Conferences related to Data Breach

Back to Top

2020 59th IEEE Conference on Decision and Control (CDC)

The CDC is the premier conference dedicated to the advancement of the theory and practice of systems and control. The CDC annually brings together an international community of researchers and practitioners in the field of automatic control to discuss new research results, perspectives on future developments, and innovative applications relevant to decision making, automatic control, and related areas.


2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)

The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.


2020 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2019 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2005 IEEE Symposium on Security and Privacy (SRSP)


2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE)

ICSE is the premier forum for researchers to present and discuss the most recent innovations,trends, outcomes, experiences, and challenges in the field of software engineering. The scopeis broad and includes all original and unpublished results of empirical, conceptual, experimental,and theoretical software engineering research.


OCEANS 2020 - SINGAPORE

An OCEANS conference is a major forum for scientists, engineers, and end-users throughout the world to present and discuss the latest research results, ideas, developments, and applications in all areas of oceanic science and engineering. Each conference has a specific theme chosen by the conference technical program committee. All papers presented at the conference are subsequently archived in the IEEE Xplore online database. The OCEANS conference comprises a scientific program with oral and poster presentations, and a state of the art exhibition in the field of ocean engineering and marine technology. In addition, each conference can have tutorials, workshops, panel discussions, technical tours, awards ceremonies, receptions, and other professional and social activities.

  • OCEANS 2019 - Marseille

    Research, Development, and Operations pertaining to the Oceans

  • 2018 OCEANS - MTS/IEEE Kobe Techno-Ocean (OTO)

    The conference scope is to provide a thematic umbrella for researchers working in OCEAN engineering and related fields across the world to discuss the problems and potential long term solutions that concernnot only the oceans in Asian pacific region, but the world ocean in general.

  • OCEANS 2017 - Aberdeen

    Papers on ocean technology, exhibits from ocean equipment and service suppliers, student posters and student poster competition, tutorials on ocean technology, workshops and town hall meetings on policy and governmental process.

  • OCEANS 2016 - Shanghai

    Papers on ocean technology, exhibits from ocean equipment and service suppliers, student posters and student poster competition, tutorial on ocean technology, workshops and town hall meetings on policy and governmental process.

  • OCEANS 2015 - Genova

    The Marine Technology Society and the Oceanic Engineering Society of IEEE cosponsor a joint annual conference and exposition on ocean science, engineering and policy. The OCEANS conference covers four days. One day for tutorials and three for approx. 450 technical papers and 50-200 exhibits.

  • OCEANS 2014 - TAIPEI

    The OCEANS conference covers all aspects of ocean engineering from physics aspects through development and operation of undersea vehicles and equipment.

  • OCEANS 2013 - NORWAY

    Ocean related technologies. Program includes tutorials, three days of technical papers and a concurrent exhibition. Student poster competition.

  • OCEANS 2012 - YEOSU

    The OCEANS conferences covers four days with tutorials, exhibits and three days of parallel tracks that address all aspects of oceanic engineering.

  • OCEANS 2011 - SPAIN

    All Oceans related technologies.

  • OCEANS 2010 IEEE - Sydney

  • OCEANS 2009 - EUROPE

  • OCEANS 2008 - MTS/IEEE Kobe Techno-Ocean

  • OCEANS 2007 - EUROPE

    The theme 'Marine Challenges: Coastline to Deep Sea' focuses on the significant challenges, from the shallowest waters around our coasts to the deepest subsea trenches, that face marine, subsea and oceanic engineers in their drive to understand the complexities of the world's oceans.

  • OCEANS 2006 - ASIA PACIFIC

  • OCEANS 2005 - EUROPE


More Conferences

Periodicals related to Data Breach

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Computational Intelligence Magazine, IEEE

The IEEE Computational Intelligence Magazine (CIM) publishes peer-reviewed articles that present emerging novel discoveries, important insights, or tutorial surveys in all areas of computational intelligence design and applications.


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


Consumer Electronics, IEEE Transactions on

The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes


More Periodicals

Most published Xplore authors for Data Breach

Back to Top

Xplore Articles related to Data Breach

Back to Top

Mining hospital data breach records: Cyber threats to U.S. hospitals

2016 IEEE Conference on Intelligence and Security Informatics (ISI), 2016

This paper provides an analysis of U.S. hospital stolen data breach records to identify their characteristics and nefarious usages. It explores patterns associated with types of data taken, how they can be exploited by attackers, and cyber threat implications for hospitals.


