Module 3 Journal: Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?
Data breach is one of the significant problems that people can find especially in an organization or working place that can crucially damage society. After I study and do some research on the type of data breach, it shows me that we can distinguish data breaches into 8 types and each type has a unique characteristic. For example, HACK type that data breach happens from hacking by an outside party or infected malware, or INSD type that data breach happens from an insider (employee and contractor). If you ask me how researchers can use this information to study breaches, I think they can use this information about the type of data breach to make them know or understand more about a data breach that data breach not just has only way or a fixed way to happen, but it can possibly happen in many ways instead such as losing document, hacking computer, skimming device, etc. Moreover, they can use this information to help them to do their research on the data breach which they can use the type of the data breach as the variable of research or use it as a citation to the research.
