How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management
暂无分享,去创建一个
[1] Sean W. Smith,et al. Why Do Street-Smart People Do Stupid Things Online? , 2008, IEEE Secur. Priv..
[2] Annie I. Antón,et al. The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information , 2007, IEEE Security & Privacy.
[3] Philip N. Howard,et al. A Case of Mistaken Identity? News Accounts of Hacker, Consumer, and Organizational Responsibility for Compromised Digital Records , 2007, J. Comput. Mediat. Commun..
[4] Vincent I. Polley,et al. A Coherent Strategy for Data Security through Data Governance , 2007, IEEE Security & Privacy.
[5] M. Eric Johnson,et al. Embedding Information Security into the Organization , 2007, IEEE Security & Privacy.
[6] Sidney W. A. Dekker,et al. Doctors Are More Dangerous Than Gun Owners: A Rejoinder to Error Counting , 2007, Hum. Factors.
[7] Albert Boquet,et al. Human Error and Commercial Aviation Accidents: An Analysis Using the Human Factors Analysis and Classification System , 2007, Hum. Factors.
[8] P. Carayon,et al. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists. , 2007, Applied ergonomics.
[9] Maria Kjaerland,et al. A taxonomy and comparison of computer security incidents from the commercial and government sectors , 2006, Comput. Secur..
[10] Bala Iyer,et al. Analyzing Complementarities Using Software Stacks for Software Industry Acquisitions , 2006, J. Manag. Inf. Syst..
[11] Bala Iyer,et al. Using Software Stacks to Explain Complementarities: The Case of Mergers and Acquisitions in the Software Industry , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[12] C. Drury,et al. Medical Error and Human Factors Engineering: Where Are We Now? , 2006, American journal of medical quality : the official journal of the American College of Medical Quality.
[13] Robert W. Reeder,et al. Improving user-interface dependability through mitigation of human error , 2005, Int. J. Hum. Comput. Stud..
[14] Jeffrey M. Stanton,et al. Analysis of end user security behaviors , 2005, Comput. Secur..
[15] Annie I. Antón,et al. Inside JetBlue's privacy policy violations , 2004, IEEE Security & Privacy Magazine.
[16] Huseyin Cavusoglu,et al. The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers , 2004, Int. J. Electron. Commer..
[17] James A. Lewis. Cyber terror: Missing in action , 2003 .
[18] Ashish Garg,et al. Quantifying the financial impact of IT security breaches , 2003, Inf. Manag. Comput. Secur..
[19] Lei Zhou,et al. The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market , 2003, J. Comput. Secur..
[20] David W. Chadwick,et al. Patient Privacy in Electronic Prescription Transfer , 2003, IEEE Secur. Priv..
[21] James A. Landay,et al. Modeling Privacy Control in Context-Aware Systems , 2002, IEEE Pervasive Comput..
[22] M. Culnan. Protecting Privacy Online: Is Self-Regulation Working? , 2000 .
[23] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[24] K. B. Hendricks,et al. Quality awards and the market value of the firm: an empirical investigation , 1996 .
[25] Mica R. Endsley,et al. Toward a Theory of Situation Awareness in Dynamic Systems , 1995, Hum. Factors.
[26] F. Paul Wilson,et al. Root Cause Analysis : A Tool for Total Quality Management , 1993 .
[27] Charles Cresson Wood,et al. Human error: an overlooked but significant information security problem , 1993, Comput. Secur..
[28] P F Lourens,et al. Error analysis and applications in transportation systems. , 1989, Accident; analysis and prevention.
[29] W. Ware. A Taxonomy for Privacy , 1981 .
[30] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[31] David Hylender,et al. Data Breach Investigations Report , 2011 .
[32] L Dales,et al. Privacy Protection , 2008, Encyclopedia of Multimedia.
[33] R Key Dismukes,et al. The Limits of Expertise: Rethinking Pilot Error and the Causes of Airline Accidents , 2007 .
[34] E. Eugene Schultz,et al. The human factor in security , 2005, Comput. Secur..
[35] Kallol Kumar Bagchi,et al. An Analysis of the Growth of Computer and Internet Security Breaches , 2003, Commun. Assoc. Inf. Syst..
[36] Michael Boyle. A Shared Vocabulary for Privacy , 2003 .
[37] Mark S. Sanders,et al. Human factors in engineering and design, 7th ed. , 1993 .
[38] J. Freedman,et al. Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .
[39] J. Shaoul. Human Error , 1973, Nature.