Добірка наукової літератури з теми "Data security and protection"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Data security and protection".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Data security and protection"

1

Carey, Peter, and David Berry. "DATA PROTECTION — SECURITY." Computer Law & Security Review 18, no. 2 (March 2002): 112–13. http://dx.doi.org/10.1016/s0267-3649(02)03010-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Begum, Shameena, V. Ratna Vasuki, and K. V. V. Srinivas K.V.V.Srinivas. "Data Security and Protection in Cloud Computing." International Journal of Scientific Research 1, no. 2 (June 1, 2012): 31–34. http://dx.doi.org/10.15373/22778179/jul2012/9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

MALIK, MAREK. "Data Protection and Security." Pacing and Clinical Electrophysiology 17, no. 2 (February 1994): 240–41. http://dx.doi.org/10.1111/j.1540-8159.1994.tb01376.x.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

A. J., Geetha. "Data Security and Protection." Indian Journal of Computer Science 8, no. 5 (October 31, 2023): 38. http://dx.doi.org/10.17010/ijcs/2023/v8/i5/173323.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Ignisca, Vira, and Danylo Vdovenko. "ANALYSIS OF METHODS DATA SECURITY." Information systems and technologies security, no. 1 (3-4) (2020): 52–56. http://dx.doi.org/10.17721/ists.2020.4.53-57.

Повний текст джерела
Анотація:
The article analyzes the main methods of information protection, from which it is possible to conclude that no method of data protection is ideal for all situations. It is important to choose an enterprise solution that provides comprehensive functionality, a flexible range of data protection options, broad support for platform and data types, and proven success in production implementations. The choice of method of information protection should take into account many circumstances that may arise during the implementation of a particular method. Due to the variety of data generated today, in addition to increasing the number of new platforms, flexibility can be a critical aspect of the data protection solution. A careful review of the requirements should make it easy to compare them with the relevant data protection methods, and it is necessary to make sure that the solution includes everything necessary to meet these requirements. Choosing the right method of information protection becomes much more difficult when more complex environments with many conflicting variables are involved, as it must support several options to provide flexibility to protect and meet data confidentiality, integrity and availability requirements. Only the integrated use of different measures can ensure reliable protection of information, because each method or measure has weaknesses and strengths. In some situations, internal security policies or regulations may forcibly change one method of data protection to another. Today, most standards, such as PCI DSS and HIPAA, allow a combination of the aforementioned methods, but these standards usually lag behind available or new data protection technologies. The set of methods and means of information protection includes software and hardware, protective transformations and organizational measures. A set of such methods, which are focused on protecting information, should protect them depending on whether the information is stored, moved or copied, accessed or used.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Qureshi, Anique A., and Joel G. Siegel. "Information security and data protection." International Journal of Computer Applications in Technology 14, no. 1/2/3 (2001): 1. http://dx.doi.org/10.1504/ijcat.2001.000256.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Martín del Rey, A., J. L. Hernández Pastora, and G. Rodríguez Sánchez. "3D medical data security protection." Expert Systems with Applications 54 (July 2016): 379–86. http://dx.doi.org/10.1016/j.eswa.2016.02.001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Highland, Harold Joseph. "Microcomputer security: Data protection techniques." Computers & Security 4, no. 2 (June 1985): 123–34. http://dx.doi.org/10.1016/0167-4048(85)90016-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Atri, Preyaa. "Enhancing Big Data Security through Comprehensive Data Protection Measures: A Focus on Securing Data at Rest and In-Transit." International Journal of Computing and Engineering 5, no. 4 (May 24, 2024): 44–55. http://dx.doi.org/10.47941/ijce.1920.

