sciences, 11(8), 3678.
- Kaur, G., Habibi Lashkari, Z., & Habibi Lashkari, A. (2021). Introduction to Cybersecurity. In Understanding Cybersecurity Management in FinTech (pp. 17-34). Springer, Cham.
- Kelton, A. S. (2021). How to Reduce the Cybersecurity Breach Contagion Effect. Current Issues in Auditing, 15(2), P1-P9.
- Bana, S., Brynjolfsson, E., Jin, W., Steffen, S., & Wang, X. (2021). Cybersecurity Hiring in Response to Data Breaches. Available at SSRN.
- Kim, N., & Lee, S. (2021). Cybersecurity breach and crisis response: An analysis of organizations’ official statements in the United States and South Korea. International Journal of Business Communication, 58(4), 560-581.
- Kostyuk, N., & Wayne, C. (2021). The microfoundations of state cybersecurity: Cyber risk perceptions and the mass public. Journal of Global Security Studies, 6(2), ogz077.
- Lankton, N., Price, J. B., & Karim, M. (2021). Cybersecurity Breaches and the Role of Information Technology Governance in Audit Committee Charters. Journal of Information Systems, 35(1), 101-119.
- Azubuike, S. (2021). Cybersecurity Attacks: Regulatory and Practical Approach Towards Preventing Data Breach and Cyber-Attacks in USA. Available at SSRN 3878326.
- Lee, I. (2021). Cybersecurity: Risk management framework and investment cost analysis. Business Horizons, 64(5), 659-671.
- Yusif, S., & Hafeez-Baig, A. (2021). A conceptual model for cybersecurity governance. Journal of Applied Security Research, 16(4), 490-513.
- Narasimhan, V. L. (2021, February). Using Deep Learning for Assessing Cybersecurity Economic Risks in Virtual Power Plants. In 2021 7th International Conference on Electrical Energy Systems (ICEES) (pp. 530-537). IEEE.
- F Khan, JH Kim, L Mathiassen, R Moore (2021). Data Breach management: An Integrated Risk Model
- Z Fang, M Xu, S Xu, T Hu (2021). A framework for predicting data breach risk: Leveraging dependence to cope with sparsity
2020
- Bisogni, F., Asghari, H. (2020). More Than a Suspect: An Investigation into the Connection Between Data Breaches, Identity Theft, and Data Breach Notification Laws. Journal of Information Policy, 10, 2020, Penn State University Press.
- T Yesmin, MW Carter (2020). Evaluation framework for automatic privacy auditing tools for hospital data breach detections: A case study
- M Meglio (2020). Embracing Insecurity: Harm Reduction Through a No-Fault Approach to Consumer Data Breach Litigation
- M Greve, K Masuch, S Trang (2020). The More, the Better? Compensation and Remorse as Data Breach Recovery Actions-An Experimental Scenario-based Investigation.
- T Diesterhöft, K Masuch, M Greve, S Trang (2020). Really, What Are They Offering? A Taxonomy of Companies’ Actual Response Strategies after a Data Breach
- NN Neto, SE Madnick, AMG de Paula, NM Borges (2020). A case study of the capital one data breach
- L Horvath, S Banducci, O James (2020). Citizens’ attitudes to contact tracing apps
- OI Poyraz, M Canan, M McShane, CA Pinto, TS Cotter (2020). Cyber assets at risk: monetary impact of U.S. personally identifiable information mega data breaches
- P Langlois (2020). 2020 Data Breach Investigations Report
- D’Arcy, J., Adjerid I., Angst M.C.& Glavas, A. (2020, September). Too Good to Be True: Firm Social Performance and the Risk of Data Breach
- RK Jamra, B Anggorojati, DI Sensuse, RR Suryono (2020). Systematic Review of Issues and Solutions for Security in E-commerce
- H Shim, C Kim, YH Choi (2020). Volatility clustering in data breach counts
- KA Gangloff, MC Hersel, S Kuban, MS Nalick (2020). Legitimacy Loss Following Data Breach: Examining Government Contract Awards and Firm Lobbying
- DM Chudasama, K Patel, P Dand (2020). Awareness of data privacy breach in society
- H Saleem, M Naveed (2020). SoK: Anatomy of Data Breaches
- SJ Jathar (2020). EMAIL DATA BREACH ANALYSIS AND PREVENTION USING HOOK AND EYE SYSTEM
- AH Seh, M Zarour, M Alenezi, AK Sarkar, A Agrawal, R Kumar, RA Khan (2020). Healthcare Data Breaches: Insights and Implications
- FS Alharbi (2020). Dealing with Data Breaches Amidst Changes In Technology
- T Kahler (2020). Data breach: 72 hours period extended on weekend?
