Results 61 to 70 of about 12,885 (184)
A Survey on Securing Personally Identifiable Information on Smartphones [PDF]
With an ever-increasing footprint, already topping 3 billion devices, smartphones have become a huge cybersecurity concern. The portability of smartphones makes them convenient for users to access and store personally identifiable information (PII); this
Hoppa, Mary Ann +2 more
core +1 more source
The rapid proliferation of artificial intelligence (AI) across various industries presents both opportunities and challenges, particularly concerning personal data privacy. With the enforcement of regulations like Thailand’s Personal Data Protection Act (
Parinya Thetbanthad +2 more
doaj +1 more source
Social Identity and Crisis Resilience in Agriculture: Caste, Gender, and Migration in Nepal
ABSTRACT Capacity to weather economic shocks is often mediated by social identity, which in turn determines access to social, economic and physical capital. We study the repercussions of a large economic shock on access to agriculture inputs, agricultural extension, output markets, and the consequent effects on income and livelihoods in rural Nepal. We
Muzna Alvi +3 more
wiley +1 more source
Privacy-Preserving Reengineering of Model-View-Controller Application Architectures Using Linked Data [PDF]
When a legacy system’s software architecture cannot be redesigned, implementing additional privacy requirements is often complex, unreliable and costly to maintain.
Dodero Beardo, Juan Manuel +3 more
core +2 more sources
Engineering MLOps Pipelines With Data Quality: A Case Study on Tabular Datasets in Kaggle
Our study shows that open‐source datasets—while having become indispensable in advancing ML research and applications—exhibit low‐quality but high accessibility enables practitioners to test algorithms, benchmark models, and prototype solutions efficiently but with unfathomable longer‐term consequences.
Matteo Pancini +3 more
wiley +1 more source
Privacy Risks of Cybersquatting Attacks
Cybersquatting is a collection of methods commonly used by malicious actors to mislead or trick internet users into accessing fraudulent or malicious content.
Jack Kolenbrander +2 more
doaj +1 more source
ABSTRACT Aim Human population growth and resource overexploitation have induced major changes in global biodiversity. Costa Rica, with 26% of its land area protected, is often cited as a model of environmental conservation. However, conservation efforts have largely focused on habitat preservation, while overharvesting remains an unquantified factor in
P. Romero‐Vidal +5 more
wiley +1 more source
Implementação de Sticky Policies em um provedor OpenID Connect [PDF]
TCC(graduação) - Universidade Federal de Santa Catarina. Centro Tecnológico. Sistemas de Informação.Com o crescente mercado de sistemas web, deve crescer também o cuidado das organizações com os dados sensíveis dos usuários de seus serviços, em especial ...
Monfardine, Lucas Maltempi +1 more
core
Integrating Generative AI Into Enterprise Platforms: Insights From Salesforce
ABSTRACT The widespread applications of generative AI (GenAI) have sparked significant interest, with many organisations eager to leverage its transformative potential. Rather than focusing on individual organisations, this study examines GenAI integration within enterprise platforms, which are extensively adopted by many organisations and thus amplify
Kazem Haki +3 more
wiley +1 more source
Social network services and chatbots are susceptible to personal information leakage while facilitating language learning without time or space constraints. Accurate detection of personal information is paramount in avoiding such leaks.
Sungsoon Jang +4 more
doaj +1 more source

