Academic literature on the topic 'Data security and protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data security and protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Data security and protection"

1

Carey, Peter, and David Berry. "DATA PROTECTION — SECURITY." Computer Law & Security Review 18, no. 2 (March 2002): 112–13. http://dx.doi.org/10.1016/s0267-3649(02)03010-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Begum, Shameena, V. Ratna Vasuki, and K. V. V. Srinivas K.V.V.Srinivas. "Data Security and Protection in Cloud Computing." International Journal of Scientific Research 1, no. 2 (June 1, 2012): 31–34. http://dx.doi.org/10.15373/22778179/jul2012/9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

MALIK, MAREK. "Data Protection and Security." Pacing and Clinical Electrophysiology 17, no. 2 (February 1994): 240–41. http://dx.doi.org/10.1111/j.1540-8159.1994.tb01376.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Qureshi, Anique A., and Joel G. Siegel. "Information security and data protection." International Journal of Computer Applications in Technology 14, no. 1/2/3 (2001): 1. http://dx.doi.org/10.1504/ijcat.2001.000256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Martín del Rey, A., J. L. Hernández Pastora, and G. Rodríguez Sánchez. "3D medical data security protection." Expert Systems with Applications 54 (July 2016): 379–86. http://dx.doi.org/10.1016/j.eswa.2016.02.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Highland, Harold Joseph. "Microcomputer security: Data protection techniques." Computers & Security 4, no. 2 (June 1985): 123–34. http://dx.doi.org/10.1016/0167-4048(85)90016-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fang, Ze Nan, Jian Ming Zhou, and Jing Song Zhang. "A Practical Data Security Protection Technology." Advanced Materials Research 846-847 (November 2013): 1620–23. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1620.

Full text
Abstract:
While the flash becomes main data storage medium, user authentication is normally used as the most important method to safeguard the securities of the data. But ii could do nothing to prevent illegal copies of legitimate users and illegal hard copies. This paper introduces a new type of data security protection technology. A method of generating special character code was first proposed. The code is regarded as the flash identity. The authentication of that identity can be applied to effectively recognize the illegal data copies and protect the data security.
APA, Harvard, Vancouver, ISO, and other styles
8

Bolshakov, A. S., A. I. Zhila, and A. V. Osin. "FUZZY LOGIC DATA PROTECTION MANAGEMENT." H&ES Research 13, no. 4 (2021): 37–47. http://dx.doi.org/10.36724/2409-5419-2021-13-4-37-47.

Full text
Abstract:
Introduction: to ensure the necessary level of personal data security in computer systems, it is advisable to create an information security management system that would allow you to help choose protective measures for certain input data. Purpose: to develop an algorithm for the personal data protection model that allows considering a set of input factors for making decisions on information security. Methods: it is proposed to use the fuzzy inference apparatus as a mathematical apparatus for describing such a situation. The main advantage of using this mathematical approach in modeling a control system is the description of conditions and methods for solving problems under uncertainty. Results: when building an information security management system, defined a set of rules and study the influence of changes in input variables on a set of protective measures. The model developed on the basis of this algorithm using fuzzy inference identifies the impact of information security threats on decision-making on the choice of measures to protect personal data in a computer system. The result of threat modeling is also planning that illustrate the relationship between the input and output parameters of the model. These planes allow you to determine the management decision on the choice of measures depending on the values of the selected parameters. The paper proposes three thresholds for the values of each of the protective measures, which determine the need for the measures used to neutralize the simulated threats. The influence of input variables on the output values of the constructed model identify a change in the distribution of the terms of the membership functions of the input parameters, the change of which can significantly affect the final decision on information security management. Discussion: the results of the work indicate the need for an adequate description of both the input variables and the response of the output variables of the model to the input variables in order to take effective measures to protect information.
APA, Harvard, Vancouver, ISO, and other styles
9

Livshitz, Ilya. "Assessment of the Impact of General Data Protection Regulation on Enterprise Security in the Russian Federation." Voprosy kiberbezopasnosti, no. 4(38) (2020): 66–75. http://dx.doi.org/10.21681/2311-3456-2020-04-66-75.

