From Exposure to Response: Understanding and Managing Data Breaches

Main Article Content

Raja Irfan Ahmad

Abstract

As the amount of data available to individuals, businesses, and governments on the internet increases, this may lead to data misuse. As the data available on the internet is in a huge volume, making any strategy that may be real-time or we think is effective regarding stopping or minimising data breaches is impractical.  For individuals and organisations alike, the primary issue in the digital era is data breaches, which can affect any data available online. This review paper examines patterns in data breaches and their effects across sectors worldwide, as well as mitigation methods. existing This review paper aims to advance understanding of data breaches by considering case studies and the literature, and by outlining essential techniques/measure to enhance data security.

Downloads

Download data is not yet available.

Article Details

Section

Articles

How to Cite

[1]
Raja Irfan Ahmad , Tran., “From Exposure to Response: Understanding and Managing Data Breaches”, IJIES, vol. 13, no. 2, pp. 11–21, Feb. 2026, doi: 10.35940/ijies.C1217.13020226.
Share |

References

Nalajala S (2020). Data Security in Cloud Computing Using Three-Factor Authentication. Lecture Notes in Electrical Engineering, Vol.637.https://www.researchgate.net/publication/339709490_Data_Security_in_Cloud_Computing_Using_Three-Factor_Authentication

Herath, T., & Rao, H. R. (2020). Protection motivation and deterrence: a framework for security policy compliance in organizations. European Journal of Information Systems, 18(2), 106-125.

https://www.tandfonline.com/doi/full/10.1057/ejis.2009.6

Chintala R.R(2019). FPGA implementation of Katan block cypher for security in wireless sensor networks, International Journal of Emerging Trends in Engineering Research 7(11).

https://www.warse.org/IJETER/static/pdf/file/ijeter157112019.pdf

A consolidated approach for estimation of data security breach costs, May 2016 DOI:10.1109/INFOMAN.2016.7477530

Amudhavel J, Reddy L.S.S. "Effects, challenges, opportunities and analysis on security-based cloud resource virtualization - 2017." Journal of Advanced Research in Dynamical and Control Systems, Vol. 9, Special issue 12.

6 P. R. Clearinghouse. Privacy Rights Clearinghouse’s Chronology of Data Breaches. Accessed: Nov. 2017. [Online]. Retrieved from https://www.privacyrights.org/data-breaches

Jabber B. (2019). A novel sampling approach for balancing the data and providing health care management systems for the government. International Journal of Advanced Trends in Computer Science and Engineering, Vol.8, Issue 6.https://www.warse.org/IJATCSE/static/pdf/file/ijatcse12862019.pdf

Vijaya Chandra J (2019). Authentication and authorization mechanism for cloud security, International Journal of Engineering and Advanced Technology, vol.8, Issue 6.

https://www.researchgate.net/publication/335842661_Authentication_and_Authorization_Mechanism_for_Cloud_Security

Gurajada L.B., Security attacks in wireless sensor networks (2018). International Journal of Engineering and Technology Vol. 7, Special Issue 32.

https://www.researchgate.net/publication/324817452_Security_Attacks_in_Wireless_Sensor_Networks_A_Survey

The role of data privacy in marketing Conceptual/Theoretical Paper Published: 22 September 2016 Volume 45, pages 135–155, (2017) https://www.researchgate.net/publication/308578866_The_Role_of_Data_Privacy_in_Marketing

Cavusoglu, H., Mishra, B., & Raghunathan, S. (2017). The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers. International Journal of Electronic Commerce, 9(I) 69-104. https://www.tandfonline.com/doi/abs/10.1080/10864415.2004.11044320

Reddy V.J (2020). Mining regular patterns in cloud databases. Test Engineering and Management, Vol.83.

C. R. Centre. Cybersecurity Incidents. Accessed: Nov. 2017. [Online]. Retrieved from

https://www.opm.gov/cybersecurity/cybersecurityincidents

Kurt C Stange (2025). Doing qualitative research. 2025 Apr 4;57(6):450–451. doi: 10.22454/FamMed.2025.142040

Creswell, J. W. (2017). Qualitative inquiry and research design: Choosing among five approaches. Thousand Oaks, CA: Sage Publications. https://psycnet.apa.org/record/2006-13099-000

Creswell, J. W. (2016). Educational research: Planning, conducting, and evaluating quantitative and qualitative research. Upper Saddle River, NJ: Pearson Education

https://www.researchgate.net/publication/324451568_Educational_Research_Planning_Conducting_and_Evaluating_Quantitative_and_Qualitative_Research_6th_Edition

Culnan, M. J., & Williams, C. C. (2009). How ethics can enhance organisational privacy: Lessons from the ChoicePoint and TJX data breaches. MIS Quarterly, 33(4), 673-687.

https://www.jstor.org/stable/pdf/20650322.pdf

Doyle, K. (2016). Information security in health care - four critical errors. Retrieved from

http://www.itworld.comlsecurity/68838/informationsecurity-health-care-fourcritical-errors

Experian (2019). Healthcare breaches and fraud are here to stay. Retrieved from

http://www.experian.comlblogs/databreach/2015/05/15/healthcare-breaches-fraudare-here-ostayl

Gatzlaff, K. M., & McCullough, K. A. (2010). The effect of data breaches on shareholder wealth. Risk Management and Insurance Review, 13(1), 61-83.https://econpapers.repec.org/article/blarmgtin/v_3a13_3ay_3a2010_3ai_3a1_3ap_3a61-83.htm

ITR Centre. Data Breaches Increase 40 Per cent in 2016, Finds New Report from Identity Theft Resource Centre and Cyber Scout. Accessed: Nov. 2017. [Online]. Retrieved fromhttp://www.idtheftcenter.org/2016databreaches.html

Hovav, A. & D'Arcy, J. (2019). The impact of denial-of-service attack announcements on the market value of firms, Risk Management and Insurance Review, 6(2),97-121.https://onlinelibrary.wiley.com/doi/abs/10.1046/J.1098-1616.2003.026.x

Hsu, C. W. (2009). Frame misalignment: interpreting the implementation of information systems security certification in an organization, European Journal of Information Systems, 18(2), 140-150.https://link.springer.com/article/10.1057/ejis.2009.7

ISACA. (2018). Top business/technology issues survey results. Retrieved from http://www.isaca.orglKnowledge-Center/Pages/Top-Business-Technology-IssuesSurvey-Results.aspx

ISMG. (2017). Healthcare information security today. Retrieved from http://www.healthcareinfosecurity.comlphis-survey-2021.

https://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-attacks-in-2023

https://www.breachsense.com/blog/data-breach-mitigation/

https://burningtree.co.uk/data-breaches-unveiled-lesson-learned-and-best-practices/#:~:text=1.,of%20their%20most%20valuable%20assets.

https://perception-point.io/guides/endpoint-security/7-data-leakage-prevention-tips-to-prevent-the-next-breach/

https://thecyberexpress.com/top-10-data-breaches-in-india-cybercrime/

https://www.getastra.com/blog/security-audit/list-of-data-breaches/

https://www.metacompliance.com/blog/cyber-security-awareness/emerging-technologies-and-their-impact

https://www.secoda.co/learn/most-common-types-of-data-security breaches#: ~:text=Security%20breaches%20can%20take%20various, across%20a%20multitude%20of%20industries.

https://www.lepide.com/blog/best-practices-for-your-data-breach-incident-response-plan/

https://www.eccu.edu/blog/technology/the-latest-cybersecurity-technologies-and-trends/

Most read articles by the same author(s)

<< < 2 3 4 5 6 7 8 9 > >>