Search Results

There are 10565 results for: content related to: A Case of Mistaken Identity? News Accounts of Hacker, Consumer, and Organizational Responsibility for Compromised Digital Records

  1. What Do They Really Know About Me in the Cloud? A Comparative Law Perspective on Protecting Privacy and Security of Sensitive Consumer Data

    American Business Law Journal

    Volume 50, Issue 2, Summer 2013, Pages: 413–482, Nancy J. King and V.T. Raja

    Article first published online : 28 MAY 2013, DOI: 10.1111/ablj.12012

  2. Do data breach disclosure laws reduce identity theft?

    Journal of Policy Analysis and Management

    Volume 30, Issue 2, Spring 2011, Pages: 256–286, Sasha Romanosky, Rahul Telang and Alessandro Acquisti

    Article first published online : 9 MAR 2011, DOI: 10.1002/pam.20567

  3. How things Work and Fail

    The Death of the Internet

    Markus Jakobsson, Jeff Hodges, Andy Steingruebl, Juan Caballero, Adam Barth, Dawn Song, Garth Bruen, Dimitar Nikolov, Filippo Menczer, Elie Bursztein, Ariel Rabkin, Rick Wash, Emilee Rader, Christopher Soghoian, Sid Stamm, Pages: 57–168, 2012

    Published Online : 9 JUL 2012, DOI: 10.1002/9781118312551.ch4

  4. You have free access to this content
    Empirical Analysis of Data Breach Litigation

    Journal of Empirical Legal Studies

    Volume 11, Issue 1, March 2014, Pages: 74–104, Sasha Romanosky, David Hoffman and Alessandro Acquisti

    Article first published online : 17 JAN 2014, DOI: 10.1111/jels.12035

  5. Encryption and the loss of patient data

    Journal of Policy Analysis and Management

    Volume 30, Issue 3, Summer 2011, Pages: 534–556, Amalia R. Miller and Catherine E. Tucker

    Article first published online : 24 MAY 2011, DOI: 10.1002/pam.20590

  6. Hacking

    The Dark Side of Software Engineering: Evil on Computing Projects

    Johann Rost, Robert L. Glass, Pages: 113–156, 2010

    Published Online : 22 DEC 2010, DOI: 10.1002/9780470909959.ch3

  7. Where Security Threats Will Come from in the Future

    Security 2020: Reduce Security Risks This Decade

    Doug Howard, Kevin Prince, Pages: 95–130, 2011

    Published Online : 3 NOV 2011, DOI: 10.1002/9781118255803.ch4

  8. A survey of cyber crimes

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 422–437, Yanping Zhang, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang and Hongmei Deng

    Article first published online : 13 JUL 2011, DOI: 10.1002/sec.331

  9. A sociology of hackers

    The Sociological Review

    Volume 46, Issue 4, November 1998, Pages: 757–780, Tim Jordan and Paul Taylor

    Article first published online : 28 JUN 2008, DOI: 10.1111/1467-954X.00139

  10. Preventing identity theft: New legal obligations for businesses

    Employment Relations Today

    Volume 33, Issue 3, Autumn (Fall) 2006, Pages: 71–83, Richard Haygood and Robert Hensley

    Article first published online : 6 OCT 2006, DOI: 10.1002/ert.20120

  11. What To Do When you Get Hacked

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 293–322, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch9

  12. What your firm should know about identity theft

    Journal of Corporate Accounting & Finance

    Volume 15, Issue 4, May/June 2004, Pages: 3–11, Gregory Gerard, William Hillison and Carl Pacini

    Article first published online : 19 APR 2004, DOI: 10.1002/jcaf.20016

  13. NETWORK SECURITY: VULNERABILITIES AND DISCLOSURE POLICY

    The Journal of Industrial Economics

    Volume 58, Issue 4, December 2010, Pages: 868–894, JAY PIL CHOI, CHAIM FERSHTMAN and NEIL GANDAL

    Article first published online : 24 DEC 2010, DOI: 10.1111/j.1467-6451.2010.00435.x

  14. Cybercrime and Cyberfraud

    Standard Article

    The Internet Encyclopedia

    Camille Chin

    Published Online : 15 APR 2004, DOI: 10.1002/047148296X.tie030

  15. What Has History Shown Us?

    Security 2020: Reduce Security Risks This Decade

    Doug Howard, Kevin Prince, Pages: 1–22, 2011

    Published Online : 3 NOV 2011, DOI: 10.1002/9781118255803.ch1

  16. Hackers as Tricksters of the Digital Age: Creativity in Hacker Culture

    The Journal of Popular Culture

    Volume 45, Issue 1, February 2012, Pages: 133–152, Svetlana Nikitina

    Article first published online : 22 FEB 2012, DOI: 10.1111/j.1540-5931.2011.00915.x

  17. The Effect of Data Breaches on Shareholder Wealth

    Risk Management and Insurance Review

    Volume 13, Issue 1, Spring 2010, Pages: 61–83, Kevin M. Gatzlaff and Kathleen A. McCullough

    Article first published online : 1 MAR 2010, DOI: 10.1111/j.1540-6296.2010.01178.x

  18. Identifying Aggressors and Acts of Aggression

    Information Warfare

    Daniel Ventre, Pages: 209–277, 2013

    Published Online : 21 JAN 2013, DOI: 10.1002/9781118381533.ch7

  19. E-Commerce and Information Privacy: Privacy Policies as Personal Information Protectors

    American Business Law Journal

    Volume 44, Issue 1, Spring 2007, Pages: 55–126, Corey A. Ciocchetti

    Article first published online : 22 FEB 2007, DOI: 10.1111/j.1744-1714.2007.00031.x

  20. Dynamics of organizational information security

    System Dynamics Review

    Volume 24, Issue 3, Autumn (Fall) 2008, Pages: 349–375, Amitava Dutta and Rahul Roy

    Article first published online : 13 NOV 2008, DOI: 10.1002/sdr.405