Повний текст джерела
Анотація:
Purpose: This research paper aims to enhance Big Data security by implementing comprehensive data protection measures, focusing on securing data at rest and in transit. In the era of Big Data, organizations handle vast quantities of data characterized by high velocity, volume, and variety, which complicates management and increases security risks. Methodology: The study examines various data protection strategies, including encryption, access control, data masking, immutable storage, tokenization, and physical security for data at rest. For data in transit, it explores encryption protocols, secure transfer methods like SSH and TLS, VPNs, Zero Trust architecture, and secure APIs. These methods are crucial for safeguarding sensitive information and preventing unauthorized access. Findings: The findings highlight common security challenges in Big Data, such as data breaches, unauthorized access, and integrity issues. The study emphasizes the need for robust protection measures and offers a comprehensive view of the data security landscape. Implementing these strategies helps organizations safeguard sensitive information and ensure compliance with international data protection regulations, enhancing their overall security posture. Unique contribution to theory policy and practice: This paper contributes to theory, policy, and practice by advocating comprehensive data protection strategies. It stresses the importance of continuous monitoring and regulatory compliance, providing practical insights into best practices and technologies that protect Big Data. The research supports developing robust data protection policies and practices, advancing knowledge in Big Data security.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Shahul Ikram, Nur Adlin Hanisah. "DATA BREACHES EXIT STRATEGY: A COMPARATIVE ANALYSIS OF DATA PRIVACY LAWS." Malaysian Journal of Syariah and Law 12, no. 1 (April 15, 2024): 135–47. http://dx.doi.org/10.33102/mjsl.vol12no1.458.

Повний текст джерела
Анотація:
Data has become highly valuable in the era of digitalisation and is the main target of cybercriminals. Cybercriminals steal data by exploiting system vulnerabilities. The rise of catastrophic data breach incidents affects business operations, reputation and legal standing, leading to business disruptions, financial loss and reputation damage. These incidents have raised data security concerns. The frequent incident is partly due to insufficient security measures in place. This article employs doctrinal research focusing on legal principles based on legislation to analyse Malaysia’s legal framework for protecting personal data in Malaysia and a comparison with other jurisdictions, i.e. the European Union General Data Protection Regulation (GDPR), the Singapore Personal Data Protection Act 2012 and the China Personal Information Protection Law (PIPL). The findings show that Malaysia’s data protection laws fall short of the international norm in some areas. This article suggests that Malaysian policymakers may amend the Personal Data Protection Act 2010 to align with international data protection standards to strengthen data security measures in preventive, detective and responsive data breaches. Consequently, this article provides an analysis of data protection laws in Malaysia and compares them with other advanced jurisdictions. It offers valuable insights into the challenges and opportunities involved in safeguarding personal data, the legal framework, and organisational strategies related to data privacy and security.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Data security and protection"

1

Neophytou, Andonis. "Computer security : data control and protection." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834504.

Повний текст джерела
Анотація:
Computer security is a crucial area for any organization based on electronic devices that process data. The security of the devices themselves and the data they process are the backbone of the organization. Until today there have been no completely secure systems or procedures until and a lot of research is being done in this area. It impossible for a machine or a mechanical procedure to "guess" all possible events and lead to conclusive, cohesive and comprehensive secure systems, because of: 1) the human factor, and 2) acts of nature (fire, flood etc). However, proper managerial control can alleviate the extent of the damage caused by those factors.The purpose of this study is to examine the different frameworks of computer security. Emphasis is given to data/database security and the various kinds of attacks on the data. Controls over these attacks and preventative measures will be discussed, and high level language programs will demonstrate the protection issues. The Oracle, SOL query language will be used to demonstrate these controls and prevention measures. In addition the FORTRAN high level language will be used in conjunction with SOL (Only the FORTRAN and COBOL compilers are available for embedded SOL). The C language will be used to show attacks on password files and also as an encryption/decryption program.This study was based mainly on research. An investigation of literature spanning the past decade, was examined to produce the ideas and methods of prevention and control discussed in the study.
Department of Computer Science
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Ammar, Bassem AbuBakr. "Error protection and security for data transmission." Thesis, Lancaster University, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.421640.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Oduyiga, Adeshola Oyesanya. "Security in Cloud Storage : A Suitable Security Algorithm for Data Protection." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34428.

Повний текст джерела
Анотація:
The purpose of this thesis work was to conduct a general research on existing security techniques and come up with a considerable algorithm for data security in cloud storage. Cloud storage is an infrastructure or is a model of computer data storage in which the digital data is stored in logical pools. It unifies object storage for both developers and enterprises, from live applications data to cloud archival. It help to save valuable space on PC computers or mobile devices and provides the easy storage and access of data anywhere in the world. However, just as the benefits of cloud computing abounds, so also are the risks involved. If data are not well secured or encrypted before deployment for storage in the cloud, in case of negligence on the side of the developers, then hackers can gain unauthorized access to the data. The behavior of existing security algorithms on data were studied, the encryption and decryption process of the each algorithm on data was studied and also their weaknesses against attacks. Apart from data encryption, security policies also plays an important roll in cloud storage which was also covered in this report. The research work was conducted through the use of online publications, literature review, books, academic publications and reputable research materials. The study showed that regardless of the challenges in cloud storage, there is still a suitable algorithm for protecting data against attack in the cloud.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Benson, Glenn Stuart. "A formal protection model of security in distributed systems." Diss., Georgia Institute of Technology, 1989. http://hdl.handle.net/1853/12238.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Mai, Guangcan. "Biometric system security and privacy: data reconstruction and template protection." HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/544.

Повний текст джерела
Анотація:
Biometric systems are being increasingly used, from daily entertainment to critical applications such as security access and identity management. It is known that biometric systems should meet the stringent requirement of low error rate. In addition, for critical applications, the security and privacy issues of biometric systems are required to be concerned. Otherwise, severe consequence such as the unauthorized access (security) or the exposure of identity-related information (privacy) can be caused. Therefore, it is imperative to study the vulnerability to potential attacks and identify the corresponding risks. Furthermore, the countermeasures should also be devised and patched on the systems. In this thesis, we study the security and privacy issues in biometric systems. We first make an attempt to reconstruct raw biometric data from biometric templates and demonstrate the security and privacy issues caused by the data reconstruction. Then, we make two attempts to protect biometric templates from being reconstructed and improve the state-of-the-art biometric template protection techniques.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Tyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.

Повний текст джерела
Анотація:
The corporate scandals of the last few years have changed the face of information security and its governance. Information security has been elevated to the board of director level due to legislation and corporate governance regulations resulting from the scandals. Now boards of directors have corporate responsibility to ensure that the information assets of an organisation are secure. They are forced to embrace information security and make it part of business strategies. The new support from the board of directors gives information security weight and the voice from the top as well as the financial muscle that other business activities experience. However, as an area that is made up of specialist activities, information security may not easily be comprehended at board level like other business related activities. Yet the board of directors needs to provide oversight of information security. That is, put an information security programme in place to ensure that information is adequately protected. This raises a number of challenges. One of the challenges is how can information security be understood and well informed decisions about it be made at the board level? This dissertation provides a mechanism to present information at board level on how information security is implemented according to the vision of the board of directors. This mechanism is built upon well accepted and documented concepts of information security. The mechanism (termed An Organisational Information Security Profile or OISP) will assist organisations with the initialisation, monitoring, measuring, reporting and reviewing of information security programmes. Ultimately, the OISP will make it possible to know if the information security endeavours of the organisation are effective or not. If the information security programme is found to be ineffective, The OISP will facilitate the pointing out of areas that are ineffective and what caused the ineffectiveness. This dissertation also presents how the effectiveness or ineffctiveness of information security can be presented at board level using well known visualisation methods. Finally the contribution, limits and areas that need more investigation are provided.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Salles, Ernesto J. "The impact on quality of service when using security-enabling filters to provide for the security of run-time extensible virtual environments." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FSalles.pdf.

Повний текст джерела
Анотація:
Thesis (M.S. in Modeling, Virtual Environments and Simulation)--Naval Postgraduate School, September 2002.
Thesis advisor(s): J. Bret Michael, Michael Capps, Don McGregor. Includes bibliographical references (p. 123-127). Also available online.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Cannon, Jennifer Elizabeth. "Strategies for Improving Data Protection to Reduce Data Loss from Cyberattacks." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7277.

Повний текст джерела
Анотація:
Accidental and targeted data breaches threaten sustainable business practices and personal privacy, exposing all types of businesses to increased data loss and financial impacts. This single case study was conducted in a medium-sized enterprise located in Brevard County, Florida, to explore the successful data protection strategies employed by the information system and information technology business leaders. Actor-network theory was the conceptual framework for the study with a graphical syntax to model data protection strategies. Data were collected from semistructured interviews of 3 business leaders, archival documents, and field notes. Data were analyzed using thematic, analytic, and software analysis, and methodological triangulation. Three themes materialized from the data analyses: people--inferring security personnel, network engineers, system engineers, and qualified personnel to know how to monitor data; processes--inferring the activities required to protect data from data loss; and technology--inferring scientific knowledge used by people to protect data from data loss. The findings are indicative of successful application of data protection strategies and may be modeled to assess vulnerabilities from technical and nontechnical threats impacting risk and loss of sensitive data. The implications of this study for positive social change include the potential to alter attitudes toward data protection, creating a better environment for people to live and work; reduce recovery costs resulting from Internet crimes, improving social well-being; and enhance methods for the protection of sensitive, proprietary, and personally identifiable information, which advances the privacy rights for society.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

De, Lange Joshua. "A framework for information security management in local government." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/7588.

