{"title":"准备网上购物的数据回收请求","authors":"Gal Ringel","doi":"10.12968/s1361-3723(22)70012-7","DOIUrl":null,"url":null,"abstract":"Even in a world with the General Data Protection Regulation (GDPR), we still leave behind a notable digital footprint online – and cyber criminals only need to follow the trail to steal customer data. Scams are already increasingly prevalent throughout the pandemic, retailers continue to fall victim to data breaches and exploits, and the issue always reaches a fever pitch during the holiday shopping season. 1 , 2 Are businesses properly equipped to keep customers’ data and their brand reputation safe?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"35 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Preparing for data reclaim requests from online shopping\",\"authors\":\"Gal Ringel\",\"doi\":\"10.12968/s1361-3723(22)70012-7\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Even in a world with the General Data Protection Regulation (GDPR), we still leave behind a notable digital footprint online – and cyber criminals only need to follow the trail to steal customer data. Scams are already increasingly prevalent throughout the pandemic, retailers continue to fall victim to data breaches and exploits, and the issue always reaches a fever pitch during the holiday shopping season. 1 , 2 Are businesses properly equipped to keep customers’ data and their brand reputation safe?\",\"PeriodicalId\":35636,\"journal\":{\"name\":\"Computer Fraud and Security\",\"volume\":\"35 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Fraud and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12968/s1361-3723(22)70012-7\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Social Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Fraud and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1361-3723(22)70012-7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
Preparing for data reclaim requests from online shopping
Even in a world with the General Data Protection Regulation (GDPR), we still leave behind a notable digital footprint online – and cyber criminals only need to follow the trail to steal customer data. Scams are already increasingly prevalent throughout the pandemic, retailers continue to fall victim to data breaches and exploits, and the issue always reaches a fever pitch during the holiday shopping season. 1 , 2 Are businesses properly equipped to keep customers’ data and their brand reputation safe?
期刊介绍:
Computer Fraud & Security has grown with the fast-moving information technology industry and has earned a reputation for editorial excellence with IT security practitioners around the world. Every month Computer Fraud & Security enables you to see the threats to your IT systems before they become a problem. It focuses on providing practical, usable information to effectively manage and control computer and information security within commercial organizations.