Full text
Abstract:
Abstract The purpose of the study is to analyze the existing requirements for personal data security and assess the impact of these requirements on the enterprises security in the Russian Federation. Research method: the problem of ensuring the security of personal data in accordance with the requirements of the Federal law of the Russian Federation FZ-152 and the international General Data Protection Regulation is investigated. The article analyzes the possible risks of interrupting the normal activities of enterprises in the Russian Federation due to violations of these requirements for personal data protection and the imposition of significant fines by international regulators. Numerical relationships are estimated between the amount of fines for violations of established requirements, including General Data Protection Regulation, and the cost of creating an effectiveness personal data protection system. Estimates of the permissible degree of influence of the General Data Protection Regulation requirements on the enterprises security in the Russian Federation are obtained. Research result: a study and comparison of possible penalties for violation of compliance with the requirements of the Federal law of the Russian Federation FZ-152 and the international General Data Protection Regulation was performed. Risk assessments of sanctions for violation of the established requirements for personal data protection were obtained. The analysis of the cost of preparing a personal data protection system for compliance with the requirements of the General Data Protection Regulation was performed. Based on the data obtained, examples of calculating the degree of maturity of the security system are presented – based on the ratio of the share of the budget allocated for security in relation to the cost of creating an effectiveness personal data protection system and based on the ratio of the amount of the fine for violation of the established requirements. The importance of accounting for the costs of personal data security to ensure the security of enterprises in the Russian Federation, taking into account the requirements of the General Data Protection Regulation, is shown
APA, Harvard, Vancouver, ISO, and other styles
10

Dai, Xue Bing, Zhao Jing Wang, and Yan Zhang. "Data Security and Privacy Protection of Cloud Computing." Advanced Materials Research 846-847 (November 2013): 1570–73. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1570.

Full text
Abstract:
Data security and privacy protection of cloud computing as a new IT application mode are the most valued and concerned issues of the cloud user,and thus of utmost significance to the security of cloud computing. This paper describes and analyzes in detail the risks of data security and privacy showup brought by cloud computing,discusses the protective approaches of data security and privacy in cloud computing environment. Furthermore, this paper based on the newly developed fully homomorphism encryption then proposed a data security scheme which can operate encrypted data directly on cloud server without decrypt while all communication between client and server is encrypted, it can assure data security at the mean time assure the operate efficiency.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Data security and protection"

1

Neophytou, Andonis. "Computer security : data control and protection." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834504.

Full text
Abstract:
Computer security is a crucial area for any organization based on electronic devices that process data. The security of the devices themselves and the data they process are the backbone of the organization. Until today there have been no completely secure systems or procedures until and a lot of research is being done in this area. It impossible for a machine or a mechanical procedure to "guess" all possible events and lead to conclusive, cohesive and comprehensive secure systems, because of: 1) the human factor, and 2) acts of nature (fire, flood etc). However, proper managerial control can alleviate the extent of the damage caused by those factors.The purpose of this study is to examine the different frameworks of computer security. Emphasis is given to data/database security and the various kinds of attacks on the data. Controls over these attacks and preventative measures will be discussed, and high level language programs will demonstrate the protection issues. The Oracle, SOL query language will be used to demonstrate these controls and prevention measures. In addition the FORTRAN high level language will be used in conjunction with SOL (Only the FORTRAN and COBOL compilers are available for embedded SOL). The C language will be used to show attacks on password files and also as an encryption/decryption program.This study was based mainly on research. An investigation of literature spanning the past decade, was examined to produce the ideas and methods of prevention and control discussed in the study.
Department of Computer Science
APA, Harvard, Vancouver, ISO, and other styles
2

Ammar, Bassem AbuBakr. "Error protection and security for data transmission." Thesis, Lancaster University, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.421640.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Oduyiga, Adeshola Oyesanya. "Security in Cloud Storage : A Suitable Security Algorithm for Data Protection." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34428.

