Data breach o violazione dei dati?

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adaptive forecasting on functional data Previsione adattiva per dati funzionali

Statistical methods for data representing functions or curves have received much attention in recent years. Such data, known in literature as functional data (Ramsay and Silverman, 1997), has received in the last years a large interest for research, especially due to the difficulty to deal with infinite dimensional spaces in the context of classical multivariate methods. Examples of functional ...

متن کامل

An Analysis of HIPAA Breach Data

As software developers, we have a responsibility to protect our user’s data. When this data is protected health information (PHI), breaches can have serious financial and reputational consequences. The goal of this research is to analyze trends in breaches of PHI that point to software design guidelines that can prevent or lessen the impact of breaches. We examine the US Office of Civil Rights ...

متن کامل

Empirical Analysis of Data Breach Litigation

and 7 anonymous attorneys for their valuable insights and suggestions. Abstract In recent years, many individuals have sought legal redress for harms caused by the loss or theft of their personal information. However, very little is known about the drivers, mechanics, and outcomes of these lawsuits, making it difficult to assess the effectiveness of litigation at balancing organizations' usage ...

متن کامل

From data breach to information stewardship

This journal and the individual contributions contained in it are protected under copyright by Elsevier Ltd, and the following terms and conditions apply to their use: Photocopying Single photocopies of single articles may be made for personal use as allowed by national copyright laws. Permission of the publisher and payment of a fee is required for all other photocopying, including multiple or...

متن کامل

User Compensation as a Data Breach Recovery Action: An Investigation of the Sony PlayStation Network Breach

To gather articles, we searched three literature databases of Scopus, ABI/Inform, and Google Scholar. We looked for all articles that contained various keywords, such as “data breach,” “security breach,” “privacy breach,” and “information breach.” We then narrowed our focus to include scholarly articles, excluding articles in the popular and practitioner media. Most of the articles identified i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Italiano digitale

سال: 2020

ISSN: 2532-9006

DOI: 10.35948/2532-9006/2020.3320