Targeting key data breach services in underground supply chain

2016 IEEE Conference on Intelligence and Security Informatics (ISI), 2016

Over the past decade, a growing body of cybercriminals have founded an underground supply chain to facilitate data breaches, leading to the leak of personal information for hundreds of millions of individuals. As many service providers in the supply chain are rippers, cybercriminals tend to rely on a few key services. Identifying key services is of great interest to both ...


Beyond Mandatory: Making Data Breach Notifications Useful for Consumers

IEEE Security & Privacy, 2019

Data breaches pose significant security and privacy risks to affected consumers. However, it is doubtful whether data breach notifications mandated by respective laws effectively inform consumers of risks stemming from a data breach and motivate them to take protective actions.<sup>5,8,12</sup> We analyze potential reasons for consumers' inaction after a data breach and discuss how data breach notifications and respective requirements ...


Investigating the impact of media coverage on data breach fatigue

2017 IEEE 38th Sarnoff Symposium, 2017

In this paper, we present some preliminary results on a user study which was geared to obtain a better understanding for the relevance and impact of how the media reports on data breaches. Specifically, we conducted a study to investigate whether or not there is a correlation between the media coverage of data breaches and the perceived data breach fatigue ...


A survey on data breach challenges in cloud computing security: Issues and threats

2017 International Conference on Circuit ,Power and Computing Technologies (ICCPCT), 2017

Cloud computing is an innovation methodology for giving pay per utilize access to a gathering of shared resources for specific systems, stockpiling, servers, administration and applications, without physically getting them. So it spares overseeing expense and time for organizations. Numerous businesses, for example, keeping money, social insurance and instruction are moving towards the cloud because of the productivity of administrations ...


More Xplore Articles

Educational Resources on Data Breach

Back to Top

IEEE-USA E-Books

  • Mining hospital data breach records: Cyber threats to U.S. hospitals

    This paper provides an analysis of U.S. hospital stolen data breach records to identify their characteristics and nefarious usages. It explores patterns associated with types of data taken, how they can be exploited by attackers, and cyber threat implications for hospitals.

  • Targeting key data breach services in underground supply chain

    Over the past decade, a growing body of cybercriminals have founded an underground supply chain to facilitate data breaches, leading to the leak of personal information for hundreds of millions of individuals. As many service providers in the supply chain are rippers, cybercriminals tend to rely on a few key services. Identifying key services is of great interest to both cybersecurity researchers and practitioners. This study presents a text-mining framework for identifying key data breach services based on analysis of service reviews. The framework includes crawlers with counter anti-crawling measures, text preprocessing, and supervised topic models. In our experiment, more than 70% of the key services were identified by our framework.

  • Beyond Mandatory: Making Data Breach Notifications Useful for Consumers

    Data breaches pose significant security and privacy risks to affected consumers. However, it is doubtful whether data breach notifications mandated by respective laws effectively inform consumers of risks stemming from a data breach and motivate them to take protective actions.<sup>5,8,12</sup> We analyze potential reasons for consumers' inaction after a data breach and discuss how data breach notifications and respective requirements should be improved.

  • Investigating the impact of media coverage on data breach fatigue

    In this paper, we present some preliminary results on a user study which was geared to obtain a better understanding for the relevance and impact of how the media reports on data breaches. Specifically, we conducted a study to investigate whether or not there is a correlation between the media coverage of data breaches and the perceived data breach fatigue among the general public.

  • A survey on data breach challenges in cloud computing security: Issues and threats

    Cloud computing is an innovation methodology for giving pay per utilize access to a gathering of shared resources for specific systems, stockpiling, servers, administration and applications, without physically getting them. So it spares overseeing expense and time for organizations. Numerous businesses, for example, keeping money, social insurance and instruction are moving towards the cloud because of the productivity of administrations gave by the compensation per-use design in view of the assets, for example, preparing influence utilized, exchanges completed, storage capacity devoured, information exchanged, or storage room possessed and so on. Cloud computing is a totally web based innovation where customer information is put away and kept in the server farm of a cloud supplier like Google, Amazon, Salesforce.com and Microsoft and so on. Constrained control over the information may acquire different security issues and threats which incorporate data breach, unreliable connectivity, sharing of resources, data accessibility and inside attacks. A breach of security may lead to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed. There are different research challenges likewise there for embracing data breaches on cloud computing. This paper examines about cloud computing, different cloud models and primary security threats and data breach issues that are right now exploring in the cloud computing framework. This paper investigates the noteworthy research and difficulties that presents data breach in cloud computing and provides best practices to service providers and additionally endeavors plan to influence cloud servers to enhance their main concern in this serious economic scenario.

