100+ datasets found
  1. d

    Open Data Privacy Policy (Sensitive Regulated Data: Permitted and Restricted...

    • catalog.data.gov
    • datasets.ai
    • +7more
    Updated Mar 18, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    City of Tempe (2023). Open Data Privacy Policy (Sensitive Regulated Data: Permitted and Restricted Uses) [Dataset]. https://catalog.data.gov/dataset/open-data-privacy-policy-sensitive-regulated-data-permitted-and-restricted-uses-30dc6
    Explore at:
    Dataset updated
    Mar 18, 2023
    Dataset provided by
    City of Tempe
    Description

    Sensitive Regulated Data: Permitted and Restricted UsesPurposeScope and AuthorityStandardViolation of the Standard - Misuse of InformationDefinitionsReferencesAppendix A: Personally Identifiable Information (PII)Appendix B: Security of Personally Owned Devices that Access or Maintain Sensitive Restricted DataAppendix C: Sensitive Security Information (SSI)

  2. IT Policies and Standards - NASA Information Security Policy - Dataset -...

    • data.nasa.gov
    Updated Mar 31, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    nasa.gov (2025). IT Policies and Standards - NASA Information Security Policy - Dataset - NASA Open Data Portal [Dataset]. https://data.nasa.gov/dataset/it-policies-and-standards-nasa-information-security-policy
    Explore at:
    Dataset updated
    Mar 31, 2025
    Dataset provided by
    NASAhttp://nasa.gov/
    Description

    The documents contained in this dataset reflect NASA's comprehensive IT policy in compliance with Federal Government laws and regulations.

  3. o

    Port security - Dataset - Open Government Data Portal

    • opendata.gov.jo
    Updated May 10, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2021). Port security - Dataset - Open Government Data Portal [Dataset]. https://opendata.gov.jo/dataset/port-security-819-2021
    Explore at:
    Dataset updated
    May 10, 2021
    Description

    Port security

  4. t

    Security and Privacy Worksheet

    • open.tempe.gov
    • data.tempe.gov
    • +8more
    Updated Jun 4, 2020
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    City of Tempe (2020). Security and Privacy Worksheet [Dataset]. https://open.tempe.gov/datasets/security-and-privacy-worksheet
    Explore at:
    Dataset updated
    Jun 4, 2020
    Dataset authored and provided by
    City of Tempe
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    City of Tempe Security and Privacy Worksheet includes:Section 1: DATASET NAME Section 2. PERSONALLY IDENTIFIABLE INFORMATION QUESTIONS Section 3. SECURITY: PROTECTED DATA Section 4. SECURITY: SENSITIVE DATA

  5. G

    Government Open Data Management (ODM) Platform Report

    • datainsightsmarket.com
    doc, pdf, ppt
    Updated May 4, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Data Insights Market (2025). Government Open Data Management (ODM) Platform Report [Dataset]. https://www.datainsightsmarket.com/reports/government-open-data-management-odm-platform-526814
    Explore at:
    pdf, doc, pptAvailable download formats
    Dataset updated
    May 4, 2025
    Dataset authored and provided by
    Data Insights Market
    License

    https://www.datainsightsmarket.com/privacy-policyhttps://www.datainsightsmarket.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    Discover the booming Government Open Data Management (ODM) Platform market! This comprehensive analysis reveals key trends, drivers, and challenges shaping this $2B+ sector, including regional insights, leading companies, and future growth projections through 2033. Learn how cloud-based solutions and AI are transforming government data management.

  6. Cyber Security

    • kaggle.com
    zip
    Updated Jan 29, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Rishi Kumar (2024). Cyber Security [Dataset]. https://www.kaggle.com/datasets/rishikumarrajvansh/cyber-security
    Explore at:
    zip(8913512 bytes)Available download formats
    Dataset updated
    Jan 29, 2024
    Authors
    Rishi Kumar
    License

    Apache License, v2.0https://www.apache.org/licenses/LICENSE-2.0
    License information was derived automatically

    Description

    Business Context: We are in a time where businesses are more digitally advanced than ever, and as technology improves, organizations’ security postures must be enhanced as well. Failure to do so could result in a costly data breach, as we’ve seen happen with many businesses. The cybercrime landscape has evolved, and threat actors are going after any type of organization, so in order to protect your business’s data, money and reputation, it is critical that you invest in an advanced security system. Cyber security can be described as the collective methods, technologies, and processes to help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access. a. Information Security vs. Cyber Security vs. Network Security: Information security (also known as InfoSec) ensures that both physical and digital data is protected from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction. Information security differs from cyber security in that InfoSec aims to keep data in any form secure, whereas cyber security protects only digital data. Cyber security, a subset of information security, is the practice of defending your organization’s networks, computers and data from unauthorized digital access, attack or damage by implementing various processes, technologies and practices. With the countless sophisticated threat actors targeting all types of organizations, it is critical that your IT infrastructure is secured at all times to prevent a full-scale attack on your network and risk exposing your company’ data and reputation. Network security, a subset of cyber security, aims to protect any data that is being sent through devices in your network to ensure that the information is not changed or intercepted. The role of network security is to protect the organization’s IT infrastructure from all types of cyber threats including: Viruses, worms and Trojan horses a. Zero-day attacks b. Hacker attacks c. Denial of service attacks d. Spyware and adware Your network security team implements the hardware and software necessary to guard your security architecture. With the proper network security in place, your system can detect emerging threats before they infiltrate your network and compromise your data. There are many components to a network security system that work together to improve your security posture. The most common network security components include: a. Firewalls b. Anti-virus software c. Intrusion detection and prevention systems (IDS/IPS) d. Virtual private networks (VPN) Network Intrusions vs. Computer intrusions vs. Cyber Attacks 1. Computer Intrusions: Computer intrusions occur when someone tries to gain access to any part of your computer system. Computer intruders or hackers typically use automated computer programs when they try to compromise a computer’s security. There are several ways an intruder can try to gain access to your computer. They can Access your a. Computer to view, change, or delete information on your computer, b. Crash or slow down your computer c. Access your private data by examining the files on your system d. Use your computer to access other computers on the Internet. 2. Network Intrusions: A network intrusion refers to any unauthorized activity on a digital network. Network intrusions often involve stealing valuable network resources and almost always jeopardize the security of networks and/or their data. In order to proactively detect and respond to network intrusions, organizations and their cyber security teams need to have a thorough understanding of how network intrusions work and implement network intrusion, detection, and response systems that are designed with attack techniques and cover-up methods in mind. Network Intrusion Attack Techniques: Given the amount of normal activity constantly taking place on digital networks, it can be very difficult to pinpoint anomalies that could indicate a network intrusion has occurred. Below are some of the most common network intrusion attack techniques that organizations should continually look for: Living Off the Land: Attackers increasingly use existing tools and processes and stolen credentials when compromising networks. These tools like operating system utilities, business productivity software and scripting languages are clearly not malware and have very legitimate usage as well. In fact, in most cases, the vast majority of the usage is business justified, allowing an attacker to blend in. Multi-Routing: If a network allows for asymmetric routing, attackers will often leverage multiple routes to access the targeted device or network. This allows them to avoid being detected by having a large portion of suspicious packets bypass certain network segments and any relevant network intrusion systems. Buffer Overwrit...

  7. Government Open Data Management Platform Market Analysis, Size, and Forecast...

    • technavio.com
    pdf
    Updated Jul 20, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Technavio (2025). Government Open Data Management Platform Market Analysis, Size, and Forecast 2025-2029: North America (US, Canada, and Mexico), Europe (France, Germany, Italy, and UK), APAC (Australia, China, and India), and Rest of World (ROW) [Dataset]. https://www.technavio.com/report/government-open-data-management-platform-market-industry-analysis
    Explore at:
    pdfAvailable download formats
    Dataset updated
    Jul 20, 2025
    Dataset provided by
    TechNavio
    Authors
    Technavio
    License

    https://www.technavio.com/content/privacy-noticehttps://www.technavio.com/content/privacy-notice

    Time period covered
    2025 - 2029
    Area covered
    United States
    Description

    Snapshot img

    Government Open Data Management Platform Market Size 2025-2029

    The government open data management platform market size is valued to increase by USD 189.4 million, at a CAGR of 12.5% from 2024 to 2029. Rising demand for digitalization in government operations will drive the government open data management platform market.

