From Exposure to Response: Understanding and Managing Data Breaches
Main Article Content
Abstract
As the amount of data available to individuals, businesses, and governments on the internet increases, this may lead to data misuse. As the data available on the internet is in a huge volume, making any strategy that may be real-time or we think is effective regarding stopping or minimising data breaches is impractical. For individuals and organisations alike, the primary issue in the digital era is data breaches, which can affect any data available online. This review paper examines patterns in data breaches and their effects across sectors worldwide, as well as mitigation methods. existing This review paper aims to advance understanding of data breaches by considering case studies and the literature, and by outlining essential techniques/measure to enhance data security.
Downloads
Article Details
Section

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
References
Nalajala S (2020). Data Security in Cloud Computing Using Three-Factor Authentication. Lecture Notes in Electrical Engineering, Vol.637.https://www.researchgate.net/publication/339709490_Data_Security_in_Cloud_Computing_Using_Three-Factor_Authentication
Herath, T., & Rao, H. R. (2020). Protection motivation and deterrence: a framework for security policy compliance in organizations. European Journal of Information Systems, 18(2), 106-125.
https://www.tandfonline.com/doi/full/10.1057/ejis.2009.6
Chintala R.R(2019). FPGA implementation of Katan block cypher for security in wireless sensor networks, International Journal of Emerging Trends in Engineering Research 7(11).
https://www.warse.org/IJETER/static/pdf/file/ijeter157112019.pdf
A consolidated approach for estimation of data security breach costs, May 2016 DOI:10.1109/INFOMAN.2016.7477530
Amudhavel J, Reddy L.S.S. "Effects, challenges, opportunities and analysis on security-based cloud resource virtualization - 2017." Journal of Advanced Research in Dynamical and Control Systems, Vol. 9, Special issue 12.
6 P. R. Clearinghouse. Privacy Rights Clearinghouse’s Chronology of Data Breaches. Accessed: Nov. 2017. [Online]. Retrieved from https://www.privacyrights.org/data-breaches
Jabber B. (2019). A novel sampling approach for balancing the data and providing health care management systems for the government. International Journal of Advanced Trends in Computer Science and Engineering, Vol.8, Issue 6.https://www.warse.org/IJATCSE/static/pdf/file/ijatcse12862019.pdf
Vijaya Chandra J (2019). Authentication and authorization mechanism for cloud security, International Journal of Engineering and Advanced Technology, vol.8, Issue 6.
Gurajada L.B., Security attacks in wireless sensor networks (2018). International Journal of Engineering and Technology Vol. 7, Special Issue 32.
The role of data privacy in marketing Conceptual/Theoretical Paper Published: 22 September 2016 Volume 45, pages 135–155, (2017) https://www.researchgate.net/publication/308578866_The_Role_of_Data_Privacy_in_Marketing
Cavusoglu, H., Mishra, B., & Raghunathan, S. (2017). The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers. International Journal of Electronic Commerce, 9(I) 69-104. https://www.tandfonline.com/doi/abs/10.1080/10864415.2004.11044320
Reddy V.J (2020). Mining regular patterns in cloud databases. Test Engineering and Management, Vol.83.
C. R. Centre. Cybersecurity Incidents. Accessed: Nov. 2017. [Online]. Retrieved from
https://www.opm.gov/cybersecurity/cybersecurityincidents
Kurt C Stange (2025). Doing qualitative research. 2025 Apr 4;57(6):450–451. doi: 10.22454/FamMed.2025.142040
Creswell, J. W. (2017). Qualitative inquiry and research design: Choosing among five approaches. Thousand Oaks, CA: Sage Publications. https://psycnet.apa.org/record/2006-13099-000
Creswell, J. W. (2016). Educational research: Planning, conducting, and evaluating quantitative and qualitative research. Upper Saddle River, NJ: Pearson Education
Culnan, M. J., & Williams, C. C. (2009). How ethics can enhance organisational privacy: Lessons from the ChoicePoint and TJX data breaches. MIS Quarterly, 33(4), 673-687.
https://www.jstor.org/stable/pdf/20650322.pdf
Doyle, K. (2016). Information security in health care - four critical errors. Retrieved from
http://www.itworld.comlsecurity/68838/informationsecurity-health-care-fourcritical-errors
Experian (2019). Healthcare breaches and fraud are here to stay. Retrieved from
http://www.experian.comlblogs/databreach/2015/05/15/healthcare-breaches-fraudare-here-ostayl
Gatzlaff, K. M., & McCullough, K. A. (2010). The effect of data breaches on shareholder wealth. Risk Management and Insurance Review, 13(1), 61-83.https://econpapers.repec.org/article/blarmgtin/v_3a13_3ay_3a2010_3ai_3a1_3ap_3a61-83.htm
ITR Centre. Data Breaches Increase 40 Per cent in 2016, Finds New Report from Identity Theft Resource Centre and Cyber Scout. Accessed: Nov. 2017. [Online]. Retrieved fromhttp://www.idtheftcenter.org/2016databreaches.html
Hovav, A. & D'Arcy, J. (2019). The impact of denial-of-service attack announcements on the market value of firms, Risk Management and Insurance Review, 6(2),97-121.https://onlinelibrary.wiley.com/doi/abs/10.1046/J.1098-1616.2003.026.x
Hsu, C. W. (2009). Frame misalignment: interpreting the implementation of information systems security certification in an organization, European Journal of Information Systems, 18(2), 140-150.https://link.springer.com/article/10.1057/ejis.2009.7
ISACA. (2018). Top business/technology issues survey results. Retrieved from http://www.isaca.orglKnowledge-Center/Pages/Top-Business-Technology-IssuesSurvey-Results.aspx
ISMG. (2017). Healthcare information security today. Retrieved from http://www.healthcareinfosecurity.comlphis-survey-2021.
https://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-attacks-in-2023
https://www.breachsense.com/blog/data-breach-mitigation/
https://thecyberexpress.com/top-10-data-breaches-in-india-cybercrime/
https://www.getastra.com/blog/security-audit/list-of-data-breaches/
https://www.metacompliance.com/blog/cyber-security-awareness/emerging-technologies-and-their-impact
https://www.secoda.co/learn/most-common-types-of-data-security breaches#: ~:text=Security%20breaches%20can%20take%20various, across%20a%20multitude%20of%20industries.
https://www.lepide.com/blog/best-practices-for-your-data-breach-incident-response-plan/
https://www.eccu.edu/blog/technology/the-latest-cybersecurity-technologies-and-trends/