The Proceedings of the Conference on Information Systems Applied Research 2009: §3563    Home    Papers/Indices    prev (§3562)    Next (§3564)
Sat, Nov 7, 2:30 - 2:55, Crystal 6     Paper (refereed)
Recommended Citation: Guerra, M, M Joseph, E Ramirez, K S Koong, and L C Liu.  Some Observations on the Occurrences of Data Breaches.  In The Proceedings of the Conference on Information Systems Applied Research 2009, v 2 (Washington DC): §3563. ISSN: 0000-0000.
CDpic

Some Observations on the Occurrences of Data Breaches

thumb
Refereed10 pages
Mario Guerra    [a1] [a2]
Computer Information Systems and Quantitative Methods Department
The University of Texas Pan American    [u1] [u2]
Edinburg, Texas, USA    [c1] [c2]

Murphy Joseph    [a1] [a2]
Computer Information Systems and Quantitative Methods Department
The University of Texas Pan American    [u1] [u2]
Edinburg, Texas, USA    [c1] [c2]

Ernest Ramirez    [a1] [a2]
Computer Information Systems and Quantitative Methods Department
The University of Texas Pan American    [u1] [u2]
Edinburg, Texas, USA    [c1] [c2]

Kai S. Koong    [a1] [a2]
Computer Information Systems and Quantitative Methods Department
The University of Texas Pan American    [u1] [u2]
Edinburg, Texas, USA    [c1] [c2]

Lai C. Liu    [a1] [a2]
Computer Information Systems and Quantitative Methods Department
The University of Texas Pan American    [u1] [u2]
Edinburg, Texas, USA    [c1] [c2]

This study examines the occurrences of data breaches that were reported to have occurred in the United States. Specifically, this research deals with all those data breaches that were reported to Privacy Rights Clearinghouse (PRC) from 2005 to the first quarter of 2009. First, based on the number of breaches reported and the number of records compromised, businesses represented the leading category affected. The rate of breaches being reported is slowly decreasing. Like in the case of previous studies, laptops are the most commonly stolen hardware reported.

Keywords: data breaches, computer security, data breaches trends, data breaches characteristics

Read this refereed paper in Adobe Portable Document (PDF) format. (10 pages, 508 K bytes)
Preview this refereed paper in Plain Text (TXT) format. (24 K bytes)

CDpic
Comments and corrections to
webmaster@isedj.org