“It wouldn't happen to me”: Privacy concerns and perspectives following the Cambridge Analytica scandal

J Hinds, EJ Williams, AN Joinson - International Journal of Human …, 2020 - Elsevier
In March 2018, news of the Facebook-Cambridge Analytica scandal made headlines around
the world. By inappropriately collecting data from approximately 87 million users' Facebook …

The OPM data breach: An investigation of shared emotional reactions on Twitter.

E Bachura, R Valecha, R Chen, HR Rao - MIS quarterly, 2022 - search.ebscohost.com
This paper investigates the shared emotional responses of Twitter users in the aftermath of a
massive data breach, a crisis event known as the Office of Personnel Management (OPM) …

Much ado about nothing: The (lack of) economic impact of data privacy breaches

VJ Richardson, RE Smith… - Journal of Information …, 2019 - publications.aaahq.org
In this paper, we examine the consequences of data breaches for a breached company. We
find the economic consequences are, on average, very small for breached companies. On …

An empirical study of text-based machine learning models for vulnerability detection

K Napier, T Bhowmik, S Wang - Empirical Software Engineering, 2023 - Springer
With an increase in complexity and severity, it is becoming harder to identify and mitigate
vulnerabilities. Although traditional tools remain useful, machine learning models are being …

SoK: Cyber insurance–technical challenges and a system security roadmap

S Dambra, L Bilge, D Balzarotti - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Cyber attacks have increased in number and complexity in recent years, and companies
and organizations have accordingly raised their investments in more robust infrastructure to …

[HTML][HTML] Quantitative assessment of cybersecurity risks for mitigating data breaches in business systems

AM Algarni, V Thayananthan, YK Malaiya - Applied Sciences, 2021 - mdpi.com
The evaluation of data breaches and cybersecurity risks has not yet been formally
addressed in modern business systems. There has been a tremendous increase in the …

Investigating the influence of governance determinants on reporting cybersecurity incidents to police: Evidence from Canadian organizations' perspectives

KR Agbodoh-Falschau, BH Ravaonorohanta - Technology in Society, 2023 - Elsevier
Government agencies and standard setters require organizations operating in critical
infrastructure sectors to disclose cybersecurity incidents, yet little is known about whether …

[HTML][HTML] Modelling and predicting enterprise-level cyber risks in the context of sparse data availability

D Zängerle, D Schiereck - The Geneva Papers on Risk and Insurance …, 2023 - Springer
Despite growing attention to cyber risks in research and practice, quantitative cyber risk
assessments remain limited, mainly due to a lack of reliable data. This analysis leverages …

Software complexity analysis using halstead metrics

T Hariprasad, G Vidhyagaran, K Seenu… - … on Trends in …, 2017 - ieeexplore.ieee.org
Software Complexity influences inward connections. Higher the multifaceted nature, bigger
the deformities. Programming complexity for any product or a program is hard to discover …

Heuristic prediction of rainfall using machine learning techniques

C Thirumalai, KS Harsha, ML Deepak… - … on Trends in …, 2017 - ieeexplore.ieee.org
This paper is carried on the heuristic prediction of rainfall using machine learning
techniques. As we know agriculture was the predominant of our country and economy. While …