Повний текст джерела
Анотація:
Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the business operations of any enterprise. Information and communication technology (ICT) systems are heavily relied upon to store, process and transmit this valuable commodity. Due to its immense value, information and related ICT resources have to be adequately protected. This protection of information is commonly referred to as information security.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Kane, Douglas Robert. "Web-based dissemination system for the Trusted Computing Exemlar [i.e. Exemplar] project." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FKane.pdf.

Повний текст джерела
Анотація:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005.
Thesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 127-128). Also available online.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Data security and protection"

1

Endrijonas, Janet. Data security. Rocklin, Calif: Prima Pub., 1995.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

1952-, Gordon John, ed. Practical data security. Aldershot, England: Ashgate, 1993.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Frank, Lars. EDP-security. Amsterdam: Elsevier Science, 1992.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Brocx, W. H. J. 1939-, ed. Data security manual: Guidelines and procedures for data protection. Dordrecht [Netherlands]: D. Riedel, 1985.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Ziegler, Sébastien, ed. Internet of Things Security and Data Protection. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04984-3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

American Bar Association. Section of Antitrust Law., ed. Data security handbook. Chicago, Ill: ABA Section of Antitrust Law, 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Atluri, Vijay. Security of Data and Transaction Processing. Boston, MA: Springer US, 2000.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Y, Chow Stephen, Goldstone David, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Data security & identity theft. Boston, MA: MCLE, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Y, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Y, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Data security and protection"

1

Garbis, Jason, and Jerry W. Chapman. "Data Protection." In Zero Trust Security, 163–72. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6702-8_13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Lenhard, Thomas H. "Data Protection and Data Security." In Data Security, 3–4. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-35494-7_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Lakshmi, Vasantha. "Data Protection." In Beginning Security with Microsoft Technologies, 173–230. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4853-9_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Ots, Karl. "Workload Protection – Data." In Azure Security Handbook, 77–95. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7292-3_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Islam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management, 1–7. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_95-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Islam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management, 1–7. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_95-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Islam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management, 223–29. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_95.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Weber, Peter, Roland Gabriel, Thomas Lux, and Katharina Menke. "Data Security and Data Protection." In Basics in Business Informatics, 281–308. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-35859-4_11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Long, Ian. "Data Protection and Data Security." In The Complete Company Policies, 41–64. London: Routledge, 2024. http://dx.doi.org/10.4324/9781003258995-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Degoulet, Patrice, and Marius Fieschi. "Security and Data Protection." In Introduction to Clinical Informatics, 193–203. New York, NY: Springer New York, 1997. http://dx.doi.org/10.1007/978-1-4612-0675-0_15.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Data security and protection"

1

Li, Yifeng. "Blockchain transaction data privacy protection scheme." In Fifth International Conference on Computer Communication and Network Security (CCNS 2024), edited by Zhiyong Xiong and Zhaolong Ning, 37. SPIE, 2024. http://dx.doi.org/10.1117/12.3038136.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

"TOWARDS DATA PROTECTION COMPLIANCE." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2010. http://dx.doi.org/10.5220/0002981802130216.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Shi, Yue. "Data Security and Privacy Protection in Public Cloud." In 2018 IEEE International Conference on Big Data (Big Data). IEEE, 2018. http://dx.doi.org/10.1109/bigdata.2018.8622531.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Su, Chunli. "Big Data Security and Privacy Protection." In 2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS). IEEE, 2019. http://dx.doi.org/10.1109/icvris.2019.00030.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Aparajit, Srushti, Rashi Shah, Riddhi Chopdekar, and Rupali Patil. "Data Protection: The Cloud Security Perspective." In 2022 3rd International Conference for Emerging Technology (INCET). IEEE, 2022. http://dx.doi.org/10.1109/incet54531.2022.9825151.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Jiang, Yixiang, Yuangen Xu, Qi Xu, Limei Fang, and Cong Lin. "Tobacco Industry Data Security Protection System." In 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS). IEEE, 2019. http://dx.doi.org/10.1109/ccoms.2019.8821674.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Zhang, Dongpo. "Big Data Security and Privacy Protection." In 8th International Conference on Management and Computer Science (ICMCS 2018). Paris, France: Atlantis Press, 2018. http://dx.doi.org/10.2991/icmcs-18.2018.56.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Vázquez-Naya, Jose. "Protection and security of medical data." In MOL2NET'21, Conference on Molecular, Biomedical & Computational Sciences and Engineering, 7th ed. Basel, Switzerland: MDPI, 2021. http://dx.doi.org/10.3390/mol2net-07-11848.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Boehnen, Christopher, David Bolme, and Patrick Flynn. "Biometrics IRB best practices and data protection." In SPIE Defense + Security, edited by Ioannis A. Kakadiaris, Ajay Kumar, and Walter J. Scheirer. SPIE, 2015. http://dx.doi.org/10.1117/12.2181981.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Kan, Senwen, Jennifer Dworak, and James George Dunham. "Echeloned IJTAG data protection." In 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST). IEEE, 2016. http://dx.doi.org/10.1109/asianhost.2016.7835558.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Data security and protection"