  • Data breach on the critical information infrastructures: Lessons from the Wikileaks

    The recent massive critical data leaks by Wikileaks suggest how fragile national security is from the perspective of information system and network sustainability. This incident raises some causes of concern. Firstly, critical infrastructure such as military and diplomatic systems is not spared from security breach. Secondly, such leak causes far-reaching damage to public interests, national security and economic sustainability. And thirdly, both technology and law seem incapable of dealing with such situation. Malaysia is not spared from the risk of information security attacks. Its ten critical sectors as identified in its National Cyber Security Policy (NCSP) -national defence and security; banking and finance; information and communications; energy, transport and water; government, emergency and medical services; as well as food and agriculture-can at any time fall victim to security breaches and data leaks if efforts to protect their system are flawed. The objective this paper is to outline the problems and challenges from the points of legal framework that Malaysia should anticipate and address in maintaining and sustaining its national CII. The paper first look at the problem of data breaches in the world and examine how as the technology becomes more superior, the cyber-world becomes more vulnerable to data breaches. Tied to that is the notion of critical information infrastructure (CIIs). As more and more of these CIIs are connected and dependent on connectivity, the normal incidence of data breach can be a potential of human loss and catastrophe. The paper next look at the concept of critical information security in Malaysia and examine the seriousness of data breaches in Malaysia. The paper seeks to explore legal options that Malaysia can adopt in preparing itself to more data breaches onslaught. It is the basic contention of the paper that the traditional legal framework should be reformed in line with the advances of the information and communications technologies.

  • User Information Security Behavior Towards Data Breach in Bring Your Own Device (BYOD) Enabled Organizations - Leveraging Protection Motivation Theory

    User information security behavior has been an area of growing demand in information systems (IS) research. Unfortunately, most of the research done in user information security behavior have been in broad contexts, therefore creating a gap in the literature for similar research that focuses on specific technologies and organizational technology policies. With organization's looking to increase productivity, reduce cost, and increase the flexibility in how employees work, they are introducing policies such as Bring Your Own Device (BYOD). However, increasing data breach tied to user negligence and noncompliance with security policies makes it imperative to better understand user information security behavior. The paper explores existing literature, proposes a conceptual model based on Protection Motivation Theory (PMT), and an approach to conduct the study. The paper also highlights contributions the study will make to the area of IS research.

  • The importance of mandatory data breach notification to identity crime

    The relationship between data breaches and identity crime has been scarcely explored in current literature. However, there is an important relationship between the misuse of personal identification information and identity crime as the former is in many respects the catalyst for the latter. Data breaches are one of the ways in which this personal identification information is obtained by identity criminals, and thereby any response to data breaches is likely to impact the incidence of identity crime. Initiatives around data breach notification have become increasingly prevalent and are now seen in many State legislatures in the United States and overseas. The Australian Government is currently in the process of introducing mandatory data breach notification laws. This paper explores the introduction of mandatory data breach notification in Australia, and lessons learned from the experience in the US, particularly noting the link between data breaches and identity crime. The paper proposes that through the introduction of such laws, identity crimes are likely to be reduced.

  • Stock market reaction to data breaches: The moderating role of corporate social responsibility

    This study explores the potential role of corporate social responsibility (CSR) in mitigating the damage of data breach, a topic that has received scant attention from the literature. Drawing upon the literatures on CSR, stakeholder theory, and the resource-based view (cites), we conceptualize that firms with greater CSR activities accumulate goodwill and cultivate stronger stakeholder relationships, and thus during times of a crisis, such as a data breach, stakeholders are more likely to give the socially responsible firm “the benefit of doubt” and temper their sanctions, mitigating the damage of the breach.

  • An efficient security system for data base management from illegal access

    The current scenario of scientific knowledge has seen a zoom in the improvement of various technologies. Attributable to this development, the importance level of protecting data has increased rapidly. Security to information defends the access to data from unauthorized users. The likelihood of knowledge insecurity arises to each giant and additionally tiny organization. Data Breach will have an effect on the consistency and reputation of the organization. At the moment to ensure security two major ways are followed particularly Numeric and Pattern. At the start Numeric manner was introduced to produce security which has variety locks, encrypted messages and revolving credit. Later came within the pattern technology that is far a lot of economical than Numeric's. However to stress a lot of information preservation, we've to maneuver on to more developments. We have proposed a brand new system that's a lot of economical and effectual than the existing systems.



Standards related to Data Breach

Back to Top

No standards are currently tagged "Data Breach"


Jobs related to Data Breach

Back to Top