The proliferation of big data is developing with substantial advancement to enter into glorious future, but the vulnerability of personal data has always been a disaster to this dream. In order to foster confidence in information systems, a novel examination of incident response approach is evaluated from a Taiwan hacking ring case. With the guidance of this case study, we can discriminate normal information sharing from internet privacy violation. Enhancing data privacy is a baffling task because of its newness and technological furtherance. It is believed that this study will clarify the obscure technological and social aspects of data privacy enhancement. The proposed security measures can prohibit individuals or organizations from the risk of getting hurts, facilitate to cut down its roots and remove its foundation. © 2014 Springer-Verlag.
CITATION STYLE
Kao, D. Y., Peng, C. Y., Huang, F. F. Y., & Wang, S. J. (2014). Privacy breach investigations of incident response to personal information protection act. In Lecture Notes in Electrical Engineering (Vol. 276 LNEE, pp. 351–359). Springer Verlag. https://doi.org/10.1007/978-3-642-40861-8_50
Mendeley helps you to discover research relevant for your work.