10,264 Hits in 10.4 sec

(How) Do people change their passwords after a breach? [article]

Sruti Bhagavatula, Lujo Bauer, Apu Kapadia
2020 arXiv   pre-print
participants changed their passwords after a breach announcement.  ...  To study the effectiveness of password-related breach notifications and practices enforced after a breach, we examine---based on real-world password data from 249 participants---whether and how constructively  ...  Specifically, we examine: (1) whether people with an account on a breached domain changed their passwords after the breach and how constructive these changes were; (2) the extent to which people changed  ... 
arXiv:2010.09853v1 fatcat:2nvvse4kxzbhbm5lnf3qsdy4h4

What breach? Measuring online awareness of security incidents by studying real-world browsing behavior [article]

Sruti Bhagavatula, Lujo Bauer, Apu Kapadia
2021 arXiv   pre-print
Learning about real-world security incidents and data breaches can alert people to the ways in which their information is vulnerable online, thus playing a significant role in encouraging safe security  ...  ., the Equifax breach almost universally affected people with Equifax credit reports).  ...  So as to treat incidents uniformly, we do not consider actions tailored to any specific incident (e.g., changing passwords after a password breach).  ... 
arXiv:2010.09843v4 fatcat:meaj5fv6rzewvmpq2ma3ukwn2e

Bouncing back from psychological contract breach: How commitment recovers over time

Omar N. Solinger, Joeri Hofmans, P. Matthijs Bal, Paul G. W. Jansen
2015 Journal of Organizational Behavior  
By tracking organizational commitment up until 10 weeks after the first reported breach event, we ascertain that employees may indeed bounce back from a breach incidence, albeit that some employees do  ...  a sample of young academics who reported breach events while undergoing job changes (N = 109).  ...  Conversely, people who are likely to have a nonsuccessful breach resolution (i.e., those with lower scores on component 1) typically have a lower commitment level after breach.  ... 
doi:10.1002/job.2047 fatcat:c65x4pfkivbgtmc4a45kreiz44

SoK: Anatomy of Data Breaches

Hamza Saleem, Muhammad Naveed
2020 Proceedings on Privacy Enhancing Technologies  
We use information from a variety of sources to develop our breach workflows, however, we emphasize that for many data breaches, information about crucial steps was absent.  ...  For generalizability, we present a general workflow of 50 data breaches from 2015. Based on our data breach analysis, we develop requirements that organizations need to meet to thwart data breaches.  ...  Acknowledgment This work was partly supported by a Northrop Grumman Cybersecurity Research Consortium (NGCRC) grant.  ... 
doi:10.2478/popets-2020-0067 fatcat:5f3m3q72xvcnld25lu4bb6d7cm

Data Breaches - Staying safe online in 21st Century

2021 International journal of modern trends in science and technology  
We bring people from different cities of India in this study through a survey and use the data provided by these 150 participants to examine their understanding of data privacy, their concern regarding  ...  Despite these, guidelines on how organizations can react to breaches, or how to manage information securely once it has leaked, still haveto be established.  ...  More than 300 million Twitter users were asked to change their password.  ... 
doi:10.46501/ijmtst0702023 fatcat:46sn5k4vfbes5ipzdvhdtk6s5a

Privacy-Breaching Patterns in NoSQL Databases

Kanika Goel, Arthur Hm Ter Hofstede
2021 IEEE Access  
Their contemporary relevance has increased further in the era of big data due to the demands placed on (real-time) analytics.  ...  NoSQL databases are well placed to meet these demands due to their performance, availability, scalability, and storage solutions.  ...  database or change data in a web application in an unintended manner.  ... 
doi:10.1109/access.2021.3062034 fatcat:hransnnpsbcere3wcz4l2d7jhe

Data Breaches in Europe: Reported Breaches of Compromised Personal Records in Europe, 2005-2014

Philip N. Howard, Orsolya Gulyas
2014 Social Science Research Network  
Reports of Data Breaches in Europe Introduction The internet, mobile phones, and a host of other new information technologies have allowed more and more people to conduct the business of their personal  ...  This study investigates a decade of records to help assess both the changing volume and character of data breaches, and the way in which those breaches are reported to the public in Europe.  ... 
doi:10.2139/ssrn.2554352 fatcat:tmrstmcvlfchzivgpnpdbwwptq

Modelling and analysing cognitive causes of security breaches

Rimvydas Rukšėnas, Paul Curzon, Ann Blandford
2008 Innovations in Systems and Software Engineering  
These examples demonstrate how our framework can be used (i) to detect confidentiality leaks, caused by a combination of an inappropriate design and certain aspects of human cognition, and (ii) to identify  ...  If the password box preceded the name box, people might enter their password into the name box, due to their habits (ByPrecedence condition) rather than confusion.  ...  Though their function is indicated by labels, in reality, however, people frequently do not pay sufficient attention to the labels.  ... 
doi:10.1007/s11334-008-0050-7 fatcat:crybkgprzrblpdzjorlnfn62hm

Data Breaches in Healthcare Security Systems [article]

Jahnavi Reddy, Nelly Elsayed, Zag ElSayed, Murat Ozer
2021 arXiv   pre-print
After the digitalization of the patient's records in the medical field, the healthcare/medical field has become a victim of several internal and external cyberattacks.  ...  Despite having security standards such as HIPAA (Health Insurance Portability and Accountability Act), data breaches still happen on a daily basis.  ...  Also, small healthcare organizations do not have an emergency security advisor in case of an attack or a data breach. It is always a secondary job for some other duty [27] .  ... 
arXiv:2111.00582v1 fatcat:2nvwwqvigbgevgkikwqesmhmku

Information security breaches and precautions on Industry 4.0

Adil Kondiloglu, Harun Bayer, Enes Celik, Muhammet Atalay
2017 Tehnologìčnij Audit ta Rezervi Virobnictva  
Kondiloglu a., Bayer H., Celik e., atalay m.  ...  The user's responsbility of password security has started after the user first logs in to the system and then changes the password.  ...  -Avoid unnecessary repetitions that would create a security breach on the wrong password.  ... 
doi:10.15587/2312-8372.2017.117593 fatcat:jiongjqmcrg77nasaskx6a4os4

Data breach recovery areas: an exploration of organization's recovery strategies for surviving data breaches

Zareef Mohammed
2021 Organizational Cybersecurity Journal: Practice, Process and People  
Despite the preparations an organization must take to prevent a data breach, it is still necessary to develop strategies in the event of a data breach.  ...  in developing their research in the field.  ...  Investigations suggested that the attackers used a "password spraying" attacka type of attack that uses the same password for many different accounts to avoid account lockouts, and after gaining some access  ... 
doi:10.1108/ocj-05-2021-0014 fatcat:r6ocg2zojfarpn6m542jsmty3a

Consumers' Change in Trust and Security after a Personal Data Breach in Online Shopping

Artur Strzelecki, Mariia Rizun
2022 Sustainability  
Data from 826 people affected by this incident were collected and used for drawing conclusions regarding the changes that took place after the incident.  ...  The purpose of the paper is to present the results of a study of an incident of a personal data breach from the online store that occurred in Poland.  ...  How do consumers evaluate the efficacy of the GDPR obligations after a personal data breach?  ... 
doi:10.3390/su14105866 fatcat:ifuke6h3vncvrlusus32djbzqu

Financial Analysis Of Information Security Breaches*

Faramarz Damanpour, M. Hossain Heydari
2011 International Business & Economics Research Journal  
in security breaches.  ...  The impacts are globally felt and are not restricted to a single industry or agency, but it includes academia, individual, industry, and government agencies.  ...  It also changed the way they view their Internet technology investments.  ... 
doi:10.19030/iber.v2i6.3809 fatcat:n3lsvbop2jdj5oazcx5yrekdau

Surviving Data Breaches: A Multiple Case Study Analysis

Nithya Shankar, Zareef Mohammed
2020 Journal of Comparative International Management  
Our findings have implications for organizations regarding how they could restructure their internal practices and contain the fallout after a data breach.  ...  A multiple case study approach is applied to this study, using secondary data from the case studies of Target, Anthem, and Yahoo data breaches.  ...  A number of their practices adopted after the data breach can be attributed to their survival.  ... 
doi:10.7202/1071508ar fatcat:uj2c5hzky5avdnoitu2wrwce6y

Password Security Threats and How to Protect Yourself

Tamim Alabdali, Abdulelah Alghamdi
2022 Zenodo  
There is no doubt that the majority of people need to rethink their password security.  ...  This should not be a surprise knowing that many people follow insecure ways of handling passwords including reusing the same password for different accounts.  ...  could contain millions or even billions of login credentials, besides that people are attempting to reuse their passwords on multiple services.  ... 
doi:10.5281/zenodo.6556648 fatcat:tj3pqwmjjreyjkaoqaimtvebgi
« Previous Showing results 1 — 15 out of 10,264 results