Results 71 to 80 of about 305,823 (288)

Detecting Unauthorized Access of Personal Device

open access: yesJournal of Neonatal Surgery
Unauthorized access to personal devices poses a severe concern to people's security and privacy in the digital age. The primary objective of this endeavour is to develop a dependable system for detecting and preventing such unauthorized access. The proposed system employs an interdisciplinary approach that integrates behaviour analysis, anomaly ...
S. Jerald Nirmal kumar   +4 more
openaire   +1 more source

Australia's Migration Strategy: An Effective Response to Migrant Worker Exploitation?

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT A series of publicised migrant worker injuries and deaths has drawn attention to the issue of migrant worker exploitation (MWE) in Australia. In response, the Australian Government has included ‘Tackling Worker Exploitation’ as a key area of its Migration Strategy which it introduced in 2023. However, it is unclear how effective the Strategy’s
Evelyn Dowling, Alexandra Ridgway
wiley   +1 more source

Diminishing the perceived need for black open access [PDF]

open access: yes, 2017
Conference paper and presentation slidesThe attention garnered by unauthorized sharing and pirating of scholarly content has resulted in a new category on the open access spectrum – black open access.
Baich, Tina
core  

Artificial Intelligence and Access to Justice at the ‘Shop Front’: The Potential and Limitations of Meeting Legal Need Through Technology

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT In Australia, governments fund Community Legal Centres (CLCs) as part of the legal assistance sector (LAS) to meet the ‘legal needs’ of people experiencing disadvantage who cannot afford private legal services. Persistent unmet demand for CLCs is well‐documented. As artificial intelligence (AI) is increasingly used in private legal practice to
Catherine Hastings   +2 more
wiley   +1 more source

Modification of CAS-protocol for improvement of security web-applications from unauthorized access

open access: yesБезопасность информационных технологий, 2017
Dissemination of information technologies and the expansion of their application demand constantly increasing security level for users, operating with confidential information and personal data.
Alexey I Igorevich Alexandrov   +1 more
doaj   +1 more source

Reference to protection methods WI-FI network [PDF]

open access: yes, 2019
У роботі розглянуто методи захисту Wi-Fi мереж від несанкціонованого доступу, проаналізувати їхні переваги та недоліки.The paper considers methods of protecting Wi-Fi networks from unauthorized access, analyze their advantages and ...
Dunets, V. L.   +3 more
core  

Legal and ethical considerations around the use of existing illustrations to generate new illustrations in the anatomical sciences

open access: yesAnatomical Sciences Education, Volume 18, Issue 3, Page 289-300, March 2025.
Abstract It is likely existing anatomical illustrations are often used as the basis for new illustrative works, given not all illustrators have access to human tissues, bodies, or prosections on which to base their illustrations. Potential issues arise with this practice in the realms of copyright infringement and plagiarism when authors are seeking to
Jon Cornwall   +7 more
wiley   +1 more source

Захист інформації від несанкціонованого доступу [PDF]

open access: yes, 2013
In this issue are considered shortcomings of the system information security and ways and methods of protecting information from unauthorized access. When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789 ...
Kulish, Anatolii Mykolaiovych   +3 more
core  

Associating cognitive abilities with naturalistic search behavior

open access: yesJournal of the Association for Information Science and Technology, Volume 76, Issue 4, Page 665-685, April 2025.
Abstract Differences in cognitive abilities affect search behaviors, but this has mostly been observed in laboratory experiments. There is limited research on how users search for information in real‐world, naturalistic settings and how real‐world search behaviors relate to cognitive abilities.
Tung Vuong   +2 more
wiley   +1 more source

Trust at the Edge: ABAC-Secured Federated Learning for Smart Home Access Control Using Blockchain

open access: yesIEEE Access
This paper proposes a novel security framework that integrates Attribute-Based Access Control (ABAC) with Federated Learning (FL) using Hyperledger Fabric smart contracts to secure IoT-based smart home environments.
Sohanur Rahman, Yi Wang, Bingyang Wei
doaj   +1 more source

Home - About - Disclaimer - Privacy