Статті в журналах з теми "Data security and protection"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Data security and protection".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Carey, Peter, and David Berry. "DATA PROTECTION — SECURITY." Computer Law & Security Review 18, no. 2 (March 2002): 112–13. http://dx.doi.org/10.1016/s0267-3649(02)03010-8.
Повний текст джерелаBegum, Shameena, V. Ratna Vasuki, and K. V. V. Srinivas K.V.V.Srinivas. "Data Security and Protection in Cloud Computing." International Journal of Scientific Research 1, no. 2 (June 1, 2012): 31–34. http://dx.doi.org/10.15373/22778179/jul2012/9.
Повний текст джерелаMALIK, MAREK. "Data Protection and Security." Pacing and Clinical Electrophysiology 17, no. 2 (February 1994): 240–41. http://dx.doi.org/10.1111/j.1540-8159.1994.tb01376.x.
Повний текст джерелаA. J., Geetha. "Data Security and Protection." Indian Journal of Computer Science 8, no. 5 (October 31, 2023): 38. http://dx.doi.org/10.17010/ijcs/2023/v8/i5/173323.
Повний текст джерелаIgnisca, Vira, and Danylo Vdovenko. "ANALYSIS OF METHODS DATA SECURITY." Information systems and technologies security, no. 1 (3-4) (2020): 52–56. http://dx.doi.org/10.17721/ists.2020.4.53-57.
Повний текст джерелаQureshi, Anique A., and Joel G. Siegel. "Information security and data protection." International Journal of Computer Applications in Technology 14, no. 1/2/3 (2001): 1. http://dx.doi.org/10.1504/ijcat.2001.000256.
Повний текст джерелаMartín del Rey, A., J. L. Hernández Pastora, and G. Rodríguez Sánchez. "3D medical data security protection." Expert Systems with Applications 54 (July 2016): 379–86. http://dx.doi.org/10.1016/j.eswa.2016.02.001.
Повний текст джерелаHighland, Harold Joseph. "Microcomputer security: Data protection techniques." Computers & Security 4, no. 2 (June 1985): 123–34. http://dx.doi.org/10.1016/0167-4048(85)90016-1.
Повний текст джерелаAtri, Preyaa. "Enhancing Big Data Security through Comprehensive Data Protection Measures: A Focus on Securing Data at Rest and In-Transit." International Journal of Computing and Engineering 5, no. 4 (May 24, 2024): 44–55. http://dx.doi.org/10.47941/ijce.1920.
Повний текст джерелаShahul Ikram, Nur Adlin Hanisah. "DATA BREACHES EXIT STRATEGY: A COMPARATIVE ANALYSIS OF DATA PRIVACY LAWS." Malaysian Journal of Syariah and Law 12, no. 1 (April 15, 2024): 135–47. http://dx.doi.org/10.33102/mjsl.vol12no1.458.
Повний текст джерелаReddy Gopireddy, Ravindar, and Sandhya Rani Koppanathi. "Post - Breach Data Security: Strategies for Recovery and Future Protection." International Journal of Science and Research (IJSR) 7, no. 12 (December 5, 2018): 1609–14. http://dx.doi.org/10.21275/sr24731204000.
Повний текст джерелаFang, Ze Nan, Jian Ming Zhou, and Jing Song Zhang. "A Practical Data Security Protection Technology." Advanced Materials Research 846-847 (November 2013): 1620–23. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1620.
Повний текст джерелаAnita, Dombale. "Data Rakshak." International Journal for Research in Applied Science and Engineering Technology 11, no. 11 (November 30, 2023): 1978–85. http://dx.doi.org/10.22214/ijraset.2023.56957.
Повний текст джерелаBolshakov, A. S., A. I. Zhila, and A. V. Osin. "FUZZY LOGIC DATA PROTECTION MANAGEMENT." H&ES Research 13, no. 4 (2021): 37–47. http://dx.doi.org/10.36724/2409-5419-2021-13-4-37-47.
Повний текст джерелаGama, Cruz. "Data protection and personal data protection." Brazilian Journal of Clinical Medicine and Review 1, Suppl.1 (April 15, 2023): 18. http://dx.doi.org/10.52600/2965-0968.bjcmr.2023.1.suppl.1.18.
Повний текст джерелаLivshitz, Ilya. "Assessment of the Impact of General Data Protection Regulation on Enterprise Security in the Russian Federation." Voprosy kiberbezopasnosti, no. 4(38) (2020): 66–75. http://dx.doi.org/10.21681/2311-3456-2020-04-66-75.
Повний текст джерелаSwanzy, Percy Nathan, Arnold Mashud Abukari, and Edward Danso Ansong. "Data Security Framework for Protecting Data in Transit and Data at Rest in the Cloud." Current Journal of Applied Science and Technology 43, no. 6 (May 13, 2024): 61–77. http://dx.doi.org/10.9734/cjast/2024/v43i64387.
