Privacy Incidents Database
tearline
Submitted by drwright on Fri, 06/09/2017 - 7:33am
tearline
Submitted by drwright on Mon, 03/20/2017 - 7:06pm
tearline
Submitted by drwright on Mon, 12/12/2016 - 11:02am
biblio
Submitted by Jessica Staddon on Fri, 10/07/2016 - 10:48am
tearline
Submitted by drwright on Wed, 09/14/2016 - 8:13am
tearline
Submitted by drwright on Mon, 06/13/2016 - 9:31am
group_project
Submitted by drwright on Mon, 04/04/2016 - 2:43pm
The patterns and characteristics of security incidents are a significant driver of security technology innovation. Patterns are detected by analyzing repositories of malware/viruses/worms, incidents affecting control/SCADA systems, general security alerts and updates, and data breaches. For most types of privacy incidents there are no repositories. Privacy incidents that do not involve a security breach, such as cyber-bullying/slander/stalking, revenge porn, social media oversharing, data reidentification and surveillance, are not represented in the current repositories.
tearline
Submitted by drwright on Tue, 03/15/2016 - 8:29am