{"id":66263,"date":"2020-10-07T12:26:28","date_gmt":"2020-10-07T12:26:28","guid":{"rendered":"http:\/\/www.kriativ-tech.com\/?p=66263"},"modified":"2020-10-08T08:20:50","modified_gmt":"2020-10-08T08:20:50","slug":"data-the-most-valuable-commodity","status":"publish","type":"post","link":"http:\/\/www.kriativ-tech.com\/?p=66263","title":{"rendered":"Data: The most valuable commodity"},"content":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243;]Kriativ-tech Volume 1, Issue 7, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Jul. 30, 2020.[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Authors[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243;]Pedro Ramos Brandao, Coordinator Professor at ISTEC<\/p>\n<p>Manuel Rezende, MSc Student at ISTEC[\/vc_custom_heading][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading]Media[\/vc_custom_heading][vc_button button_color=&#8221;accent&#8221; border_animation=&#8221;btn-ripple-out&#8221; border_width=&#8221;0&#8243; link=&#8221;url:http%3A%2F%2Fwww.kriativ-tech.com%2Fwp-content%2Fuploads%2F2020%2F10%2FPB-Manuel_Rezende-Data-The-most-valuable-commodity.pdf.pdf||target:%20_blank|&#8221;]PDF[\/vc_button][vc_custom_heading heading_semantic=&#8221;h4&#8243; text_size=&#8221;h4&#8243;]To cite this article[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h6&#8243;]Pedro Ramos Brandao, Manuel Rezende,\u00a0<strong>Data: The most valuable commodity. <\/strong>DOI: 10.31112\/kriativ-tech-2020-08-47[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;1&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;1&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Abstract[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243;]Throughout the 21<sup>st<\/sup> Century, corporate data breaches have become an increasingly common occurrence, progressively changing corporations and IT security specialist\u2019s focus from \u2018If\u2019 to \u2018When\u2019 the next significant event will occur. This article presents an insight into cybersecurity and why it has become the primary concern for corporations and institutions.[\/vc_custom_heading][vc_empty_space empty_h=&#8221;2&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Keywords[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243;]Data breach, data loss, data leakage, cybersecurity, financial loss, identity theft[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]References[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243;][1] Ibrahim A., Thiruvady D., Schneider J. and Abdelrazek M. (2020). \u201cThe challenges of leveraging threat intelligence to stop data breaches\u201d. In Frontiers in Computer Science, August 2020. Volume 2, Article 36. doi:10.3389\/fcomp.2020.00036<\/p>\n<p>[2]Cheng L., Liu F. and Yao D. (2017). \u201cEnterprise data breach: causes, challenges, prevention, and future directions\u201d. WIREs Data Mining and Knowledge Discovery. Published by John Wiley &amp; Sons, Ltd.. doi: 10.1002\/widm.1211<\/p>\n<p>[3] Digital Guardian (2019). \u201cThe definitive guide to data loss prevention\u201d. Whitepaper 2019 edition<\/p>\n<p>[4]Jeng A. (2015), \u201cMinimizing Damage From J.P. Morgan\u2019s Data Breach\u201d The SANS Institute<\/p>\n<p>[5] Adams B., Clark A. and Craven J. (2018). \u201cIt is Free and Always Will Be: Trading personal information and privacy for the convenience of online services\u201d. Researchgate publication\/324717676<\/p>\n<p>[6] McCoy K. (2017) \u201cTarget to pay $18.5M for 2013 data breach that affected 41 million consumers\u201d. USAToday, May 23<sup>rd<\/sup> 2017 edition, Money section<\/p>\n<p>[7] Reuters Editorial Staff (2020). \u201cProsecutors open homicide case after hacker attack on German hospital\u201d. Reuters Worls News, September 18<sup>th<\/sup>, 2020.<\/p>\n<p>[8] Columbus L. (2020). \u201c2020 Roundup Of Cybersecurity Forecasts And Market Estimates\u201d. Forbes Editor\u2019s pick, Apr 5<sup>th<\/sup> 2020<\/p>\n<p>[9] Bissell K., Lasalle R. and Dal Cin P (2020) \u201cInnovate for cyber resilience\u201d. Accenture Security, third annual state of cyber resilience.<\/p>\n<p>[10] Hill K. (2020). \u201cThe Secretive Company That Might End Privacy as We Know It\u201d. The New York Times, January 18<sup>th<\/sup> 2020 edition<\/p>\n<p>[11] Pricewaterhouse Coopers (2017). \u201cHow consumers see cybersecurity and privacy risks and what to do about it\u201d. PwC Consumer Intelligence Series: Protect.me[\/vc_custom_heading][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pedro Ramos Brand\u00e3o, Coordinator Professor at ISTEC | Manuel Rezende, MSc Student at ISTEC<br \/>\nDOI: 10.31112\/kriativ-tech-2020-08-47<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[68],"tags":[],"_links":{"self":[{"href":"http:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66263"}],"collection":[{"href":"http:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=66263"}],"version-history":[{"count":2,"href":"http:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66263\/revisions"}],"predecessor-version":[{"id":66268,"href":"http:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66263\/revisions\/66268"}],"wp:attachment":[{"href":"http:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=66263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=66263"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=66263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}