{"id":35518,"date":"2022-12-19T08:53:36","date_gmt":"2022-12-19T13:53:36","guid":{"rendered":"https:\/\/studentwork.prattsi.org\/infovis\/?p=35518"},"modified":"2023-01-13T08:08:13","modified_gmt":"2023-01-13T13:08:13","slug":"world-data-breaches-increasing-in-scope-severity","status":"publish","type":"post","link":"https:\/\/studentwork.prattsi.org\/infovis\/visualization\/world-data-breaches-increasing-in-scope-severity\/","title":{"rendered":"World Data Breaches Increasing in Scope &amp; Severity"},"content":{"rendered":"\n<p>When I began this research, I was originally planning to study children\u2019s internet use and data collection methods and concerns around internet-connected, or \u201csmart,\u201d toys. Not only was this a dataset that proved either hard to find or legally unavailable, but as I was conducting a literature review about data privacy legislation for another analysis paper in my Foundations of Information class, I quickly realized that that topic was a part of a bigger conversation about the broader issue of data privacy in the United States.&nbsp;<\/p>\n\n\n\n<p>Through that research, I discovered a data visualization from <em>Information is Beautiful<\/em> entitled \u201c<a href=\"https:\/\/www.informationisbeautiful.net\/visualizations\/worlds-biggest-data-breaches-hacks\/\">World\u2019s Biggest Data Breaches and Hacks<\/a>\u201d (2022), which appeared to show incidents of hacking, data breaches and leaks, and accidental security lapses growing in size and scope since the timeline began in 2004. As I looked further into the visualization and the stories it linked to, I found some dramatic recent examples of data loss, including the loss of 900,000 records from a police database in China, a recent leak of <a href=\"https:\/\/e24.no\/internasjonal-oekonomi\/i\/Bj97B0\/dubai-uncovered-data-leak-exposes-how-criminals-officials-and-sanctioned-politicians-poured-money-into-dubai-real-estate\">Dubai property data<\/a> illuminating illicit money and criminal investments, and a hack of streaming platform <a href=\"https:\/\/www.bbc.com\/news\/technology-58817658\">Twitch<\/a> in 2021 that exposed salary and payouts alongside technical details of new products and platforms.&nbsp;<\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><strong>Research<\/strong> Question<\/h2>\n\n\n\n<p>For this research and data visualization project, I decided to dive deeper into the \u201cWorld\u2019s Biggest Data Breaches and Hacks\u201d original dataset, which authors David McCandless, Tom Evans, Paul Barton make available online. Their dataset\u2019s sources include information compiled from IdTheftCentre and DataBreaches.net as well as news reports from New York Times, Forbes, The Guardian, Tech Radar, BBC, PC Mag, Tech Crunch and others.&nbsp;<\/p>\n\n\n\n<p>This research project focuses on answering a broad investigative question through data visualization:&nbsp;<strong>What lessons can we learn from the past 15 years of global data breaches and hacks?&nbsp;<\/strong><\/p>\n\n\n\n<p>My main hypothesis was that data breaches and hacks will be shown to have grown in almost every category, but specifically in size (the number of data records lost) and severity (the level of data sensitivity, frequency of events, and the number of \u201cinteresting story\u201d events). As part of this investigation, I hoped to be able to highlight and discuss specific, concrete examples of data loss. Through telling that story, I also wanted to begin to illuminate the human toll of, and the greater meaning behind, what I suspected was a trend illuminating a general mass loss of data privacy over time.<\/p>\n\n\n\n<p>This project will complement other research I\u2019ve done that has focused on data privacy issues from both a historical and policymaking or legislative standpoint. It will serve as a support to that research by illustrating both the present dangers and lessons to learn for the global population as we continue to constantly release, collect, and store more and more personal, financial, and biometric data online.