1

Adams, C. Independent Data Unit Protection Generic Security Service Application Program Interface (IDUP-GSS-API). RFC Editor, December 1998. http://dx.doi.org/10.17487/rfc2479.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Park, Soontae, Antonio García Zaballos, Enrique Iglesias Rodriguez, Pau Puig Gabarró, Kwanghee Choi, Donghwan Oh, Hyein Song, and Junok Lim. Roadmap for the Establishment of a Big Data Analysis Center for Critical Infrastructure Protection in Latin America and the Caribbean post COVID-19. Inter-American Development Bank, January 2022. http://dx.doi.org/10.18235/0003930.

Повний текст джерела
Анотація:
This report, a joint effort between the Korea Internet & Security Agency (KISA) and Inter-American Development Bank (IDB), emphasizes the rising importance of critical infrastructure protection for the Latin American and Caribbean (LAC) region and proposes ways to overcome existing and potential cybersecurity threats. Considering the unexpected and high-speed transformations brought on by the COVID-19 pandemic, it is important to get prepared for imminent threats. The report examines the status of information and communication technology (ICT) infrastructure protection in the region and suggests big data analysis as a solution. To make the case, the report discusses the role of Koreas Big Data Analysis Center in protecting critical infrastructures in the country and makes suggestions to build an institutional foundation, stronger governance, and an effective roadmap for the implementation of a similar center in the LAC region.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Stankovic, Mirjana, and Agustín Ignacio Filippo. Global Value Chain Data for Mexico in the Automotive and Electronics Sectors. Inter-American Development Bank, September 2021. http://dx.doi.org/10.18235/0003664.

Повний текст джерела
Анотація:
This report uses the Global Value Chain (GVC) data framework to provide scoping review and analysis of Mexico's current position and potential for using and harvesting GVC data in the automotive and electronics sectors. By conducting the study on GVCs data, we hope to broaden the understanding of the importance of data transfers for GVCs, production, and trade, underlining that data are critical to all companies and not only to the so-called "high-tech companies." Data protection, sharing, and security are also central to manufacturers in the automotive and electronics sectors. This report will review how datafication, data protection, sharing, and security impact Mexico's automotive and electronics industry. This information is analyzed from a global perspective and the viewpoint of Mexico to provide a holistic picture of the situation when identifying trajectories for entry, growth, and upgrading along GVCs that rely on datafication and digital transformation. It will also offer recommendations for regulators and policymakers on how to facilitate successful GVCs' data functioning and guidance for businesses on how to harvest data for growth and digital transformation.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Gautrais, Vincent, and Nicolas Aubin. Assessment Model of Factors Relating to Data Flow: Instrument for the Protection of Privacy as well as Rights and Freedoms in the Development and Use of Artificial Intelligence. Observatoire international sur les impacts sociétaux de l'intelligence artificielle et du numérique, March 2022. http://dx.doi.org/10.61737/haoj6662.

Повний текст джерела
Анотація:
This document proposes a model for assessing factors relating to data flow. Indeed, in order to increase the diligence of the players involved, systematic use is made of internal policies in which the latter spell out the guarantees they offer, whether in terms of privacy, transparency, security, fundamental freedoms, and so on. Based on the Guide des bonnes pratiques en intelligence artificielle (only available in French), this model seems to us to be a way for a provider to expose its diligence and the efforts it intends to make to handle data responsibly.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Idris, Iffat. Documentation of Survivors of Gender-based Violence (GBV). Institute of Development Studies (IDS), July 2021. http://dx.doi.org/10.19088/k4d.2021.103.

