Showing 1 - 10 of 1,375
Persistent link: https://www.econbiz.de/10014438879
Chapter 1. Data Sovereignty -- Chapter 2. Digital Governance -- Chapter 3. Conflicts of Law -- Chapter 4. Technical Complexities -- Chapter 5. Comparative Legal Strategies -- Chapter 6. Emerging Topics in Data Sovereignty and Digital Governance.
Persistent link: https://www.econbiz.de/10013406959
Persistent link: https://www.econbiz.de/10014529558
Persistent link: https://www.econbiz.de/10014284607
This book explains the most important technical terms and contents and assigns them to the corresponding areas. It also includes seemingly peripheral areas that play a role in information security. For instance, the topic complexes of functional Safety and Privacy are examined in terms of their...
Persistent link: https://www.econbiz.de/10015100709
Using China's Cybersecurity Law (CSL) as an exogenous shock, I examine how personal data security affects stock crash risk. I find that the stock crash risk of treatment firms (which collect personal data) significantly decreases after the CSL, and such decrease is larger when firms face greater...
Persistent link: https://www.econbiz.de/10015133963
Persistent link: https://www.econbiz.de/10004021970
A stronger legal and regulatory environment, high profile privacy failures, and increasing public concerns build the case for enterprises to take privacy seriously. For those new to the subject, this paper describes the harms that privacy failures can lead to, and the reasons why privacy issues...
Persistent link: https://www.econbiz.de/10014185839
In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting “data breach disclosure laws” that require firms to notify...
Persistent link: https://www.econbiz.de/10014214642
Well documented breaches have heightened the public's and regulatory agencies' concerns about how well companies are securing consumer-specific information. Despite some initial advances, sensitive information is still commonly stolen. Internal threat issues and the fact that extended...
Persistent link: https://www.econbiz.de/10014217429