Works matching DE "DATA security failures"
Results: 2008
The role of insurers in shaping international cyber-security norms about cyber-war.
- Published in:
- Contemporary Security Policy, 2024, v. 45, n. 1, p. 141, doi. 10.1080/13523260.2023.2279033
- By:
- Publication type:
- Article
Northern Ireland 2023.
- Published in:
- Irish Political Studies, 2024, v. 39, n. 3, p. 389, doi. 10.1080/07907184.2024.2384807
- Publication type:
- Article
Pay No Attention to That Man behind the Curtain: An Ethical Analysis of the Monetization of Menstruation App Data.
- Published in:
- IJFAB: International Journal of Feminist Approaches to Bioethics, 2021, v. 14, n. 2, p. 144, doi. 10.3138/ijfab-2021-03-22
- By:
- Publication type:
- Article
The Role of Network Centralization in Shaping Digital Sovereignty: An Analysis Under the DNS Lens.
- Published in:
- International Journal of Network Management, 2025, v. 35, n. 1, p. 1, doi. 10.1002/nem.2309
- By:
- Publication type:
- Article
Human Services Organizations and the Responsible Integration of AI: Considering Ethics and Contextualizing Risk(s).
- Published in:
- Journal of Technology in Human Services, 2025, v. 43, n. 1, p. 20, doi. 10.1080/15228835.2025.2457045
- By:
- Publication type:
- Article
Technology Maintenance: Older Adults Using Old Software on Old Computers.
- Published in:
- Journal of Technology in Human Services, 2025, v. 43, n. 1, p. 1, doi. 10.1080/15228835.2025.2451337
- By:
- Publication type:
- Article
Optimizing healthcare data quality with optimal features driven mutual entropy gain.
- Published in:
- Expert Systems, 2025, v. 42, n. 2, p. 1, doi. 10.1111/exsy.13737
- By:
- Publication type:
- Article
Insights on How Data Privacy Officers Can Build a Corporate Privacy Culture.
- Published in:
- MIS Quarterly Executive, 2025, v. 24, n. 1, p. 79
- By:
- Publication type:
- Article
DaC-GANSAEBF: Divide and Conquer-Generative Adversarial Network—Squeeze and Excitation-Based Framework for Spam Email Identification.
- Published in:
- Computer Modeling in Engineering & Sciences (CMES), 2025, v. 142, n. 3, p. 3181, doi. 10.32604/cmes.2025.061608
- By:
- Publication type:
- Article
PERFORMANCE EVALUATION AND FORENSIC EXAMINATION OF COMMON FINGERPRINT SPOOFING MATERIALS.
- Published in:
- Problems of Forensic Sciences / Z Zagadnień Nauk Sądowych, 2024, v. 138, p. 123, doi. 10.4467/12307483PFS.24.008.20181
- By:
- Publication type:
- Article
Verifikasi Quick Response Code dengan Vigenere Cipher dan Multi-Factor RSA.
- Published in:
- Techno.com, 2025, v. 24, n. 1, p. 240, doi. 10.62411/tc.v24i1.12192
- By:
- Publication type:
- Article
"Key" Tam: Giving Teeth to Federal Data Security Enforcement.
- Published in:
- Minnesota Law Review, 2024, v. 109, n. 2, p. 1003
- By:
- Publication type:
- Article
A new privacy framework for the management of chronic diseases via mHealth in a post-Covid-19 world.
- Published in:
- Journal of Public Health: From Theory to Practice (2198-1833), 2022, v. 30, n. 1, p. 37, doi. 10.1007/s10389-021-01608-9
- By:
- Publication type:
- Article
УПРАВЛІННЯ РИЗИКАМИ НА РІЗНИХ ЕТАПАХ ЖИТТЄВОГО ЦИКЛУ РОЗРОБКИ ІТ-ПРОЄКТІВ.
- Published in:
- Scientific Proceedings of Ostroh Academy National University Series, Economics, 2024, v. 63, n. 35, p. 71, doi. 10.25264/2311-5149-2024-35(63)-71-78
- By:
- Publication type:
- Article
ALL HANDS ON DECK: WHY GOVERNMENT COLLABORATION IS NECESSARY TO ENSURE PROPER CYBERSECURITY STANDARDS AT SMALL- AND MEDIUM-SIZED LAW FIRMS.
- Published in:
- Journal of the Legal Profession, 2024, v. 49, n. 1, p. 45
- By:
- Publication type:
- Article
Breach of medical confidentiality.
- Published in:
- Medico-Legal Journal, 2025, v. 93, n. 1, p. 14, doi. 10.1177/00258172241274444
- By:
- Publication type:
- Article
Environmental, Social, and Governance Committees and Information Technology Outcomes.
- Published in:
- Journal of Information Systems, 2025, v. 39, n. 1, p. 1, doi. 10.2308/ISYS-2024-050
- By:
- Publication type:
- Article
blockHealthSecure: Integrating Blockchain and Cybersecurity in Post-Pandemic Healthcare Systems.
- Published in:
- Information (2078-2489), 2025, v. 16, n. 2, p. 133, doi. 10.3390/info16020133
- By:
- Publication type:
- Article
Security and Privacy in Physical–Digital Environments: Trends and Opportunities.
- Published in:
- Future Internet, 2025, v. 17, n. 2, p. 83, doi. 10.3390/fi17020083
- By:
- Publication type:
- Article
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security.
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 2, p. 2637, doi. 10.32604/cmc.2025.058717
- By:
- Publication type:
- Article
ENSEMBLE STRATEGY TO MITIGATE ADVERSARIAL ATTACK IN FEDERATED LEARNING.
- Published in:
- ICTACT Journal on Soft Computing, 2025, v. 15, n. 3, p. 3646, doi. 10.21917/ijsc.2025.0506
- By:
- Publication type:
- Article
Enhancing Banking Transaction Security with Fractal-Based Image Steganography Using Fibonacci Sequences and Discrete Wavelet Transform.
- Published in:
- Fractal & Fractional, 2025, v. 9, n. 2, p. 95, doi. 10.3390/fractalfract9020095
- By:
- Publication type:
- Article
HUMAN CAPITAL ACQUISITION IN RESPONSE TO DATA BREACHES.
- Published in:
- MIS Quarterly, 2025, v. 49, n. 1, p. 367
- By:
- Publication type:
- Article
HOW MERGERS AND ACQUISITIONS INCREASE DATA BREACHES: A COMPLEXITY PERSPECTIVE.
- Published in:
- MIS Quarterly, 2025, v. 49, n. 1, p. 211
- By:
- Publication type:
- Article
The Shari'a Approach to Contemporary Problems of Mass Surveillance.
- Published in:
- Muslim World Journal of Human Rights, 2020, v. 17, n. 1, p. 1, doi. 10.1515/mwjhr-2020-0007
- By:
- Publication type:
- Article
Cow Vigilantism and India's Evolving Human Rights Framework.
- Published in:
- Muslim World Journal of Human Rights, 2020, v. 17, n. 1, p. 45, doi. 10.1515/mwjhr-2019-0019
- By:
- Publication type:
- Article
THE PARIS AGREEMENT'S APPROACH TOWARD CLIMATE CHANGE LOSS AND DAMAGE.
- Published in:
- World Affairs, 2023, v. 186, n. 1, p. 46, doi. 10.1177/00438200221147936
- By:
- Publication type:
- Article
Are Conditional Sentence Orders Used Differently for Indigenous Offenders? A Comparison of Sentences and Outcomes in Canada.
- Published in:
- Canadian Journal of Criminology & Criminal Justice, 2020, v. 62, n. 4, p. 1, doi. 10.3138/cjccj.2019-0044
- By:
- Publication type:
- Article
ACCEPT ALL COOKIES: OPTING-IN TO A COMPREHENSIVE FEDERAL DATA PRIVACY FRAMEWORK AND OPTING-OUT OF A DISPARATE STATE REGULATORY REGIME.
- Published in:
- Villanova Law Review, 2023, v. 68, n. 3, p. 511
- By:
- Publication type:
- Article
Standing up to Hackers: Article III Standing for Victims of Data Breaches.
- Published in:
- University of Miami Law Review, 2023, v. 77, n. 2, p. 295
- By:
- Publication type:
- Article
The People's Republic of China's Cyber Coercion: Taiwan, Hong Kong, and the South China Sea.
- Published in:
- Issues & Studies, 2020, v. 56, n. 03, p. N.PAG, doi. 10.1142/S1013251120400135
- By:
- Publication type:
- Article
A designated crisis response team is best for managing board's crisis management duties.
- Published in:
- Board Leadership, 2024, v. 2024, n. 194, p. 8, doi. 10.1002/bl.30267
- By:
- Publication type:
- Article
Applying the Lessons from the Equifax Cybersecurity Incident to Build a Better Defense.
- Published in:
- MIS Quarterly Executive, 2021, v. 20, n. 2, p. 109, doi. 10.17705/2msqe.00044
- By:
- Publication type:
- Article
Maximizing Employee Compliance with Cybersecurity Policies.
- Published in:
- MIS Quarterly Executive, 2020, v. 19, n. 3, p. 183, doi. 10.17705/2msqe.00032
- By:
- Publication type:
- Article
Challenges and Best Practices in Information Security Management.
- Published in:
- MIS Quarterly Executive, 2018, v. 17, n. 3, p. 237
- By:
- Publication type:
- Article
A comprehensive analysis of threat vectors in software-defined networking.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 39, p. 86791, doi. 10.1007/s11042-024-19679-7
- By:
- Publication type:
- Article
Ensuring the privacy and security of IoT-medical data: a hybrid deep learning-based encryption and blockchain-enabled transmission.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 33, p. 79067, doi. 10.1007/s11042-023-18043-5
- By:
- Publication type:
- Article
Healthcare with datacare—a triangular DNA security.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 7, p. 21153, doi. 10.1007/s11042-023-16303-y
- By:
- Publication type:
- Article
Towards a fully homomorphic symmetric cipher scheme resistant to plain-text/cipher-text attacks.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 10, p. 14403, doi. 10.1007/s11042-022-12043-7
- By:
- Publication type:
- Article
A blockchain-based privacy preservation scheme in multimedia network.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 20, p. 30691, doi. 10.1007/s11042-021-10513-y
- By:
- Publication type:
- Article
Key Ethical Challenges in the European Medical Information Framework.
- Published in:
- Minds & Machines, 2019, v. 29, n. 3, p. 355, doi. 10.1007/s11023-018-9467-4
- By:
- Publication type:
- Article
Resilienz gegen IT-Angriffe an Kliniken: Ergebnisse einer Stabsrahmenübung an einem Universitätsklinikum.
- Published in:
- Die Anaesthesiologie, 2023, v. 72, n. 12, p. 852, doi. 10.1007/s00101-023-01331-y
- By:
- Publication type:
- Article
Peretas, Ketakutan, dan Kerugian: Pelanggaran Data dan Keamanan Nasional.
- Published in:
- Global Strategis, 2023, v. 17, n. 1, p. 153, doi. 10.20473/jgs.17.1.2023.153-182
- By:
- Publication type:
- Article
A trading matching model for aquatic products based on blockchain and credit mechanisms.
- Published in:
- Electronic Research Archive, 2023, v. 31, n. 11, p. 1, doi. 10.3934/mbe.2023874
- By:
- Publication type:
- Article
FedSC: A federated learning algorithm based on client-side clustering.
- Published in:
- Electronic Research Archive, 2023, v. 31, n. 9, p. 1, doi. 10.3934/era.2023266
- By:
- Publication type:
- Article
Data security in smart devices: Advancement, constraints and future recommendations.
- Published in:
- IET Networks (Wiley-Blackwell), 2023, v. 12, n. 6, p. 269, doi. 10.1049/ntw2.12091
- By:
- Publication type:
- Article
病歷與 個人資料保護.
- Published in:
- Angle Health Law Review, 2023, n. 84, p. 112, doi. 10.53106/241553062023100084009
- By:
- Publication type:
- Article
STANDING AND PROBABILISTIC INJURY.
- Published in:
- Michigan Law Review, 2024, v. 122, n. 8, p. 1557, doi. 10.36644/mlr.122.8.standing
- By:
- Publication type:
- Article
What Counts as an Apology? Exploring Stakeholder Perceptions in a Hypothetical Organizational Crisis.
- Published in:
- Management Communication Quarterly, 2018, v. 32, n. 2, p. 202, doi. 10.1177/0893318917722635
- By:
- Publication type:
- Article
Impact of Artificial Intelligence (AI) Technology in Healthcare Sector: A Critical Evaluation of Both Sides of the Coin.
- Published in:
- Clinical Pathology, 2024, p. 1, doi. 10.1177/2632010X241226887
- By:
- Publication type:
- Article