Skip to main navigation
Skip to search
Skip to main content
University of Haifa Home
Update your profile
Home
Researchers
Research units
Research output
Search by expertise, name or affiliation
Optimizing breach notification
Mark Verstraete,
Tal Zarsky
Faculty of Law
Research output
:
Contribution to journal
›
Review article
›
peer-review
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Optimizing breach notification'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Statute
100%
Data Breach Notification
100%
Law
50%
Data Security
50%
Notification Laws
33%
Normative Justification
33%
Legal Remedies
33%
Security Breaches
33%
Activity Level
16%
Design Strategy
16%
Organization for Economic Cooperation and Development
16%
Information Flow
16%
Conventional Wisdom
16%
Cybersecurity
16%
Moral Luck
16%
Legal Paradigm
16%
Social Objectives
16%
Privacy Security
16%
Digital Infrastructure
16%
Regulatory Design
16%
Federal Law
16%
Looming
16%
Regulatory Change
16%
Regulatory Pathways
16%
Reputational Sanctions
16%
General Data Protection Regulation
16%
Strict Liability
16%
New Requirements
16%
Tort
16%
Computer Science
Data Security
100%
Breach Notification Law
66%
Security Breach
66%
Design Strategy
33%
Cybersecurity
33%
Strict Liability
33%
General Data Protection Regulation
33%
Security Effort
33%
Conventional Wisdom
33%
Organization for Economic Cooperation and Development
33%
Social Sciences
Law
100%
Legislation
80%
Data Protection
60%
Normativity
60%
Legal Remedy
40%
Autonomy
20%
General Data Protection Regulation
20%
Federal Law
20%
Organisation for Economic Co-Operation and Development
20%
Economics, Econometrics and Finance
Organisation for Economic Co-Operation and Development
100%
Cybersecurity
100%