{"id":"https://openalex.org/W4284897495","doi":"https://doi.org/10.1109/eit53891.2022.9814044","title":"Data Breaches: Vulnerable Privacy","display_name":"Data Breaches: Vulnerable Privacy","publication_year":2022,"publication_date":"2022-05-19","ids":{"openalex":"https://openalex.org/W4284897495","doi":"https://doi.org/10.1109/eit53891.2022.9814044"},"language":"en","primary_location":{"id":"doi:10.1109/eit53891.2022.9814044","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eit53891.2022.9814044","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Electro Information Technology (eIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022217856","display_name":"Aaron Fleury-Charles","orcid":null},"institutions":[{"id":"https://openalex.org/I79060951","display_name":"East Stroudsburg University","ror":"https://ror.org/05atz9219","country_code":"US","type":"education","lineage":["https://openalex.org/I79060951"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Aaron Fleury-Charles","raw_affiliation_strings":["East Stroudsburg University,Department of Computer Science,East Stroudsburg,USA","Department of Computer Science, East Stroudsburg University, East Stroudsburg, USA"],"affiliations":[{"raw_affiliation_string":"East Stroudsburg University,Department of Computer Science,East Stroudsburg,USA","institution_ids":["https://openalex.org/I79060951"]},{"raw_affiliation_string":"Department of Computer Science, East Stroudsburg University, East Stroudsburg, USA","institution_ids":["https://openalex.org/I79060951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064125900","display_name":"Md Minhaz Chowdhury","orcid":"https://orcid.org/0000-0003-0145-6838"},"institutions":[{"id":"https://openalex.org/I79060951","display_name":"East Stroudsburg University","ror":"https://ror.org/05atz9219","country_code":"US","type":"education","lineage":["https://openalex.org/I79060951"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Md Minhaz Chowdhury","raw_affiliation_strings":["East Stroudsburg University,Department of Computer Science,East Stroudsburg,USA","Department of Computer Science, East Stroudsburg University, East Stroudsburg, USA"],"affiliations":[{"raw_affiliation_string":"East Stroudsburg University,Department of Computer Science,East Stroudsburg,USA","institution_ids":["https://openalex.org/I79060951"]},{"raw_affiliation_string":"Department of Computer Science, East Stroudsburg University, East Stroudsburg, USA","institution_ids":["https://openalex.org/I79060951"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008515625","display_name":"Nafiz Rifat","orcid":"https://orcid.org/0000-0002-5011-2778"},"institutions":[{"id":"https://openalex.org/I57328836","display_name":"North Dakota State University","ror":"https://ror.org/05h1bnb22","country_code":"US","type":"education","lineage":["https://openalex.org/I57328836"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nafiz Rifat","raw_affiliation_strings":["North Dakota State University,Department of Computer Science,Fargo,ND,USA","Department of Computer Science, North Dakota State University, Fargo, ND, USA"],"affiliations":[{"raw_affiliation_string":"North Dakota State University,Department of Computer Science,Fargo,ND,USA","institution_ids":["https://openalex.org/I57328836"]},{"raw_affiliation_string":"Department of Computer Science, North Dakota State University, Fargo, ND, USA","institution_ids":["https://openalex.org/I57328836"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5022217856"],"corresponding_institution_ids":["https://openalex.org/I79060951"],"apc_list":null,"apc_paid":null,"fwci":1.5157,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.86027345,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"538","last_page":"543"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6172226667404175},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5974496006965637},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5823961496353149},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5195977091789246},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.47413989901542664},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3379138708114624}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6172226667404175},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5974496006965637},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5823961496353149},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5195977091789246},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.47413989901542664},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3379138708114624}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/eit53891.2022.9814044","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eit53891.2022.9814044","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Electro Information Technology (eIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6000000238418579,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2565682512","https://openalex.org/W2623711236","https://openalex.org/W2738731570","https://openalex.org/W3212213804","https://openalex.org/W3213195615","https://openalex.org/W3214316629"],"related_works":["https://openalex.org/W4252558677","https://openalex.org/W2766152053","https://openalex.org/W2584827882","https://openalex.org/W2538581760","https://openalex.org/W3195097297","https://openalex.org/W4225340788","https://openalex.org/W3038106605","https://openalex.org/W4243387025","https://openalex.org/W2513267613","https://openalex.org/W3049084372"],"abstract_inverted_index":{"Data":[0],"breaches":[1,48,77,92,121],"are":[2,11],"becoming":[3],"the":[4,21,44,63,69,87,102,115],"common":[5],"news":[6],"headlines":[7],"nowadays.":[8],"The":[9],"organizations":[10],"incurring":[12],"bulk":[13],"amount":[14],"of":[15,43,60,62,75,91,101,119],"money":[16],"and":[17,25,33,55,89,98],"efforts,":[18],"right":[19],"after":[20],"data":[22,47,76,120],"breaches,":[23],"expenses,":[24],"efforts":[26],"from":[27],"lawsuits,":[28],"installing":[29],"cyber":[30],"security":[31],"measures":[32],"organization":[34],"policy":[35],"changes.":[36],"This":[37],"study":[38,81],"looks":[39],"at":[40],"a":[41,57,72],"few":[42],"most":[45],"prominent":[46],"that":[49,65,93,113,130],"have":[50,94],"occurred":[51,95],"in":[52],"recent":[53],"history":[54],"provides":[56,99],"detailed":[58],"analysis":[59],"some":[61,100],"factors":[64],"lead":[66],"up":[67],"to":[68,106],"breaches.":[70],"With":[71],"higher":[73],"frequency":[74,118],"taking":[78],"place,":[79],"this":[80],"also":[82],"focuses":[83],"on":[84],"statistics":[85],"regarding":[86],"size":[88,116],"number":[90],"over":[96,124],"time":[97],"technique\u2019s":[103],"companies":[104],"use":[105],"secure":[107],"their":[108,131],"data.":[109],"It":[110],"was":[111],"found":[112],"neither":[114],"nor":[117],"had":[122],"increased":[123],"time,":[125],"but":[126],"it":[127],"is":[128],"possible":[129],"impact":[132],"has.":[133]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
