IDEAS home Printed from https://ideas.repec.org/a/spi/ijetss/v8y2020i1p33-41id248.html
   My bibliography  Save this article

Cost and Effects of Data Breaches, Precautions, and Disclosure Laws

Author

Listed:
  • Narendra Sharma
  • Ebere A. Oriaku
  • Ngozi Oriaku

Abstract

In recent times the breach of security systems or cyber-attacks leading to unauthorized acquisitions of computerized data that compromises the security, confidentiality, and integrity of personally identifiable information by many organizations has grown. There is a general belief that data breaches and today’s organizational practices are axiomatically regarded as cause and effect. This paper addresses the cost of data breaches, disclosure laws, and precautions that have been instituted for many organizations and concludes that cybersecurity and data breach question is not “if” but “when” it might happen. Data has grown as one of the critical assets, and the absence of security protocols creates a vulnerability that can be misused by bad actors engaged in hacking and other forms of the data breach. This paper documents that the last decade experienced a phenomenal rise in the number of data breaches caused by hacking and the efficacy of disclosure laws that have been instituted by 48 states in the US. The frequency of data breach incidents has been alarming as billions of records have been breached and billions of dollars have been spent to mitigate those breaches, which could have been allocated for other projects. It is recommended that all organizations, big or small, have cybersecurity policies and a business continuity plan in place to deal with data breaches.

Suggested Citation

  • Narendra Sharma & Ebere A. Oriaku & Ngozi Oriaku, 2020. "Cost and Effects of Data Breaches, Precautions, and Disclosure Laws," International Journal of Emerging Trends in Social Sciences, Asian Online Journal Publishing Group, vol. 8(1), pages 33-41.
  • Handle: RePEc:spi:ijetss:v:8:y:2020:i:1:p:33-41:id:248
    as

    Download full text from publisher

    File URL: http://scipg.com/index.php/103/article/view/248/327
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spi:ijetss:v:8:y:2020:i:1:p:33-41:id:248. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Marina Taylor (email available below). General contact details of provider: http://scipg.com/index.php/103/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.