Privacy breach investigations of incident response to personal information protection act

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The proliferation of big data is developing with substantial advancement to enter into glorious future, but the vulnerability of personal data has always been a disaster to this dream. In order to foster confidence in information systems, a novel examination of incident response approach is evaluated from a Taiwan hacking ring case. With the guidance of this case study, we can discriminate normal information sharing from internet privacy violation. Enhancing data privacy is a baffling task because of its newness and technological furtherance. It is believed that this study will clarify the obscure technological and social aspects of data privacy enhancement. The proposed security measures can prohibit individuals or organizations from the risk of getting hurts, facilitate to cut down its roots and remove its foundation. © 2014 Springer-Verlag.

Cite

CITATION STYLE

APA

Kao, D. Y., Peng, C. Y., Huang, F. F. Y., & Wang, S. J. (2014). Privacy breach investigations of incident response to personal information protection act. In Lecture Notes in Electrical Engineering (Vol. 276 LNEE, pp. 351–359). Springer Verlag. https://doi.org/10.1007/978-3-642-40861-8_50

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free