enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. List of data breaches - Wikipedia

    en.wikipedia.org/wiki/List_of_data_breaches

    This is a list of reports about data breaches, using data compiled from various sources, including press reports, government news releases, and mainstream news articles. The list includes those involving the theft or compromise of 30,000 or more records, although many smaller breaches occur continually.

  3. Workplace harassment - Wikipedia

    en.wikipedia.org/wiki/Workplace_harassment

    While sexual harassment is a form of workplace harassment, the United States Department of Labor defines workplace harassment as being more than just sexual harassment. [10] "It may entail quid pro quo harassment, which occurs in cases in which employment decisions or treatment are based on submission to or rejection of unwelcome conduct ...

  4. 2022 Optus data breach - Wikipedia

    en.wikipedia.org/wiki/2022_Optus_data_breach

    Home Affairs and Cyber Security Minister Clare O'Neil said Optus was at fault for the attack, refuting Optus's argument the attack was complicated. O'Neil also stated the attack should not have happened, stating: "Responsibility for the security breach rests with Optus[,] and I want to note that the breach is of a nature that we should not expect to see in a large telecommunications provider ...

  5. List of cyberattacks - Wikipedia

    en.wikipedia.org/wiki/List_of_cyberattacks

    A cyberattack is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.

  6. Counterproductive work behavior - Wikipedia

    en.wikipedia.org/wiki/Counterproductive_work...

    Cyber loafing can be defined as surfing the web in any form of non-job-related tasks performed by the employee. [19] Cyber loafing has emerged as more and more people use computers at work. One survey showed that 64% of US workers use the Internet for personal tasks at work. [20]

  7. Cyberstalking - Wikipedia

    en.wikipedia.org/wiki/Cyberstalking

    Missouri revised its state harassment statutes to include stalking and harassment by telephone and electronic communications (as well as cyber-bullying) after the Megan Meier suicide case of 2006. In one of the few cases where a cyberstalking conviction was obtained the cyberstalker was a woman, which is also much rarer that male cyberstalkers ...

  8. Cybercrime - Wikipedia

    en.wikipedia.org/wiki/Cybercrime

    In 2000, the tenth United Nations Congress on the Prevention of Crime and the Treatment of Offenders classified cyber crimes into five categories: unauthorized access, damage to computer data or programs, sabotage to hinder the functioning of a computer system or network, unauthorized interception of data within a system or network, and ...

  9. Workplace aggression - Wikipedia

    en.wikipedia.org/wiki/Workplace_aggression

    Common examples of workplace aggression include gossiping, bullying, intimidation, sabotage, sexual harassment, and physical violence. [5] These behaviors can have serious consequences, including reduced productivity, increased stress, and decreased morale. Workplace aggression can be classified as either active or passive.