&nbsp;<\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><strong>Background&nbsp;<\/strong><\/h2>\n\n\n\n<p><strong>Defining the multifaceted nature of data privacy<\/strong><\/p>\n\n\n\n<p>To trace the idea of data privacy is to trace the growth of the internet, and the growth of its use over time. Internet access has grown exponentially with the proliferation of smartphones and personal devices (Pew Research Center, 2019), which in tandem has increased the amount of data being collected, stored, and analyzed by essentially all companies, institutions, and governments with a web presence. At the same time, the price of surveillance technology has decreased, allowing businesses both large and small to engage in data collection (Heavin et al., 2020). The global size of the \u201cdatasphere,\u201d too, is growing exponentially. It is projected to surpass 175 terabytes by 2025 (Kushmaro, 2021). This cascade of effects, coupled with the lack of regulation in the data privacy space, has created a veritable nightmare for individuals wishing to keep their data private.<\/p>\n\n\n\n<p>A fundamental tension emerges in the world of data collection and analysis that contributes to this conflict. The more detailed the data provided to the researcher for analysis, the more useful it is in drawing conclusions. On one side of the spectrum lies privacy, and on the other, utility (Stewart, 2020). In a context such as the medical research field, some clear examples emerge. In studying a rare disease\u2019s progression through a randomized controlled trial, the greater the information about a population that has the disease in relation to one that does not, the greater the strength of variables to study and find potential significance. Significance, in this case, might lead to better treatment and understanding. However, in the context of a for-profit company looking to generate advertising revenue through data collection, the greater the volume and detail of the data collected, the more it is generally worth for less humanitarian purposes.<\/p>\n\n\n\n<p><strong>Data privacy violations on the rise<\/strong><\/p>\n\n\n\n<p>There are also privacy concerns raised with publicly available data. The collection and release of mass amounts of personal data can still have far-reaching implications, even if the data was not necessarily kept private. For instance, in 2017, Strava, the running app, accidentally identified a secret military base by publishing its worldwide running routes, including regular laps taken by these particular armed forces (Stewart, 2020). There are also emerging concerns about the possibilities of reidentification of what was thought to be anonymized data, such as when the Netflix prize competition ended up outing a LGBTQ individual (Singel, 2010).&nbsp;<\/p>\n\n\n\n<p>Underscoring this conversation is the recognition that internet use is becoming ubiquitous for an increasingly younger population. Children\u2019s internet use has increased more than ever. One highly popular virtual world-building game, Roblox, \u201crose by over 20% in popularity [in 2021 alone], with 56% of kids playing the game worldwide\u201d (Qustodio, 2021). In the same study, children\u2019s time spent on IXL, a subscription learning service, rose by 46%. YouTube remained children\u2019s top video streaming app despite recently having settled a major COPPA lawsuit about its illegal data collection practices (Federal Trade Commission, 2019). All of these tools have faced scrutiny due to lack of transparency regarding sharing or selling data, lack of attention to children\u2019s safety on their platform, and\/or concerns over security of the data they store (Common Sense, 2021). Roblox, in particular, was the subject of a <a href=\"https:\/\/www.vice.com\/en\/article\/qj4ddw\/hacker-bribed-roblox-insider-accessed-user-dat-reset-passwords\">major hack<\/a> in 2020 (Cox, 2020).<\/p>\n\n\n\n<p>Returning to the research question: What lessons can we learn from the past 15 years of global data breaches and hacks?<\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><strong>Methodology &amp; Materials<\/strong><\/h2>\n\n\n\n<p>The Information is Beautiful dataset included 16 column variables of comprehensive information on each event, including company name, year and date of the breach or hack, sources that reported on the breach or hack, and one column containing a variable called \u201cinteresting story,\u201d corresponding to examples such as the Twitch or Dubai real estate reporting. Individual events often were listed with a main sector and a corresponding subsector, such as \u201cgovernment, health.\u201d<\/p>\n\n\n\n<p>After locating and downloading the dataset, I both checked and cleaned it in Excel, then added one column for country data, which I added in manually after cross-referencing the source materials for the hack or breach incident. I also transformed the \u201cinteresting story\u201d variable into a boolean (true\/false) variable. Then, for ease of reading, I grouped the sectors together by main sector only in Tableau.