- OJB Selle (2020). The Data Breach Notification Obligation in the GDPR: Assessing the Interpretative and Practical Problems Posed by the Obligation
- L Rivers (2020). Strategies for Reducing the Risk of Data Breach within the Internet Cloud
- R Siegel (2020). Data breach may have exposed personal information of thousands of SBA emergency loan applicants
- GD Say, G Vasudeva (2020). Learning from digital failures? The effectiveness of firms’ divestiture and management turnover responses to data breaches
- A Ibrahim, D Thiruvady, JG Schneider, M Abdelrazek (2020). The Challenges of Leveraging Threat Intelligence to Stop Data Breaches
2019
- T Venturini, R Rogers (2019). “API-based research” or how can digital sociology and journalism studies learn from the Facebook and Cambridge Analytica data breach
- SJ Choi, ME Johnson, CU Lehmann (2019). Data breach remediation efforts and their implications for hospital quality
- R Syed (2019). Enterprise reputation threats on social media: A case of data breach framing
- P Rosati, P Deeney, M Cummins, L van der Werff (2019). Social media and stock price reaction to data breach announcements: Evidence from US listed companies
- S Chatterjee, X Gao, S Sarkar, C Uzmanoglu (2019). Reacting to the scope of a data breach: The differential role of fear and anger
- Y Zou, S Danino, K Sun, F Schaub (2019). You Might’Be Affected: An Empirical Analysis of Readability and Usability Issues in Data Breach Notifications
- L Zhang, W Wei, N Hua (2019). Impact of data breach locality and error management on attitude and engagement
- C Cross, M Parker, D Sansom (2019). Media discourses surrounding ‘non-ideal’victims: The case of the Ashley Madison data breach
- R Murciano-Goroff (2019). Do Data Breach Disclosure Laws Increase Firms’ Investment in Securing Their Digital Infrastructure?
- D Turjeman, FM Feinberg (2019). When the data are out: measuring behavioral changes following a data breach
- GS Gaglione Jr – Buff. L. Rev. (2019). The equifax data breach: an opportunity to improve consumer protection and cybersecurity efforts in America
- N Ronaldson (2019). HACKING: THE NAKED AGE CYBERCRIME, CLAPPER & STANDING, AND THE DEBATE BETWEEN STATE AND FEDERAL DATA BREACH NOTIFICATION LAWS
- X Chen, G Hilary, XS Tian (2019). Data Breach Disclosure and Insider Trading
- G Vojković, M Milenković, T Katulić (2019). IoT and Smart Home Data Breach Risks from the Perspective of Croatian Data Protection and Information Security Law
- H Hammouchi, O Cherqi, G Mezzour, M Ghogho, ME Koutbi (2019). Digging Deeper into Data Breaches: An Exploratory Data Analysis of Hacking Breaches Over Time
- FA Shaikh, D Joseph (2019). Effects of information security legitimacy on data breach consequences: Moderating effect of impression management
- VM Harshini, S Danai, HR Usha, MR Kounte (2019). Health Record Management through Blockchain Technology
- M Chernyshev, S Zeadally, Z Baig (2019). Healthcare data breaches: Implications for digital forensic readiness
- S Paudel (2019). Data Breach a Cyber Security Issue in Cloud
- G Chimuka (2019). Leadership in the cyber warfare era: Formulating a data breach reporting and management strategy
- I Confente, GG Siciliano, B Gaudenzi, M Eickhoff (2019). Effects of data breaches from user-generated content: A corporate reputation analysis
- SC Ayo (2019). Data Breach e-Crime, A Case Study and Legal Analysis
- H Koch, N Adeleye (2019). Psychological Injury, Cyber Crime and Data Breach Damages
- T Zarsky (2019). Data Breach Harms-Bringing in the Courts, or Leaving Them out
- J Foerderer, SW Schuetz (2019). Data Breach Announcements and Stock Market Reactions: A Matter of Timing?
