{"title":"Cyber Crime in Privately Held Information Systems: Personal Data at Stake","authors":"M. Hengst, M. Warnier","doi":"10.1109/EISIC.2013.25","DOIUrl":null,"url":null,"abstract":"This paper describes the possible threats of cyber crime in privately held information systems. Privately held information systems contain large amounts of personal data and are owned by organizations. Data breaches through which confidential and personal information is stolen from these privately held information systems happen more often than we know. Some examples of data breaches are presented in this paper, together with an overview of the means to perform these data breaches, the impact these data breaches have on organizations and individuals and possible measures that could be taken to prevent data breaches to occur.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 European Intelligence and Security Informatics Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EISIC.2013.25","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
This paper describes the possible threats of cyber crime in privately held information systems. Privately held information systems contain large amounts of personal data and are owned by organizations. Data breaches through which confidential and personal information is stolen from these privately held information systems happen more often than we know. Some examples of data breaches are presented in this paper, together with an overview of the means to perform these data breaches, the impact these data breaches have on organizations and individuals and possible measures that could be taken to prevent data breaches to occur.