Password Reuse Behavior: How Massive Online Data Breaches Impacts Personal Data in Web

Author(s):  
Prabaharan Poornachandran ◽  
M. Nithun ◽  
Soumajit Pal ◽  
Aravind Ashok ◽  
Aravind Ajayan

A breach of data is a reported occurrence where private, sensitive, or covered records have been compromised and/or released unlawfully mostly due to cyber attacks or theft. Breach of data can include personal health records, personal information, travel information, trade secrets, intellectual property, or information you provided to or is stored on a platform. Data revealed to breaches pose a security and privacy risk to Users around the world. Despite these, guidelines on how organizations can react to breaches, or how to manage information securely once it has leaked, still haveto be established. More than 3 billion people suffered and became victims of data breaches and cyber attacks in the last two decades leading to loss of personal data as well as monetary loss. This research paper conducts real time research about awareness of data privacy, kind of data/information that needs to be protected, basic protocols for staying safe online, and some of the biggest corporate data breaches that happened in this century. We bring people from different cities of India in this study through a survey and use the data provided by these 150 participants to examine their understanding of data privacy, their concern regarding their online data and the practices they follow in their daily life to keep their online data safe in this age of computers and internet.


2020 ◽  
pp. 004728752095164
Author(s):  
Athina Ioannou ◽  
Iis Tussyadiah ◽  
Graham Miller

Against the backdrop of advancements in technology and its deployment by companies and governments to collect sensitive personal information, information privacy has become an issue of great interest for academics, practitioners, and the general public. The travel and tourism industry has been pioneering the collection and use of biometric data for identity verification. Yet, privacy research focusing on the travel context is scarce. This study developed a valid measurement of Travelers’ Online Privacy Concerns (TOPC) through a series of empirical studies: pilot ( n=277) and cross-validation ( n=287). TOPC was then assessed for its predictive validity in its relationships with trust, risk, and intention to disclose four types of personal data: biometric, identifiers, biographic, and behavioral data ( n=685). Results highlight the role of trust in mitigating the relationship between travelers’ privacy concerns and data disclosure. This study provides valuable contribution to research and practice on data privacy in travel.


2020 ◽  
Vol 8 (4) ◽  
pp. 163-174
Author(s):  
Laurien Desimpelaere ◽  
Liselot Hudders ◽  
Dieneke Van de Sompel

Children’s personal data are often collected for commercial aims. Although regulations in different countries aim to protect children’s privacy (e.g., by imposing websites to request parental consent for the processing of children’s data for commercial purposes), concerns about protecting children’s online data continue to rise. This article therefore aims to get insights into parents’ and children’s privacy coping strategies and perceptions underlying these strategies. In-depth interviews with ten parents and nine children (8–11 years) were conducted. Findings show that although children engaged in avoidance (e.g., leaving the particular website) and confrontation (e.g., seeking support) strategies, they mainly did this to protect their privacy from malicious individuals—and not from commercial parties. Participating children also lacked general knowledge about both explicit and implicit data practices. To protect their children’s privacy, parents in this study mainly adopted restrictive mediation strategies, but lacked the knowledge to undertake concrete actions in the case of implicit data collection. Implications for policymakers are discussed.


2021 ◽  
Vol 6 (10) ◽  
pp. 488-495
Author(s):  
Nurkhairina Binti Noor Sureani ◽  
Atikah Shahira Binti Awis Qurni ◽  
Ayman Haziqah Binti Azman ◽  
Mohd Bahrin Bin Othman ◽  
Hariz Sufi Bin Zahari

With the burgeoning technology, Malaysia has seen a staggering number of data breaches and data leaks within this past decade alone, with no signs of the trend decreasing. This has raised questions on whether the Personal Data Protection Act 2010 (PDPA) adequately protects the personal data of Malaysians. With the recent COVID-19 pandemic, data has been collected on a larger scale than before, with more frequent data leaks occurring. Hence, this study aims to analyse the adequacy of the PDPA by benchmarking it to the United Kingdom’s (UK) Data Protection Act 2018, which have seen a decrease in data breaches since the implementation of the new legislation. In this context, personal data refers to information processed or recorded that relates directly or indirectly to a data subject, who may be identified from the information and may include sensitive personal data. The study uses a doctrinal analysis methodology to best explore the ideas and concepts within the literature available regarding the protection of personal data. The study also employs a comparative analysis methodology by comparing the scope and application of Malaysian and UK legislation for benchmarking. The findings suggest that there are improvements to be made for the PDPA to be adequate.


2016 ◽  
Vol 89 (1) ◽  
Author(s):  
Spencer Wheatley ◽  
Thomas Maillart ◽  
Didier Sornette

2017 ◽  
Vol 33 (4) ◽  
pp. 458-469 ◽  
Author(s):  
Apostolos Malatras ◽  
Ignacio Sanchez ◽  
Laurent Beslay ◽  
Iwen Coisel ◽  
Ioannis Vakalis ◽  
...  

2020 ◽  
Vol 8 (4) ◽  
pp. 197-207 ◽  
Author(s):  
Mariya Stoilova ◽  
Sonia Livingstone ◽  
Rishita Nandagiri

How do children understand the privacy implications of the contemporary digital environment? This question is pressing as technologies transform children’s lives into data which is recorded, tracked, aggregated, analysed and monetized. This article takes a child-centred, qualitative approach to charting the nature and limits of children’s understanding of privacy in digital contexts. We conducted focus group interviews with 169 UK children aged 11–16 to explore their understanding of privacy in three distinct digital contexts—interpersonal, institutional and commercial. We find, first, that children primarily conceptualize privacy in relation to interpersonal contexts, conceiving of personal information as something they have agency and control over as regards deciding when and with whom to share it, even if they do not always exercise such control. This leads them to some misapprehensions about how personal data is collected, inferred and used by organizations, be these public institutions such as their schools or commercial businesses. Children’s expectation of agency in interpersonal contexts, and their tendency to trust familiar institutions such as their schools, make for a doubly problematic orientation towards data and privacy online in commercial contexts, leading to a mix of frustration, misapprehension and risk. We argue that, since the complexity of the digital environment challenges teachers’ capacity to address children’s knowledge gaps, businesses, educators, parents and the state must exercise a shared responsibility to create a legible, transparent and privacy-respecting digital environment in which children can exercise genuine choice and agency.


10.28945/2261 ◽  
2015 ◽  
Author(s):  
S. Srinivasan

Data breach is the act of accessing a central data repository without the consent of the data owner. Data breaches are occurring frequently and involve millions of records. Major breaches have been reported since 2005. Often data breaches occur due to someone with malicious intent accessing the stored data. In this paper we look at the types of data breaches and how they impact people’s privacy, we introduce a data protection model with the goal of protecting people’s privacy. Given today’s mobile information needs it is essential to have access to personal data. Social networks are making it difficult to keep personal information private. We provide several different summaries to show the effect of data breaches and data losses on people. We conclude this paper with a set of recommendations to protect people’s privacy.


Author(s):  
Egils Ginters ◽  
Dirk Burkhardt ◽  
Kawa Nazemi ◽  
Yuri Merkuryev

"Virtual and augmented reality (VR / AR) applications have successfully overcome the critical part of the Gartner curve. Investments are made and new products entering the economy. However, a very small percentage of society have also heard about AR glasses, mainly linking these with potential identity threats and personal data breaches. The authors dealt with the design of application of AR to improve golf skills by improving the putting technique. The above solution is complicated by requiring complex object recognition, tracking and advanced AR software designing."


Sign in / Sign up

Export Citation Format

Share Document