Search
Search Results
-
Data Protection and Data Privacy
In this chapter, we specify the business requirements and propose the solution concept for data protection and data privacy. ERP systems must fulfill... -
Ensuring Data Protection
Data is a core asset to any enterprise. Data is the key, common element of the three information assurance building blocks, that is, data... -
Data Protection
Snowflake provides many features that protect data against human error, malicious acts, and software failure. This chapter introduces features... -
Digital protection analysis of national traditional sports health cultural heritage based on big data in the era of data cloud
In the era of Internet big data, the extensive use of cloud data has promoted the development of various fields. In the field of sports, western...
-
Road to homogenization? Argentina publishes a new bill to replace the Personal Data Protection Law
By the end of 2022, the Argentine data protection authority, the Agency of Access to Public Information, published a new bill (‘the Bill’) seeking to...
-
Data Privacy and Protection
Understanding data privacy has become a paramount concern for individuals and organizations in our increasingly digital world. Data privacy refers to... -
From Privacy-Enhancing to Health Data Utilisation: The Traces of Anonymisation and Pseudonymisation in EU Data Protection Law
The proliferation of digital technologies in healthcare creates two conflicting needs: protection of health data and the free flow of such data....
-
Data Protection in a Post-Pandemic Society Laws, Regulations, Best Practices and Recent Solutions
This book offers the latest research results and predictions in data protection with a special focus on post-pandemic society. This book also...
-
Trends in Data Protection and Encryption Technologies
This open access book reports the results of a study conducted in Switzerland in 2022 to provide an overview of the changing landscape of encryption... -
A Biometric-Based Data Protection Scheme for RSDs
Removable Storage Devices are widely used for data storage and sharing in mobile internet. The security of data stored in RSDs is a crucial issue in... -
Performant almost-latch-free data structures using epoch protection in more depth
Multi-core scalability presents a major implementation challenge for data system designers today. Traditional methods such as latching no longer...
-
Understanding the GDPR from a requirements engineering perspective—a systematic map** study on regulatory data protection requirements
Data protection compliance is critical from a requirements engineering (RE) perspective, both from a software development lifecycle (SDLC)...
-
Blockchain-based cyber-security trust model with multi-risk protection scheme for secure data transmission in cloud computing
The rise of cloud computing has transformed the way data is stored and managed, yet it has also brought about major security issues, especially...
-
Data Security and Data Protection
IT security management is also a focus of information management, as ensuring data security and data protection is an essential prerequisite for the... -
Legal Protection for the Personal Data in Indonesia and Malaysia
Rapid globalization in Indonesia has led to the growth of the information technology sector, which has an impact on individuals and global economic... -
Blockchain and the General Data Protection Regulation: Healthcare Data Processing
The General Data Protection Regulation (GDPR) of the European Union became binding in May 2018. The objective of the GDPR is essentially twofold. On... -
Who Is the Attacker - Analyzing Data Protection Violations in Health Care
Every natural person has the fundamental right of protection in relation to the processing of their personal data. The General Data Protection... -
Data Protection and Data Security
Data protectionData protection is inconceivable without data securityData security. But data securityData security encompasses much more than just... -
Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things
Users of computer networks may benefit from cloud computing, which is a fairly new abstraction that offers features like processing as well as the...
-
Medical image protection using a data-hiding technique based on integer wavelets
Maintaining the secrecy of sensitive data transferred over the Internet while restricting access to approved information is a significant security...