Data Breach Highlights Corporate Security Risks Annotated Bibliography

Pages: 4 (1639 words)  ·  Bibliography Sources: 0  ·  File: .docx  ·  Level: Master's  ·  Topic: Business

¶ … Big Data Annotated Bibliography

Bjorhus, J. (2014). Clean Reviews Preceded Target's Data Breach, and Others. Retrieved from

Bjorhus focuses on the issues surrounding Trustwave Holdings. The company faced security criticisms because of revealing customer information, a factor considered breach of compliance and security. The author reviews the reasons behind the reviews the company received in the past secondary to breaching confidentiality of the consumer information. The author reveals the weaknesses of the holding including flawed policy system for consumer related information, focusing on speed rather than quality, selling cheap audits to their clients and insecurity of the security systems that predispose companies to hacking of the systems and loss of valuable data. The article by this author is important for the study as it illuminates light into the challenges behind the success of the large companies involved in the storage of clients' information hence, the need for adoption of the big data.

Author's Note: Bjorhus is a business reporter and specialist in consumer finance and banking.

Claburn, T. (2013). Record-Setting Data Breach Highlights Corporate Security Risks. Retrieved from full Download Microsoft Word File
paper NOW!

Annotated Bibliography on Data Breach Highlights Corporate Security Risks Assignment

Clabum (2013) focuses on one of the cases associated with stealing of more than 160 million credit card numbers. The article shows that global businesses have not adopted effective strategies aimed at protecting their systems and client information against hackers. The author shows that lack of adequate security on client related information results to significant losses to businesses and the public. Apart from this, the author illuminates light into the economic impact of internet insecurity, which necessitates the adoption of strategies aiming at enhancing surveillance on the storage of business information. The article is important for the study as it shows the risks associated with adoption of inadequate strategies for ensuring security of information hence, the need for adoption of the big data.

Authors Note: Clabum is a renowned writer who focuses on technology and business related issues. He has written other articles such as New Architect, InformationWeek, and Salon among other publications.

Finkle, J. & Heavey, S. (2014). Target says it declined to act on early alert of cyber breach. Retrieved from

Finkle and Heavey (2014) focuses on the malicious data breach identified by the Target Corp's security. Despite its identification, the staff failed to respond in a timely manner to the threat. The authors recognize that the failure to respond to the threat is attributable to the fact that they received numerous threats on a daily basis from the FireEye. The FireEye also does not give detailed information on the threat detected hence, the failure to respond to the threat. The fact that the article provides an estimate of the losses incurred from the threat forms the basis of the strengths of the article and its concern. The article is important as it provides insights into the need for the big data in preventing malware that affects the sustainability and safety of information from access by third parties.

Authors Note: Finkle is a photographer and journalists who write business articles. Heavey is a reporter, journalist and writer from Washington DC. She writes articles on business and finance related issues.

Harris, E.A. & Perlroth, N. (2014) Target missed signs of a data breach. Retrieved from:

Just like in the previous cases, this article focuses on the issues related with access of client information by a third party resulting to a significant loss to the Target Holdings. The hackers infiltrated their system and compromised approximately 40 million-customer information resulting into a loss of $61 million to the company. It is recognizable that similar to the earlier cases, the FireEye software detected the suspicious activity but there was no early initiation of response activities. The article is important for the study because it shows the nature of effects of loss of information of the company and the need for adoption of a more effective systems of data management than the earlier, hence suitability of the big data.

Authors Note: Harris is a reporter, journalists and writes business and finance related articles. She publishes articles with the New York Times and the Forbes among other publishing firms. Perlroth is a technology reporter working with the New York Times. She covers issues related to cyber security and privacy.

Jamieson, A. & McClam, E. (2013) Millions of Target customer's credit, debit card accounts may be hit by data breach. Retrieved from:

The article shows the significant effects associated with breaching of the consumers' information such as that of the credit cards by a third party or hackers. It shows the ways in which the FireEye identified the malicious activity, but the involved authorities failed to execute the desired actions to eliminate the threat, as such, the article reveals the extent to which valuable information of the clients' credit cards and a significant loss of money through hacking occurred. The article proves important for the study as it stresses the need for the adoption of an effective security system that protects information against access by a third party such as in the case of the big data.

Author Note: Jamieson is a journalist, reporter, and a writer of the New York Times. He writes on business, finance, and cyber security related issues. McClam is also a reporter and writer for the New York Times and specializes in cyber-security related issues.

Kurane, S. (2014). Minnesota court to hear all Target data breach cases. Retrieved from

The article shows client dissatisfaction to the services provided by the Target Corp. The company failed in protecting the clients from data breach leading to significant loss of their valuable information. The 33 cases across 18 districts in the Minnesota signifies the nature of the inefficiency of the Target Corp in providing security of information of the customers from access by a third party. The article is important as it shows the extent and the consequences of failing to protect information of the consumers. As such, the article shows the need for the adoption of the big data in such companies.

Authors Note: Kurane is a reporter and writer for the New York Times and specializes in the monitoring of information related to cyber threats and security across the U.S. alongside writing on issues affecting business of the state.

Mitchell, S. (2009). How to Survive a Data Breach a Pocket Guide. Cambridgeshire, UK: IT Governance Publishers.

Mitchell recognizes the fact that data breach costs significant losses to most organization hence, the need for adoption of effective strategies to respond and prevent incidences of data breach across different organizations. The author draws empirical evidences from the past cases of breach of information and loss of data to come up with an effective strategy for preventing data loss through hacking. The fact that the author uses surveys and analysis of past events to provide ways of preventing data loss forms the strength of the guide. The guide is important for the study as it provides valuable information used in the study to develop preventive strategies against breach of data.

Authors Note: Mitchell is a renowned IT journalist working across different publications that include Sunday Times, PC Pro, and Computer Shopper.

Rosenbaum, P. (2014) The Target data breach is becoming a nightmare. Retrieved from:

Rosenbaum discusses ways in which data breach has become one of the most critical issues facing businesses in the modern business environment. The author notes that most of the breach of data has occurred through the loss of credit card information and other users related information such as email phone numbers of the consumers. The ways in which the loss of data as stated in the article forms the basis of its strengths. Among the systems targeted by the hackers, include the POS system that stores Visa related information. The article is important… [END OF PREVIEW] . . . READ MORE

Two Ordering Options:

Which Option Should I Choose?
1.  Download full paper (4 pages)Download Microsoft Word File

Download the perfectly formatted MS Word file!

- or -

2.  Write a NEW paper for me!✍🏻

We'll follow your exact instructions!
Chat with the writer 24/7.

Data Breach Case Study

Identity Management and Security Awareness Training Plan Corporate Writing

Security - Agip Kazakhstan North Caspian Operating Term Paper

Security Policy Dr. Fossett's Dental Office Term Paper

Computer Security Research Paper

View 200+ other related papers  >>

How to Cite "Data Breach Highlights Corporate Security Risks" Annotated Bibliography in a Bibliography:

APA Style

Data Breach Highlights Corporate Security Risks.  (2014, April 18).  Retrieved April 14, 2021, from

MLA Format

"Data Breach Highlights Corporate Security Risks."  18 April 2014.  Web.  14 April 2021. <>.

Chicago Style

"Data Breach Highlights Corporate Security Risks."  April 18, 2014.  Accessed April 14, 2021.