Results 321 to 330 of about 28,117,703 (382)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Data protection beyond data protection regulation
Stiftelsen Juridisk FakultetslitteraturJohanna Chamberlain, Andreas Kotsios
openaire +2 more sources
Social Science Research Network, 2023
The evolution of artificial intelligence (AI) and machine learning (ML) has led to the development of sophisticated large language models (LLMs) that are used extensively in applications such as chatbots. This research investigates the critical issues of
Glorin Sebastian
semanticscholar +1 more source
The evolution of artificial intelligence (AI) and machine learning (ML) has led to the development of sophisticated large language models (LLMs) that are used extensively in applications such as chatbots. This research investigates the critical issues of
Glorin Sebastian
semanticscholar +1 more source
An IoT-Centric Data Protection Method for Preserving Security and Privacy in Cloud
IEEE Systems Journal, 2023A malevolent utility provider may extract outsourced data from the cloud while storing, analyzing, and sharing the data among the involved entities to acquire sensitive information that can be misused.
Rishabh Gupta +4 more
semanticscholar +1 more source
IEEE Transactions on Industrial Informatics, 2021
With rapid growth in data volume generated from different industrial devices in IoT, the protection for sensitive and private data in data sharing has become crucial.
Bin Jia +5 more
semanticscholar +1 more source
With rapid growth in data volume generated from different industrial devices in IoT, the protection for sensitive and private data in data sharing has become crucial.
Bin Jia +5 more
semanticscholar +1 more source
China's emerging data protection framework
Journal of Cybersecurity, 2022Over the past 5 years, the People’s Republic of China has accelerated efforts to establish a legal architecture for data protection. With the promulgation of the Personal Information Protection Law (PIPL) and the Data Security Law (DSL) in the summer ...
Rogier Creemers
semanticscholar +1 more source
2013
The right to privacy, characterised by Justice Brandeis in Olmestead v. United States (1928)277 US 438 as the “right to be let alone: the most comprehensive of rights and the right most valued by civilised men,” is recognized under India’s constitution by the Supreme Court in four rulings: Kharak Singh v. State of Uttar Pradesh and Ors.
Rajinder Kaur, Prabal Mehrotra
+5 more sources
The right to privacy, characterised by Justice Brandeis in Olmestead v. United States (1928)277 US 438 as the “right to be let alone: the most comprehensive of rights and the right most valued by civilised men,” is recognized under India’s constitution by the Supreme Court in four rulings: Kharak Singh v. State of Uttar Pradesh and Ors.
Rajinder Kaur, Prabal Mehrotra
+5 more sources
The Short-Run Effects of the General Data Protection Regulation on Technology Venture Investment
Marketing science (Providence, R.I.), 2021Jia et al. study the effects of the General Data Protection Regulation on technology venture investment in the European Union.
Jian Jia, G. Jin, Liad Wagman
semanticscholar +1 more source
A User-Centric Data Protection Method for Cloud Storage Based on Invertible DWT
IEEE Transactions on Cloud Computing, 2021Protection on end users’ data stored in Cloud servers becomes an important issue in today’s Cloud environments. In this paper, we present a novel data protection method combining Selective Encryption (SE) concept with fragmentation and dispersion on ...
Han Qiu +4 more
semanticscholar +1 more source