<\/p>\n\n\n\n<p>I uploaded the cleaned spreadsheet to Google Drive, connecting Tableau Desktop to the Drive to query it, then created a Tableau Story in a series of five standalone visualizations and dashboards to seek to answer my research question. I published the final product through <a href=\"https:\/\/public.tableau.com\/app\/profile\/anna.feldman4373\/viz\/ScopeandSeverityoftheWorldsBiggestDataBreachesandHacks\/DataStory#1\">Tableau Public<\/a>.<\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><strong><a href=\"https:\/\/public.tableau.com\/app\/profile\/anna.feldman4373\/viz\/ScopeandSeverityoftheWorldsBiggestDataBreachesandHacks\/DataStory#1\">Full interactive Tableau visualization can be viewed here.<\/a><\/strong><\/h2>\n\n\n\n<p>The first part of the Tableau story includes an introductory line chart that summarizes the scope of the issue over time, highlighting the aggregated number of data records lost by year since the timeline begins in 2004.<\/p>\n\n\n\n<p>The story tabs include:&nbsp;<\/p>\n\n\n\n<p>Firstly, <strong>a timeline of data loss by size<\/strong>, the number of data records lost, from 2004 to 2022:<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/overtime-1024x900.png?resize=768%2C675&#038;ssl=1\" alt=\"\" class=\"wp-image-35542\" width=\"768\" height=\"675\" srcset=\"https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/overtime.png?resize=1024%2C900&amp;ssl=1 1024w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/overtime.png?resize=300%2C264&amp;ssl=1 300w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/overtime.png?resize=768%2C675&amp;ssl=1 768w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/overtime.png?resize=1536%2C1350&amp;ssl=1 1536w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/overtime.png?resize=800%2C703&amp;ssl=1 800w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/overtime.png?resize=205%2C180&amp;ssl=1 205w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/overtime.png?w=1736&amp;ssl=1 1736w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/overtime.png?w=1680 1680w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><figcaption class=\"wp-element-caption\">Aggregate data records lost over time<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Next, a dashboard with a series of charts showing <strong>how the data was lost across sectors <\/strong>(web, healthcare, app, retail, gaming, transport, financial, tech, government, telecoms, legal, media, academic, energy, military) and <strong>by method <\/strong>(hacking, inside job, mistake &#8211; &#8220;oops!&#8221;, poor security, or lost device).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/methods-and-sectors-1024x918.png?resize=768%2C689&#038;ssl=1\" alt=\"\" class=\"wp-image-35544\" width=\"768\" height=\"689\" srcset=\"https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/methods-and-sectors.png?resize=1024%2C918&amp;ssl=1 1024w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/methods-and-sectors.png?resize=300%2C269&amp;ssl=1 300w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/methods-and-sectors.png?resize=768%2C688&amp;ssl=1 768w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/methods-and-sectors.png?resize=1536%2C1376&amp;ssl=1 1536w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/methods-and-sectors.png?resize=800%2C717&amp;ssl=1 800w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/methods-and-sectors.png?resize=201%2C180&amp;ssl=1 201w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/methods-and-sectors.png?w=1684&amp;ssl=1 1684w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><figcaption class=\"wp-element-caption\">Interactive visualization dashboard showing how data was lost over time and by sector. <br>Users can filter by method (e.g. hacks) as well as hover over the bar graph to see major incidents by year.<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>The next tab displays another dashboard with <strong>a global heat map visualization <\/strong>in order to display where in the world the companies with breaches and hacks are active. The map serves as a jumping off point for potential discussion and investigation into how a country\u2019s geographic location may impact data privacy and protections with regard to oversight, and regulation of companies&#8217; data management in particular. In the map, I edited the color, the number ranges displayed in the legend, and the cluster sizes of the circles displaying the size of the data record numbers lost in order to make the results more legible and apparent.