Full text
Abstract:
The purpose of this thesis work was to conduct a general research on existing security techniques and come up with a considerable algorithm for data security in cloud storage. Cloud storage is an infrastructure or is a model of computer data storage in which the digital data is stored in logical pools. It unifies object storage for both developers and enterprises, from live applications data to cloud archival. It help to save valuable space on PC computers or mobile devices and provides the easy storage and access of data anywhere in the world. However, just as the benefits of cloud computing abounds, so also are the risks involved. If data are not well secured or encrypted before deployment for storage in the cloud, in case of negligence on the side of the developers, then hackers can gain unauthorized access to the data. The behavior of existing security algorithms on data were studied, the encryption and decryption process of the each algorithm on data was studied and also their weaknesses against attacks. Apart from data encryption, security policies also plays an important roll in cloud storage which was also covered in this report. The research work was conducted through the use of online publications, literature review, books, academic publications and reputable research materials. The study showed that regardless of the challenges in cloud storage, there is still a suitable algorithm for protecting data against attack in the cloud.
APA, Harvard, Vancouver, ISO, and other styles
4

Benson, Glenn Stuart. "A formal protection model of security in distributed systems." Diss., Georgia Institute of Technology, 1989. http://hdl.handle.net/1853/12238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mai, Guangcan. "Biometric system security and privacy: data reconstruction and template protection." HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/544.

Full text
Abstract:
Biometric systems are being increasingly used, from daily entertainment to critical applications such as security access and identity management. It is known that biometric systems should meet the stringent requirement of low error rate. In addition, for critical applications, the security and privacy issues of biometric systems are required to be concerned. Otherwise, severe consequence such as the unauthorized access (security) or the exposure of identity-related information (privacy) can be caused. Therefore, it is imperative to study the vulnerability to potential attacks and identify the corresponding risks. Furthermore, the countermeasures should also be devised and patched on the systems. In this thesis, we study the security and privacy issues in biometric systems. We first make an attempt to reconstruct raw biometric data from biometric templates and demonstrate the security and privacy issues caused by the data reconstruction. Then, we make two attempts to protect biometric templates from being reconstructed and improve the state-of-the-art biometric template protection techniques.
APA, Harvard, Vancouver, ISO, and other styles
6

Tyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.

Full text
Abstract:
The corporate scandals of the last few years have changed the face of information security and its governance. Information security has been elevated to the board of director level due to legislation and corporate governance regulations resulting from the scandals. Now boards of directors have corporate responsibility to ensure that the information assets of an organisation are secure. They are forced to embrace information security and make it part of business strategies. The new support from the board of directors gives information security weight and the voice from the top as well as the financial muscle that other business activities experience. However, as an area that is made up of specialist activities, information security may not easily be comprehended at board level like other business related activities. Yet the board of directors needs to provide oversight of information security. That is, put an information security programme in place to ensure that information is adequately protected. This raises a number of challenges. One of the challenges is how can information security be understood and well informed decisions about it be made at the board level? This dissertation provides a mechanism to present information at board level on how information security is implemented according to the vision of the board of directors. This mechanism is built upon well accepted and documented concepts of information security. The mechanism (termed An Organisational Information Security Profile or OISP) will assist organisations with the initialisation, monitoring, measuring, reporting and reviewing of information security programmes. Ultimately, the OISP will make it possible to know if the information security endeavours of the organisation are effective or not. If the information security programme is found to be ineffective, The OISP will facilitate the pointing out of areas that are ineffective and what caused the ineffectiveness. This dissertation also presents how the effectiveness or ineffctiveness of information security can be presented at board level using well known visualisation methods. Finally the contribution, limits and areas that need more investigation are provided.
APA, Harvard, Vancouver, ISO, and other styles
7

Salles, Ernesto J. "The impact on quality of service when using security-enabling filters to provide for the security of run-time extensible virtual environments." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FSalles.pdf.

Full text
Abstract:
Thesis (M.S. in Modeling, Virtual Environments and Simulation)--Naval Postgraduate School, September 2002.
Thesis advisor(s): J. Bret Michael, Michael Capps, Don McGregor. Includes bibliographical references (p. 123-127). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
8

Cannon, Jennifer Elizabeth. "Strategies for Improving Data Protection to Reduce Data Loss from Cyberattacks." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7277.

Full text
Abstract:
Accidental and targeted data breaches threaten sustainable business practices and personal privacy, exposing all types of businesses to increased data loss and financial impacts. This single case study was conducted in a medium-sized enterprise located in Brevard County, Florida, to explore the successful data protection strategies employed by the information system and information technology business leaders. Actor-network theory was the conceptual framework for the study with a graphical syntax to model data protection strategies. Data were collected from semistructured interviews of 3 business leaders, archival documents, and field notes. Data were analyzed using thematic, analytic, and software analysis, and methodological triangulation. Three themes materialized from the data analyses: people--inferring security personnel, network engineers, system engineers, and qualified personnel to know how to monitor data; processes--inferring the activities required to protect data from data loss; and technology--inferring scientific knowledge used by people to protect data from data loss. The findings are indicative of successful application of data protection strategies and may be modeled to assess vulnerabilities from technical and nontechnical threats impacting risk and loss of sensitive data. The implications of this study for positive social change include the potential to alter attitudes toward data protection, creating a better environment for people to live and work; reduce recovery costs resulting from Internet crimes, improving social well-being; and enhance methods for the protection of sensitive, proprietary, and personally identifiable information, which advances the privacy rights for society.
APA, Harvard, Vancouver, ISO, and other styles
9

De, Lange Joshua. "A framework for information security management in local government." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/7588.

Full text
Abstract:
Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the business operations of any enterprise. Information and communication technology (ICT) systems are heavily relied upon to store, process and transmit this valuable commodity. Due to its immense value, information and related ICT resources have to be adequately protected. This protection of information is commonly referred to as information security.
APA, Harvard, Vancouver, ISO, and other styles
10

Kane, Douglas Robert. "Web-based dissemination system for the Trusted Computing Exemlar [i.e. Exemplar] project." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FKane.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005.
Thesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 127-128). Also available online.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Data security and protection"

1

Endrijonas, Janet. Data security. Rocklin, Calif: Prima Pub., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rao, Yarlagadda R. K., ed. Data transportation and protection. New York: Plenum Press, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Frank, Lars. EDP-security. Amsterdam: Elsevier Science, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1947-, Daler T., ed. Security of information and data. Chichester: E. Horwood, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Data protection and information lifecycle management. Upper Saddle River, NJ: Prentice Hall Professional Technical Reference, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Butterworth's data security law & practice. London: LexisNexis, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ziegler, Sébastien, ed. Internet of Things Security and Data Protection. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04984-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Security and data protection with SAP systems. New York: Addison-Wesley, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Data protection for virtual data centers. Indianapolis, Ind: Wiley, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Data protection: Governance, risk management, and compliance. Boca Raton, FLA: Taylor & Francis, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Data security and protection"

1

Garbis, Jason, and Jerry W. Chapman. "Data Protection." In Zero Trust Security, 163–72. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6702-8_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lenhard, Thomas H. "Data Protection and Data Security." In Data Security, 3–4. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-35494-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lakshmi, Vasantha. "Data Protection." In Beginning Security with Microsoft Technologies, 173–230. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4853-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ots, Karl. "Workload Protection – Data." In Azure Security Handbook, 77–95. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7292-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Islam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management, 1–7. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_95-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Islam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management, 1–7. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_95-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Islam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management, 223–29. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_95.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Weber, Peter, Roland Gabriel, Thomas Lux, and Katharina Menke. "Data Security and Data Protection." In Basics in Business Informatics, 281–308. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-35859-4_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Degoulet, Patrice, and Marius Fieschi. "Security and Data Protection." In Introduction to Clinical Informatics, 193–203. New York, NY: Springer New York, 1997. http://dx.doi.org/10.1007/978-1-4612-0675-0_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vijayakumar, Thurupathan. "Security and Data Protection." In Practical Azure Application Development, 131–55. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2817-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Data security and protection"

