Search

Showing total 79 results

Search Constraints

Start Over You searched for: Topic data security failures Remove constraint Topic: data security failures Region united states Remove constraint Region: united states
79 results

Search Results

2. Challenging the Carceral Imaginary in a Digital Age: Epistemic Asymmetries and the Right to Be Forgotten.

3. Data breaches and corporate liquidity management.

4. The "Dirty Dozen" Tax Scams Plus 1.

5. Securing the Human: Employee Security Vulnerability Risk in Organizational Settings.

7. GIVING THE CYBERSECURITY MATURITY MODEL CERTIFICATION TEETH: ENSURING COMPLIANCE IN CONTRACTOR SELF-CERTIFICATIONS.

8. US Hospitals Prone to Cyberattacks Like One That Impacted Patient Care at Ascension, Experts Say.

9. State Courts and the Transformation to Virtual Courts.

10. Information Security in Libraries: Examining the Effects of Knowledge Transfer.

11. التأثري السيرباني يف األمن القومي للدول الفاعلة (الواليات املتحدة األمريكية) امنوذج.

12. Temporal Trends and Characteristics of Reportable Health Data Breaches, 2010-2017.

13. Which Nationals Use Sci-Hub Mostly?

14. Experts advise new tactics to fight data breaches.

15. Classified Information in the Public Sphere.

16. Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information.

17. The UK's faster payment project: avoiding a bonanza for cybercrime fraudsters.

19. PROTECTING PERSONAL INFORMATION: A Guide for Businesses.

20. How Inequality Distorts Economics.

22. MORE THAN A SUSPECT: An Investigation into the Connection Between Data Breaches, Identity Theft, and Data Breach Notification Laws.

23. Bidding Farewell to Privacy?: Protecting Our Secrets from the Impact of Data Aggregator Security Breaches.

24. How persuasive is phishing email? The role of authentic design, influence and current events in email judgements.

25. THE INTERPLAY BETWEEN INVESTMENT LAW AND THE DUTY OF NON-RECOGNITION IN SITUATIONS OF CONTESTED SOVEREIGNTY.

26. Privacy Perils.

27. Analysis of Industry-Specific Concentration of CPOs in Fortune 500 Companies.

28. AML deadline is Wells’ next concern; Is Zelle a target?

29. The Struggle to Define Privacy Rights and Liabilities in a Digital World and the Unfortunate Role of Constitutional Standing.

30. Are You Hip to HIPAA? Here's a refresher course.

31. DOJ probes Equifax; China bitcoin ban broadens.

32. Birds of a feather: intra-industry spillover of the Target customer data breach and the shielding role of IT, marketing, and CSR.

34. Prepare for and plan against a cyberattack.

36. Congress Debates Data Breach Legislation.

37. Too Much or Too Little? How Much Control Should Patients Have Over EHR Data?

38. Roger R. Schell on Trusted Computer Systems.

39. Authorized Investigation: A Temperate Alternative to Cyber Insecurity.

40. SOVEREIGN DEFAULT AND LITIGATION: NML CAPITAL V. ARGENTINA.

41. Why the Payment System Is Suddenly a Hot Topic in D.C.

42. Moving Towards Trusted Identities.

43. HEALTH HACKERS: QUESTIONING THE SUFFICIENCY OF REMEDIES WHEN MEDICAL INFORMATION IS COMPROMISED.

44. Taking on TJX.

45. CYBERARMIES RISING?

46. Perceived Legal Barriers to Information Sharing.

47. PLUGGING PORT HOLES.

48. THE ACQUISITION SUPPLY CHAIN AND THE SECURITY OF GOVERNMENT INFORMATION TECHNOLOGY PURCHASES.

49. REGULATING INFORMATION SECURITY IN THE GOVERNMENT CONTRACTING INDUSTRY: WILL THE RISING TIDE LIFT ALL THE BOATS?

50. Could a malpractice insurer drop you when you need it most?