<\/p>\n\n\n\n<p>This tab also includes the &#8220;top ten&#8221; list of the biggest hacks and breaches within the entire dataset, by organization or entity.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/where-1024x911.png?resize=768%2C683&#038;ssl=1\" alt=\"\" class=\"wp-image-35548\" width=\"768\" height=\"683\" srcset=\"https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/where.png?resize=1024%2C911&amp;ssl=1 1024w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/where.png?resize=300%2C267&amp;ssl=1 300w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/where.png?resize=768%2C683&amp;ssl=1 768w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/where.png?resize=1536%2C1366&amp;ssl=1 1536w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/where.png?resize=800%2C712&amp;ssl=1 800w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/where.png?resize=202%2C180&amp;ssl=1 202w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/where.png?w=1700&amp;ssl=1 1700w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><figcaption class=\"wp-element-caption\">Map and top ten biggest hacks\/breaches since the timeline began (2004).<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>The next tab shows a selection of the <strong>most concerning data hacks and breaches<\/strong> by the level of data sensitivity (1=Just email address\/Online information; 2=SSN\/Personal details; 3=Credit card information; 4=Health &amp; other personal records; 5=Full details):<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/concerns-1024x914.png?resize=768%2C686&#038;ssl=1\" alt=\"\" class=\"wp-image-35551\" width=\"768\" height=\"686\" srcset=\"https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/concerns.png?resize=1024%2C914&amp;ssl=1 1024w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/concerns.png?resize=300%2C268&amp;ssl=1 300w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/concerns.png?resize=768%2C685&amp;ssl=1 768w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/concerns.png?resize=1536%2C1371&amp;ssl=1 1536w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/concerns.png?resize=800%2C714&amp;ssl=1 800w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/concerns.png?resize=202%2C180&amp;ssl=1 202w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/concerns.png?w=1680&amp;ssl=1 1680w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><figcaption class=\"wp-element-caption\">Highlighting highly sensitive data leaks.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/concerns2-1024x857.png?resize=768%2C643&#038;ssl=1\" alt=\"\" class=\"wp-image-35552\" width=\"768\" height=\"643\" srcset=\"https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/concerns2.png?resize=1024%2C857&amp;ssl=1 1024w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/concerns2.png?resize=300%2C251&amp;ssl=1 300w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/concerns2.png?resize=768%2C642&amp;ssl=1 768w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/concerns2.png?resize=1536%2C1285&amp;ssl=1 1536w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/concerns2.png?resize=800%2C669&amp;ssl=1 800w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/concerns2.png?resize=215%2C180&amp;ssl=1 215w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/concerns2.png?w=1786&amp;ssl=1 1786w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/concerns2.png?w=1680 1680w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><figcaption class=\"wp-element-caption\">More detail, same visualization<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>The final tab is a reimagined version of the Information is Beautiful original visualization, which encourages the user to <strong>explore the entire dataset<\/strong>. Of course, this does not show all the variables, but highlights both the company involved and the size of the incident, via number of records lost, alongside any \u201cinteresting story\u201d information associated with it. I configured pop-ups to link to interesting stories with titles and\/or topics, so that the reader can read more about where and at what time major breaches and hacks were reported on.