1

"TOWARDS DATA PROTECTION COMPLIANCE." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2010. http://dx.doi.org/10.5220/0002981802130216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shi, Yue. "Data Security and Privacy Protection in Public Cloud." In 2018 IEEE International Conference on Big Data (Big Data). IEEE, 2018. http://dx.doi.org/10.1109/bigdata.2018.8622531.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Su, Chunli. "Big Data Security and Privacy Protection." In 2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS). IEEE, 2019. http://dx.doi.org/10.1109/icvris.2019.00030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Aparajit, Srushti, Rashi Shah, Riddhi Chopdekar, and Rupali Patil. "Data Protection: The Cloud Security Perspective." In 2022 3rd International Conference for Emerging Technology (INCET). IEEE, 2022. http://dx.doi.org/10.1109/incet54531.2022.9825151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jiang, Yixiang, Yuangen Xu, Qi Xu, Limei Fang, and Cong Lin. "Tobacco Industry Data Security Protection System." In 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS). IEEE, 2019. http://dx.doi.org/10.1109/ccoms.2019.8821674.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Dongpo. "Big Data Security and Privacy Protection." In 8th International Conference on Management and Computer Science (ICMCS 2018). Paris, France: Atlantis Press, 2018. http://dx.doi.org/10.2991/icmcs-18.2018.56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vázquez-Naya, Jose. "Protection and security of medical data." In MOL2NET'21, Conference on Molecular, Biomedical & Computational Sciences and Engineering, 7th ed. Basel, Switzerland: MDPI, 2021. http://dx.doi.org/10.3390/mol2net-07-11848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Boehnen, Christopher, David Bolme, and Patrick Flynn. "Biometrics IRB best practices and data protection." In SPIE Defense + Security, edited by Ioannis A. Kakadiaris, Ajay Kumar, and Walter J. Scheirer. SPIE, 2015. http://dx.doi.org/10.1117/12.2181981.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kan, Senwen, Jennifer Dworak, and James George Dunham. "Echeloned IJTAG data protection." In 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST). IEEE, 2016. http://dx.doi.org/10.1109/asianhost.2016.7835558.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Al-Hamdani, Wasim A. "Elliptic curve for data protection." In the 2011 Information Security Curriculum Development Conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2047456.2047457.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Data security and protection"

1

Adams, C. Independent Data Unit Protection Generic Security Service Application Program Interface (IDUP-GSS-API). RFC Editor, December 1998. http://dx.doi.org/10.17487/rfc2479.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Park, Soontae, Antonio García Zaballos, Enrique Iglesias Rodriguez, Pau Puig Gabarró, Kwanghee Choi, Donghwan Oh, Hyein Song, and Junok Lim. Roadmap for the Establishment of a Big Data Analysis Center for Critical Infrastructure Protection in Latin America and the Caribbean post COVID-19. Inter-American Development Bank, January 2022. http://dx.doi.org/10.18235/0003930.

Full text
Abstract:
This report, a joint effort between the Korea Internet & Security Agency (KISA) and Inter-American Development Bank (IDB), emphasizes the rising importance of critical infrastructure protection for the Latin American and Caribbean (LAC) region and proposes ways to overcome existing and potential cybersecurity threats. Considering the unexpected and high-speed transformations brought on by the COVID-19 pandemic, it is important to get prepared for imminent threats. The report examines the status of information and communication technology (ICT) infrastructure protection in the region and suggests big data analysis as a solution. To make the case, the report discusses the role of Koreas Big Data Analysis Center in protecting critical infrastructures in the country and makes suggestions to build an institutional foundation, stronger governance, and an effective roadmap for the implementation of a similar center in the LAC region.
APA, Harvard, Vancouver, ISO, and other styles
3

Stankovic, Mirjana, and Agustín Ignacio Filippo. Global Value Chain Data for Mexico in the Automotive and Electronics Sectors. Inter-American Development Bank, September 2021. http://dx.doi.org/10.18235/0003664.

Full text
Abstract:
This report uses the Global Value Chain (GVC) data framework to provide scoping review and analysis of Mexico's current position and potential for using and harvesting GVC data in the automotive and electronics sectors. By conducting the study on GVCs data, we hope to broaden the understanding of the importance of data transfers for GVCs, production, and trade, underlining that data are critical to all companies and not only to the so-called "high-tech companies." Data protection, sharing, and security are also central to manufacturers in the automotive and electronics sectors. This report will review how datafication, data protection, sharing, and security impact Mexico's automotive and electronics industry. This information is analyzed from a global perspective and the viewpoint of Mexico to provide a holistic picture of the situation when identifying trajectories for entry, growth, and upgrading along GVCs that rely on datafication and digital transformation. It will also offer recommendations for regulators and policymakers on how to facilitate successful GVCs' data functioning and guidance for businesses on how to harvest data for growth and digital transformation.
APA, Harvard, Vancouver, ISO, and other styles
4

Author, Not Given. Y-12 Groundwater Protection Program Calendar Year 2000 Groundwater Monitoring Data Evaluation Report for the Upper East Fork Poplar Creek Hydrogeologic Regime at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee. Office of Scientific and Technical Information (OSTI), September 2001. http://dx.doi.org/10.2172/788789.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Idris, Iffat. Documentation of Survivors of Gender-based Violence (GBV). Institute of Development Studies (IDS), July 2021. http://dx.doi.org/10.19088/k4d.2021.103.