- VJ Richardson, RE Smith (2019). Much ado about nothing: The (lack of) economic impact of data privacy breaches
2018
- Y Zou, AH Mhaidli, A McCall, F Schaub (2018). “I’ve Got Nothing to Lose”: Consumers’ Risk Perceptions and Protective Actions after the Equifax Data Breach
- KL Gwebu, J Wang, L Wang (2018). The role of corporate reputation and crisis response strategies in data breach management
- R Janakiraman, JH Lim, R Rishika (2018). The effect of a data breach announcement on customer behavior: Evidence from a multichannel retailer
- DJ Marcus (2018). The Data Breach Dilemma: Proactive Solutions for Protecting Consumers’ Personal Information
- MH Gabriel, A Noblin, A Rutherford, A Walden, K Cortelyou-Ward (2018). Data breach locations, types, and associated characteristics among US hospitals
- M Eling, K Jung (2018). Copula approaches for modeling cross-sectional dependence of data breach losses
- A Daly (2018). The introduction of data breach notification legislation in Australia: A comparative view
- SR Curtis, JR Carre, DN Jones (2018). Consumer security behaviors and trust following a data breach
- B Nieuwesteeg, M Faure (2018). An analysis of the effectiveness of the EU data breach notification obligation
- RM Krisby (2018). Health care held ransom: Modifications to data breach security & the future of health care privacy protection
- SA Talesh (2018). Data breach, privacy, and cyber insurance: How insurance companies act as “compliance managers” for businesses
- A McLeod, D Dolezel (2018). Cyber-analytics: Modeling factors associated with healthcare data breaches
- JG Bellika, A Makhlysheva, PA Bakkevoll (2018). A significant increase in the risk for exposure of health information in the United States: result from analysing the US data breach registry
- B Dayanim, E George (2018). Data breach litigation and regulatory enforcement: A survey of our present and how to prepare for the future
- C Lending, K Minnick, PJ Schorno (2018). Corporate governance, social responsibility, and data breaches
- M Ashraf, J Sunder (2018). Can shareholders benefit from consumer protection disclosure mandates? Evidence from data breach disclosure laws and the cost of equity
- RE Anderson Jr (2018). Low-cost strategies to strengthen cybersecurity: Low-cost strategies can help healthcare organizations avoid the high price of a data breach
- D Yao (2018). Data Breach and Multiple Points to Stop It
- M Tarr (2018). Accountability Is the Best (Privacy) Policy: Improving Remedies for Data Breach Victims through Recognition of Privacy Policies as Enforceable Agreements
- C Behan (2018). Leaving Class Action Plaintiffs with Too Many Legs to Stand on: The Inconsistent Application of Article III Standing Requirements in Data Breach Casess
- J Romanova (2018). Control of digital data breach risks in companies as a crucial factor for guarding human right to privacy
- P Finnigan (2018). Data Breach
2017
- Bisogni, F., Asghari, H., van Eeten, M. (2017). Estimating the size of the iceberg from its tip : An investigation into unreported data breach notifications. 16th Annual Workshop on the Economics of Information Security.
- L Cheng, F Liu, D Yao (2017). Enterprise data breach: causes, challenges, prevention, and future directions
- S Goode, H Hoehle, V Venkatesh, SA Brown (2017). User compensation as a data breach recovery action: An investigation of the Sony PlayStation network breach
- S Kashmiri, CD Nicol, L Hsu (2017). Birds of a feather: intra-industry spillover of the Target customer data breach and the shielding role of IT, marketing, and CSR
- DJ Solove, DK Citron (2017). Risk and anxiety: A theory of data-breach harms
- JL Mills, K Harclerode (2017). Privacy, Mass Intrusion, and the Modern Data Breach
- P Wang, SA Park (2017). COMMUNICATION IN CYBERSECURITY: A PUBLIC COMMUNICATION MODEL FOR BUSINESS DATA BREACH INCIDENT HANDLING
- G Bai, JX Jiang, R Flasher (2017). Hospital risk of data breaches
- A Wehbé (2017). OPM Data breach case study: Mitigating personnel cybersecurity risk
- D Fabbri, ME Frisse, B Malin (2017). The Need for Better Data Breach Statistics
- DJ Baldwin, JP Buckley, DR Slaugh (2017). Insuring Against Privacy Claims Following a Data Breach
- JH Schuessler, D Nagy, HK Fulk & A Dearing (2017). Data Breach Laws: Do They Work?