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/explorethedata-1024x863.png?resize=768%2C647&#038;ssl=1\" alt=\"\" class=\"wp-image-35554\" width=\"768\" height=\"647\" srcset=\"https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/explorethedata.png?resize=1024%2C863&amp;ssl=1 1024w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/explorethedata.png?resize=300%2C253&amp;ssl=1 300w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/explorethedata.png?resize=768%2C647&amp;ssl=1 768w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/explorethedata.png?resize=1536%2C1294&amp;ssl=1 1536w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/explorethedata.png?resize=800%2C674&amp;ssl=1 800w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/explorethedata.png?resize=214%2C180&amp;ssl=1 214w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/explorethedata.png?w=1797&amp;ssl=1 1797w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/explorethedata.png?w=1680 1680w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><figcaption class=\"wp-element-caption\">Hover information includes an excerpt from any &#8220;interesting stories&#8221; included in the dataset.<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>In each of the standalone visualizations, I adjusted the cut points and colors to make each as readable as possible and to reflect \u201cwarnings\u201d in culturally recognized \u201cdangerous\u201d colors like reds and oranges, and more education information in neutrals, while also adding highlights to interesting data points. I grouped related visualizations together in a dashboard to tell a more complete story about one subtopic, for instance, the nature and scope of leaks within the government and military sector.<\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><strong>Conclusion &amp; Further Study<\/strong><\/h2>\n\n\n\n<p>As I investigated this dataset, I found that indeed, data privacy violations have increased and escalated in severity alongside the growth of the global datasphere, however the growth has been irregular.&nbsp;In drilling down into the data, I found that data was lost across sectors, but none so big as the overarching &#8220;web&#8221; sector. This makes sense &#8211; this dataset encompasses incidents from 2004 on, wherein the biggest breaches in early years were a combination of physical hacks (e.g. stealing hard drives or physical documents) versus later years, where the breaches segued entirely into the digital, online space.<\/p>\n\n\n\n<p>This is an area for further analysis, but in drilling down into certain methods and sectors, I also found that the increase in data loss seemed to be affected by certain gigantic breaches and hacks, such as the loss of police data in Shanghai or the breach at J.P. Morgan (both highlighted in the story data). Many of these were accompanied by a slew of media coverage. I tried to pull out some of the human toll of this data loss in the tab highlighting specific breaches alongside some of the most &#8220;concerning&#8221; data breaches and hacks across the health and government sectors.<\/p>\n\n\n\n<p>Time was a major limitation of this study. Given more of it, I would have liked to keep growing and investigating this dataset. However, this is a project that I plan to keep building on in the future by adding further contextual information to the dataset and the visualization. For instance, I would like to create more calculated fields and parameters to highlight each country\u2019s top ten data breaches and hacks by size and by sector. Alongside this, I plan to do further research on how the legal landscape and cultural contexts of different affected companies\u2019 geographic location may further impact their vulnerability to hacking or breaches. Featuring texts, links to outside images, and a more illustrative timeline with interesting stories and images would all help underscore the complexity and urgency of addressing this issue.<\/p>\n\n\n\n<p>As a Data Analytics and Visualization graduate student, issues surrounding data privacy are of particular importance to me. Three months into this investigation, I have become acutely aware of the vastness of the topic of data privacy and protection and the corresponding urgent debate both within the United States and globally about how to address mass data loss. Researchers and leaders across fields of information sciences, law, health, education, politics, and more have spent and continue to spend their entire lives studying the concept of data privacy and protection. This visualization begins to tell but a small contextual part of that story.