• Title/Summary/Keyword: data breach

Search Result 73, Processing Time 0.032 seconds

Volatility clustering in data breach counts

  • Shim, Hyunoo;Kim, Changki;Choi, Yang Ho
    • Communications for Statistical Applications and Methods
    • /
    • v.27 no.4
    • /
    • pp.487-500
    • /
    • 2020
  • Insurers face increasing demands for cyber liability; entailed in part by a variety of new forms of risk of data breaches. As data breach occurrences develop, our understanding of the volatility in data breach counts has also become important as well as its expected occurrences. Volatility clustering, the tendency of large changes in a random variable to cluster together in time, are frequently observed in many financial asset prices, asset returns, and it is questioned whether the volatility of data breach occurrences are also clustered in time. We now present volatility analysis based on INGARCH models, i.e., integer-valued generalized autoregressive conditional heteroskedasticity time series model for frequency counts due to data breaches. Using the INGARCH(1, 1) model with data breach samples, we show evidence of temporal volatility clustering for data breaches. In addition, we present that the firms' volatilities are correlated between some they belong to and that such a clustering effect remains even after excluding the effect of financial covariates such as the VIX and the stock return of S&P500 that have their own volatility clustering.

A Framework and Guidelines for Personal Data Breach Notification Act (개인정보 유출 시 통지.신고 프레임워크 및 가이드라인)

  • Lee, Chung-Hun;Ko, Yu-Mi;Kim, Beom-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.169-179
    • /
    • 2011
  • Recent personal data breach incidences draw the public's attention to their privacy and personal rights. The new personal data protection law effective in September 2009 imposes additional legal responsibility on personal data controllers and processors. For instance, if a data breach occurs, this new law requires that the processors must notify individuals (data subjects) and data protection authorities of the nature of incidents. This research reviews the U.S. forty six state laws and related acts, and offers a framework for managing incidents. This framework includes five major components: (1) type of personal data required to be reported and notified, (2) the ultimate subject notifying data subjects, (3) event occurrence and notification time phases, (4) notification message details, and (5) direct/indirect communication media. Along with this framework, we also offer directions for effective/manageable guidelines on data breach notification act.

The Effect of Flood Discharge due to Dam Breach on Downstream Channel (댐붕괴시 홍수가 하천하류에 미치는 영향)

  • Ahn, Sang-Jin;Lee, Jun-Geun;Yeon, In-Sung;You, Hyung-Gyu
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2006.05a
    • /
    • pp.1666-1670
    • /
    • 2006
  • The purpose of this study is to analyze how a downstream channel is affected in case of hypothetical dam failure. The object of it is Hwacheon dam basin within the basin of North Han river. This study has analyzed the influence on Pyeonghwa(Peace) dam and Hwacheon dam supposing that the Imnam dam in North Korea on the upper stream of North Han river is failed hypothetically at the MFWL(maximum flood water level) by a deluge of rain. The model applied at the main study is NWS(National Weather Service) FLDWAV(Flood Wave Routing Model). Dam breach characteristics data are analyzed by making nine hypothetical scenarios on the basis of other studies on the shape and size of dam breach, time of failure and so on. Expected peak discharge through the breach is verified to have the propriety in comparison with empirical function which is developed on the basis of the case of dam breach in the foreign countries and it is observed that peak discharge is more increasing, as the time of breach gets shorter and the breach width gets bigger. As a result of main study, even though the Imnam dam is hypothetically failed down, there has no influence on the Hwacheon dam of the downstream as the extended Pyeonghwa dam on the downstream controls the volume of discharge properly.

  • PDF

Empirical Investigation on Information Breach Effect on the Market Value of the Firm: Focused on Source and Long Term Performance (정보유출이 기업가치에 미치는 효과분석: 원천 및 장기성과)

  • Kwon, Sun Man;Han, Chang Hee
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.2
    • /
    • pp.81-96
    • /
    • 2016
  • This paper analyzes the impact of information breach on shareholder value by measuring the stock price reaction associated with the announcements of data breach. The breach firms in the sample lost, on average, 1.3% of their market value, amounting to 98.9 million won of loss within two-day of the event period after the announcement. We examine the abnormal returns in various categories (i.e., source, type, size, etc.) of information breach. Although the market does not react significantly to the announcements of outside breach, we find statistically significant market reactions to inside breach. We estimate abnormal returns over the following 60 days. The mean 60-day cumulative abnormal return and BHAR (buy-and-hold abnormal returns) are both significantly far from zero. We conclude that there is a coherent market reaction following the announcement. The difference between the market reactions to IT firms and Non-IT firms is statistically significant. But breach amount, firm size, and the year the breach occurred do not show to be significant variables.

Development of a integrated platform for urban river management (도시하천관리를 위한 연계플랫폼 개발)

  • Koo, Bonhyun;Oh, Seunguk;Koo, Jaseob;Shim, Kyucheoul
    • Journal of Korea Water Resources Association
    • /
    • v.55 no.6
    • /
    • pp.471-480
    • /
    • 2022
  • In this study, a integrated platform applied with various analysis and evaluation models and data collection modules was developed for urban river management. Modules applied to the integrated platform are data collection and provision module, flood analysis module, river evaluation module, and levee breach simulation module, which were selected and applied for efficient urban river management. The integrated platform collects data for application to analysis and evaluation modules from various institutions. The collected data is refined through pre-processing and stored. The stored data is used as input data for each module and is also provided as an Open API through the platform. The flood analysis module is provided to analyze and prepare for floods occurring in cities and rivers. The river evaluation module is used for river planning and management by evaluating rivers in various ways. Finally, the levee breach simulation module can be used to establish countermeasures by deriving a possible damage area due to levee breach through analysis of a virtual breach situation.

Privacy Assurance and Consumer Behaviors in e-Business Environments (e-비즈니스 환경에서 기업의 개인정보보호 활동이 소비자 행위에 미치는 영향)

  • Park, JaeYoung;Jung, Woo-Jin;Lee, SangKeun;Kim, Beomsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.1-17
    • /
    • 2018
  • Recently, most online firms are trying to provide personalized services based on customer's data. However, customers are reluctant to give their information to online firm because of concerns about data breach. Online firms are seeking to increase their trust by ensuring the protection of personal information for customers through privacy seal (e.g. e-privacy) or data breach insurance. This research examines the effects of privacy assurance(i.e. privacy seal, data breach insurance) on consumer behavior in online environment. An experiment based on the hypothetical scenario was conducted using a between-subjects 2 (type of privacy assurance) + 1 (control) design. We found that both privacy seal and data breach insurance increased perceived privacy trust. In addition, privacy seal has a positive effect on the intention to provide personal information through perceived privacy trust. Finally, in the case of the group with a high (low) disposition to trust, higher perceived privacy trust is formed through privacy seal (data breach insurance). Theoretical and practical implications are discussed.

Information Security Investment and Security Breach: Empirical Study on the Reverse Causality (정보보호 투자와 침해사고의 인과관계에 대한 실증분석)

  • Shin, Ilsoon;Jang, Wonchang;Park, Heeyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1207-1217
    • /
    • 2013
  • This study utilizes raw data from "Research on the actual condition of firms' information security" of KISA (2010) and constructs panel dataset to analyze a causal relationship between information security investment and security breach. Using Difference in Difference estimation method we find the following results. First, while the usual causality that information security investment reduces security breach is not supported, the reverse causality that security breach increases information security investment is well explained. Second, contrary to the conventional wisdom, firms in the finance/insurance business sector show the most significant reverse causality pattern.

An Experimental Study on the Collapse Phase of a River Leeves(II) -Effect of the Soil Properties and Compactness (하천제방 붕괴 양상의 실험적 연구(II) - 축조재료 및 다짐도의 영향)

  • Lee, Jong-Tae;Lee, Sang-Tae
    • Journal of Korea Water Resources Association
    • /
    • v.34 no.2
    • /
    • pp.155-167
    • /
    • 2001
  • The effects of bank crest width, slope steepness, soil properties, and soil compactness on the characteristics of levee breach due to overlfow were investigated through a series of experiments. Generally, the major factors influencing the breach phenomenon are compactness, soil properties. crest width, and slope steepness, in that order. Using proper soil, and ensuring enough compactness in bank construction are very essential for extending breach duration and reducing peak overflow ranges for the values of breach duration, breach width, width-to-depth ratio, and side slope of the breach section, proposed by Singh, MacDonald and Fread based on the field data for earth dam breaks were reasonable. We found that those criteria could also be applied to the phenomenon of levee breaching.

  • PDF

Online Privacy Protection: An Analysis of Social Media Reactions to Data Breaches (온라인 정보 보호: 소셜 미디어 내 정보 유출 반응 분석)

  • Seungwoo Seo;Youngjoon Go;Hong Joo Lee
    • Knowledge Management Research
    • /
    • v.25 no.1
    • /
    • pp.1-19
    • /
    • 2024
  • This study analyzed the changes in social media reactions of data subjects to major personal data breach incidents in South Korea from January 2014 to October 2022. We collected a total of 1,317 posts written on Naver Blogs within a week immediately following each incident. Applying the LDA topic modeling technique to these posts, five main topics were identified: personal data breaches, hacking, information technology, etc. Analyzing the temporal changes in topic distribution, we found that immediately after a data breach incident, the proportion of topics directly mentioning the incident was the highest. However, as time passed, the proportion of mentions related indirectly to the personal data breach increased. This suggests that the attention of data subjects shifts from the specific incident to related topics over time, and interest in personal data protection also decreases. The findings of this study imply a future need for research on the changes in privacy awareness of data subjects following personal data breach incidents.

Levee Breach Flow by Experiment and Numerical Simulation (수리실험 및 수치모의를 이용한 제방붕괴 흐름해석)

  • Kim, Joo-Young;Lee, Jong-Kyu;Lee, Jin-Woo;Cho, Yong-Sik
    • Journal of Korea Water Resources Association
    • /
    • v.44 no.6
    • /
    • pp.461-470
    • /
    • 2011
  • Abrupt and gradual levee breach analyses on the flat domain were implemented by laboratory experiments and numerical simulations. To avoid the reflective wave from the side wall the experiment was performed in a large domain surrounded by waterway. A numerical model was developed for solving the two-dimensional gradual levee breach flow. The results of the numerical simulation developed in this study showed good agreement with those of the experimental data. However, even if the numerical schemes effectively replicated the trends of the observed water depth for the first shock, there were little differences for the second shock. In addition, even though the model considered the Smagorinsky horizontal eddy viscosity, the location and height of the hydraulic jump in the numerical simulation were not fairly well agree with experimental measurements. This shows the shallow water equation solver has a limitation which does not exactly reproduce the energy dissipation from the hydraulic jump. Further study might be required, considering the energy dissipation due to the hydraulic jump or transition flow from reflective wave.