Повний текст джерела
Анотація:
This review is largely based on grey literature, in particular policy documents and reports by international development organizations. While there was substantial literature on approaches and principles to GBV documentation, there was less on remote service delivery such as helplines – much of this only in the wake of the COVID-19 pandemic. In addition, very little was found on actual examples of GBV documentation in developing contexts. By definition, gender featured strongly in the available literature; the particular needs of persons with disabilities were also addressed in discussions of overall GBV responses, but far less in GBV documentation. GBV documentation refers to the recording of data on individual GBV incidents in order to provide/refer survivors with/to appropriate support, and the collection of data of GBV incidents for analysis and to improve GBV responses. The literature notes that there are significant risks associated with GBV documentation, in relation to data protection. Failure to ensure information security can expose survivors, in particular, to harm, e.g. reprisal attacks by perpetrators, stigma, and ostracism by their families/ communities. This means that GBV documentation must be carried out with great care. A number of principles should always be applied when documenting GBV cases in order to protect survivors and prevent potential negative effects: do no harm, survivor-centered approach, survivor autonomy, informed consent, non-discrimination, confidentiality, and data protection (information security).
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Deb, Shourjya, and Virginie Baudais. The Challenges of Data Collection in Conflict-affected Areas: A Case Study in the Liptako-Gourma Region. Stockholm International Peace Research Institute, October 2022. http://dx.doi.org/10.55163/vwim3307.

Повний текст джерела
Анотація:
Conducting research in the Sahel has become more challenging over the past 10 years, and the continuing deterioration of the security situation has restricted access to many areas. This SIPRI Insights paper provides an overview of the main challenges for researchers when conducting data collection in conflict-affected areas. The paper employs a case study of a humanitarian protection project that SIPRI has been working on in the Liptako-Gourma region. The project was designed in collaboration with the Danish Refugee Council (DRC) and three local research partners: the Centre for Democratic Governance (CGD) in Burkina Faso, Point Sud in Mali and the Laboratoire d’Études et de Recherche sur les Dynamiques Sociales et le Développement Local (LASDEL) in Niger. Using the case study, the paper identifies and outlines how the project addressed specific challenges. The paper also highlights key considerations for researchers to take into account when carrying out data collection and fieldwork in conflict zones. Evidence-based research can influence humanitarian and development initiatives and support shifts in policy and programming. The bottom-up research approach gives a voice to communities and alternative perspectives and advances evidence-based solutions that are locally driven, meaningful and sustainable for target populations.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Author, Not Given. Y-12 Groundwater Protection Program Calendar Year 2000 Groundwater Monitoring Data Evaluation Report for the Upper East Fork Poplar Creek Hydrogeologic Regime at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee. Office of Scientific and Technical Information (OSTI), September 2001. http://dx.doi.org/10.2172/788789.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Amarante, Verónica, Rodrigo Arim, and Andrés Dean. Protecting Workers against Unemployment in Uruguay. Inter-American Development Bank, October 2011. http://dx.doi.org/10.18235/0011349.

Повний текст джерела
Анотація:
This paper considers the main institutional features of the Uruguayan labor market and its recent evolution, with a focus on unemployment. The main policies aimed at protecting workers against unemployment are analyzed. Using administrative data from social security records, the paper studies the dynamics of the labor market. Particularly examined are inflows and outflows from the formal labor market, as well as the effect, in terms of earnings loss, of episodes out of the formal labor market. Finally, an impact evaluation of recent changes in the unemployment insurance program is presented.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Rosenthal, David, Peter Samsel, and Cheryl Barbasch. Information Tools for Security Protection. Fort Belvoir, VA: Defense Technical Information Center, November 2002. http://dx.doi.org/10.21236/ada408503.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Lewis, Dustin, Radhika Kapoor, and Naz Modirzadeh. Advancing Humanitarian Commitments in Connection with Countering Terrorism: Exploring a Foundational Reframing concerning the Security Council. Harvard Law School Program on International Law and Armed Conflict, December 2021. http://dx.doi.org/10.54813/uzav2714.