    Market Insights

    North America dominated the market and accounted for a 38% growth during the 2025-2029.
    By End-user - Large enterprises segment was valued at USD 108.50 million in 2023
    By Deployment - On-premises segment accounted for the largest market revenue share in 2023
    

    Market Size & Forecast

    Market Opportunities: USD 138.56 million 
    Market Future Opportunities 2024: USD 189.40 million
    CAGR from 2024 to 2029 : 12.5%
    

    Market Summary

    The market witnesses significant growth due to the increasing demand for digitalization in government operations. Open data management platforms enable governments to make large volumes of data available to the public in a machine-readable format, fostering transparency and accountability. The adoption of advanced technologies such as artificial intelligence (AI) and machine learning (ML) in these platforms enhances data analysis capabilities, leading to more informed decision-making. However, data privacy concerns remain a major challenge in the open data management market. Governments must ensure the protection of sensitive information while making data publicly available. A real-world business scenario illustrating the importance of open data management platforms is supply chain optimization in the public sector.
    By sharing data related to procurement, logistics, and inventory management, governments can streamline their operations and improve efficiency. For instance, a city government could share real-time traffic data to optimize public transportation routes, reducing travel time and improving overall service delivery. Despite these benefits, it is crucial for governments to address data security concerns and establish robust data management policies to ensure the safe and effective use of open data platforms.
    

    What will be the size of the Government Open Data Management Platform Market during the forecast period?

    Get Key Insights on Market Forecast (PDF) Request Free Sample

    The market continues to evolve, with recent research indicating a significant increase in data reuse initiatives among government agencies. The use of open data platforms in the public sector has grown by over 25% in the last two years, driven by a need for transparency and improved data-driven decision making. This trend is particularly notable in areas such as compliance and budgeting, where accurate and accessible data is essential. Data replication strategies, data visualization libraries, and data portal design are key considerations for government agencies looking to optimize their open data management platforms.
    Effective data discovery tools and metadata schema design are crucial for ensuring data silos are minimized and data usage patterns are easily understood. Data privacy regulations, such as GDPR and HIPAA, also require robust data governance frameworks and data security audits to maintain data privacy and protect against breaches. Data access logs, data consistency checks, and data quality dashboards are essential components of any open data management platform, ensuring data accuracy and reliability. Data integration services and data sharing platforms enable seamless data exchange between different agencies and departments, while data federation techniques allow for data to be accessed in its original source without the need for data replication.
    Ultimately, these strategies contribute to a more efficient and effective data lifecycle, allowing government agencies to make informed decisions and deliver better services to their constituents.
    

    Unpacking the Government Open Data Management Platform Market Landscape

    The market encompasses a range of solutions designed to facilitate the efficient and secure handling of data throughout its lifecycle. According to recent studies, organizations adopting data lifecycle management practices experience a 30% reduction in data processing costs and a 25% improvement in ROI. Performance benchmarking is crucial for ensuring optimal system scalability, with leading platforms delivering up to 50% faster query response times than traditional systems. Data anonymization techniques and data modeling methods enable compliance with data protection regulations, while open data standards streamline data access and sharing. Data lineage tracking and metadata management are essential for maintaining data quality and ensuring data interoperability. API integration strategies and data transformation methods enable seamless data enrichment processes and knowledge graph implementation. Data access control, data versioning, and data security protocols

  8. ICO Data Security Incidents

    • kaggle.com
    zip
    Updated Mar 4, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Rory Caley (2025). ICO Data Security Incidents [Dataset]. https://www.kaggle.com/datasets/rorycaley/ico-data-security-incidents
    Explore at:
    zip(15370773 bytes)Available download formats
    Dataset updated
    Mar 4, 2025
    Authors
    Rory Caley
    Description

    This dataset contains publicly available records of data security incidents reported to the UK Information Commissioner's Office (ICO). The original data has been split into each year on each sheet of the main excel document, as well as into each individual .CSV file for ease of working.

    The figures reported here are based on the number of reports of personal data breaches received by the ICO up to Q3 2024. Please note that the data is presented in calendar years and quarters, following the Office for National Statistics style for non-financial data releases.

    Note: some reports hold multiple characteristics for some of the categories of data and as such appear on multiple rows – this may make it appear as if there are more breaches reported than is actually the case.

    Year, Quarter – When the incident occurred. Data Subject Type – Affected individuals (e.g., employees, customers). Data Type – The type of compromised data (e.g., financial, medical). Decision Taken – Regulatory actions or penalties imposed. Incident Category & Type – The nature of the breach (e.g., unauthorized access, ransomware). No. Data Subjects Affected – The scale of the breach. Sector – Industry of the affected organization. Time Taken to Report – How long it took to report the breach.

    Contains public sector information licensed under the Open Government Licence v3.0. https://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/

  9. o

    Cockpit Door Security - Dataset - Open Government Data Portal

    • opendata.gov.jo
    Updated Jul 6, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2023). Cockpit Door Security - Dataset - Open Government Data Portal [Dataset]. https://opendata.gov.jo/dataset/cockpit-door-security-2624-2023
    Explore at:
    Dataset updated
    Jul 6, 2023
    Description

    Cockpit Door Security

  10. O

    Open Source Cyber Security Report

    • datainsightsmarket.com
    doc, pdf, ppt
    Updated Jan 20, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Data Insights Market (2025). Open Source Cyber Security Report [Dataset]. https://www.datainsightsmarket.com/reports/open-source-cyber-security-1440129
    Explore at:
    pdf, ppt, docAvailable download formats
    Dataset updated
    Jan 20, 2025
    Dataset authored and provided by
    Data Insights Market
    License

    https://www.datainsightsmarket.com/privacy-policyhttps://www.datainsightsmarket.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The size of the Open Source Cyber Security market was valued at USD XXX million in 2024 and is projected to reach USD XXX million by 2033, with an expected CAGR of XX% during the forecast period.

  11. o

    Agreements Armed Forces and Public Security - Dataset - Open Government Data...

    • opendata.gov.jo
    Updated Oct 28, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2024). Agreements Armed Forces and Public Security - Dataset - Open Government Data Portal [Dataset]. https://opendata.gov.jo/dataset/agreements-armed-forces-and-public-security-3357-2022
    Explore at:
    Dataset updated
    Oct 28, 2024
    Description

    Local agreements with the Jordanian Armed Forces and Public Security

  12. O

    Open Source Cyber Security Report

    • archivemarketresearch.com
    doc, pdf, ppt
    Updated Feb 10, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Archive Market Research (2025). Open Source Cyber Security Report [Dataset]. https://www.archivemarketresearch.com/reports/open-source-cyber-security-26403
    Explore at:
    ppt, doc, pdfAvailable download formats
    Dataset updated
    Feb 10, 2025
    Dataset authored and provided by
    Archive Market Research
    License

    https://www.archivemarketresearch.com/privacy-policyhttps://www.archivemarketresearch.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The Open Source Cyber Security market, valued at $XX million in 2025, is projected to reach $XXX million by 2033, exhibiting a CAGR of XX% during the forecast period (2025-2033). The market growth is primarily driven by the increasing adoption of open source software in various industries, rising concerns over cyber threats, and the need for cost-effective security solutions. Additionally, the growing emphasis on data privacy and security regulations, as well as the increasing sophistication of cyberattacks, are further fueling market expansion. The Open Source Cyber Security market is segmented based on application, type, and region. The BFSI, IT&Telecom, and healthcare sectors hold a significant market share due to their high dependence on technology and sensitive data. In terms of type, the solution segment dominates the market, driven by the need for comprehensive security solutions. The Americas and Europe are the leading regional markets due to the presence of mature IT infrastructures and stringent data protection laws. However, Asia Pacific is expected to witness significant growth in the coming years due to the rapid adoption of open source software and the increasing number of cyberattacks in the region.

  13. c

    The global Government Open Data Management Platform Market size is USD XX...

    • cognitivemarketresearch.com
    pdf,excel,csv,ppt
    Updated Sep 8, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Cognitive Market Research (2024). The global Government Open Data Management Platform Market size is USD XX million in 2024. [Dataset]. https://www.cognitivemarketresearch.com/government-open-data-management-platform-market-report
    Explore at:
    pdf,excel,csv,pptAvailable download formats
    Dataset updated
    Sep 8, 2024
    Dataset authored and provided by
    Cognitive Market Research
    License

    https://www.cognitivemarketresearch.com/privacy-policyhttps://www.cognitivemarketresearch.com/privacy-policy

    Time period covered
    2021 - 2033
    Area covered
    Global
    Description

    According to Cognitive Market Research, the global Government Open Data Management Platform Market size was USD XX million in 2024. It will expand at a compound annual growth rate (CAGR) of 9.90% from 2024 to 2031.

    North America held the major market share for more than 40% of the global revenue with a market size of USD XX million in 2024 and will grow at a compound annual growth rate (CAGR) of 8.1% from 2024 to 2031.
    Europe accounted for a market share of over 30% of the global revenue with a market size of USD XX million.
    Asia Pacific held a market share of around 23% of the global revenue with a market size of USD XX million in 2024 and will grow at a compound annual growth rate (CAGR) of 11.9% from 2024 to 2031.
    Latin America had a market share of more than 5% of the global revenue with a market size of USD XX million in 2024 and will grow at a compound annual growth rate (CAGR) of 9.3% from 2024 to 2031.
    Middle East and Africa had a market share of around 2% of the global revenue and was estimated at a market size of USD XX million in 2024 and will grow at a compound annual growth rate (CAGR) of 9.6% from 2024 to 2031.
    The large enterprises held the highest Government Open Data Management Platform Market revenue share in 2024.
    

    Market Dynamics of Government Open Data Management Platform Market

    Key Drivers for Government Open Data Management Platform Market

    Streamlining Procedures and Increasing Productivity to Increase the Demand Globally

    Operational effectiveness and process optimization are propelling market expansion. Organizations can increase operational efficiency and streamline procedures by implementing open data management solutions. Organizational data is gathered, managed, organized, and stored with the use of open data management platforms to increase accessibility and usability. These kinds of solutions are commonly applied to business process automation as well as operational optimization and streamlining. For instance, by significantly reducing human engagement and contact during the data extraction procedures, open data management platforms are often used to automate corporate processes. In response to advancements in technology and the creation of increasingly complicated data sets, open data management platforms have developed.

    Advancements in Technology to Propel Market Growth

    The Government Open Data Management Platform Market has witnessed steady growth, driven by advancements in technology, such as improving analytics, security, and data accessibility. Governments can more effectively manage and use huge volumes of public data because of advances in AI, cloud computing, and big data analytics. By enhancing the integration of data, real-time analysis, and visualization, these technologies promote availability and well-informed decision-making. Furthermore, improvements in cybersecurity guarantee data security, encouraging public confidence. The need for advanced data management platforms in the public sector is being driven by the increasing capacity to handle and exploit open data as a result of technological advancements.

    Restraint Factor for the Government Open Data Management Platform Market

    Lack of Skilled Workforce in Government Open Data Management Platform to Limit the Sales

    The government's open data management platform needs skilled workers to oversee its operations, but a key hindrance to its expansion is the need for a skilled workforce. Understanding HTML, CSS, and JavaScript is necessary for the developer to execute data platform management. Thus, lacking in this fundamental knowledge makes it more difficult to hire the proper specialists, which lowers productivity inside the firm. These important problems make it harder for the market for government open data platform management to expand.

    Impact of Covid-19 on the Government Open Data Management Platform Market

    The Government Open Data Management Platform Market has witnessed growth. In order for researchers and policymakers to follow the virus's transmission, locate hotspots, and make defensible decisions, open data management technologies were essential in the collection, analysis, and visualization of COVID-19 data. Consequently, the outbreak had a favorable effect on the expansion of the local market. The need for improved data security, the growing focus on data-driven decision-making, the need for transparent and accessible government data, changing reg...

  14. G

    Average cost to prevent or detect cyber security incidents by industry and...

    • ouvert.canada.ca
    • www150.statcan.gc.ca
    • +2more
    csv, html, xml
    Updated Oct 21, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statistics Canada (2024). Average cost to prevent or detect cyber security incidents by industry and size of enterprise [Dataset]. https://ouvert.canada.ca/data/dataset/b608cf3b-21f5-4c61-8a66-0a2828559d3d
    Explore at:
    csv, html, xmlAvailable download formats
    Dataset updated
    Oct 21, 2024
    Dataset provided by
    Statistics Canada
    License

    Open Government Licence - Canada 2.0https://open.canada.ca/en/open-government-licence-canada
    License information was derived automatically

    Description

    Average spending on specific measures to prevent or detect cyber security incidents by the North American Industry Classification System (NAICS) and size of enterprise.

  15. G

    Government Open Data Management Platform Market Report

    • marketreportanalytics.com
    doc, pdf, ppt
    Updated Mar 19, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Market Report Analytics (2025). Government Open Data Management Platform Market Report [Dataset]. https://www.marketreportanalytics.com/reports/government-open-data-management-platform-market-11268
    Explore at:
    doc, ppt, pdfAvailable download formats
    Dataset updated
    Mar 19, 2025
    Dataset authored and provided by
    Market Report Analytics
    License

    https://www.marketreportanalytics.com/privacy-policyhttps://www.marketreportanalytics.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The Government Open Data Management Platform market is booming, projected to reach $163.29 million in 2025 with a 9.73% CAGR. Discover key trends, leading companies, and regional insights in this comprehensive market analysis. Learn how governments leverage open data for improved transparency and citizen engagement.

  16. G

    Types of cyber security incidents that impact enterprises by industry and...

    • open.canada.ca
    • www150.statcan.gc.ca
    • +1more
    csv, html, xml
    Updated Oct 21, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statistics Canada (2024). Types of cyber security incidents that impact enterprises by industry and size of enterprise [Dataset]. https://open.canada.ca/data/en/dataset/a3b3f93a-b658-4e57-b0a3-d3ac2a70368f
    Explore at:
    html, csv, xmlAvailable download formats
    Dataset updated
    Oct 21, 2024
    Dataset provided by
    Statistics Canada
    License

    Open Government Licence - Canada 2.0https://open.canada.ca/en/open-government-licence-canada
    License information was derived automatically

    Description

    Percentage of enterprises impacted by specific types of cyber security incidents by the North American Industry Classification System (NAICS) and size of enterprise.

  17. Canadian Perspectives Survey Series 5: Technology Use and Cyber Security...

    • open.canada.ca
    • datasets.ai
    csv, html, sas
    Updated Mar 9, 2021
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statistics Canada (2021). Canadian Perspectives Survey Series 5: Technology Use and Cyber Security During the Pandemic Public Use Microdata File [Dataset]. https://open.canada.ca/data/en/dataset/a3a6a9e6-3e38-4bae-9385-b78bd24b8da6
    Explore at:
    csv, html, sasAvailable download formats
    Dataset updated
    Mar 9, 2021
    Dataset provided by
    Statistics Canadahttps://statcan.gc.ca/en
    License

    Open Government Licence - Canada 2.0https://open.canada.ca/en/open-government-licence-canada
    License information was derived automatically

    Area covered
    Canada
    Description

    This public use microdata file is from the fifth survey in the Canadian Perspectives Survey Series and includes information about technology use, cyber security practices and online spending during the pandemic. This product is provided using Statistics Canada's electronic file transfer service.

  18. Cyber Security Indexes

    • kaggle.com
    zip
    Updated Apr 16, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Kateryna Meleshenko (2023). Cyber Security Indexes [Dataset]. https://www.kaggle.com/datasets/katerynameleshenko/cyber-security-indexes
    Explore at:
    zip(3421 bytes)Available download formats
    Dataset updated
    Apr 16, 2023
    Authors
    Kateryna Meleshenko
    Description

    The Dataset "Cyber Security Indexes" includes four indicators which illustrate the current cyber security situation around the world. The data is provided on 193 countries and territories, grouped by five geographical regions - Africa, North America, South America, Europe and Asia-Pasific.

    The Cybersecurity Exposure Index (CEI) defines the level of exposure to cybercrime by country from 0 to 1; the higher the score, the higher the exposure (provided by 10guard). The indicator was last updated in 2020.

    The Global Cyber Security Index (GCI) is a trusted reference that measures the commitment of countries to cybersecurity at a global level – to raise awareness of the importance and different dimensions of the issue (provided by the International Telecommunication Union - ITU). The indicator was last updated in 2021.

    The National Cyber Security Index (NCSI) measures a country's readiness to address cyber threats and manage cyber incidents. It is composed of categories, capacities, and indicators (provided by NCSI). The indicator was last updated in January 2023.

    The Digital Development Level (DDL) defines the average percentage the country received from the maximum value of both indices (provided by NCSI). The indicator was last updated in January 2023.

    The dataset can be used for practising data cleaning, data visualization (on maps and round/bar charts), finding correlations between the indexes and predicting the missing data.

    The data was used in the analytical article research The Geography of Cybersecurity: Cyber Threats and Vulnerabilities

  19. G

    Genomic Data Security Market Research Report 2033

    • growthmarketreports.com
    csv, pdf, pptx
    Updated Sep 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Growth Market Reports (2025). Genomic Data Security Market Research Report 2033 [Dataset]. https://growthmarketreports.com/report/genomic-data-security-market
    Explore at:
    pptx, csv, pdfAvailable download formats
    Dataset updated
    Sep 1, 2025
    Dataset authored and provided by
    Growth Market Reports
    Time period covered
    2024 - 2032
    Area covered
    Global
    Description

    Genomic Data Security Market Outlook



    According to our latest research, the global genomic data security market size reached USD 1.42 billion in 2024, reflecting robust investment and prioritization of data protection in the life sciences sector. The market is poised to expand at a CAGR of 15.8% from 2025 to 2033, with the value projected to reach USD 5.32 billion by 2033. This impressive growth is fueled by the escalating adoption of advanced sequencing technologies and the exponential increase in genomic data generation, which demands stringent security solutions to safeguard sensitive information and ensure regulatory compliance.




    A primary growth factor for the genomic data security market is the surging volume of genomics data generated by next-generation sequencing (NGS) technologies and large-scale research projects. With the cost of sequencing genomes dropping and the proliferation of precision medicine initiatives, healthcare organizations, research institutes, and pharmaceutical companies are handling petabytes of highly sensitive genetic information. This surge has heightened the risk of data breaches, cyberattacks, and unauthorized access, prompting institutions to prioritize robust cybersecurity frameworks. Additionally, the increasing integration of artificial intelligence and machine learning in genomics further amplifies the need for advanced security measures to protect both raw data and derived insights, making data security solutions indispensable across the ecosystem.




    Another key driver is the tightening regulatory landscape surrounding genomic data privacy and protection. Governments and regulatory bodies across North America, Europe, and Asia Pacific have implemented stringent guidelines, such as the General Data Protection Regulation (GDPR) in the European Union and the Health Insurance Portability and Accountability Act (HIPAA) in the United States. These regulations mandate strict controls over the collection, storage, transmission, and sharing of genomic data, with severe penalties for non-compliance. As a result, organizations are increasingly investing in specialized security solutions that offer encryption, access control, audit trails, and secure data sharing capabilities. The growing emphasis on data sovereignty and cross-border data transfer restrictions is also compelling multinational organizations to adopt region-specific security strategies, further driving market expansion.




    The rapid digitization of healthcare and the emergence of cloud-based genomics platforms have introduced new complexities and vulnerabilities in data management. While cloud deployment offers scalability and cost-efficiency, it also raises concerns about data residency, multi-tenant security, and third-party access. This has led to a surge in demand for hybrid and multi-cloud security solutions that can provide end-to-end protection for genomic datasets, whether stored on-premises or in the cloud. Moreover, the rise of collaborative research, open data initiatives, and cross-institutional data sharing is accelerating the adoption of advanced encryption, blockchain, and privacy-preserving technologies. These innovations not only enhance data security but also foster trust among stakeholders, enabling broader participation in genomics research and personalized medicine programs.




    Regionally, North America dominates the genomic data security market, driven by a mature healthcare infrastructure, high adoption of genomic technologies, and proactive regulatory enforcement. Europe follows closely, supported by comprehensive data privacy laws and significant investments in genomics research. The Asia Pacific region is witnessing the fastest growth, propelled by government-led genomics initiatives, expanding healthcare IT infrastructure, and rising awareness about data privacy. Latin America and the Middle East & Africa are gradually increasing their market share as genomic research gains traction and security standards evolve. The interplay of regional regulations, technology adoption, and research funding will continue to shape the global landscape of genomic data security in the coming years.



    In the context of genomic data security, Secure Multiparty Computation for Genomic Data is emerging as a pivotal technology. This advanced cryptographic technique allows multiple parties to joint

  20. Data from: Impact of Information Security in Academic Institutions on Public...

    • catalog.data.gov
    • s.cnmilf.com
    • +1more
    Updated Nov 14, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    National Institute of Justice (2025). Impact of Information Security in Academic Institutions on Public Safety and Security in the United States, 2005-2006 [Dataset]. https://catalog.data.gov/dataset/impact-of-information-security-in-academic-institutions-on-public-safety-and-security-2005-76368
    Explore at:
    Dataset updated
    Nov 14, 2025
    Dataset provided by
    National Institute of Justicehttp://nij.ojp.gov/
    Area covered
    United States
    Description

    Despite the critical information security issues faced by academic institutions, little research has been conducted at the policy, practice, or theoretical levels to address these issues, and few policies or cost-effective controls have been developed. The purpose of this research study was three-fold: (1) to create an empirically-based profile of issues and approaches, (2) to develop a practical road map for policy and practice, and (3) to advance the knowledge, policy, and practice of academic institutions, law enforcement, government, and researchers. The study design incorporated three methods of data collection: a quantitative field survey, qualitative one-on-one interviews, and an empirical assessment of the institutions' network activity. Survey data collection involved simple random sampling of 600 academic institutions from the Department of Education's National Center for Education Statistics (NCES) Integrated Postsecondary Education Data System (IPEDS) database, recruitment via postcard, telephone, and email, Web-based survey administration, and three follow-ups. Results are contained in Part 1, Quantitative Field Survey Data. Interview data collection involved selecting a sample size of 15 institutions through a combination of simple random and convenience sampling, recruitment via telephone and email, and face-to-face or telephone interviews. Results are contained in Part 2, Qualitative One-on-One Interview Data. Network analysis data collection involved convenience sampling of two academic institutions, recruitment via telephone and email, installing Higher Education Network Analysis (HENA) on participants' systems, and six months of data collection. Results are in Part 3, Subject 1 Network Analysis Data, and Part 4, Subject 2 Network Analysis Data. The Quantitative Field Survey Data (Part 1) contains 19 variables on characteristics of institutions that participated in the survey component of this study, as well as 263 variables derived from responses to the Information Security in Academic Institutions Survey, which was organized into five sections: Environment, Policy, Information Security Controls, Information Security Challenges, and Resources. The Qualitative One-on-One Interview Data (Part 2) contains qualitative responses to a combination of closed-response and open-response formats. The data are divided into the following seven sections: Environment, Institution's Potential Vulnerability, Institution's Potential Threat, Information Value and Sharing, End Users, Countermeasures, and Insights. Data collected through the empirical analysis of network activity (Part 3 and Part 4) include type and protocol of attack, source and destination information, and geographic location.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
City of Tempe (2023). Open Data Privacy Policy (Sensitive Regulated Data: Permitted and Restricted Uses) [Dataset]. https://catalog.data.gov/dataset/open-data-privacy-policy-sensitive-regulated-data-permitted-and-restricted-uses-30dc6

Open Data Privacy Policy (Sensitive Regulated Data: Permitted and Restricted Uses)

Explore at:
Dataset updated
Mar 18, 2023
Dataset provided by
City of Tempe
Description

Sensitive Regulated Data: Permitted and Restricted UsesPurposeScope and AuthorityStandardViolation of the Standard - Misuse of InformationDefinitionsReferencesAppendix A: Personally Identifiable Information (PII)Appendix B: Security of Personally Owned Devices that Access or Maintain Sensitive Restricted DataAppendix C: Sensitive Security Information (SSI)

Search
Clear search
Close search
Google apps
Main menu