{"id":321,"date":"2023-09-17T14:14:29","date_gmt":"2023-09-17T18:14:29","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/?p=321"},"modified":"2023-09-17T14:14:29","modified_gmt":"2023-09-17T18:14:29","slug":"a-holistic-view-of-data-breach-research","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/2023\/09\/17\/a-holistic-view-of-data-breach-research\/","title":{"rendered":"A Holistic View of Data Breach Research"},"content":{"rendered":"\n<p>The types of data that States require companies and state and local agencies to protect as personal information, and each States\u2019 reporting requirements are useful variables for researchers to leverage when reviewing breaches holistically.<\/p>\n\n\n\n<p>For example: a government\u2019s emphasis on protecting the information can have a clear implication on a given population\u2019s vulnerability. States with more panoptic laws could be more likely to put an emphasis on cyber-awareness and education, resulting, again, in a less vulnerable population.<\/p>\n\n\n\n<p>Leveraging each States\u2019 breach notification requirements, social science researchers could identify ethical loopholes in the laws which could allow companies and government agencies to get away with compromising a person\u2019s information. For example: if a certain number of files must be compromised to call it a \u201cbreach\u201d, this could encourage compilation of data to reduce numbers of files, reducing a company\u2019s culpability to its consumers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The types of data that States require companies and state and local agencies to protect as personal information, and each States\u2019 reporting requirements are useful variables for researchers to leverage when reviewing breaches holistically. For example: a government\u2019s emphasis on protecting the information can have a clear implication on a given population\u2019s vulnerability. States with&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ladler-cyse\/2023\/09\/17\/a-holistic-view-of-data-breach-research\/\">Read More<\/a><\/div>\n","protected":false},"author":26408,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/wp-json\/wp\/v2\/posts\/321"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/wp-json\/wp\/v2\/users\/26408"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/wp-json\/wp\/v2\/comments?post=321"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/wp-json\/wp\/v2\/posts\/321\/revisions"}],"predecessor-version":[{"id":322,"href":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/wp-json\/wp\/v2\/posts\/321\/revisions\/322"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/wp-json\/wp\/v2\/media?parent=321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/wp-json\/wp\/v2\/categories?post=321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/wp-json\/wp\/v2\/tags?post=321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}