Повний текст джерела
Анотація:
The imperative to provide humanitarian and medical services on an urgent basis in armed conflicts is anchored in moral tenets, shared values, and international rules. States spend tens of billions of dollars each year to help implement humanitarian programs in conflicts across the world. Yet, in practice, counterterrorism objectives increasingly prevail over humanitarian concerns, often resulting in devastating effects for civilian populations in need of aid and protection in war. Not least, confusion and misapprehensions about the power and authority of States relative to the United Nations Security Council to set policy preferences and configure legal obligations contribute significantly to this trajectory. In this guide for States, we present a framework to reconfigure relations between these core commitments by assessing the counterterrorism architecture through the lens of impartial humanitarianism. We aim in particular to provide an evidence base and analytical frame for States to better grasp key legal and policy issues related to upholding respect for principled humanitarian action in connection with carrying out the Security Council’s counterterrorism decisions. We do so because the lack of knowledge regarding interpretation and implementation of counterterrorism resolutions matters for the coherence, integrity, and comprehensiveness of humanitarian policymaking and protection of the humanitarian imperative. In addition to analyzing foundational concerns and evaluating discernible behaviors and attitudes, we identify avenues that States may take to help achieve pro-humanitarian objectives. We also endeavor to help disseminate indications of, and catalyze, States’ legally relevant positions and practices on these issues. In section 1, we introduce the guide’s impetus, objectives, target audience, and structure. We also describe the methods that we relied on and articulate definitions for key terms. In section 2, we introduce key legal actors, sources of law, and the notion of international legal responsibility, as well as the relations between international and national law. Notably, Security Council resolutions require incorporation into national law in order to become effective and enforceable by internal administrative and judicial authorities. In section 3, we explain international legal rules relevant to advancing the humanitarian imperative and upholding respect for principled humanitarian action, and we sketch the corresponding roles of humanitarian policies, programs, and donor practices. International humanitarian law (IHL) seeks to ensure — for people who are not, or are no longer, actively participating in hostilities and whose needs are unmet — certain essential supplies, as well as medical care and attention for the wounded and sick. States have also developed and implemented a range of humanitarian policy frameworks to administer principled humanitarian action effectively. Further, States may rely on a number of channels to hold other international actors to account for safeguarding the humanitarian imperative. In section 4, we set out key theoretical and doctrinal elements related to accepting and carrying out the Security Council’s decisions. Decisions of the Security Council may contain (binding) obligations, (non-binding) recommendations, or a combination of the two. UN members are obliged to carry out the Council’s decisions. Member States retain considerable interpretive latitude to implement counterterrorism resolutions. With respect to advancing the humanitarian imperative, we argue that IHL should represent a legal floor for interpreting the Security Council’s decisions and recommendations. In section 5, we describe relevant conduct of the Security Council and States. Under the Resolution 1267 (1999), Resolution 1989 (2011), and Resolution 2253 (2015) line of resolutions, the Security Council has established targeted sanctions as counterterrorism measures. Under the Resolution 1373 (2001) line of resolutions, the Security Council has adopted quasi-“legislative” requirements for how States must counter terrorism in their national systems. Implementation of these sets of resolutions may adversely affect principled humanitarian action in several ways. Meanwhile, for its part, the Security Council has sought to restrict the margin of appreciation of States to determine how to implement these decisions. Yet international law does not demand that these resolutions be interpreted and implemented at the national level by elevating security rationales over policy preferences for principled humanitarian action. Indeed, not least where other fields of international law, such as IHL, may be implicated, States retain significant discretion to interpret and implement these counterterrorism decisions in a manner that advances the humanitarian imperative. States have espoused a range of views on the intersections between safeguarding principled humanitarian action and countering terrorism. Some voice robust support for such action in relation to counterterrorism contexts. A handful call for a “balancing” of the concerns. And some frame respect for the humanitarian imperative in terms of not contradicting counterterrorism objectives. In terms of measures, we identify five categories of potentially relevant national counterterrorism approaches: measures to prevent and suppress support to the people and entities involved in terrorist acts; actions to implement targeted sanctions; measures to prevent and suppress the financing of terrorism; measures to prohibit or restrict terrorism-related travel; and measures that criminalize or impede medical care. Further, through a number of “control dials” that we detect, States calibrate the functional relations between respect for principled humanitarian action and countering terrorism. The bulk of the identified counterterrorism measures and related “control dials” suggests that, to date, States have by and large not prioritized advancing respect for the humanitarian imperative at the national level. Finally, in section 6, we conclude by enumerating core questions that a State may answer to help formulate and instantiate its values, policy commitments, and legal positions to secure respect for principled humanitarian action in relation to counterterrorism contexts.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії