Works matching DE "DATA security failures"
Results: 2017
For-profit versus non-profit cybersecurity posture: breach types and locations in healthcare organisations.
- Published in:
- Health Information Management Journal, 2024, v. 53, n. 3, p. 198, doi. 10.1177/18333583231158886
- By:
- Publication type:
- Article
Wearable devices in healthcare: Privacy and information security issues.
- Published in:
- Health Information Management Journal, 2020, v. 49, n. 2/3, p. 150, doi. 10.1177/1833358319851684
- By:
- Publication type:
- Article
How can hospitals better protect the privacy of electronic medical records? Perspectives from staff members of health information management.
- Published in:
- Health Information Management Journal, 2017, v. 46, n. 2, p. 87, doi. 10.1177/1833358316671264
- By:
- Publication type:
- Article
National Cyber Governance Awareness Policy and Framework.
- Published in:
- International Journal of Legal Information, 2019, v. 47, n. 2, p. 70, doi. 10.1017/jli.2019.22
- By:
- Publication type:
- Article
The ransomware threat grows. How your practice can prepare: Using antivirus so ware consistently is among the steps you should take.
- Published in:
- Urology Times, 2021, v. 49, n. 8, p. 37
- By:
- Publication type:
- Article
Business/PRACTICE MATTERS. Cybercrime on the rise during COVID-19 pandemic.
- Published in:
- Urology Times, 2020, v. 48, n. 7, p. 36
- By:
- Publication type:
- Article
Cybersecurity: What you need to know to protect your practice: Threats are growing in sophistication; here's what you can do to stop them.
- Published in:
- Urology Times, 2019, v. 47, n. 6, p. 24
- By:
- Publication type:
- Article
Why you should take a risk-aware approach to cybersecurity: A compliance-focused mindset fails to adequately address threats to a practice.
- Published in:
- Urology Times, 2019, v. 47, n. 5, p. 29
- By:
- Publication type:
- Article
Are you taking steps to prevent data breaches? Training staff to recognize phishing attacks is one step you can take now.
- Published in:
- Urology Times, 2017, v. 45, n. 12, p. 24
- By:
- Publication type:
- Article
Data Security's Unjust Enrichment Theory.
- Published in:
- University of Chicago Law Review, 2020, p. 2477
- By:
- Publication type:
- Article
Looking for Waldo.
- Published in:
- Law Library Journal, 2019, v. 111, n. 4, p. 613
- By:
- Publication type:
- Article
¿PUEDE CONSTRUIRSE UN SISTEMA DE RESPONSABILIDAD PRECONTRACTUAL? ANÁLISIS DE LOS DEBERES PRECONTRACTUALES Y LAS CONSECUENCIAS JURÍDICAS DERIVADAS DE SU INFRACCIÓN.
- Published in:
- Revista Jurídica de la Universidad Autonóma de Madrid, 2024, n. 49, p. 133, doi. 10.15366/rjuam2024.49.005
- By:
- Publication type:
- Article
Analytical Techniques for Decision Making on Information Security for Big Data Breaches.
- Published in:
- International Journal of Information Technology & Decision Making, 2018, v. 17, n. 2, p. 527, doi. 10.1142/S0219622017500432
- By:
- Publication type:
- Article
Trust and The Acquisition and Use of Public Health Information.
- Published in:
- Health Care Analysis, 2022, v. 30, n. 1, p. 1, doi. 10.1007/s10728-021-00436-y
- By:
- Publication type:
- Article
Privacy-Preserving Certificateless Cloud Auditing with Multiple Users.
- Published in:
- Wireless Personal Communications, 2019, v. 106, n. 3, p. 1161, doi. 10.1007/s11277-019-06208-1
- By:
- Publication type:
- Article
Preserving Data Privacy During Data Transfer in MANETs.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 3, p. 4063, doi. 10.1007/s11277-017-4713-2
- By:
- Publication type:
- Article
Academics should not remain silent on hacking.
- Published in:
- Nature, 2013, v. 504, n. 7480, p. 333, doi. 10.1038/504333a
- By:
- Publication type:
- Article
Akademisyenlerin Dijital Veri Güvenliği Farkındalıkları Üzerine Bir Araştırma: Malatya Örneği.
- Published in:
- Gümüshane University Journal of Social Sciences (GUSBID) / Gümüshane Üniversitesi Sosyal Bilimler Dergisi (GUSBID), 2023, v. 14, n. 2, p. 429
- By:
- Publication type:
- Article
Self-Disclosure or Burying the Evidence Dilemma: A Legal Review of the Data Breach Rules under the Turkish Personal Data Protection Law.
- Published in:
- Annales de la Faculté de Droit d'Istanbul, 2021, n. 70, p. 195, doi. 10.26650/annales.2021.70.0007
- By:
- Publication type:
- Article
Sustainability in Global Supply Chains Under the CISG.
- Published in:
- European Journal of Law Reform, 2021, v. 23, n. 3, p. 300, doi. 10.5553/EJLR/138723702021023003002
- By:
- Publication type:
- Article
Screen Watermark: A Novel Approach in Detecting Digital Criminals.
- Published in:
- Gazi Journal of Engineering Sciences (GJES) / Gazi Mühendislik Bilimleri Dergisi, 2023, v. 9, n. 3, p. 612, doi. 10.30855/gmbd.0705091
- By:
- Publication type:
- Article
ZERO TRUST, CYBER RESILIENCY, AND MANEUVER WARFARE FROM THE LEGENDARY COL. JOHN BOYD.
- Published in:
- Defense Acquisition, 2023, v. 52, n. 6, p. 36
- By:
- Publication type:
- Article
RESPONSABILIDADE CIVIL POR INCIDENTES DE SEGURANÇA E VAZAMENTO DE DADOS.
- Published in:
- Revista Foco (Interdisciplinary Studies Journal), 2024, v. 17, n. 11, p. 1, doi. 10.54751/revistafoco.v17n11-002
- By:
- Publication type:
- Article
FORENSE DIGITAL APLICADA AO COMBATE DE CRIMES CIBERNÉTICOS: UMA REVISÃO.
- Published in:
- Revista Foco (Interdisciplinary Studies Journal), 2024, v. 17, n. 7, p. 1, doi. 10.54751/revistafoco.v17n7-152
- By:
- Publication type:
- Article
EXPLORING THE SECURITY OF CLOUD COMPUTING: AN ANALYSIS OF THREATS AND COUNTERMEASURES FOR CLOUD COMPUTING IN THE ERA OF DIGITAL TRANSFORMATION.
- Published in:
- Knowledge: International Journal, 2024, v. 65, n. 3, p. 305
- By:
- Publication type:
- Article
Digital health technology-specific risks for medical malpractice liability.
- Published in:
- NPJ Digital Medicine, 2022, v. 5, n. 1, p. 1, doi. 10.1038/s41746-022-00698-3
- By:
- Publication type:
- Article
ПРАВО НА ПРИВАТНОСТ И ЗАШТИТА ЛИЧНИХ ПОДАТАКА У ДОБА ПАНДЕМИЈЕ COVID-19.
- Published in:
- Socioloski Pregled, 2020, v. 54, n. 3, p. 670, doi. 10.5937/socpreg54-27284
- By:
- Publication type:
- Article
التأثري السيرباني يف األمن القومي للدول الفاعلة (الواليات املتحدة األمريكية) امنوذج.
- Published in:
- Journal of Political Sciences, 2022, n. 64, p. 1, doi. 10.30907/jcopolicy.vi63.586
- By:
- Publication type:
- Article
العدالة الانتقالية دراسة في المفهوم والآليات
- Published in:
- Journal of Political Sciences, 2020, n. 59, p. 117
- By:
- Publication type:
- Article
CLOUD COMPUTING SECURITY AND ITS CHALLENGES.
- Published in:
- i-Manager's Journal On Cloud Computing, 2020, v. 7, n. 2, p. 20, doi. 10.26634/jcc.7.2.17965
- By:
- Publication type:
- Article
La nueva actividad pública de fomento: el «green nudge»en la actual contratación pública.
