Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Data Breach

Multidisciplinary Approaches to Ethics in the Digital Era
When the information is stolen or used without consent of the system’s owner, the data stolen may cover confidential information like credit cards or passwords.
Published in Chapter:
Social Media Short Video-Sharing TikTok Application and Ethics: Data Privacy and Addiction Issues
Kevser Zeynep Meral (İstanbul Bahçeşehir University, Turkey)
Copyright: © 2021 |Pages: 19
DOI: 10.4018/978-1-7998-4117-3.ch010
Abstract
With 3.8 billion users, social media created ethical problems as well. The Cambridge Analytica scandal has been a serious issue with data security lately. Contents not in compliance with general moral rules is another important violation of ethics. TikTok application, the fastest-rising short video-sharing website, is examined. As a result of the literature review, it is observed that TikTok application also had ethical violations issues like lack of private data safety, not sufficient precautionary system barriers for the young generation, and addiction risk. Furthermore, considering that the young people can interact with malicious users through the fake accounts and the risk of sharing their exceptional videos to have more viewers, it is suggested that the sanctions should be arranged as a deterrent in violation of the rules. Parents and young users must be educated about the risks and ethical violations of social media.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Sentinels of Privacy: Mastering Data Breach Detection and Response in Healthcare Ecosystems
An incident involving the unauthorized access, exposure, or disclosure of sensitive or confidential information, such as personal data, financial records, or intellectual property.
Full Text Chapter Download: US $37.50 Add to Cart
Change Management and Cybersecurity in Healthcare: Mitigating Human Factors and Risks
A data breach occurs when information is stolen or removed from a system without the owner's knowledge or authority.
Full Text Chapter Download: US $37.50 Add to Cart
The 2018 Facebook Data Controversy and Technological Alienation
A process where large amounts of private data, mostly about individuals, becomes illegally available to people who should not have access to the information.
Full Text Chapter Download: US $37.50 Add to Cart
Patient Privacy and Security in E-Health
An incident in which sensitive, protected or confidential data has been viewed, stolen or used by an unauthorized body.
Full Text Chapter Download: US $37.50 Add to Cart
US Cybersecurity Laws and Regulations: Current Trends and Recommendations for Improvement
An incident wherein information is stolen or taken from a system without the knowledge or authorization of the system’s owner.
Full Text Chapter Download: US $37.50 Add to Cart
National Security Policy and Strategy and Cyber Security Risks
The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.
Full Text Chapter Download: US $37.50 Add to Cart
Dark Web: A Breeding Ground for ID Theft and Financial Crimes
The unauthorized access and dissemination of data sourced from corporate databases. Data breaches can happen either via exploiting a technical vulnerability, or by human factors, such as social engineering or insider threat.
Full Text Chapter Download: US $37.50 Add to Cart
Internet Privacy
An incident where information is accessed without authorization.
Full Text Chapter Download: US $37.50 Add to Cart
Cybercrime in Online Gaming
A security incident involving unauthorized access to data.
Full Text Chapter Download: US $37.50 Add to Cart
Challenges of Developing AI Applications in the Evolving Digital World and Recommendations to Mitigate Such Challenges: A Conceptual View
This refers to any intentional or unintentional leak of secure or private or confidential data to any untrusted system. This is also referred to as information disclosure or data spill.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity Risk: The Business Significance of Ongoing Tracking
A data breach references any incident wherein data is pilfered or removed from a system minus the realization or approval of the owner.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR