A Systematic Review and Taxonomy for Privacy Breach Classification: Trends, Gaps, and Future Directions
- URL: http://arxiv.org/abs/2505.13694v1
- Date: Mon, 19 May 2025 19:52:21 GMT
- Title: A Systematic Review and Taxonomy for Privacy Breach Classification: Trends, Gaps, and Future Directions
- Authors: Clint Fuchs, John D. Hastings,
- Abstract summary: This study presents a comprehensive examination of academic literature on the classification of privacy breaches and violations between 2010-2024.<n>A corpus of screened studies was assembled and analyzed to identify primary research themes, emerging trends, and gaps in the field.<n>A novel taxonomy is introduced to guide efforts by categorizing research efforts into seven domains: breach classification, report classification, breach detection, threat detection, breach prediction, risk analysis, and threat classification.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In response to the rising frequency and complexity of data breaches and evolving global privacy regulations, this study presents a comprehensive examination of academic literature on the classification of privacy breaches and violations between 2010-2024. Through a systematic literature review, a corpus of screened studies was assembled and analyzed to identify primary research themes, emerging trends, and gaps in the field. A novel taxonomy is introduced to guide efforts by categorizing research efforts into seven domains: breach classification, report classification, breach detection, threat detection, breach prediction, risk analysis, and threat classification. An analysis reveals that breach classification and detection dominate the literature, while breach prediction and risk analysis have only recently emerged in the literature, suggesting opportunities for potential research impacts. Keyword and phrase frequency analysis reveal potentially underexplored areas, including location privacy, prediction models, and healthcare data breaches.
Related papers
- Anomaly Detection and Generation with Diffusion Models: A Survey [51.61574868316922]
Anomaly detection (AD) plays a pivotal role across diverse domains, including cybersecurity, finance, healthcare, and industrial manufacturing.<n>Recent advancements in deep learning, specifically diffusion models (DMs), have sparked significant interest.<n>This survey aims to guide researchers and practitioners in leveraging DMs for innovative AD solutions across diverse applications.
arXiv Detail & Related papers (2025-06-11T03:29:18Z) - Out-of-Distribution Detection on Graphs: A Survey [58.47395497985277]
Graph out-of-distribution (GOOD) detection focuses on identifying graph data that deviates from the distribution seen during training.<n>We categorize existing methods into four types: enhancement-based, reconstruction-based, information propagation-based, and classification-based approaches.<n>We discuss practical applications and theoretical foundations, highlighting the unique challenges posed by graph data.
arXiv Detail & Related papers (2025-02-12T04:07:12Z) - Dive into Time-Series Anomaly Detection: A Decade Review [19.883791946730494]
Time-series anomaly detection has been an important activity, entailing various applications in fields such as cyber security, financial markets, law enforcement, and health care.<n>This survey groups and summarizes anomaly detection existing solutions under a process-centric taxonomy in the time series context.<n>In addition to giving an original categorization of anomaly detection methods, we also perform a meta-analysis of the literature and outline general trends in time-series anomaly detection research.
arXiv Detail & Related papers (2024-12-29T16:11:46Z) - Model Inversion Attacks: A Survey of Approaches and Countermeasures [59.986922963781]
Recently, a new type of privacy attack, the model inversion attacks (MIAs), aims to extract sensitive features of private data for training.
Despite the significance, there is a lack of systematic studies that provide a comprehensive overview and deeper insights into MIAs.
This survey aims to summarize up-to-date MIA methods in both attacks and defenses.
arXiv Detail & Related papers (2024-11-15T08:09:28Z) - Unveiling the Spectrum of Data Contamination in Language Models: A Survey from Detection to Remediation [28.997127566200753]
The issue of training corpus overlaps with evaluation benchmarks--referred to as contamination--has been the focus of significant recent research.
This body of work aims to identify contamination, understand its impacts, and explore mitigation strategies.
This survey serves as a succinct overview of the most recent advancements in data contamination research.
arXiv Detail & Related papers (2024-06-20T18:07:26Z) - Inference Attacks: A Taxonomy, Survey, and Promising Directions [44.290208239143126]
This survey provides an in-depth and comprehensive inference of attacks and corresponding countermeasures in ML-as-a-service.
We first propose the 3MP taxonomy based on the community research status, trying to normalize the confusing naming system of inference attacks.
Also, we analyze the pros and cons of each type of inference attack, their workflow, countermeasure, and how they interact with other attacks.
arXiv Detail & Related papers (2024-06-04T07:06:06Z) - A Survey of Privacy-Preserving Model Explanations: Privacy Risks, Attacks, and Countermeasures [50.987594546912725]
Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations.
This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures.
arXiv Detail & Related papers (2024-03-31T12:44:48Z) - Meta-survey on outlier and anomaly detection [0.0]
This paper implements the first systematic meta-survey of general surveys and reviews on outlier and anomaly detection.
It collects nearly 500 papers using two specialized scientific search engines.
The paper investigates the evolution of the outlier detection field over a 20-year period, revealing emerging themes and methods.
arXiv Detail & Related papers (2023-12-12T09:29:22Z) - SoK: Evaluations in Industrial Intrusion Detection Research [8.356036431147889]
Industrial intrusion detection systems strive to timely uncover even the most sophisticated breaches.
Due to its criticality for society, this fast-growing field attracts researchers from diverse backgrounds.
Our analysis of 609 publications shows that the rapid growth of this research field has positive and negative consequences.
arXiv Detail & Related papers (2023-11-06T07:49:58Z) - Deep Learning for Anomaly Detection: A Review [150.9270911031327]
This paper surveys the research of deep anomaly detection with a comprehensive taxonomy, covering advancements in three high-level categories and 11 fine-grained categories of the methods.
We review their key intuitions, objective functions, underlying assumptions, advantages and disadvantages, and discuss how they address the aforementioned challenges.
arXiv Detail & Related papers (2020-07-06T02:21:16Z) - Anomalous Example Detection in Deep Learning: A Survey [98.2295889723002]
This survey tries to provide a structured and comprehensive overview of the research on anomaly detection for Deep Learning applications.
We provide a taxonomy for existing techniques based on their underlying assumptions and adopted approaches.
We highlight the unsolved research challenges while applying anomaly detection techniques in DL systems and present some high-impact future research directions.
arXiv Detail & Related papers (2020-03-16T02:47:23Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.