Found: 1742
Select item for more details and to access through your institution.
Privacy in Community Pharmacies in Saudi Arabia: A Cross-Sectional Study.
- Published in:
- Healthcare (2227-9032), 2024, v. 12, n. 17, p. 1740, doi. 10.3390/healthcare12171740
- By:
- Publication type:
- Article
EXPLORING THE SECURITY OF CLOUD COMPUTING: AN ANALYSIS OF THREATS AND COUNTERMEASURES FOR CLOUD COMPUTING IN THE ERA OF DIGITAL TRANSFORMATION.
- Published in:
- Knowledge: International Journal, 2024, v. 65, n. 3, p. 305
- By:
- Publication type:
- Article
Enhancing Industrial Robot Arms Data Security with a Hybrid Encryption Approach.
- Published in:
- Sakarya University Journal of Science (SAUJS) / Sakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2024, v. 28, n. 4, p. 756, doi. 10.16984/saufenbilder.1440949
- By:
- Publication type:
- Article
A review on smartphone usage data for user identification and user profiling.
- Published in:
- Communications in Science & Technology, 2021, v. 6, n. 1, p. 25, doi. 10.21924/cst.6.1.2021.363
- By:
- Publication type:
- Article
70 YEARS OF EU LAW: A DISCUSSION ON THE PROTECTION OF PERSONAL DATA IN A RAPIDLY CHANGING TECHNOLOGICAL ENVIRONMENT.
- Published in:
- European Review of Public Law, 2024, v. 36, n. 1, p. 297
- By:
- Publication type:
- Article
CONSUMER DATA PROTECTION IN ELECTRONIC TRANSACTION PRACTICES IN E-COMMERCE.
- Published in:
- Journal of Economics, Technology & Business / Jurnal Ekonomi Teknologi & Bisnis (JETBIS), 2024, v. 3, n. 8, p. 1044
- By:
- Publication type:
- Article
Human connection is vital to mental healthcare and digitalisation.
- Published in:
- Mental Health Practice, 2024, v. 27, n. 5, p. 5, doi. 10.7748/mhp.27.5.5.s1
- By:
- Publication type:
- Article
Optimizing Data Security in Computer-Assisted Test Applications Through the Advanced Encryption Standard 256-Bit Cipher Block Chaining.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 8, p. 163, doi. 10.14569/ijacsa.2024.0150817
- By:
- Publication type:
- Article
Modelling user notification scenarios in privacy policies.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00234-8
- By:
- Publication type:
- Article
Zero-Day Delivery: Hacking Risks and the Use of Machine Learning for Military Logistics.
- Published in:
- Journal of National Security Law & Policy, 2024, v. 14, n. 3, p. 399
- By:
- Publication type:
- Article
DOES SHARING MAKE MY DATA MORE INSECURE? AN EMPIRICAL STUDY ON HEALTH INFORMATION EXCHANGE AND DATA BREACHES.
- Published in:
- MIS Quarterly, 2024, v. 48, n. 3, p. 873, doi. 10.25300/MISQ/2023/17479
- By:
- Publication type:
- Article
Review of Smart-Home Security Using the Internet of Things.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 16, p. 3343, doi. 10.3390/electronics13163343
- By:
- Publication type:
- Article
A SOUTH AFRICAN PERSPECTIVE TO MEDICAL LAW AND ETHICS IN NURSING: GETTING BASIC PRINCIPLES RIGHT.
- Published in:
- Africa Journal of Nursing & Midwifery, 2015, v. 17, n. 2, p. 118, doi. 10.25159/2520-5293/378
- By:
- Publication type:
- Article
THE ETHICAL LAWYER AND THE TAO OF TECHNOLOGY.
- Published in:
- Creighton Law Review, 2015, v. 48, n. 4, p. 709
- By:
- Publication type:
- Article
A designated crisis response team is best for managing board's crisis management duties.
- Published in:
- Board Leadership, 2024, v. 2024, n. 194, p. 8, doi. 10.1002/bl.30267
- By:
- Publication type:
- Article
Towards Developing Privacy-Preserved Data Security Approach (PP-DSA) in Cloud Computing Environment.
- Published in:
- Computer Systems Science & Engineering, 2023, v. 44, n. 3, p. 1881, doi. 10.32604/csse.2023.026690
- By:
- Publication type:
- Article
A Usability Management Framework for Securing Healthcare Information System.
- Published in:
- Computer Systems Science & Engineering, 2022, v. 42, n. 3, p. 1015, doi. 10.32604/csse.2022.021564
- By:
- Publication type:
- Article
Organizational Data Breach: Building Conscious Care Behavior in Incident Response.
- Published in:
- Computer Systems Science & Engineering, 2022, v. 40, n. 2, p. 505, doi. 10.32604/csse.2022.018468
- By:
- Publication type:
- Article
Cyberproofing the Future: Five ways cyberchiefs can support emerging technologies in the coming decade.
- Published in:
- Government Technology, 2019, v. 32, n. 7, p. 50
- By:
- Publication type:
- Article
3 Key Decisions for Security Leaders: A cyberchief's success rides on how they address a few crucial questions.
- Published in:
- Government Technology, 2019, v. 32, n. 3, p. 44
- By:
- Publication type:
- Article
THE WEAKEST LINK: Guarding against the latest cyberthreats requires an aggressive training program. But can the human element ever be completely overcome?
- Published in:
- Government Technology, 2018, v. 31, n. 7, p. 16
- By:
- Publication type:
- Article
Tech/bytes.
- Published in:
- Government Technology, 2018, v. 31, n. 4, p. 8
- Publication type:
- Article
State Credit Freeze Laws Need a Reboot.
- Published in:
- Government Technology, 2017, v. 30, n. 8, p. 51
- By:
- Publication type:
- Article
Small Towns, Big Risks: Small to mid-sized local governments struggle with cybersecurity. Here's how some are confronting the threat.
- Published in:
- Government Technology, 2017, v. 30, n. 7, p. 34
- By:
- Publication type:
- Article
Beyond the Cyberheadlines: We break down the biggest cyberevents from the past year.
- Published in:
- Government Technology, 2017, v. 30, n. 7, p. 40
- By:
- Publication type:
- Article
tech/bytes.
- Published in:
- Government Technology, 2017, v. 30, n. 7, p. 8
- Publication type:
- Article
Risk Factors.
- Published in:
- Government Technology, 2016, v. 29, n. 4, p. 48
- By:
- Publication type:
- Article
RISE OF THE PRIVACY OFFICER.
- Published in:
- Government Technology, 2014, v. 27, n. 5, p. 12
- By:
- Publication type:
- Article
Applying the Lessons from the Equifax Cybersecurity Incident to Build a Better Defense.
- Published in:
- MIS Quarterly Executive, 2021, v. 20, n. 2, p. 109, doi. 10.17705/2msqe.00044
- By:
- Publication type:
- Article
Maximizing Employee Compliance with Cybersecurity Policies.
- Published in:
- MIS Quarterly Executive, 2020, v. 19, n. 3, p. 183, doi. 10.17705/2msqe.00032
- By:
- Publication type:
- Article
Challenges and Best Practices in Information Security Management.
- Published in:
- MIS Quarterly Executive, 2018, v. 17, n. 3, p. 237
- By:
- Publication type:
- Article
Business judgment rule en Colombia: mirada desde el análisis económico del derecho.
- Published in:
- Revista de Derecho, 2023, n. 59, p. 172, doi. 10.14482/dere.59.519.001
- By:
- Publication type:
- Article
SensDroid: Analysis for Malicious Activity Risk of Android Application.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 24, p. 35713, doi. 10.1007/s11042-019-07899-1
- By:
- Publication type:
- Article
Security risk situation quantification method based on threat prediction for multimedia communication network.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 16, p. 21693, doi. 10.1007/s11042-017-5602-0
- By:
- Publication type:
- Article
Signature-based three-factor authenticated key exchange for internet of things applications.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 14, p. 18355, doi. 10.1007/s11042-017-5560-6
- By:
- Publication type:
- Article
A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 14, p. 18043, doi. 10.1007/s11042-017-4444-0
- By:
- Publication type:
- Article
Providing security and privacy to huge and vulnerable songs repository using visual cryptography.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 9, p. 11101, doi. 10.1007/s11042-017-5240-6
- By:
- Publication type:
- Article
An encrypted deduplication scheme based on files diversity.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 15, p. 22860, doi. 10.1007/s11227-024-06325-0
- By:
- Publication type:
- Article
DL-HIDS: deep learning-based host intrusion detection system using system calls-to-image for containerized cloud environment.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 9, p. 12218, doi. 10.1007/s11227-024-05895-3
- By:
- Publication type:
- Article
A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 6, p. 7955, doi. 10.1007/s11227-023-05735-w
- By:
- Publication type:
- Article
A lightweight blockchain-based framework for medical cyber-physical system.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 11, p. 12013, doi. 10.1007/s11227-023-05133-2
- By:
- Publication type:
- Article
An efficient method for privacy-preserving trajectory data publishing based on data partitioning.
- Published in:
- Journal of Supercomputing, 2020, v. 76, n. 7, p. 5276, doi. 10.1007/s11227-019-02906-6
- By:
- Publication type:
- Article
Secure data processing for IoT middleware systems.
- Published in:
- Journal of Supercomputing, 2019, v. 75, n. 8, p. 4684, doi. 10.1007/s11227-018-2686-x
- By:
- Publication type:
- Article
Next-generation cybersecurity through a blockchain-enabled federated cloud framework.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 10, p. 5099, doi. 10.1007/s11227-018-2385-7
- By:
- Publication type:
- Article
Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions.
- Published in:
- Journal of Supercomputing, 2017, v. 73, n. 10, p. 4275, doi. 10.1007/s11227-017-2009-7
- By:
- Publication type:
- Article
A quantitative measure of the information leaked from queries to search engines and a scheme to reduce it.
- Published in:
- Journal of Supercomputing, 2017, v. 73, n. 6, p. 2494, doi. 10.1007/s11227-016-1942-1
- By:
- Publication type:
- Article
Analisis Yuridis Peristiwa Kebocoran Data Daftar Pemilih Tetap Dalam Penyelenggaraan Pemilihan Umum Tahun 2024.
- Published in:
- Jurnal Ilmu Hukum, Humaniora dan Politik (JIHHP), 2024, v. 4, n. 4, p. 958
- By:
- Publication type:
- Article
Should We Govern Geoengineering like Nuclear Weapons or the Internet?
- Published in:
- Georgetown Journal of International Affairs (Johns Hopkins University Press), 2021, v. 22, n. 1, p. 112, doi. 10.1353/gia.2021.0001
- By:
- Publication type:
- Article
ZERO TRUST, CYBER RESILIENCY, AND MANEUVER WARFARE FROM THE LEGENDARY COL. JOHN BOYD.
- Published in:
- Defense Acquisition, 2023, v. 52, n. 6, p. 36
- By:
- Publication type:
- Article
FORENSE DIGITAL APLICADA AO COMBATE DE CRIMES CIBERNÉTICOS: UMA REVISÃO.
- Published in:
- Revista Foco (Interdisciplinary Studies Journal), 2024, v. 17, n. 7, p. 1, doi. 10.54751/revistafoco.v17n7-152
- By:
- Publication type:
- Article