{"id":299,"date":"2024-01-26T14:21:26","date_gmt":"2024-01-26T14:21:26","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/afrie006\/?p=299"},"modified":"2024-01-26T14:21:26","modified_gmt":"2024-01-26T14:21:26","slug":"how-researchers-use-your-privacyrights-to-study-breaches","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/afrie006\/2024\/01\/26\/how-researchers-use-your-privacyrights-to-study-breaches\/","title":{"rendered":"How Researchers Use Your PrivacyRights to Study Breaches"},"content":{"rendered":"\n<p>Understanding data breaches can be a daunting task, especially for researches attempting to better understand who Is impacted and the methods used for the breach. Searching through hundreds of sources is a burdensome task exasperated by the various forms the information comes in or the different reporting methods for the data. It is for these reasons a cumulative report of data is highly sought after and why PrivacyRights.org is an important tool to learn how to employ. For example, PrivacyRights Data Breach Chronology tool pulls its data from 25 resources varying between databases and government entities. These sources may be filtered out to specialize results. Other editable factors include your choice of date range between January 1<sup>st<\/sup> 2005 to February 7<sup>th<\/sup> 2022. For that entire date range, we can see that hacking resulted in data breaches primarily followed closely by unknown causes and that St. Mary\u2019s Credit Union has the most reported breach notifications of all organizations affected. These results might guide researchers\u2019 attention in reviewing the security practices of financial institutions. On the face of this data, the reasons may be a little obvious. Hacking may be done for a multitude of reasons; however, the data seems to suggest that financial gain is a motivating factor for a large swath of hackers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Understanding data breaches can be a daunting task, especially for researches attempting to better understand who Is impacted and the methods used for the breach. Searching through hundreds of sources <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/afrie006\/2024\/01\/26\/how-researchers-use-your-privacyrights-to-study-breaches\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27837,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/afrie006\/wp-json\/wp\/v2\/posts\/299"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/afrie006\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/afrie006\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/afrie006\/wp-json\/wp\/v2\/users\/27837"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/afrie006\/wp-json\/wp\/v2\/comments?post=299"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/afrie006\/wp-json\/wp\/v2\/posts\/299\/revisions"}],"predecessor-version":[{"id":300,"href":"https:\/\/sites.wp.odu.edu\/afrie006\/wp-json\/wp\/v2\/posts\/299\/revisions\/300"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/afrie006\/wp-json\/wp\/v2\/media?parent=299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/afrie006\/wp-json\/wp\/v2\/categories?post=299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/afrie006\/wp-json\/wp\/v2\/tags?post=299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}