<\/p>\n\n\n\n<p><strong>Sources<\/strong><\/p>\n\n\n\n<p>Cox, J. (2020, May 4). Hacker bribed &#8216;Roblox&#8217; insider to access user data. VICE. Retrieved from <a href=\"https:\/\/www.vice.com\/en\/article\/qj4ddw\/hacker-bribed-roblox-insider-accessed-user-dat-reset-passwords\">https:\/\/www.vice.com\/en\/article\/qj4ddw\/hacker-bribed-roblox-insider-accessed-user-dat-reset-passwords<\/a>&nbsp;<\/p>\n\n\n\n<p>Feldman, A. (2022, December 16). Whither Data Privacy? INFO 601-03: Foundations of Information.<\/p>\n\n\n\n<p>Kushmaro, P. (2021,\u00a0 June 7). Why Data Privacy Is A Human Right (And What Businesses Should Do About It). <em>Forbes<\/em>. Retrieved from <a href=\"https:\/\/www.forbes.com\/sites\/forbescommunicationscouncil\/2021\/06\/07\/why-data-privacy-is-a-human-right-and-what-businesses-should-do-about-it\/?sh=6fe75a4ec3ca\">https:\/\/www.forbes.com\/sites\/forbescommunicationscouncil\/2021\/06\/07\/why-data-privacy-is-a-human-right-and-what-businesses-should-do-about-it\/?sh=6fe75a4ec3ca<\/a><\/p>\n\n\n\n<p>McCandless, D. (2022, June 1). <em>World&#8217;s biggest data breaches &amp; hacks<\/em>. Information is Beautiful. Retrieved from <a href=\"https:\/\/www.informationisbeautiful.net\/visualizations\/worlds-biggest-data-breaches-hacks\">https:\/\/www.informationisbeautiful.net\/visualizations\/worlds-biggest-data-breaches-hacks<\/a>&nbsp;<\/p>\n\n\n\n<p>Privacy program. The Common Sense Privacy Program. (n.d.). Retrieved from <a href=\"https:\/\/privacy.commonsense.org\">https:\/\/privacy.commonsense.org<\/a><\/p>\n\n\n\n<p>Singel, R. (2010, March 12). <em>Netflix cancels recommendation contest after privacy lawsuit<\/em>. Wired. Retrieved from <a href=\"https:\/\/www.wired.com\/2010\/03\/netflix-cancels-contest\/\">https:\/\/www.wired.com\/2010\/03\/netflix-cancels-contest\/<\/a><\/p>\n\n\n\n<p>Singer, N. and Krolik, A. (2020, January 13). The New York Times. Retrieved from <a href=\"https:\/\/www.nytimes.com\/2020\/01\/13\/technology\/grindr-apps-dating-data-tracking.html\">https:\/\/www.nytimes.com\/2020\/01\/13\/technology\/grindr-apps-dating-data-tracking.html<\/a><\/p>\n\n\n\n<p>Stock photos: Pexels, <a href=\"https:\/\/www.pexels.com\/search\/security\/\">https:\/\/www.pexels.com\/search\/security\/<\/a>&nbsp;<\/p>\n\n\n\n<p>Warzel, C., &amp; Ngu, A. (2019, July 10). Google&#8217;s 4,000-word privacy policy is a secret history of the internet. The New York Times. Retrieved December 14, 2022, from <a href=\"https:\/\/www.nytimes.com\/interactive\/2019\/07\/10\/opinion\/google-privacy-policy.html\">https:\/\/www.nytimes.com\/interactive\/2019\/07\/10\/opinion\/google-privacy-policy.html<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When I began this research, I was originally planning to study children\u2019s internet use and data collection methods and concerns around internet-connected, or \u201csmart,\u201d toys. Not only was this a dataset that proved either hard to find or legally unavailable, but as I was conducting a literature review about data privacy legislation for another analysis&hellip;<\/p>\n","protected":false},"author":4026,"featured_media":35519,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[150,1],"tags":[1838,1837,1839,5],"coauthors":[1799],"class_list":["post-35518","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-projects","category-visualization","tag-data-breaches","tag-data-privacy","tag-hacks","tag-information-visualization"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2022\/12\/Security-scaled.jpg?fit=2560%2C1707&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/paBdcV-9eS","_links":{"self":[{"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/posts\/35518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/users\/4026"}],"replies":[{"embeddable":true,"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/comments?post=35518"}],"version-history":[{"count":30,"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/posts\/35518\/revisions"}],"predecessor-version":[{"id":35572,"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/posts\/35518\/revisions\/35572"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/media\/35519"}],"wp:attachment":[{"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/media?parent=35518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/categories?post=35518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/tags?post=35518"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/coauthors?post=35518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}