Data Breaches: The Main Enemy Within

Data Breaches: The Main Enemy Within

Authors

  • Pavel S. Shvyriaev Lomonosov Moscow State University

Keywords:

Confidential information, personal data, data breach, cybercrime, zero trust security model, sustainable digital development

Abstract

The article is devoted to the study of trends in the field of data breaches in the world and in Russia and the social foundation for this problem. Based on the analysis of global and Russian analytical reports, the most important trends and problems are identified: the continued high level of the number of breaches around the world; a significant increase in the share of external security violators during remote work; the main threat in terms of the volume and value of compromised data is posed by the employees of the organizations themselves, and not by external violators; from the point of view of the potential threat of data compromise, leaving employees are especially dangerous. The problems that are clearly expressed in Russia are analyzed separately: suppression of the facts of data breaches from the media and the public; misunderstanding or unwillingness to invest resources in the development of digital literacy competencies in employees; lack of understanding or unwillingness to increase investments in the prevention of cyber threats, elimination of the consequences of incidents already after their occurrence; high level of vulnerability of the population to data breaches; imperfection of the Russian regulatory framework. As a result, it is concluded that all these problems indicate global unpreparedness, misunderstanding and lack of awareness of the deep foundations for the ongoing digital transformation processes, their risks and potential threats; lack of a systematic, strategic approach to the implementation of technological transformations. A turn to a different understanding of the digital processes means changes not only in the technological, but above all in the social sphere. The current situation, systemic in nature, requires a systematic approach to its resolution, as a turn towards sustainable digital development of the entire society.

Author Biography

Pavel S. Shvyriaev, Lomonosov Moscow State University

Postgraduate student, School of Public Administration, Lomonosov Moscow State University, Moscow, Russian Federation.

ShvyryaevPS@spa.msu.ru

References

Беззатеев С.В., Елина Т.Н., Мыльников В.А., Лившиц И.И. Методика оценки рисков информационных систем на основе анализа поведения пользователей и инцидентов информационной безопасности // Научно-технический вестник информационных технологий, механики и оптики. 2021. Т. 21. № 4. С. 553–561. DOI: 10.17586/2226-1494-2021-21-4-553-561

Иванова А.П. Утечка персональных данных: большая проблема в цифровую эпоху (обзор) // Реферативный журнал Государство и право. 2020. № 4. С. 100–107.

Перекрестова В.А., Фурсова П.В. Цифровизация в России: проблемы информационной безопасности // Вестник Прикамского социального института. 2021. № 2 (89). C. 170–176.

Сергеева И.Г., Али Х.М. Анализ технологических рисков финансовых инноваций // Научный журнал НИУ ИТМО. 2021. № 2. С. 23–29. DOI: 10.17586/2310-1172-2021-14-2-23-29

Bayan A., Beloff N., White M. Rise of Big Data — Issues and Challenges // 21st Saudi Computer Society National Computer Conference (NCC). 2018. DOI: 10.1109/NCG.2018.8593166

Gidigbi M.O. Digital Technologies for Sustainable Development: Dual Challenge of Sustainability and Inclusivity Perspective // Law & Digital Technologies. 2021. Vol. 1. P. 27–36. DOI: 10.18254/S123456780015729-2

Hammouchi H., Cherqi O., Mezzour G., Ghogho M., Koutbi M. Digging Deeper into Data Breaches: An Exploratory Data Analysis of Hacking Breaches over Time // Procedia Computer Science. 2019. Vol. 151. P. 1004–1009. DOI: https://doi.org/10.1016/j.procs.2019.04.141

Helman L. Pay for (Privacy) Performance Holding Social Network Executives Accountable for Breaches in Data Privacy Protection // Brooklyn Law Review. 2019. Vol. 84. № 2. P. 523–569.

Marcus D.J. The Data Breach Dilemma: Proactive Solutions for Protecting Consumers’ Personal Information // Duke Law Journal. 2018. Vol. 68. № 3. P. 555–593.

Stier S., Breuer J., Siegers P., Thorson K. Integrating Survey Data and Digital Trace Data: Key Issues in Developing an Emerging Field // Social Science Computer Review. 2020. Vol. 38. Is. 5. P. 503–516. DOI: https://doi.org/10.1177/0894439319843669

Downloads

Published

2022-10-30

How to Cite

Data Breaches: The Main Enemy Within. (2022). Public Administration. E-Journal (Russia), 91, 226-241. https://spajournal.ru/index.php/spa/article/view/264

Issue

Section

Scientific articles

Categories

How to Cite

Data Breaches: The Main Enemy Within. (2022). Public Administration. E-Journal (Russia), 91, 226-241. https://spajournal.ru/index.php/spa/article/view/264

Most read articles by the same author(s)

<< < 13 14 15 16 17 18 19 20 21 22 > >> 

Similar Articles

1-10 of 316

You may also start an advanced similarity search for this article.

Loading...