We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Data Protection and Data Privacy

    In this chapter, we specify the business requirements and propose the solution concept for data protection and data privacy. ERP systems must fulfill...
    Chapter 2024
  2. Ensuring Data Protection

    Data is a core asset to any enterprise. Data is the key, common element of the three information assurance building blocks, that is, data...
    Chapter 2024
  3. Data Protection

    Snowflake provides many features that protect data against human error, malicious acts, and software failure. This chapter introduces features...
    Chapter 2023
  4. Digital protection analysis of national traditional sports health cultural heritage based on big data in the era of data cloud

    In the era of Internet big data, the extensive use of cloud data has promoted the development of various fields. In the field of sports, western...

    Weiwu Ye, Shihong Li in Multimedia Tools and Applications
    Article 02 February 2024
  5. Road to homogenization? Argentina publishes a new bill to replace the Personal Data Protection Law

    By the end of 2022, the Argentine data protection authority, the Agency of Access to Public Information, published a new bill (‘the Bill’) seeking to...

    Diego Fernandez, Josefina Barbero in International Cybersecurity Law Review
    Article 30 August 2023
  6. Data Privacy and Protection

    Understanding data privacy has become a paramount concern for individuals and organizations in our increasingly digital world. Data privacy refers to...
    Dr. Jason Edwards in Mastering Cybersecurity
    Chapter 2024
  7. From Privacy-Enhancing to Health Data Utilisation: The Traces of Anonymisation and Pseudonymisation in EU Data Protection Law

    The proliferation of digital technologies in healthcare creates two conflicting needs: protection of health data and the free flow of such data....

    Zhicheng He in Digital Society
    Article Open access 09 May 2023
  8. Data Protection in a Post-Pandemic Society Laws, Regulations, Best Practices and Recent Solutions

    This book offers the latest research results and predictions in data protection with a special focus on post-pandemic society. This book also...

    Chaminda Hewage, Yogachandran Rahulamathavan, Deepthi Ratnayake
    Book 2023
  9. Trends in Data Protection and Encryption Technologies

    This open access book reports the results of a study conducted in Switzerland in 2022 to provide an overview of the changing landscape of encryption...
    Valentin Mulder, Alain Mermoud, ... Bernhard Tellenbach
    Book Open access 2023
  10. A Biometric-Based Data Protection Scheme for RSDs

    Removable Storage Devices are widely used for data storage and sharing in mobile internet. The security of data stored in RSDs is a crucial issue in...
    Rui Wu, Yubing Jiang, Peisong Shen in Mobile Internet Security
    Conference paper 2024
  11. Performant almost-latch-free data structures using epoch protection in more depth

    Multi-core scalability presents a major implementation challenge for data system designers today. Traditional methods such as latching no longer...

    Tianyu Li, Badrish Chandramouli, Samuel Madden in The VLDB Journal
    Article Open access 17 June 2024
  12. Understanding the GDPR from a requirements engineering perspective—a systematic map** study on regulatory data protection requirements

    Data protection compliance is critical from a requirements engineering (RE) perspective, both from a software development lifecycle (SDLC)...

    Claudia Negri-Ribalta, Marius Lombard-Platet, Camille Salinesi in Requirements Engineering
    Article Open access 10 July 2024
  13. Blockchain-based cyber-security trust model with multi-risk protection scheme for secure data transmission in cloud computing

    The rise of cloud computing has transformed the way data is stored and managed, yet it has also brought about major security issues, especially...

    Mohd Akbar, Mohammed Mujtaba Waseem, ... Praveen Barmavatu in Cluster Computing
    Article 16 April 2024
  14. Data Security and Data Protection

    IT security management is also a focus of information management, as ensuring data security and data protection is an essential prerequisite for the...
    Peter Weber, Roland Gabriel, ... Katharina Menke in Basics in Business Informatics
    Chapter 2022
  15. Legal Protection for the Personal Data in Indonesia and Malaysia

    Rapid globalization in Indonesia has led to the growth of the information technology sector, which has an impact on individuals and global economic...
    Nanik Prasetyoningsih, Nazli Ismail Nawang, ... Muhammad Nur Rifqi Amirullah in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2024
  16. Blockchain and the General Data Protection Regulation: Healthcare Data Processing

    The General Data Protection Regulation (GDPR) of the European Union became binding in May 2018. The objective of the GDPR is essentially twofold. On...
    Paola Perchinunno, Antonella Massari, ... Corrado Crocetta in Computational Science and Its Applications – ICCSA 2023 Workshops
    Conference paper 2023
  17. Who Is the Attacker - Analyzing Data Protection Violations in Health Care

    Every natural person has the fundamental right of protection in relation to the processing of their personal data. The General Data Protection...
    Conference paper 2024
  18. Data Protection and Data Security

    Data protectionData protection is inconceivable without data securityData security. But data securityData security encompasses much more than just...
    Thomas H. Lenhard in Data Security
    Chapter 2022
  19. Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things

    Users of computer networks may benefit from cloud computing, which is a fairly new abstraction that offers features like processing as well as the...

    Ala Mughaid, Ibrahim Obeidat, ... Hazem Migdady in International Journal of Information Security
    Article 19 March 2024
  20. Medical image protection using a data-hiding technique based on integer wavelets

    Maintaining the secrecy of sensitive data transferred over the Internet while restricting access to approved information is a significant security...

    Moad Med Sayah, Zermi Narima, ... Kafi Med Redouane in Multimedia Tools and Applications
    Article 18 October 2023
Did you find what you were looking for? Share feedback.