Full text
Abstract:
This review is largely based on grey literature, in particular policy documents and reports by international development organizations. While there was substantial literature on approaches and principles to GBV documentation, there was less on remote service delivery such as helplines – much of this only in the wake of the COVID-19 pandemic. In addition, very little was found on actual examples of GBV documentation in developing contexts. By definition, gender featured strongly in the available literature; the particular needs of persons with disabilities were also addressed in discussions of overall GBV responses, but far less in GBV documentation. GBV documentation refers to the recording of data on individual GBV incidents in order to provide/refer survivors with/to appropriate support, and the collection of data of GBV incidents for analysis and to improve GBV responses. The literature notes that there are significant risks associated with GBV documentation, in relation to data protection. Failure to ensure information security can expose survivors, in particular, to harm, e.g. reprisal attacks by perpetrators, stigma, and ostracism by their families/ communities. This means that GBV documentation must be carried out with great care. A number of principles should always be applied when documenting GBV cases in order to protect survivors and prevent potential negative effects: do no harm, survivor-centered approach, survivor autonomy, informed consent, non-discrimination, confidentiality, and data protection (information security).
APA, Harvard, Vancouver, ISO, and other styles
6

Deb, Shourjya, and Virginie Baudais. The Challenges of Data Collection in Conflict-affected Areas: A Case Study in the Liptako-Gourma Region. Stockholm International Peace Research Institute, October 2022. http://dx.doi.org/10.55163/vwim3307.

Full text
Abstract:
Conducting research in the Sahel has become more challenging over the past 10 years, and the continuing deterioration of the security situation has restricted access to many areas. This SIPRI Insights paper provides an overview of the main challenges for researchers when conducting data collection in conflict-affected areas. The paper employs a case study of a humanitarian protection project that SIPRI has been working on in the Liptako-Gourma region. The project was designed in collaboration with the Danish Refugee Council (DRC) and three local research partners: the Centre for Democratic Governance (CGD) in Burkina Faso, Point Sud in Mali and the Laboratoire d’Études et de Recherche sur les Dynamiques Sociales et le Développement Local (LASDEL) in Niger. Using the case study, the paper identifies and outlines how the project addressed specific challenges. The paper also highlights key considerations for researchers to take into account when carrying out data collection and fieldwork in conflict zones. Evidence-based research can influence humanitarian and development initiatives and support shifts in policy and programming. The bottom-up research approach gives a voice to communities and alternative perspectives and advances evidence-based solutions that are locally driven, meaningful and sustainable for target populations.
APA, Harvard, Vancouver, ISO, and other styles
7

Rosenthal, David, Peter Samsel, and Cheryl Barbasch. Information Tools for Security Protection. Fort Belvoir, VA: Defense Technical Information Center, November 2002. http://dx.doi.org/10.21236/ada408503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lewis, Dustin, Radhika Kapoor, and Naz Modirzadeh. Advancing Humanitarian Commitments in Connection with Countering Terrorism: Exploring a Foundational Reframing concerning the Security Council. Harvard Law School Program on International Law and Armed Conflict, December 2021. http://dx.doi.org/10.54813/uzav2714.

