How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management

[1]  Sean W. Smith,et al.  Why Do Street-Smart People Do Stupid Things Online? , 2008, IEEE Secur. Priv..

[2]  Annie I. Antón,et al.  The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information , 2007, IEEE Security & Privacy.

[3]  Philip N. Howard,et al.  A Case of Mistaken Identity? News Accounts of Hacker, Consumer, and Organizational Responsibility for Compromised Digital Records , 2007, J. Comput. Mediat. Commun..

[4]  Vincent I. Polley,et al.  A Coherent Strategy for Data Security through Data Governance , 2007, IEEE Security & Privacy.

[5]  M. Eric Johnson,et al.  Embedding Information Security into the Organization , 2007, IEEE Security & Privacy.

[6]  Sidney W. A. Dekker,et al.  Doctors Are More Dangerous Than Gun Owners: A Rejoinder to Error Counting , 2007, Hum. Factors.

[7]  Albert Boquet,et al.  Human Error and Commercial Aviation Accidents: An Analysis Using the Human Factors Analysis and Classification System , 2007, Hum. Factors.

[8]  P. Carayon,et al.  Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists. , 2007, Applied ergonomics.

[9]  Maria Kjaerland,et al.  A taxonomy and comparison of computer security incidents from the commercial and government sectors , 2006, Comput. Secur..

[10]  Bala Iyer,et al.  Analyzing Complementarities Using Software Stacks for Software Industry Acquisitions , 2006, J. Manag. Inf. Syst..

[11]  Bala Iyer,et al.  Using Software Stacks to Explain Complementarities: The Case of Mergers and Acquisitions in the Software Industry , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[12]  C. Drury,et al.  Medical Error and Human Factors Engineering: Where Are We Now? , 2006, American journal of medical quality : the official journal of the American College of Medical Quality.

[13]  Robert W. Reeder,et al.  Improving user-interface dependability through mitigation of human error , 2005, Int. J. Hum. Comput. Stud..

[14]  Jeffrey M. Stanton,et al.  Analysis of end user security behaviors , 2005, Comput. Secur..

[15]  Annie I. Antón,et al.  Inside JetBlue's privacy policy violations , 2004, IEEE Security & Privacy Magazine.

[16]  Huseyin Cavusoglu,et al.  The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers , 2004, Int. J. Electron. Commer..

[17]  James A. Lewis Cyber terror: Missing in action , 2003 .

[18]  Ashish Garg,et al.  Quantifying the financial impact of IT security breaches , 2003, Inf. Manag. Comput. Secur..

[19]  Lei Zhou,et al.  The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market , 2003, J. Comput. Secur..

[20]  David W. Chadwick,et al.  Patient Privacy in Electronic Prescription Transfer , 2003, IEEE Secur. Priv..

[21]  James A. Landay,et al.  Modeling Privacy Control in Context-Aware Systems , 2002, IEEE Pervasive Comput..

[22]  M. Culnan Protecting Privacy Online: Is Self-Regulation Working? , 2000 .

[23]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[24]  K. B. Hendricks,et al.  Quality awards and the market value of the firm: an empirical investigation , 1996 .

[25]  Mica R. Endsley,et al.  Toward a Theory of Situation Awareness in Dynamic Systems , 1995, Hum. Factors.

[26]  F. Paul Wilson,et al.  Root Cause Analysis : A Tool for Total Quality Management , 1993 .

[27]  Charles Cresson Wood,et al.  Human error: an overlooked but significant information security problem , 1993, Comput. Secur..

[28]  P F Lourens,et al.  Error analysis and applications in transportation systems. , 1989, Accident; analysis and prevention.

[29]  W. Ware A Taxonomy for Privacy , 1981 .

[30]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[31]  David Hylender,et al.  Data Breach Investigations Report , 2011 .

[32]  L Dales,et al.  Privacy Protection , 2008, Encyclopedia of Multimedia.

[33]  R Key Dismukes,et al.  The Limits of Expertise: Rethinking Pilot Error and the Causes of Airline Accidents , 2007 .

[34]  E. Eugene Schultz,et al.  The human factor in security , 2005, Comput. Secur..

[35]  Kallol Kumar Bagchi,et al.  An Analysis of the Growth of Computer and Internet Security Breaches , 2003, Commun. Assoc. Inf. Syst..

[36]  Michael Boyle A Shared Vocabulary for Privacy , 2003 .

[37]  Mark S. Sanders,et al.  Human factors in engineering and design, 7th ed. , 1993 .

[38]  J. Freedman,et al.  Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .

[39]  J. Shaoul Human Error , 1973, Nature.