Results for 'Data security'

988 found
Order:
  1.  72
    ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  3. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  6. OPTIMIZING DATA SCIENCE WORKFLOWS IN CLOUD COMPUTING.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):71-76.
    This paper explores the challenges and innovations in optimizing data science workflows within cloud computing environments. It begins by highlighting the critical role of data science in modern industries and the pivotal contribution of cloud computing in enabling scalable and efficient data processing. The primary focus lies in identifying and analyzing the key challenges encountered in current data science workflows deployed in cloud infrastructures. These challenges include scalability issues related to handling large volumes of data, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Data management practices and educational research effectiveness of university lecturers in South-South Nigeria.Valentine Joseph Owan, Francisca Nonyelum Odigwe & Bassey Asuquo Bassey - 2020 - Journal of Educational and Social Research 10 (3):24-34.
    The existing body of knowledge has witnessed gaps arising from the paucity of research literature on the quality of educational research output in higher education. This study shows how the management of data in higher education affects the quality of academic research conducted by university lecturers in South-South Nigeria. A sample of 602 lecturers were accessed during data collection and responded to two questionnaires (Data Management Practices Questionnaire – DMPQ and "Educational Research Effectiveness Questionnaire – EREQ). Multiple (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  9. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Data Mining in the Context of Legality, Privacy, and Ethics.Amos Okomayin, Tosin Ige & Abosede Kolade - 2023 - International Journal of Research and Innovation in Applied Science 10 (Vll):10-15.
    Data mining possess a significant threat to ethics, privacy, and legality, especially when we consider the fact that data mining makes it difficult for an individual or consumer (in the case of a company) to control accessibility and usage of his data. Individuals should be able to control how his/ her data in the data warehouse is being access and utilize while at the same time providing enabling environment which enforces legality, privacy and ethicality on (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  12. Data Analytics in Higher Education: Key Concerns and Open Questions.Alan Rubel & Kyle M. L. Jones - 2017 - University of St. Thomas Journal of Law and Public Policy 1 (11):25-44.
    “Big Data” and data analytics affect all of us. Data collection, analysis, and use on a large scale is an important and growing part of commerce, governance, communication, law enforcement, security, finance, medicine, and research. And the theme of this symposium, “Individual and Informational Privacy in the Age of Big Data,” is expansive; we could have long and fruitful discussions about practices, laws, and concerns in any of these domains. But a big part of the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Data Science and Mass Media: Seeking a Hermeneutic Ethics of Information.Christine James - 2015 - Proceedings of the Society for Phenomenology and Media, Vol. 15, 2014, Pages 49-58 15 (2014):49-58.
    In recent years, the growing academic field called “Data Science” has made many promises. On closer inspection, relatively few of these promises have come to fruition. A critique of Data Science from the phenomenological tradition can take many forms. This paper addresses the promise of “participation” in Data Science, taking inspiration from Paul Majkut’s 2000 work in Glimpse, “Empathy’s Impostor: Interactivity and Intersubjectivity,” and some insights from Heidegger’s "The Question Concerning Technology." The description of Data Science (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  63
    Using Linguistics Corpus Data Analysis to Combat PRC's Cognitive Infiltration.Jr-Jiun Lian - 2024 - 2024 Annual Conference of the Communication Association: International Academic Conference on Communication and Democratic Resilience.
    In light of Taiwan's extensive exposure to the Chinese Communist Party's "cognitive domain infiltration warfare," this paper proposes new response mechanisms and strategies for cybersecurity and national defense. The focus is primarily on assessing the CCP's cognitive infiltration tactics to develop policy recommendations in cybersecurity linguistics. These recommendations are intended to serve as a reference for future national defense and information security policies. Within the constraints of limited resources, this study attempts to provide an integrated analysis method combining qualitative (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Reframing data ethics in research methods education: a pathway to critical data literacy.Javiera Atenas, Leo Havemann & Cristian Timmermann - 2023 - International Journal of Educational Technology in Higher Education 20:11.
    This paper presents an ethical framework designed to support the development of critical data literacy for research methods courses and data training programmes in higher education. The framework we present draws upon our reviews of literature, course syllabi and existing frameworks on data ethics. For this research we reviewed 250 research methods syllabi from across the disciplines, as well as 80 syllabi from data science programmes to understand how or if data ethics was taught. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Data management practices and educational research effectiveness of university lecturers in South-South Nigeria.Valentine Joseph Owan & Francisca N. Odigwe - 2019 - In Charles A. Shoniregun (ed.), Proceedings of the London International Conference on Education (LICE-2019). pp. 86-94.
