Researchers can use the information to study breaches. The important part is tracing the year that the breach occurred and correlate the recent attacks. By knowing similar occurrences, the researchers can predict the manipulation of the attacks. Another important part is the summarization of the breaches. Knowing the details that goes behind the breach can allow the researcher to rephrase and cite the source to explain the logistics that relates to the breach. There are also categories that place breaches in their corresponding field. Some were insider breaches and others were infected by malware. By differentiating between the different breaches, the researchers can further study the methodologies that went into the breach. For example, a social engineered attack can be used to steal passwords and sensitive information; while some crimes were committed to exploit the reputation of the company. The specific location of the company can help the researchers pinpoint their local companies and identify the states that get the most breaches. For big states, like California and New York, there are many breaches in those states because they are a hotspot for launching new companies. Also, knowing the company’s incorporation can help measure the trends that associate with the breaches. For example, not all companies were for-profits, but the government and non-profits were also targeted for their data and resources. Seeing the nuances of the companies prepare the researchers to figure out which companies need more protection and how can the existing breaches warn the companies on the future breaches?