361:
336:
252:
231:
133:
262:
77:
53:
518:
437:
22:
167:
449:
681:
Thomas, Kurt, Frank Li, Ali Zand, Jacob
Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Daniel Margolis, Vern Paxson, and Elie Bursztein. 2017. “Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials.” Proceedings of
404:
It seems odd, also, that articles relating to this are marked by various groups as being of low importance. I have a feeling that different fields refer to some things with different vocabularies. The priorities of the different groups thereby seem low, but they are not taken together. In other
643:
Thomas Kurt, Jennifer
Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelly, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Savar Patel, Dan Boneh, and Elie Bursztein. 2019. “Protecting accounts from credential Studding with Password Breach Alerting.” 28th {USENIX} Security Symposium
677:
Park, Sangchul. 2019. "Why information security law has been ineffective in addressing security vulnerabilities: Evidence from
California data breach notifications and relevant court and government records." International Review of Law and Economics
673:
Zou, Yixin, Shawn Danino, Kaiwen Sun, and
Florian Schaub. 2019. “You Might Be Affected: An Empirical Analysis of Readability and Usability Issues in Data Breach Notifications.” Proceedings of the 2019 CHI Conference on Human Factors in Computing
636:
Karunakaran, Sowmya, Kurt Thomas, Elie
Bursztein, and Oxana Comanescu. 2018. “Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data.” Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018).:
530:
609:
Ronaldson, Nicholas. 2019. “Hacking: The Naked Age
Cybercrime, Clapper Standing, and the Debate Between State and Federal Data Breach Notification Laws.” Northwestern Journal of Technology and Intellectual Property 16(4):
663:
Greenleaf, Graham. 2018 "The Legal and
Business Risks of Inconsistencies and Gaps in Coverage in Asian Data Protection Laws." Session II Materials, Asian Business Law Institute (ABLI) Data Privacy Forum, Singapore. 7:
570:
Bisogni, Fabio and Hadi
Asghari. “More than a Suspect: An Investigation into the Connection Between Data Breaches, Identity Theft, and Data Breach Notification Laws.” Journal of Information Policy 10:45-82.
797:
I think this is best thought of not in terms of which term is more common, but in terms of what the actual scope of the article is - a data breach is a type of security breach, not a synonym for one (note
656:
Song, Dong Hyun, and Chang Yong Son. 2017. "Mismanagement of personally identifiable information and the reaction of interested parties to safeguarding privacy in South Korea." University of Boras, Sweden
405:
words, I think that lots of different groups see data privacy issues as important. Might they just be talking about the issue in incompatible ways, thereby making it look as though this is a niche issue?
628:
Tschider, Charlotte A. 2015 "Experimenting with
Privacy: Driving Efficiency Through a State-Informed Federal Data Breach Notification and Data Protection Law." Tul. J. Tech. & Intell. Prop. 18:46-78.
582:
Garcia, Flora J. 2006. "Data protection, breach notification, and the interplay between state and federal law: The experiments need more time." Fordham Intell. Prop. Media & Ent. LJ 17: 693-727.
670:
Goel, Sanjay, and Hany A. Shawky. "The impact of federal and state notification laws on security breach announcements." Communications of the
Association for Information Systems 34(1):37-46.
613:
Sahara, Williams. 2020. "CCPA Tipping the Scales: Balancing Individual Privacy with Corporate Innovation for a Comprehensive Federal Data Protection Law," Indiana Law Review 53(1): 217-243.
851:
588:
Ishii, Kaori, and Taro Komukai. 2016. "A comparative legal study on data breaches in Japan, the US, and the UK." 12th IFIP International Conference on Human Choice and Computers 86-105.
579:
Ferguson III, James H. 2020. “Protecting Personal Data: A Survey of Consumer Protections Throughout North Carolina’s Identity Theft Protection Act.” Campbell Law Review. 42(7):191-214.
573:
Burdon, Mark. 2010. "Contextualizing the tensions and weaknesses of information privacy and data breach notification laws." Santa Clara Computer & High Tech. LJ 27(1): 63-129.
594:
Lee, Samuel. 2006. "Breach notification laws: Notification requirements and data safeguarding now apply to everyone, including entrepreneurs." Entrepreneurial Bus. LJ 1: 125-151.
511:
430:
558:
123:
660:
Greenleaf, Graham, and Whon-il Park. 2014 "South Korea's innovations in data privacy principles: Asian comparisons." Computer Law & Security Review 30(5): 492-505.
505:
667:
Rich, Cynthia. 2014. “A Look at New Trends: Privacy Laws in East, Central, and South Asia and the Pacific.” Privacy and security law report. No. 13. Law Report 1-14.
198:
576:
Daly, Angela. 2018."The introduction of data breach notification legislation in Australia: A comparative view." Computer law & security review 34(3): 477-495.
846:
117:
591:
Joerling, Jill. 2010. Data breach notification laws: An argument for a comprehensive federal law to protect consumer data. Wash. UJL & Pol'y, 32, 467-488.
647:
Ford, Janet C., Barbara Jo White, and Kristin M. White. 2015. "AFTER THE DATA BREACH: NOTIFICATION LAWS AND MORE." Issues in Information Systems 16(4):86-93.
600:
Pattanasri, Thanaphol. 2018. “Mandatory Data Breach Notification and Hacking the Smart Home: A Legal Response to Cybersecurity?” QUT L. Rev. 18:268-289.
345:
778:
774:
697:
685:
Maurushat, Alana.2009. "Data Breach Notification Law Across the World from California to Australia." Privacy Law and Business International 1-5.
616:
Sen, Ravi. 2018. “Challenges to Cybersecurity: Current State of Affairs.” Communications of the Association for Information Systems 43(2):22-38.
379:
861:
841:
806:). But the scope of this article is about laws specifically governing notifications of data breahces, not other types of security breaches, so
314:
93:
597:
Needles, Sara A. 2009. “The Data Game: Learning to Love the State-Based approach to Data Breach Notification Law.” NCL Rev. 88(8):267-310.
720:
Subsequent comments should be made in a new section on the talk page. Editors desiring to contest the closing decision should consider a
767:
603:
Picanso, Kathryn. E. 2006. Protecting information security under a uniform data breach notification law. Fordham L. Rev., 75:355-390.
546:
493:
790:
741:
625:
Tom, Jacqueline May. 2010. "A simple compromise: The need for a federal data breach notification law." John's L. Rev. 84: 1569-1603.
650:
Greenleaf, Graham. 2011."Taiwan revises its Data Protection Act." Privacy Laws & Business International Report 108: 2010-2011.
871:
156:
84:
58:
856:
818:
585:
Honeywill, Sean C. 2006. "Data Security and Data Breach Notification for Financial Institutions." NC Banking Inst. 10: 269-304.
622:
Toh, Ying Lei. 2018. “Incentivizing Firms to Protect Consumer Data: Can Reputation Play a (Bigger) Role?” Working Paper 1-42.
606:
Regan, Priscilla M. 2009. "Federal Security Breach Notifications: Politics and Approaches." Berkeley Tech. LJ 24: 1103-1132.
881:
619:
Shaw, Abraham. 2009. "Data breach: from notification to prevention using PCI DSS." Colum. JL & Soc. Probs. 43: 517-562.
304:
828:
Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.
564:
398:
886:
747:
876:
346:
http://searchsecurity.techtarget.com/news/450409941/Yahoo-breach-data-reveals-the-need-for-ethical-breach-reporting
640:
Romanosky, Sasha. 2016. “Examining the Costs and Causes of Cyber Incidents.” Journal of Cybersecurity 2(2):121-135
207:
Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
866:
702:
142:
63:
423:
751:
375:
279:, an attempt at providing a comprehensive, standardised, pan-jurisdictional and up-to-date resource for the
653:
Ritchey, Katherine, et al. 2013."Global Privacy and Data Security Developments-2013." Bus. Law. 69: 245-254
371:
33:
711:
367:
275:
236:
693:
181:
724:
after discussing it on the closer's talk page. No further edits should be made to this discussion.
92:
on Knowledge. If you would like to participate, please visit the project page, where you can join
521:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
440:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
21:
786:
763:
721:
39:
754:– More common per Google Scholar results (see below) and consistent with the main article,
419:
411:
8:
737:
689:
469:
453:
554:
501:
473:
461:
210:
Find editors who have shown interest in this subject and ask them to take a look here.
457:
176:
89:
813:
782:
759:
397:
This article seems unnecessarily US-centric. It does not, for example, mention the
682:
the 2017 ACM SIGSAC Conference on Computer and Communications Security: 1421-1434.
799:
477:
341:
The following references may be useful when improving this article in the future:
733:
481:
465:
335:
835:
550:
497:
415:
538:
485:
810:
758:. This article already defines its scope as restricted to data breaches.
