User Compensation as a Data Breach Recovery Action: An Investigation of the Sony PlayStation Network Breach
نویسندگان
چکیده
To gather articles, we searched three literature databases of Scopus, ABI/Inform, and Google Scholar. We looked for all articles that contained various keywords, such as “data breach,” “security breach,” “privacy breach,” and “information breach.” We then narrowed our focus to include scholarly articles, excluding articles in the popular and practitioner media. Most of the articles identified in this step were conceptual. From this group, we collected all empirical studies of data breaches published in IS journals over the last 10 years, shown in Table A1. We adapted level of analysis categorizations from Smith et al. (2011) and Belanger and Crossler (2011). For each study, we also recorded the timing of the study to reflect the relationship between when the phenomenon occurred and when the study was conducted.
منابع مشابه
Economic analysis of contractual breach sanctions
The conclusion of any contract aims at implementation of the obligations arising from it. Morality dictates that people adhere to what they assumed regarding others. The law also supported the moral judgment and in case of breach of obligations to oblige, compensation as a sanction is imposed on obligor. In view of the economic analysis, he also committed to respect his contract and the Contrac...
متن کاملThe principles Govering Remedies for Breach of Contract According to Expectation Interest In The Modern European law and Iranian law
Freedom of choosing an efficient remedy after the breach of contract, Cumulation of homogeneous remedies and the right to change the selected remedy in modern European contract law have been accepted via the approach of support of the injured party`s expectation interest. The consideration of these principles indicates that the remedies for breach of contract are not concerned in itself and ...
متن کاملExperimental Study of Breaching of an Earthen Dam using a Fuse Plug Model
Failure of dams due to overtopping is among the most frequent forms of embankment failures. Owing to massive and wide spread damage to structures and loss of lives associated with a dam failure, the subject has drawn the attention of scientists. The study also becomes essential for damage assessment and for development of early warning system of people downstream of the embankment. The rate of ...
متن کاملThe Investigation and Analysis of the Strengths, Weaknesses, Opportunities, and Threats of Wearable Electronic Technologies: A Systematic Review
Introduction: Wearable electronic devices, which are based on Internet of Things (IoT) and big data computing, are able to continuously collect and process the physiological and environmental data and exchange them with other tools, users, and internet networks. Therefore, despite their potential benefits in health monitoring, they can pose serious risks, especially in breach of privacy. Hence...
متن کاملThe Investigation and Analysis of the Strengths, Weaknesses, Opportunities, and Threats of Wearable Electronic Technologies: A Systematic Review
Introduction: Wearable electronic devices, which are based on Internet of Things (IoT) and big data computing, are able to continuously collect and process the physiological and environmental data and exchange them with other tools, users, and internet networks. Therefore, despite their potential benefits in health monitoring, they can pose serious risks, especially in breach of privacy. Hence...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- MIS Quarterly
دوره 41 شماره
صفحات -
تاریخ انتشار 2017