Visit PrivacyRights.org to see the types of publicly available information
about data breaches. How might researchers use this information to
study breaches? Enter a paragraph in your journal.
After reviewing the website one can look over the different type of breaches and use that to their advantage. It is important to stay aware of breaches when researching cybersecurity in order to successfully have safe cyber practices. Knowing the different breaches can be beneficial to protecting your own information. Researching cybersecurity is important to helping reduce cyber crime in the future. Surveys and experiments are vital to this research as cybersecurity directly relates to human behavior. Monitoring different types of breaches, for example: physical, card, or insider and also monitoring the behavior that takes places during the breach is a type of research that is beneficial to the study.