755:
534:
267:
132:
251:
230:
517:
436:
261:
803:
76:
52:
166:
852:
Stub-Class Computer Security articles of Unknown-importance
392:
330:
280:
366:
On 24 March 2024, it was proposed that this article be
512:
Wiki Education Foundation-supported course assignment
431:
Wiki Education Foundation-supported course assignment
257:
88:, a collaborative effort to improve the coverage of
188:Review importance and quality of existing articles
122:This article has not yet received a rating on the
833:
632:Less than 15 pages, but still useful articles:
191:Identify categories related to Computer Security
847:Unknown-importance Computer Security articles
710:The following is a closed discussion of a
197:Identify articles for creation (see also:
19:
547:Template:Dashboard.wikiedu.org assignment
494:Template:Dashboard.wikiedu.org assignment
179:. Please allow some days for processing.
545:Above undated message substituted from
492:Above undated message substituted from
102:Knowledge:WikiProject Computer Security
834:
105:Template:WikiProject Computer Security
862:Unknown-importance Computing articles
842:Stub-Class Computer Security articles
729:The result of the move request was:
355:
273:This article is within the scope of
82:This article is within the scope of
15:
401:and other laws in other countries.
283:and the subjects encompassed by it.
38:It is of interest to the following
13:
644:({USENIX} Security 19).: 1556-1571
526:
522:
445:
441:
165:
131:
14:
898:
748:Security breach notification laws
372:Security breach notification laws
204:Identify articles for improvement
824:The discussion above is closed.
529:. Further details are available
516:
448:. Further details are available
435:
359:
334:
260:
250:
229:
75:
51:
20:
309:This article has been rated as
872:All Computer Security articles
408:22:21, 31 October 2018 (UTC)
1:
857:Stub-Class Computing articles
752:Data breach notification laws
376:Data breach notification laws
175:will be generated shortly by
157:WikiProject Computer Security
140:This article is supported by
96:and see a list of open tasks.
85:WikiProject Computer Security
703:Requested move 24 March 2024
698:02:02, 18 October 2020 (UTC)
559:08:53, 17 January 2022 (UTC)
506:08:53, 17 January 2022 (UTC)
7:
882:Low-importance law articles
10:
903:
819:15:50, 25 March 2024 (UTC)
791:20:33, 24 March 2024 (UTC)
768:20:33, 24 March 2024 (UTC)
565:Bibliography (in progress)
315:project's importance scale
124:project's importance scale
108:Computer Security articles
742:01:52, 2 April 2024 (UTC)
308:
289:Knowledge:WikiProject Law
245:
150:
139:
121:
70:
46:
887:WikiProject Law articles
826:Please do not modify it.
773:Google Scholar results:
717:Please do not modify it.
292:Template:WikiProject Law
877:Stub-Class law articles
867:All Computing articles
781:("security breach..")
777:("data breach..") vs
170:
136:
28:This article is rated
533:. Student editor(s):
452:. Student editor(s):
169:
143:WikiProject Computing
135:
194:Tag related articles
155:Things you can help
182:More information...
537:. Peer reviewers:
531:on the course page
456:. Peer reviewers:
450:on the course page
171:
137:
34:content assessment
442:19 September 2020
427:
414:comment added by
390:
389:
354:
353:
329:
328:
325:
324:
321:
320:
224:
223:
220:
219:
216:
215:
99:Computer Security
90:computer security
59:Computer Security
894:
719:
561:
528:
524:
520:
508:
447:
446:19 December 2020
443:
439:
409:
378:. The result of
363:
362:
356:
338:
331:
297:
296:
293:
290:
287:
270:
265:
264:
254:
247:
246:
241:
233:
226:
225:
199:Article requests
184:
152:
151:
110:
109:
106:
103:
100:
79:
72:
71:
66:
55:
48:
47:
31:
25:
24:
16:
902:
901:
897:
896:
895:
893:
892:
891:
832:
831:
830:
829:
816:
815:it has begun...
800:security breach
715:
705:
567:
544:
514:
491:
433:
395:
360:
294:
291:
288:
285:
284:
276:WikiProject Law
266:
259:
239:
185:
180:
107:
104:
101:
98:
97:
61:
32:on Knowledge's
29:
12:
11:
5:
900:
890:
889:
884:
879:
874:
869:
864:
859:
854:
849:
844:
823:
822:
821:
814:
794:
793:
745:
727:
726:
712:requested move
706:
704:
701:
690:Nicholas100000
687:
686:
683:
679:
675:
674:Systems.:1-14.
