Works about DATA security failures
Results: 1988
A new privacy framework for the management of chronic diseases via mHealth in a post-Covid-19 world.
- Published in:
- Journal of Public Health: From Theory to Practice (2198-1833), 2022, v. 30, n. 1, p. 37, doi. 10.1007/s10389-021-01608-9
- By:
- Publication type:
- Article
УПРАВЛІННЯ РИЗИКАМИ НА РІЗНИХ ЕТАПАХ ЖИТТЄВОГО ЦИКЛУ РОЗРОБКИ ІТ-ПРОЄКТІВ.
- Published in:
- Scientific Proceedings of Ostroh Academy National University Series, Economics, 2024, v. 63, n. 35, p. 71, doi. 10.25264/2311-5149-2024-35(63)-71-78
- By:
- Publication type:
- Article
ALL HANDS ON DECK: WHY GOVERNMENT COLLABORATION IS NECESSARY TO ENSURE PROPER CYBERSECURITY STANDARDS AT SMALL- AND MEDIUM-SIZED LAW FIRMS.
- Published in:
- Journal of the Legal Profession, 2024, v. 49, n. 1, p. 45
- By:
- Publication type:
- Article
Environmental, Social, and Governance Committees and Information Technology Outcomes.
- Published in:
- Journal of Information Systems, 2025, v. 39, n. 1, p. 1, doi. 10.2308/ISYS-2024-050
- By:
- Publication type:
- Article
blockHealthSecure: Integrating Blockchain and Cybersecurity in Post-Pandemic Healthcare Systems.
- Published in:
- Information (2078-2489), 2025, v. 16, n. 2, p. 133, doi. 10.3390/info16020133
- By:
- Publication type:
- Article
Security and Privacy in Physical–Digital Environments: Trends and Opportunities.
- Published in:
- Future Internet, 2025, v. 17, n. 2, p. 83, doi. 10.3390/fi17020083
- By:
- Publication type:
- Article
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security.
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 2, p. 2637, doi. 10.32604/cmc.2025.058717
- By:
- Publication type:
- Article
ENSEMBLE STRATEGY TO MITIGATE ADVERSARIAL ATTACK IN FEDERATED LEARNING.
- Published in:
- ICTACT Journal on Soft Computing, 2025, v. 15, n. 3, p. 3646, doi. 10.21917/ijsc.2025.0506
- By:
- Publication type:
- Article
Enhancing Banking Transaction Security with Fractal-Based Image Steganography Using Fibonacci Sequences and Discrete Wavelet Transform.
- Published in:
- Fractal & Fractional, 2025, v. 9, n. 2, p. 95, doi. 10.3390/fractalfract9020095
- By:
- Publication type:
- Article
HUMAN CAPITAL ACQUISITION IN RESPONSE TO DATA BREACHES.
- Published in:
- MIS Quarterly, 2025, v. 49, n. 1, p. 367
- By:
- Publication type:
- Article
HOW MERGERS AND ACQUISITIONS INCREASE DATA BREACHES: A COMPLEXITY PERSPECTIVE.
- Published in:
- MIS Quarterly, 2025, v. 49, n. 1, p. 211
- By:
- Publication type:
- Article
The Shari'a Approach to Contemporary Problems of Mass Surveillance.
- Published in:
- Muslim World Journal of Human Rights, 2020, v. 17, n. 1, p. 1, doi. 10.1515/mwjhr-2020-0007
- By:
- Publication type:
- Article
Cow Vigilantism and India's Evolving Human Rights Framework.
- Published in:
- Muslim World Journal of Human Rights, 2020, v. 17, n. 1, p. 45, doi. 10.1515/mwjhr-2019-0019
- By:
- Publication type:
- Article
THE PARIS AGREEMENT'S APPROACH TOWARD CLIMATE CHANGE LOSS AND DAMAGE.
- Published in:
- World Affairs, 2023, v. 186, n. 1, p. 46, doi. 10.1177/00438200221147936
- By:
- Publication type:
- Article
Are Conditional Sentence Orders Used Differently for Indigenous Offenders? A Comparison of Sentences and Outcomes in Canada.
- Published in:
- Canadian Journal of Criminology & Criminal Justice, 2020, v. 62, n. 4, p. 1, doi. 10.3138/cjccj.2019-0044
- By:
- Publication type:
- Article
ACCEPT ALL COOKIES: OPTING-IN TO A COMPREHENSIVE FEDERAL DATA PRIVACY FRAMEWORK AND OPTING-OUT OF A DISPARATE STATE REGULATORY REGIME.
- Published in:
- Villanova Law Review, 2023, v. 68, n. 3, p. 511
- By:
- Publication type:
- Article
Standing up to Hackers: Article III Standing for Victims of Data Breaches.
- Published in:
- University of Miami Law Review, 2023, v. 77, n. 2, p. 295
- By:
- Publication type:
- Article
The People's Republic of China's Cyber Coercion: Taiwan, Hong Kong, and the South China Sea.
- Published in:
- Issues & Studies, 2020, v. 56, n. 03, p. N.PAG, doi. 10.1142/S1013251120400135
- By:
- Publication type:
- Article
A designated crisis response team is best for managing board's crisis management duties.
- Published in:
- Board Leadership, 2024, v. 2024, n. 194, p. 8, doi. 10.1002/bl.30267
- By:
- Publication type:
- Article
Applying the Lessons from the Equifax Cybersecurity Incident to Build a Better Defense.
- Published in:
- MIS Quarterly Executive, 2021, v. 20, n. 2, p. 109, doi. 10.17705/2msqe.00044
- By:
- Publication type:
- Article
Maximizing Employee Compliance with Cybersecurity Policies.
- Published in:
- MIS Quarterly Executive, 2020, v. 19, n. 3, p. 183, doi. 10.17705/2msqe.00032
- By:
- Publication type:
- Article
Challenges and Best Practices in Information Security Management.
- Published in:
- MIS Quarterly Executive, 2018, v. 17, n. 3, p. 237
- By:
- Publication type:
- Article
A comprehensive analysis of threat vectors in software-defined networking.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 39, p. 86791, doi. 10.1007/s11042-024-19679-7
- By:
- Publication type:
- Article
Ensuring the privacy and security of IoT-medical data: a hybrid deep learning-based encryption and blockchain-enabled transmission.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 33, p. 79067, doi. 10.1007/s11042-023-18043-5
- By:
- Publication type:
- Article
Healthcare with datacare—a triangular DNA security.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 7, p. 21153, doi. 10.1007/s11042-023-16303-y
- By:
- Publication type:
- Article
Towards a fully homomorphic symmetric cipher scheme resistant to plain-text/cipher-text attacks.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 10, p. 14403, doi. 10.1007/s11042-022-12043-7
- By:
- Publication type:
- Article
A blockchain-based privacy preservation scheme in multimedia network.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 20, p. 30691, doi. 10.1007/s11042-021-10513-y
- By:
- Publication type:
- Article
Key Ethical Challenges in the European Medical Information Framework.
- Published in:
- Minds & Machines, 2019, v. 29, n. 3, p. 355, doi. 10.1007/s11023-018-9467-4
- By:
- Publication type:
- Article
Resilienz gegen IT-Angriffe an Kliniken: Ergebnisse einer Stabsrahmenübung an einem Universitätsklinikum.
- Published in:
- Die Anaesthesiologie, 2023, v. 72, n. 12, p. 852, doi. 10.1007/s00101-023-01331-y
- By:
- Publication type:
- Article
Peretas, Ketakutan, dan Kerugian: Pelanggaran Data dan Keamanan Nasional.
- Published in:
- Global Strategis, 2023, v. 17, n. 1, p. 153, doi. 10.20473/jgs.17.1.2023.153-182
- By:
- Publication type:
- Article
A trading matching model for aquatic products based on blockchain and credit mechanisms.
- Published in:
- Electronic Research Archive, 2023, v. 31, n. 11, p. 1, doi. 10.3934/mbe.2023874
- By:
- Publication type:
- Article
FedSC: A federated learning algorithm based on client-side clustering.
- Published in:
- Electronic Research Archive, 2023, v. 31, n. 9, p. 1, doi. 10.3934/era.2023266
- By:
- Publication type:
- Article
Data security in smart devices: Advancement, constraints and future recommendations.
- Published in:
- IET Networks (Wiley-Blackwell), 2023, v. 12, n. 6, p. 269, doi. 10.1049/ntw2.12091
- By:
- Publication type:
- Article
病歷與 個人資料保護.
- Published in:
- Angle Health Law Review, 2023, n. 84, p. 112, doi. 10.53106/241553062023100084009
- By:
- Publication type:
- Article
STANDING AND PROBABILISTIC INJURY.
- Published in:
- Michigan Law Review, 2024, v. 122, n. 8, p. 1557, doi. 10.36644/mlr.122.8.standing
- By:
- Publication type:
- Article
What Counts as an Apology? Exploring Stakeholder Perceptions in a Hypothetical Organizational Crisis.
- Published in:
- Management Communication Quarterly, 2018, v. 32, n. 2, p. 202, doi. 10.1177/0893318917722635
- By:
- Publication type:
- Article
Impact of Artificial Intelligence (AI) Technology in Healthcare Sector: A Critical Evaluation of Both Sides of the Coin.
- Published in:
- Clinical Pathology, 2024, p. 1, doi. 10.1177/2632010X241226887
- By:
- Publication type:
- Article
ПРАВО НА ПРИВАТНОСТ И ЗАШТИТА ЛИЧНИХ ПОДАТАКА У ДОБА ПАНДЕМИЈЕ COVID-19.
- Published in:
- Socioloski Pregled, 2020, v. 54, n. 3, p. 670, doi. 10.5937/socpreg54-27284
- By:
- Publication type:
- Article
A comparative study of combining deep learning and homomorphic encryption techniques.
- Published in:
- Al-Qadisiyah Journal of Pure Science, 2022, v. 27, n. 1, p. 17, doi. 10.29350/qjps.2022.27.1.1452
- By:
- Publication type:
- Article
A passive Digital footprint for Extranet environment.
- Published in:
- Al-Qadisiyah Journal of Pure Science, 2018, v. 23, n. 1, p. 152, doi. 10.29350/jops.2018.23.1.727
- By:
- Publication type:
- Article
THE CRIMES OF DIGITAL CAPITALISM.
- Published in:
- Mitchell Hamline Law Review, 2022, v. 48, n. 4, p. 971
- By:
- Publication type:
- Article
重大疫情患者隐私数据保护方案研究.
- Published in:
- Journal of Frontiers of Computer Science & Technology, 2022, v. 16, n. 2, p. 359, doi. 10.3778/j.issn.1673-9418.2106023
- By:
- Publication type:
- Article
What Stays in Vegas: The Road to "Zero Privacy".
- Published in:
- New England Law Review, 2015, v. 49, n. 4, p. 611
- By:
- Publication type:
- Article
Do Good and Do No Harm Too: Employee-Related Corporate Social (Ir)responsibility and Information Security Performance.
- Published in:
- Journal of the Association for Information Systems, 2025, v. 26, n. 1, p. 171, doi. 10.17705/1jais.00908
- By:
- Publication type:
- Article
The Influences of Public and Institutional Pressure on Firms' Cybersecurity Disclosures.
- Published in:
- Journal of the Association for Information Systems, 2022, v. 23, n. 3, p. 779, doi. 10.17705/1jais.00740
- By:
- Publication type:
- Article
Understanding Information Security Policy Violation from a Situational Action Perspective.
- Published in:
- Journal of the Association for Information Systems, 2021, v. 22, n. 3, p. 739, doi. 10.17705/1jais.00678
- By:
- Publication type:
- Article
Intervention Effect Rates as a Path to Research Relevance: Information Systems Security Example.
- Published in:
- Journal of the Association for Information Systems, 2018, v. 19, n. 4, p. 247, doi. 10.17705/1jais.00491
- By:
- Publication type:
- Article
A review on smartphone usage data for user identification and user profiling.
- Published in:
- Communications in Science & Technology, 2021, v. 6, n. 1, p. 25, doi. 10.21924/cst.6.1.2021.363
- By:
- Publication type:
- Article
EL APORTE POR REGULACIÓN A FAVOR DEL OEFA BAJO LA LUPA: ¿TRANSGRESIÓN AL PRINCIPIO DE NO CONFISCATORIEDAD?
- Published in:
- Themis: Revista de Derecho, 2020, n. 77, p. 579, doi. 10.18800/themis.202001.033
- By:
- Publication type:
- Article
Showcasing Yesterday & Today.
- Published in:
- ISSA Journal, 2024, v. 22, n. 4, p. 4
- By:
- Publication type:
- Article