- C Greene, J Stavins (2017). Did the Target data breach change consumer assessments of payment card security?
- KA Whitler, PW Farris (2017). The Impact of Cyber Attacks On Brand Image. Why Proactive Marketing Expertise Is Needed for Managing Data Breaches
- G Reitberger, S Wetzel (2017). Investigating the impact of media coverage on data breach fatigue
- NL Colvin, TC Dougherty (2017). Trends for Potential Insurance Coverage for Losses Arising from a Data Breach
- A Panou, C Ntantogian, C Xenakis (2017). RiSKi: A framework for modeling cyber threats to estimate risk for data breach insurance
- KD Martin, A Borah, RW Palmatier (2017). Data privacy: Effects on customer and firm performance
- B Kim, K Johnson, SY Park (2017). Lessons from the five data breaches: Analyzing framed crisis response strategies and crisis severity
- R Lange, EW Burger (2017). Long-term market implications of data breaches, not
- BC West (2017). No Harm, Still Foul: When an Injury-in-Fact Materialized in a Consumer Data Breach
- OC Ferrell (2017). Broadening marketing’s contribution to data privacy
- B Schafer (2017). Speaking Truth to/as Victims–A Jurisprudential Analysis of Data Breach Notification Laws
- SH Hong, M Alazab (2017). Cybercrime and Data Breach: Privacy Protection through the Regulation of Voluntary Notification
- J Botha, M Grobler, M Eloff (2017). Global data breaches responsible for the disclosure of personal information: 2015 & 2016
- JZ Dillon (2017). Standing on the Wrong Foot: The Seventh Circuit’s Eccentric Attempt to Rescue Risk-Based Standing in Data Breach Litigation
- S Alavi (2017). Allocating Risk and Preparing for a Data Breach
2016
- Bisogni, F. (2016). Proving Limits of State Data Breach Notification Laws: Is a Federal Law the Most Adequate Solution?. Journal of Information Policy, 6, 154-205, 2016, Penn State University Press.
- EJ Dominitz (2016). To Err Is Human; to Insure, Divine: Shouldn’t Cyber Insurance Cover Data Breach Losses Arising (in Whole or in Part) from Negligence
- M Souccar (2016). Data Breach: What YOU can do about it?.
- LJ Trautman, PC Ormerod (2016). Corporate directors’ and officers’ cybersecurity standard of care: The Yahoo data breach
- D Bugni (2016). Standing Together: An Analysis of the Injury Requirement in Data Breach Class Actions
- JW Yoon (2016). Harmed by a Data Breach: Consumers May Find It Easier to Prove Standing under Seventh Circuit Decision
- EP Linehan (2016). Is the Injury Real?: The Seventh Circuit Extends Article III Standing to Data Breach Victims
- AG Dunn (2016). The Data Breach Realm
- N Beatty (2016). Standing Room Only: Solving the Injury-in-Fact Problem for Data Breach Plaintiffs
- R Wilson, SJ Shine (2016). Is Your Data Protected? A Look at Cybersecurity Regulations in the US and EU
- S Wheatley, T Maillart, D Sornette (2016). The extreme risk of personal data breaches and the erosion of privacy
- D Hanner, GZ Jin, M Luppino, T Rosenbaum (2016). Economics at the FTC: Horizontal mergers and data security
- Y Agelidis (2016). Protecting the Good, the Bad, and the Ugly: “Exposure” Data Breaches and Suggestions For Coping With Them
- C Campbell (2016). Protect your System from Cyberattacks!
- WG Voss (2016). Internal compliance mechanisms for firms in the EU General Data Protection Regulation