دانلود و نمایش مقالات مرتبط با نقض اطلاعات::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - نقض اطلاعات

تعداد مقالات یافته شده: 4
ردیف عنوان نوع
1 A framework for effective corporate communication after cyber security incidents
چارچوبی برای ارتباط موثر شرکت های بزرگ پس از حوادث امنیت سایبری-2020
A major cyber security incident can represent a cyber crisis for an organisation, in particular because of the associated risk of substantial reputational damage. As the likelihood of falling victim to a cyberattack has increased over time, so too has the need to understand exactly what is effective corporate communication after an attack, and how best to engage the concerns of customers, partners and other stakeholders. This research seeks to tackle this problem through a critical, multi-faceted investigation into the efficacy of crisis communication and public relations following a data breach. It does so by drawing on academic literature, obtained through a systematic literature review, and real-world case studies. Qualitative data analysis is used to interpret and structure the results, allowing for the development of a new, comprehensive framework for corporate communication to support companies in their preparation and response to such events. The validity of this framework is demonstrated by its evaluation through interviews with senior industry professionals, as well as a critical assessment against relevant practice and research. The framework is further refined based on these evaluations, and an updated version defined. This research represents the first grounded, comprehensive and evaluated proposal for characterising effective corporate communication after cyber security incidents.
Keywords: Cybersecurity incident | Data breach | Corporate communication | Public relations | Data breach announcements | Incident response | Cyber crisis | Security management | Resilience
مقاله انگلیسی
2 Hong Kong’s data breach notification scheme: From the stakeholders’ perspectives
طرح اعلان نقض داده هنگ کنگ: از دیدگاه ذینفعان-2020
Data breach notification laws have been enacted in an increasing number of economies around the world. These laws establish the requirement for notice in the event of a data breach incident. Although, there are a number of reasons for requiring data breaches to be notified, the primary objective of the laws is to regulate organizations’ data security practices in order to protect the data privacy of its customers. In so doing, the data reporting obligations promote accountability, transparency and trust, thereby improving the overall organizational data security environment. Opinions are, however, divided amongst various private sector stakeholders on the issue of mandatory data breach notification. Drawing on the interviews with 24 private sector representatives with interest in data breach issues, this article documents and examines their position on the appropriate regulatory approach for data breach notification in Hong Kong .© 2021 Rebecca Ong and Sandy Sabapathy. Published by Elsevier Ltd. All rights reserved.
Keywords: Hong Kong | Data breach notification | Qualitative investigation | Stakeholders’ perspectives | Review of personal data (privacy) | ordinance
مقاله انگلیسی
3 UK further education sector journey to compliance with the general data protection regulation and the data protection act 2018
سفر بخش آموزش بیشتر بریتانیا به انطباق با مقررات عمومی حفاظت از داده ها و قانون حفاظت از داده ها در سال 2018-2020
The Further Education sector provides training and qualifications to 2.2million young people and adults annually and in the process collect a wealth of data which must be properly managed to ensure it is processed in a fair and transparent manner, maintaining compliance with good information governance and data protection legislation. This article shares the findings of a study which explored the content of General Data Protection Regulation action plans, first hand accounts from data practitioners and the views of students as provides embraced the new legislation.
The article demonstrates how a sector which fills the void between schools and univer- sities is unique in the challenges they face when ensuring compliance with data protection laws. These challenges include the application of legislation, noting key differences between the nations of the United Kingdom, and the moral duties placed upon the provider by par- ents who expect open dialogue with the education provider, consistent as happened with lower levels of education. This must be balanced with the student’s right to data privacy and control over who can access their educational records .© 2021 Benjamin Phillips. Published by Elsevier Ltd. All rights reserved.
Keywords: Data protection | GDPR | Further education | Data governance | Information management | Data subject rights | Data breach | Compliance | Public sector
مقاله انگلیسی
4 Contradictions and inconsistencies in Australia’s mandatory data breach notification laws
تناقضات و تناقضات در قوانین اجباری اعلان نقض داده ها در استرالیا-2020
This article critically examines the objectives and practical operation of Australia’s mandatory data breach notification [MDBN] law. We find that the scope and application of Australia’s law do not reflect the legislative objectives underpinning the law. The wording of the law is ambiguous, and it is beset by conceptual inconsistencies. The law also fails to adequately consider the needs of individuals whose personal information has been com- promised in a data breach. As a result, Australia’s MDBN law is unlikely to meet the needs of organizations that have experienced a data breach, or of individuals who are notified. We conclude by identifying options for reform to better reflect the law’s rationale and to better achieve its objectives. Comparisons are made with similar laws in force in the United States and with the General Data Protection Regulation.© 2021 Dennis Gibson and Clive Hartfield. Published by Elsevier Ltd. All rights reserved.
Keywords: Data breach notification | Personal information | Identity theft | Notification threshold
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 1818 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 1818 :::::::: افراد آنلاین: 77