Full text
Abstract:
The imperative to provide humanitarian and medical services on an urgent basis in armed conflicts is anchored in moral tenets, shared values, and international rules. States spend tens of billions of dollars each year to help implement humanitarian programs in conflicts across the world. Yet, in practice, counterterrorism objectives increasingly prevail over humanitarian concerns, often resulting in devastating effects for civilian populations in need of aid and protection in war. Not least, confusion and misapprehensions about the power and authority of States relative to the United Nations Security Council to set policy preferences and configure legal obligations contribute significantly to this trajectory. In this guide for States, we present a framework to reconfigure relations between these core commitments by assessing the counterterrorism architecture through the lens of impartial humanitarianism. We aim in particular to provide an evidence base and analytical frame for States to better grasp key legal and policy issues related to upholding respect for principled humanitarian action in connection with carrying out the Security Council’s counterterrorism decisions. We do so because the lack of knowledge regarding interpretation and implementation of counterterrorism resolutions matters for the coherence, integrity, and comprehensiveness of humanitarian policymaking and protection of the humanitarian imperative. In addition to analyzing foundational concerns and evaluating discernible behaviors and attitudes, we identify avenues that States may take to help achieve pro-humanitarian objectives. We also endeavor to help disseminate indications of, and catalyze, States’ legally relevant positions and practices on these issues. In section 1, we introduce the guide’s impetus, objectives, target audience, and structure. We also describe the methods that we relied on and articulate definitions for key terms. In section 2, we introduce key legal actors, sources of law, and the notion of international legal responsibility, as well as the relations between international and national law. Notably, Security Council resolutions require incorporation into national law in order to become effective and enforceable by internal administrative and judicial authorities. In section 3, we explain international legal rules relevant to advancing the humanitarian imperative and upholding respect for principled humanitarian action, and we sketch the corresponding roles of humanitarian policies, programs, and donor practices. International humanitarian law (IHL) seeks to ensure — for people who are not, or are no longer, actively participating in hostilities and whose needs are unmet — certain essential supplies, as well as medical care and attention for the wounded and sick. States have also developed and implemented a range of humanitarian policy frameworks to administer principled humanitarian action effectively. Further, States may rely on a number of channels to hold other international actors to account for safeguarding the humanitarian imperative. In section 4, we set out key theoretical and doctrinal elements related to accepting and carrying out the Security Council’s decisions. Decisions of the Security Council may contain (binding) obligations, (non-binding) recommendations, or a combination of the two. UN members are obliged to carry out the Council’s decisions. Member States retain considerable interpretive latitude to implement counterterrorism resolutions. With respect to advancing the humanitarian imperative, we argue that IHL should represent a legal floor for interpreting the Security Council’s decisions and recommendations. In section 5, we describe relevant conduct of the Security Council and States. Under the Resolution 1267 (1999), Resolution 1989 (2011), and Resolution 2253 (2015) line of resolutions, the Security Council has established targeted sanctions as counterterrorism measures. Under the Resolution 1373 (2001) line of resolutions, the Security Council has adopted quasi-“legislative” requirements for how States must counter terrorism in their national systems. Implementation of these sets of resolutions may adversely affect principled humanitarian action in several ways. Meanwhile, for its part, the Security Council has sought to restrict the margin of appreciation of States to determine how to implement these decisions. Yet international law does not demand that these resolutions be interpreted and implemented at the national level by elevating security rationales over policy preferences for principled humanitarian action. Indeed, not least where other fields of international law, such as IHL, may be implicated, States retain significant discretion to interpret and implement these counterterrorism decisions in a manner that advances the humanitarian imperative. States have espoused a range of views on the intersections between safeguarding principled humanitarian action and countering terrorism. Some voice robust support for such action in relation to counterterrorism contexts. A handful call for a “balancing” of the concerns. And some frame respect for the humanitarian imperative in terms of not contradicting counterterrorism objectives. In terms of measures, we identify five categories of potentially relevant national counterterrorism approaches: measures to prevent and suppress support to the people and entities involved in terrorist acts; actions to implement targeted sanctions; measures to prevent and suppress the financing of terrorism; measures to prohibit or restrict terrorism-related travel; and measures that criminalize or impede medical care. Further, through a number of “control dials” that we detect, States calibrate the functional relations between respect for principled humanitarian action and countering terrorism. The bulk of the identified counterterrorism measures and related “control dials” suggests that, to date, States have by and large not prioritized advancing respect for the humanitarian imperative at the national level. Finally, in section 6, we conclude by enumerating core questions that a State may answer to help formulate and instantiate its values, policy commitments, and legal positions to secure respect for principled humanitarian action in relation to counterterrorism contexts.
APA, Harvard, Vancouver, ISO, and other styles
9

Radiological Control, Managers' Council. Nevada National Security Site Radiation Protection Program. Office of Scientific and Technical Information (OSTI), March 2018. http://dx.doi.org/10.2172/1435448.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cohen, Sheldon I. Security Clearances and the Protection of National Security Information: Law and Procedures. Fort Belvoir, VA: Defense Technical Information Center, December 2000. http://dx.doi.org/10.21236/ada389102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography