Results 131 to 140 of about 22,394,325 (191)
Some of the next articles are maybe not open access.
Privacy Rights and Data Security: GDPR and Personal Data Markets
Management Sciences, 2022General Data Protection Regulation (GDPR)—the European Union’s data protection regulation—has two key principles. It recognizes that individuals own and control their personal (but not contractual) data in perpetuity, leading to three critical privacy ...
T. Ke, K. Sudhir
semanticscholar +1 more source
The Impact of Executives' IT Expertise on Reported Data Security Breaches
Information systems research, 2021Data security breaches (DSBs) are increasing investor and regulator pressure on firms to improve their IT governance (ITG) in an effort to mitigate the related risk.
Jacob Z. Haislip+2 more
semanticscholar +1 more source
Smart Applications in Edge Computing: Overview on Authentication and Data Security
IEEE Internet of Things Journal, 2021As a new computing paradigm, edge computing has appeared in the public field of vision recently. Owing to its advantages of low delay and fast response, edge computing has become an important assistant of cloud computing and has brought new opportunities
Xinghua Li+4 more
semanticscholar +1 more source
Blockchain-Based Data Security for Artificial Intelligence Applications in 6G Networks
IEEE Network, 2020The sixth generation (6G) networks are expected to provide a fully connected world with terrestrial wireless and satellite communications integration.
Weiwei Li+4 more
semanticscholar +1 more source
Analysis of various data security techniques of steganography: A survey
Information Security Journal, 2020The amount of data exchanged via the Internet is increasing nowadays. Hence, data security is termed as a serious issue while communication of data is processed over the Internet.
Sachin Dhawan, Rashmi Gupta
semanticscholar +1 more source
Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security
IEEE Transactions on Sustainable Computing, 2020Deep learning methods, e.g., convolutional neural networks (CNNs) and Recurrent Neural Networks (RNNs), have achieved great success in image processing and natural language processing especially in high level vision applications such as recognition and ...
Feng Jiang+7 more
semanticscholar +1 more source
Journal of Chemical Information and Computer Sciences, 1975
Data security is a rich and complex subject dealing with the protection of the computing capability from all threats to its continuity. Some fundamental elements of the process of achieving a reasonable, prudent measure of that protection are considered.
openaire +2 more sources
Data security is a rich and complex subject dealing with the protection of the computing capability from all threats to its continuity. Some fundamental elements of the process of achieving a reasonable, prudent measure of that protection are considered.
openaire +2 more sources
Enhanced Data Security Framework Using Lightweight Cryptography and Multi-Level Encryption
2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE)Network security is essential for individuals as well as organizations in the modern day, since the majority of enterprises and organizations store their data on clouds.
Projjal Chakrabarty+4 more
semanticscholar +1 more source
Nursing Management, 2016
A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal ...
openaire +2 more sources
A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal ...
openaire +2 more sources
Data-centric security: Integrating data privacy and data security
IBM Journal of Research and Development, 2009Classifying data according to its permissible use, appropriate handling, and business value is critical for data privacy and security protection. This is essential for compliance with the constantly evolving regulatory landscape concerning protected data. Problems arise when users compromise data privacy and security by overlooking the critical need to
A. C. Nelson+4 more
openaire +2 more sources