Back to Results
First PageMeta Content
Cyberwarfare / National security / Data breach / Information security / Credit card / Malware / Internet privacy / Database / Remote data deletion / Data security / Security / Computer security


The following diagram illustrates the activity-based costing schema used in the current benchmark study
Add to Reading List

Document Date: 2014-05-02 18:40:18


Open Document

File Size: 398,53 KB

Share Result on Facebook

Company

IBM / Ponemon Institute LLC / /

Country

Germany / France / Japan / United States / Saudi Arabia / Brazil / Italy / Australia / United Kingdom / United Arab Emirates / India / /

Currency

USD / /

Facility

United States Ponemon Institute / Ponemon Institute / /

IndustryTerm

transportation / pharmaceuticals / data bearing devices / financial services / retail / identity protection services / stolen device / upstream and lateral communications / mobile devices / healthcare / stolen devices / energy / /

Movie

For the first time / /

Organization

United States Ponemon Institute / Ponemon Institute / /

Position

physician / representative / /

Product

SQL injection / /

ProgrammingLanguage

SQL / /

Technology

encryption / smart phones / 183 Technology / mobile devices / /

SocialTag