Researchers can find this information useful to study data breaches using analytical resources. For example, researchers may take note of breaches that are happening in the most common geographical areas. After gathering data about these certain areas and states, research and further detail the specific data systems being breached. Learning this pattern may allow the researcher to seek necessary implementations per system to increase security measurements. Another facet that researchers could pursue is cyber law. Knowing that states have different laws can also play a role in the skewed differences in certain data breaches. Recognizing these laws could result in legislation involvement and the passing of new laws regarding the cyber environment. In conclusion, using this source of information can help researchers differentiate common data breaches to implement new patches to mitigate issues.
Leave a Reply