A requirements taxonomy for reducing Web site privacy vulnerabilities
Requirements Engineering
Proceedings of the 1st ACM International Health Informatics Symposium
Towards HIPAA-compliant healthcare systems
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
Hi-index | 0.00 |
Before 2005, data broker ChoicePoint suffered fraudulent access to its databases, exposing thousands of customers' personal information. This article examines ChoicePoint's data breach, explores what went wrong from the perspective of consumers, executives, policy, and IT systems, and offers recommendations for the future.