Повний текст джерелаViana da Silva, Marcos Vinicius, Erick Da Luz Scherf, and Jose Everton Da Silva. "THE RIGHT TO DATA PROTECTION VERSUS “SECURITY”." Revista Direitos Culturais 15, no. 36 (April 27, 2020): 209–32. http://dx.doi.org/10.20912/rdc.v15i36.18.
Повний текст джерелаPounder, Chris. "Security and the new Data Protection law." Computers & Security 17, no. 2 (January 1998): 124–28. http://dx.doi.org/10.1016/s0167-4048(97)81981-5.
Повний текст джерелаSaxby, Stephen. "Data protection act 1984: Security and accuracy of data." Computer Law & Security Review 2, no. 2 (July 1986): 14. http://dx.doi.org/10.1016/0267-3649(86)90065-8.
Повний текст джерелаWilliamson, J. D. "Data protection and the clinician: guidelines on data security." BMJ 291, no. 6507 (November 23, 1985): 1516–19. http://dx.doi.org/10.1136/bmj.291.6507.1516.
Повний текст джерелаReddy Gopireddy, Ravindar. "AI-Powered Security in Cloud Environments: Enhancing Data Protection and Threat Detection." International Journal of Science and Research (IJSR) 10, no. 11 (November 5, 2021): 1568–72. http://dx.doi.org/10.21275/sr24731135001.
Повний текст джерелаAhmed, Musa Midila, and Aishatu Musa Ahmed. "Citizens’ Data Protection in E-government System." International Journal of Innovative Computing 13, no. 2 (November 24, 2023): 1–9. http://dx.doi.org/10.11113/ijic.v13n2.389.
Повний текст джерелаNugraha, Arya Adhi, and Asyahri Hadi Nasyuha. "Integrating ISO 27001 and Indonesia's Personal Data Protection Law for Data Protection Requirement Model." Journal of Information Systems and Informatics 6, no. 2 (June 14, 2024): 1052–69. http://dx.doi.org/10.51519/journalisi.v6i2.754.
Повний текст джерелаKnowen, Cosmas, Lamek Ronoh, and Anne Mugalavai. "Prioritizing Personal Data Protection in Insurance Organizations." Journal of Information Security and Cybercrimes Research 6, no. 1 (June 22, 2023): 40–56. http://dx.doi.org/10.26735/enpo6596.
Повний текст джерелаHidayatulloh, Hidayatulloh. "HUMAN RIGHTS AND DATA PROTECTION IN THE DIGITAL FINANCIAL ECOSYSTEM." JHR (Jurnal Hukum Replik) 11, no. 1 (April 1, 2023): 12. http://dx.doi.org/10.31000/jhr.v11i1.8110.
Повний текст джерелаAl-Museelem, Waleed, and Chun Lin Li. "Data Security and Data Privacy in Cloud Computing." Advanced Materials Research 905 (April 2014): 687–92. http://dx.doi.org/10.4028/www.scientific.net/amr.905.687.
Повний текст джерелаIstván, Zsolt, Soujanya Ponnapalli, and Vijay Chidambaram. "Software-defined data protection." Proceedings of the VLDB Endowment 14, no. 7 (March 2021): 1167–74. http://dx.doi.org/10.14778/3450980.3450986.
Повний текст джерелаJohn, Nicolas, and Maximilian Wellmann. "Data security management and data protection for video conferencing software." International Cybersecurity Law Review 1, no. 1-2 (October 2020): 39–50. http://dx.doi.org/10.1365/s43439-020-00013-4.
Повний текст джерелаDai, Xue Bing, Zhao Jing Wang, and Yan Zhang. "Data Security and Privacy Protection of Cloud Computing." Advanced Materials Research 846-847 (November 2013): 1570–73. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1570.
Повний текст джерелаCorones, Stephen, and Juliet Davis. "Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions." Federal Law Review 45, no. 1 (March 2017): 65–95. http://dx.doi.org/10.1177/0067205x1704500104.
Повний текст джерелаBogosavljević, Mirjana. "Protection of Personal Data in Documents: Application of the Law on Personal Data Protection in Serbia and Abroad." Moderna arhivistika 2, no. 1 (May 1, 2019): 106–15. http://dx.doi.org/10.54356/ma/2019/ghkv7413.
Повний текст джерелаГулов, Владимир Павлович, Виктор Анатольевич Хвостов, Владимир Петрович Косолапов, and Галина Владимировна Сыч. "PERSONAL DATA PROTECTION FEATURES IN MOBILE MEDICINE." СИСТЕМНЫЙ АНАЛИЗ И УПРАВЛЕНИЕ В БИОМЕДИЦИНСКИХ СИСТЕМАХ, no. 3() (September 30, 2020): 171–76. http://dx.doi.org/10.36622/vstu.2020.19.3.022.
Повний текст джерелаZhurakovskyi, Bohdan, and Oleksiy Nedashkivskiy. "SYSTEM TO COLLECT INFORMATION WHEN TRANSFERRING DATA TO RADIO CHANNELS." Cybersecurity: Education, Science, Technique 3, no. 15 (2022): 6–34. http://dx.doi.org/10.28925/2663-4023.2022.15.634.
Повний текст джерелаAdhikari, Sanjaya. "Necessity of Big Data Security and its Relation to National Security." Unity Journal 5, no. 1 (March 25, 2024): 1–14. http://dx.doi.org/10.3126/unityj.v5i1.63137.
Повний текст джерела石, 飞杰. "Citizen Data Security Protection from the Perspective of “DiDi” Security Review." Open Journal of Legal Science 09, no. 06 (2021): 663–69. http://dx.doi.org/10.12677/ojls.2021.96095.
Повний текст джерелаAmarendra Reddy, P., Sheikh Gouse, and P. Bhaskara Reddy. "Security and Privacy Mechanisms of Big Data." International Journal of Engineering & Technology 7, no. 4.39 (December 13, 2018): 730–33. http://dx.doi.org/10.14419/ijet.v7i4.39.26264.
Повний текст джерелаMichelberger, Pál, and Ágnes Kemendi. "DATA, INFORMATION AND IT SECURITY - SOFTWARE SUPPORT FOR SECURITY ACTIVITIES." Problems of Management in the 21st Century 15, no. 2 (December 10, 2020): 108–24. http://dx.doi.org/10.33225/pmc/20.15.108.
Повний текст джерелаQin, Peng, Wei Li, and Ke Ding. "A Big Data Security Architecture Based on Blockchain and Trusted Data Cloud Center." Wireless Communications and Mobile Computing 2022 (August 31, 2022): 1–8. http://dx.doi.org/10.1155/2022/7272405.
Повний текст джерелаLiu, Xiangguo, Huijun Du, Zhonglong Wang, Jianfei Chen, Jia Peng, and Yue Liu. "Application of Data Security Protection in Smart Grid Based on Computer Electronic Technology." Journal of Physics: Conference Series 2774, no. 1 (July 1, 2024): 012024. http://dx.doi.org/10.1088/1742-6596/2774/1/012024.
Повний текст джерелаDahlian Persadha, Pratama, Loso Judijanto, Melly Susanti, and Heru Kreshna Reza. "DATA PRIVACY AND SECURITY PROTECTION STRATEGIES IN LIBRARY ELECTRONIC RESOURCES MANAGEMENT." Holistik Analisis Nexus 1, no. 7 (July 6, 2024): 115–22. http://dx.doi.org/10.62504/nexus742.
Повний текст джерелаAkhramovych, Volodymyr. "DATA PROTECTION AT THE STAGES OF ITS FUNCTIONING." Cybersecurity: Education, Science, Technique 1, no. 21 (2023): 149–61. http://dx.doi.org/10.28925/2663-4023.2023.21.149161.
Повний текст джерелаMoreira da Veiga Pessoa, Bruno. "GENERAL DATA PROTECTION LAW." Revista Gênero e Interdisciplinaridade 4, no. 02 (May 5, 2023): 250–69. http://dx.doi.org/10.51249/gei.v4i02.1327.
Повний текст джерелаDu, Min, Guochao Hu, and Xu Zhang. "Research and Construction of Government Data Security System Based on Hierarchical Protection." Advances in Engineering Technology Research 7, no. 1 (November 7, 2023): 623. http://dx.doi.org/10.56028/aetr.7.1.623.2023.
Повний текст джерелаK.A., Chicherov, and Norkina A. N. "Confidential Data Protection as a Means of Ensuring Information Security." KnE Social Sciences 3, no. 2 (February 15, 2018): 85. http://dx.doi.org/10.18502/kss.v3i2.1528.
Повний текст джерелаKravchuk, V. "Foreign experience of personal data protection in social networks." Uzhhorod National University Herald. Series: Law 2, no. 78 (August 31, 2023): 49–53. http://dx.doi.org/10.24144/2307-3322.2023.78.2.7.
Повний текст джерелаParraguez Kobek, Luisa, and Erick Caldera. "Cyber Security and Habeas Data: The Latin American response to information security and data protection." OASIS, no. 24 (November 3, 2016): 109. http://dx.doi.org/10.18601/16577558.n24.07.
Повний текст джерелаSingh, Gurpreet, and Susmita Mishra. "CLOUD COMPUTING SECURITY AND DATA PROTECTION: A REVIEW." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 7 (May 14, 2015): 5887–94. http://dx.doi.org/10.24297/ijct.v14i7.1893.
Повний текст джерелаYu, Yang. "Encryption Technology for Computer Network Data Security Protection." Security and Communication Networks 2022 (August 22, 2022): 1–9. http://dx.doi.org/10.1155/2022/1789222.
Повний текст джерелаGolubova, Anguelina, and Vera Shumilina. "INFORMATION SECURITY AND DATA PROTECTION IN MODERN SOCIETY." Science & World, no. 2 (June 10, 2022): 6–10. http://dx.doi.org/10.26526/2307-9401-2022-2-6-10.
Повний текст джерела