Results 41 to 50 of about 51,742 (230)

Identity Trust Framework for iGaming [PDF]

open access: yes, 2018
The online gambling community, or the iGaming industry in the United States has individual solutions and a mix of classic processes to manage universal customer identity but it lacks a standard identity management framework in which to enroll new iGaming
George, Michael David
core   +1 more source

Statistical analysis of identity risk of exposure and cost using the ecosystem of identity attributes [PDF]

open access: yes, 2020
Personally Identifiable Information (PII) is often called the "currency of the Internet" as identity assets are collected, shared, sold, and used for almost every transaction on the Internet. PII is used for all types of applications from access control
Chen, Chia-Ju
core   +1 more source

Cyber Insurance for Heterogeneous Wireless Networks

open access: yes, 2017
Heterogeneous wireless networks (HWNs) composed of densely deployed base stations of different types with various radio access technologies have become a prevailing trend to accommodate ever-increasing traffic demand in enormous volume.
Jiang, Hai   +4 more
core   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Research on the effectiveness evaluation of cyber security curriculum construction for combating telecom network fraud

open access: yesDianxin kexue, 2023
The governance of telecom network fraud under the new situation puts forward new requirements for developing network security courses of public security colleges.Considering the cyber security curriculums in public security colleges and universities that
Shengli ZHOU   +6 more
doaj   +2 more sources

Cyber-crime Science = Crime Science + Information Security [PDF]

open access: yes, 2010
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science.
Hartel, Pieter   +2 more
core   +2 more sources

Industry 5.0 for Sustainable Healthcare Services: Analyzing the Prospects and Obstacles for the Indian Healthcare System

open access: yesSustainable Development, EarlyView.
ABSTRACT The fifth industrial revolution (I5.0), which is based on the utilization of interconnected data for efficient resource usage in meeting human requirements, proposes efficient solutions to resource constraint situations. However, the transition to I5.0 in the health sector is not easy and has to face several obstacles.
Ajay Jha   +5 more
wiley   +1 more source

Cyber security laws and safety in e-commerce in India

open access: yesLaw and Safety, 2023
In today’s information technology age, the issue of cyber Security is a complicated and fascinating area of law. The phenomenal growth and development of e-commerce in India is astounding.
A. K. Kashyap, M. Chaudhary
doaj   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy