2022
DOI: 10.1108/jfc-04-2022-0093
|View full text |Cite
|
Sign up to set email alerts
|

When is a law firm liable for a data breach? An exploration into the legal liability of ransomware and cybersecurity

Abstract: Purpose The threat of cybercrime is pervasive. Corporations cannot be convinced, out of sheer luck or naïve conviction, that they will remain unaffected. When targeted, the stark reality is that a company also incurs a liability risk. This paper aims to explore the boundaries of liability resulting from a data breach and privacy concerns according to the emerging regulations on cybersecurity. Design/methodology/approach The nature of cybercrime and its constant evolution is analysed as a threat of liability.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(12 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Identity verification systems play a crucial role in safeguarding data security, and recent academic inquiries have proposed diverse enhancements and innovations in this field [50], [44]. Research in biometric-based verification systems, for example, has delved into advanced biometric technologies such as facial recognition and fingerprint scanning, offering heightened security measures [45], [46], [56]. Simultaneously, another stream of research has been exploring the integration of artificial intelligence and machine learning algorithms into identity verification systems, aiming to augment both the precision and efficiency of these systems [19], [23].…”
Section: B Identity Verification Systemsmentioning
confidence: 99%
See 2 more Smart Citations
“…Identity verification systems play a crucial role in safeguarding data security, and recent academic inquiries have proposed diverse enhancements and innovations in this field [50], [44]. Research in biometric-based verification systems, for example, has delved into advanced biometric technologies such as facial recognition and fingerprint scanning, offering heightened security measures [45], [46], [56]. Simultaneously, another stream of research has been exploring the integration of artificial intelligence and machine learning algorithms into identity verification systems, aiming to augment both the precision and efficiency of these systems [19], [23].…”
Section: B Identity Verification Systemsmentioning
confidence: 99%
“…Those studies, while innovative, consistently reveal a research gap in finding an equilibrium between robust security measures and the preservation of user privacy and convenience [54], [53]. Moreover, these studies highlight the necessity to address the continually evolving and increasingly sophisticated threats in identity fraud [56], [57]. The challenge lies in designing systems that are not only secure but also respect the privacy of users and do not overburden them with complex authentication procedures [58], [59].…”
Section: B Identity Verification Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…These concerns primarily revolve around issues of privacy, the security of data, and the possibility that AI could be leveraged for nefarious purposes [50], [51]. The necessity for conducting research that focuses heavily on ethical practices in AI is paramount [56]. This includes the assurance of data privacy, fortifying AI systems to prevent their misuse, and being transparent about the capabilities and limitations of tools assisted by AI in the cybersecurity sector [4], [35].…”
Section: Ethical Considerations In Ai-assisted Cybersecuritymentioning
confidence: 99%
“…In its earlier forms, ransomware primarily operated by encrypting a victim's data, subsequently demanding a ransom for its decryption [3], [4], [5]. However, recent trends have witnessed an expansion in its modus operandi, now encompassing data exfiltration, which brings about an amplified threat of data breaches and privacy infractions [6], [7], [8], [9]. Ransomware, generally categorized into cryptographic and data exfiltration types, presents distinct challenges.…”
Section: Introductionmentioning
confidence: 99%