- Published in:
- Gestión y Análisis de Políticas Públicas, Nueva Época (GAPP), 2019, n. 22, p. 24, doi. 10.24965/gapp.i22.10597
- By:
- Publication type:
- Article
EL PRINCIPIO DE PUBLICIDAD REGISTRAL Y SUS MANIFESTACIONES: ESPECIAL ATENCIÓN A SU DIMENSIÓN FORMAL Y A LA INCIDENCIA DE LOS DERECHOS FUNDAMENTALES EN SU CONFIGURACIÓN.
- Published in:
- Derecho Privado y Constitución, 2021, n. 39, p. 287, doi. 10.18042/cepc/dpc.39.03
- By:
- Publication type:
- Article
Standing in the Age of Data Breaches: A CONSUMER-FRIENDLY FRAMEWORK TO PLEADING FUTURE INJURY AND PROVIDING EQUITABLE RELIEF TO DATA BREACH VICTIMS.
- Published in:
- Brooklyn Law Review, 2023, v. 88, n. 3, p. 923
- By:
- Publication type:
- Article
Pay for (Privacy) Performance: HOLDING SOCIAL NETWORK EXECUTIVES ACCOUNTABLE FOR BREACHES IN DATA PRIVACY PROTECTION.
- Published in:
- Brooklyn Law Review, 2019, v. 84, n. 2, p. 523
- By:
- Publication type:
- Article
Undercutting Employee Mobility.
- Published in:
- Brooklyn Law Review, 2014, v. 79, n. 2, p. 831
- By:
- Publication type:
- Article
CYBERSECURITY AND DATA BREACH HARMS: THEORY AND REALITY.
- Published in:
- Maryland Law Review, 2023, v. 82, n. 4, p. 1001
- By:
- Publication type:
- Article
Cyber-attacks: The New "Silent Threat" in Healthcare.
- Published in:
- Family Doctor: A Journal of the New York State Academy of Family Physicians, 2024, v. 12, n. 4, p. 26
- By:
- Publication type:
- Article
Priority on Cybersecurity.
- Published in:
- Journal: American Water Works Association, 2019, v. 111, n. 3, p. 11, doi. 10.1002/awwa.1246
- By:
- Publication type:
- Article
Summary record of the 24th meeting – A/C.6/73/SR.24: Agenda item 82.
- Published in:
- African Journal of International Criminal Justice, 2018, v. 4, n. 1/2, p. 221, doi. 10.5553/AJ/2352068X2018004001015
- Publication type:
- Article
Consequence of Risk Assessment in Information Security.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 4861
- By:
- Publication type:
- Article
Cyber-Secure Framework for the Insecure Designs in Healthcare Industry.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3824
- By:
- Publication type:
- Article
Enhancing Security of the Healthcare Sector using Visual Cryptography.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2, Part 2, p. 1495
- By:
- Publication type:
- Article
Pragmatic Study of Enterprise Data Breach and its Prevention Technique by DLPD.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2, Part 2, p. 1124
- By:
- Publication type:
- Article
Generation of Synthetic Datasets using Generative Adversarial Networks and Securing it using Blockchain.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2, Part 2, p. 520
- By:
- Publication type:
- Article
Data Security System using Blockchain Technology.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part1, p. 173
- By:
- Publication type:
- Article
Novel Peer-2-Peer File Storage System.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 3, p. 2252
- By:
- Publication type:
- Article
Comparative Study of Permissioned Blockchain Platform for Interoperability and Access Control of Electronic Health Record.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 1, p. 284
- By:
- Publication type:
- Article
BHAS: A Blockchain-Based Healthcare Analytic System to Manage Privacy and Scalability Concerns.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 2, p. 765
- By:
- Publication type:
- Article
Blockchain Encryption using Biometric Authentication.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 1, p. 371
- By:
- Publication type:
- Article
A Survey on Classical and Quantum Cryptography.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2018, v. 4, n. 2, p. 55
- By:
- Publication type:
- Article