671:
668:
665:
661:
658:
654:
651:
648:
645:
641:
638:
630:
629:
626:
623:
620:
617:
614:
611:
607:
604:
601:
598:
595:
592:
589:
586:
583:
580:
577:
574:
571:
566:
563:
513:
510:
470:Plusoneplusone
454:Nicholas100000
432:
429:
394:
391:
388:
387:
380:the discussion
364:
352:
351:
350:
349:
348:
342:
339:
327:
326:
323:
322:
319:
318:
311:Low-importance
307:
301:
300:
298:
272:
271:
255:
243:
242:
240:Low‑importance
234:
222:
221:
218:
217:
214:
213:
212:
211:
208:
205:
202:
195:
192:
189:
173:Article alerts
164:
161:
160:
148:
147:
138:
128:
127:
120:
114:
113:
111:
94:the discussion
80:
68:
67:
56:
44:
43:
37:
26:
9:
6:
4:
3:
2:
899:
888:
885:
883:
880:
878:
875:
873:
870:
868:
865:
863:
860:
858:
855:
853:
850:
848:
845:
843:
840:
839:
837:
827:
820:
817:
812:
809:
805:
802:redirects to
801:
796:
795:
792:
788:
784:
780:
776:
772:
771:
770:
769:
765:
761:
757:
753:
749:
744:
743:
739:
735:
732:
725:
723:
718:
713:
708:
707:
700:
699:
695:
691:
684:
680:
676:
672:
669:
666:
662:
659:
655:
652:
649:
646:
642:
639:
635:
634:
633:
627:
624:
621:
618:
615:
612:
608:
605:
602:
599:
596:
593:
590:
587:
584:
581:
578:
575:
572:
569:
568:
562:
560:
556:
552:
548:
542:
540:
536:
532:
519:
509:
507:
503:
499:
495:
489:
487:
483:
479:
475:
474:Showtime oski
471:
467:
463:
462:Exploredragon
459:
455:
451:
438:
428:
425:
421:
417:
413:
406:
402:
400:
385:
381:
377:
373:
369:
365:
358:
357:
347:
344:
343:
340:
337:
333:
332:
316:
312:
306:
303:
302:
299:
282:
278:
277:
269:
263:
258:
256:
253:
249:
248:
244:
238:
235:
232:
228:
227:
209:
206:
203:
200:
196:
193:
190:
187:
186:
183:
178:
174:
168:
163:
162:
158:
154:
153:
149:
145:
144:
134:
130:
129:
125:
119:
116:
115:
112:
95:
91:
87:
86:
81:
78:
74:
73:
69:
65:
60:
57:
54:
50:
49:
45:
41:
35:
27:
23:
18:
17:
825:
807:
746:
730:
728:
716:
709:
688:
631:
543:
527:31 July 2021
515:
490:
458:Jameswang323
434:
410:— Preceding
407:
403:
396:
383:
310:
295:law articles
274:
172:
141:
83:
40:WikiProjects
783:Buidhe paid
760:Buidhe paid
756:data breach
734:– robertsky
722:move review
678:58:132-145.
523:17 May 2021
281:legal field
836:Categories
811:* Pppery *
478:Hiiisparks
268:Law portal
30:Stub-class
482:Lolabaylo
466:Madssnake
177:AAlertBot
64:Computing
804:security
610:305-321.
551:PrimeBOT
498:PrimeBOT
424:contribs
416:RayKiddy
412:unsigned
393:Untitled
808:support
637:217-234
539:Fsharbi
486:HanMiKC
313:on the
731:moved.
657:22(4).
36:scale.
779:~1200
775:~1500
535:Svn38
384:moved
370:from
368:moved
159:with:
787:talk
764:talk
738:talk
694:talk
664:1-4.
555:talk
525:and
502:talk
444:and
420:talk
399:GDPR
382:was
549:by
496:by
374:to
305:Low
286:Law
237:Law
118:???
838::
789:)
766:)
750:→
740:)
714:.
696:)
557:)
541:.
504:)
488:.
484:,
480:,
476:,
472:,
468:,
464:,
460:,
426:)
422:•
62::
785:(
762:(
736:(
692:(
553:(
500:(
418:(
386:.
317:.
201:)
146:.
126:.
42::
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.