Identyfikatory
Warianty tytułu
Konferencja
7th International Conference System Safety: Human - Technical Facility - Environment, CzOTO 2018 (7 ; 12-14.12.2018 ; Zakopane, Poland)
Języki publikacji
Abstrakty
The paper presents the problem domain related to data safety management in the face of the threats that organisations of all types encounter in this scope. The Author’s particular concern are personal data management issues, which are of key importance for contemporary enterprises as they frequently determine wining the market advantage and growth in their competitiveness. Yet, incidents of personal data breaches, aimed at economic organisations have been on the increase in the recent years, leading not only to substantial financial losses, but what is worse, frequently resulting in damage to their reputation. Therefore, a vital issue for all enterprises is to make their employees acquainted with threats to data security and their potential harmful effects on the operations and financial results of organisations. The paper presents an analysis of breaches to personal data in organisations in a global dimension as well as analyses of their negative effects to their image and trust of their customers.
Wydawca
Rocznik
Tom
Strony
226--233
Opis fizyczny
Bibliogr. 13 poz., rys., tab.
Twórcy
Bibliografia
- [1] Algarni, A.M., Malaiya, Y.K., 2016. A Consolidated Approach for Estimation of Data Security Breach Costs. Proceedings of 2016 2nd International Conference on Information Management (ICIM2016), IEEE.
- [2] Ando, R., Shima, S., Takemura, T., 2016. Analysis of Privacy and Security Affecting the Intention of Use in Personal Data Collection in an IoT Environment. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, Volume E 99D, Issue 8, 1974-1981. DOI: 10.1587/transinf.2015INI0002
- [3] Bishop, M., 2003. What is computer security? IEEE Security and Privacy, Volume 1, Issue 1, 67-69. DOI: 10.1109/MSECP.2003.1176998
- [4] Bishop, M., Frincke, D.A., 2005. Teaching secure programming. IEEE Security and Privacy, Volume 3, Issue 5, 54-56.
- [5] da Veiga, A., Martins, N., 2015. Improving the information security culture through monitoring and implementation actions illustrated through a case study. Computers & Security 49, 162-176. DOI: 10.1016/j.cose.2014.12.006
- [6] Denning, D.A., 1982. Cryptograpy and data security, Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 3-4.
- [7] Jowit, T., IT Security Spending To Reach £50bn, But Human Error Is Still Main Cause Of Data Loss. http://www.silicon.co.uk
- [8] Liu, Y., 2015. Privacy Protection Method in the Era of Cloud Computing and Big Data. International Conference on Engineering Technology and Application (ICETA 2015), MATEC Web of Conferences, Volume 22, 1-4. DOI: 10.1051/matecconf/20152201041
- [9] Misa, T.J., Computer Security Discourse at RAND, SDC, and NSA (1958-1970). IEEE Annals of the History of Computing, Volume 38, Issue 4, 12-25. DOI: 10.1109/MAHC.2016.48
- [10] Rocha, F.W., Antonsen, E., Ekstedt, M., 2014. Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture. Computers&Security, Vol. 43, 90-110. DOI: 10.1016/j.cose.2014.03.004
- [11] https://www.gemalto.com/press/Pages/First-Half-2017-Breach-Level-Index-Report-Identity-Theft-and-Poor-Internal-Security-Practices-Take-a-Toll.aspx
- [12] https://www.cybercom.com/pl/Poland/security/security-blog-pl/ile-kosztuje-wyciek-danych--10-znanych-przypadkow
- [13] https://www.breachlevelindex.com/assets/Breach-Level-Index-Report-2017-Gemalto.pdf
Uwagi
Opracowanie rekordu w ramach umowy 509/P-DUN/2018 ze środków MNiSW przeznaczonych na działalność upowszechniającą naukę (2019).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-7a9a2d96-f3db-4a91-a210-f2d5baec2547