    The dishonest practices in the conduct of educational research in South-South region particularly, and Nigeria generally, has called for urgent intervention. This study assessed data management practices and educational research effectiveness of University Lecturers in South-South Nigeria. A sample of 602 lecturers that were accessible during data collection responded to two questionnaires (Data Management Practices Questionnaire – DMPQ and "Educational Research Effectiveness Questionnaire – EREQ). Multiple regression was employed in the analysis of data. Findings revealed amongst (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  71
    “Giving something back”: a systematic review and ethical enquiry into public views on the use of patient data for research in the United Kingdom and the Republic of Ireland.Jessica Stockdale, Jackie Cassell & Elizabeth Ford - 2019 - Wellcome Open Research 3 (6).
    Background: Use of patients’ medical data for secondary purposes such as health research, audit, and service planning is well established in the UK. However, the governance environment, as well as public understanding about this work, have lagged behind. We aimed to systematically review the literature on UK and Irish public views of patient data used in research, critically analysing such views though an established biomedical ethics framework, to draw out potential strategies for future good practice guidance and inform (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. ICTs, data and vulnerable people: a guide for citizens.Alexandra Castańeda, Andreas Matheus, Andrzej Klimczuk, Anna BertiSuman, Annelies Duerinckx, Christoforos Pavlakis, Corelia Baibarac-Duignan, Elisabetta Broglio, Federico Caruso, Gefion Thuermer, Helen Feord, Janice Asine, Jaume Piera, Karen Soacha, Katerina Zourou, Katherin Wagenknecht, Katrin Vohland, Linda Freyburg, Marcel Leppée, Marta CamaraOliveira, Mieke Sterken & Tim Woods - 2021 - Bilbao: Upv-Ehu.
    ICTs, personal data, digital rights, the GDPR, data privacy, online security… these terms, and the concepts behind them, are increasingly common in our lives. Some of us may be familiar with them, but others are less aware of the growing role of ICTs and data in our lives - and the potential risks this creates. These risks are even more pronounced for vulnerable groups in society. People can be vulnerable in different, often overlapping, ways, which place (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Public interest in health data research: laying out the conceptual groundwork.Angela Ballantyne & G. Owen Schaefer - 2020 - Journal of Medical Ethics 46 (9):610-616.
    The future of health research will be characterised by three continuing trends: rising demand for health data; increasing impracticability of obtaining specific consent for secondary research; and decreasing capacity to effectively anonymise data. In this context, governments, clinicians and the research community must demonstrate that they can be responsible stewards of health data. IRBs and RECs sit at heart of this process because in many jurisdictions they have the capacity to grant consent waivers when research is judged (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  21. Enabling posthumous medical data donation: an appeal for the ethical utilisation of personal health data.Jenny Krutzinna, Mariarosaria Taddeo & Luciano Floridi - 2019 - Science and Engineering Ethics 25 (5):1357-1387.
    This article argues that personal medical data should be made available for scientific research, by enabling and encouraging individuals to donate their medical records once deceased, similar to the way in which they can already donate organs or bodies. This research is part of a project on posthumous medical data donation developed by the Digital Ethics Lab at the Oxford Internet Institute at the University of Oxford. Ten arguments are provided to support the need to foster posthumous medical (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  22. Motivational Strategies and Security Service Delive ry in Universities in Cross River State, Nigeria.Comfort Robert Etor & Michael Ekpenyong Asuquo - 2021 - International Journal of Educational Administrati on, Planning, and Research 13 (1):55-65.
    This study assessed two motivational strategies and their respective ties to the service delivery in public universities in Cross River State. In achieving the central and specific targets of this research, four research questions and two null hypotheses were answered and tested in the study. The entire population of 440 security personnel in two public universities was studied, based on the census approach and following the ex-post facto research design. Three sets of expert-validated questionnaires, with Cronbach reliability estimates of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. ENSURING ECONOMIC SECURITY OF TRADE ENTERPRISES IN THE FORMATION OF PRICING POLICY.Maksym Bezpartochnyi & Igor Britchenko - 2022 - Financial and Credit Activity: Problems of Theory and Practice 43 (2):146-156.
    The article considers the problem of ensuring the economic security of trade enterprises by forming an optimal pricing policy. The methodology of formation the minimum and maximum selling prices of trade enterprise, maintenance of margin of economic security, which is based on research of turnover costs and working capital of trade enterprise is offered. Based on statistical data of trade enterprises, the types of prices by product range are determined, which form a stable economic situation and ensure (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Considering the Human Implications of New and Emerging Technologies in the Area of Human Security.Emilio Mordini - 2014 - Science and Engineering Ethics 20 (3):617-638.
    This special issue of Science and Engineering Ethics is devoted to the ethical, societal and political implications of new and emerging technologies in the area of Human Security. Its aim is to address the wider implications of an altered security landscape. Specifically, and in accordance with SEE’s main area of interest, contributions to this special issue focus on those ethical considerations warranted by scientific and technological advances in the field of human security. This includes, but is not (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. The Role of Information Technology in Enhancing National Security in Nigeria (2001 -2020).E. Offiong Ekwutosi, Eke Nta Effiong & Etim Bassey Inyang - 2021 - Pinisi Journal of Art, Humanity and Social Studies 1 (1):44-53.
    The security problems of Nigeria have continued to stare at her very ominously and intermittently harass her, both within and outside her shores. These have lingered on and have created a clog on the wheel of the country's progress, indeed dramatically stagnating, and to say the least, truncating the mainstay of the country's survival. Several interpretations, theories, analyses, syntheses, and jingoistic conceptualization have been propagated, all producing the same result. From scientific to technological approach, religious to ritualist approach, political (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Perceived Influence of Entrepreneurship Education Methods on Economic Security in Cross River State.Stephen Bepeh Undie, Ezekiel Usip Mfon, Lydia Ochuole Ogbudu, Ubong Edet Uko & Joseph Ogbaji Ebiale - 2023 - Prestige Journal of Education 6 (1):158-171.
    This study investigated the perception of how methods of entrepreneurial education predict the level of economic security in the Southern Senatorial District of Cross River State. It was guided by two research questions and two hypotheses, tested at a significant level of 0.05. The research design was a survey. The study had 350 participants. A 40-item "Entrepreneurship Education and Economic Security Questionnaire" (EEESQ) was validated by five experts from the University of Calabar and used in data collection. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Wireless Network Security: Challenges, Threats and Solutions. A Critical Review.Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 4 (2):19-26.
    Abstract: Wireless security is the avoidance of unlawful access or impairment to computers using wireless networks. Securing wireless network has been a research in the past two decades without coming up with prior solution to which security method should be employed to prevent unlawful access of data. The aim of this study was to review some literatures on wireless security in the areas of attacks, threats, vulnerabilities and some solutions to deal with those problems. It was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Management of data in higher education and the quality of academic research of university lecturers : A case study in South-South Nigeria.Francisca Nonyelum Odigwe & Valentine Joseph Owan - 2020 - International Journal of Innovative Business Strategies (IJIBS) 6 (1):378-387.
    The existing body of knowledge has witnessed gaps arising from the paucity of research literature on the quality of educational research output in higher education. This study shows how the management of data in higher education affects the quality of academic research conducted by university lecturers in South-South Nigeria. The study adopted a factorial research design. The population of this study includes all the Faculty of Education academic staff in both public and private universities situated in South-South Nigeria. Using (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. The Reality of Digital Transformation in the Palestinian Ministry of Interior and National Security.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Management Science Research (IJAMSR) 6 (11):148-165.
    This study aimed to identify the reality of digital transformation in the Palestinian Ministry of Interior and National Security from the point of view of workers in computer and information technology units. ) employees, and the study tool (the questionnaire) was distributed, and the comprehensive survey method was used, where (61) questionnaires were retrieved with a percentage of (87.1%), and they were unloaded and analyzed using the statistical packages SPSS. The study reached several results, including: The availability of dimensions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Handles for Pentesting Modern Secure Coding: bypassing mobile security.Mourad M. H. Henchiri - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (4):8-15.
    Abstract— Malware behavior was and still is a key solution, for top security appliances, to monitor algorithmic approaches when performing regular security tasks; scan, detection, cleaning and removal. And even for early actions; when building a security framework and securing all possible access points to all data sources. The first suspect in such scenario is the inner residents; appliances and system functions. Numerous are available at each operating system, and thus, the security is raised and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  99
    AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting substantial dangers to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Institutional variables and the supervision of security in public secondary schools in Cross River State.Festus Obun Arop & Valentine Joseph Owan - 2018 - International Journal of Innovation in Educational Management (IJIEM) 2 (1):1-11.
    The purpose of this paper was to examine institutional variables and the supervision of security in secondary schools in Cross River State. The study specifically sought to determine whether there was a significant influence of school population, school type and school location, on the supervision of security in public secondary schools in Cross River State. Three null hypotheses were formulated accordingly to guide the study. 360 students and 120 teachers resulting in a total of 480 respondents, constituted the (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  33. Forecasting of the number of air passengers in the United States in terms of the maintenance of economic security during the impact of COVID-19.Bartosz Kozicki, Igor Britchenko, Arsen Ovsepyan & Sabina Grabowska - 2021 - Studies in Politics and Society 19 (3):29-40.
    The purpose of the study is to forecast the number of passengers transported by air in the United States for 2021-2022. The forecast is preceded by a multidimensional comparative analysis of the number of passengers transported by air in the United States from 1 January 2019 to 2 November 2021. To achieve this goal, the data were grouped as dependent variables: years, months-years. The observed similarities, the analysis and evaluation of the literature as well as the own experience made (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. The problem of the consent for the processing of health data, particularly for biomedical research purposes, from the perspective of fundamental rights protection in the Digital Era.Joaquín Sarrión Esteve - 2018 - Revista de Derecho y Genoma Humano: Genética, Biotecnología y Medicina Avanzada = Law and the Human Genome Review: Genetics, Biotechnology and Advanced Medicine 48:107-132.
    Health data processing fields face ethical and legal problems regarding fundamental rights. As we know, patients can benefit in the Digital Era from having health or medical information available, and medical decisions can be more effective with a better understanding of clinical histories, medical and health data thanks to the development of Artificial Intelligence, Internet of Things and other Digital technologies. However, at the same time, we need to guarantee fundamental rights, including privacy ones. The complaint about ethical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Relationship Between Corporate Governance and Information Security Governance Effectiveness in United States Corporations.Dr Robert E. Davis - 2017 - Dissertation, Walden
    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and information security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Cloud Computing and Big Data for Oil and Gas Industry Application in China.Yang Zhifeng, Feng Xuehui, Han Fei, Yuan Qi, Cao Zhen & Zhang Yidan - 2019 - Journal of Computers 1.
    The oil and gas industry is a complex data-driven industry with compute-intensive, data-intensive and business-intensive features. Cloud computing and big data have a broad application prospect in the oil and gas industry. This research aims to highlight the cloud computing and big data issues and challenges from the informatization in oil and gas industry. In this paper, the distributed cloud storage architecture and its applications for seismic data of oil and gas industry are focused on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Exploring age-related patterns in internet access: Insights from a secondary analysis of New Zealand survey data.Edgar Pacheco - 2024 - Media Peripheries 18 (1):38-56.
    About thirty years ago, when the Internet started to be commercialised, access to the medium became a topic of research and debate. Up-to-date evidence about key predictors, such as age, is crucial because of the Internet's ever-changing nature and the challenges associated with gaining access to it. This paper aims to give an overview of New Zealand's Internet access trends and how they relate to age. It is based on secondary analysis of data from a larger online panel survey (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. MANAGEMENT OF INFORMATION SECURITY OF THE ENTERPRISE.Tryashchenko Vitaliy & Tytar Tetiana - 2022 - Економіка Та Суспільство 44:1-7.
    The article highlights the current issues related to the management of information provision of the enterprise. It has been specified that complete and reliable information support of business processes is a necessary condition for the effective functioning of the enterprise. It was determined that the information support mechanism for managing the development of business processes should include available information resources, technologies, systems and platforms, software, and qualified personnel responsible for this work. The article examines the works of domestic and foreign (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Horizontal Integration of Warfighter Intelligence Data: A Shared Semantic Resource for the Intelligence Community.Barry Smith, Tatiana Malyuta, William S. Mandrick, Chia Fu, Kesny Parent & Milan Patel - 2012 - In Barry Smith, Tatiana Malyuta, William S. Mandrick, Chia Fu, Kesny Parent & Milan Patel (eds.), Proceedings of the Conference on Semantic Technology in Intelligence, Defense and Security (STIDS), CEUR. pp. 1-8.
    We describe a strategy that is being used for the horizontal integration of warfighter intelligence data within the framework of the US Army’s Distributed Common Ground System Standard Cloud (DSC) initiative. The strategy rests on the development of a set of ontologies that are being incrementally applied to bring about what we call the ‘semantic enhancement’ of data models used within each intelligence discipline. We show how the strategy can help to overcome familiar tendencies to stovepiping of intelligence (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  41. Restful Web Services for Scalable Data Mining.Solar Cesc - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Moral Implications of Data-Mining, Key-word Searches, and Targeted Electronic Surveillance.Michael Skerker - 2015 - In Bradley J. Strawser, Fritz Allhoff & Adam Henschke (eds.), Binary Bullets.
    This chapter addresses the morality of two types of national security electronic surveillance (SIGINT) programs: the analysis of communication “metadata” and dragnet searches for keywords in electronic communication. The chapter develops a standard for assessing coercive government action based on respect for the autonomy of inhabitants of liberal states and argues that both types of SIGINT can potentially meet this standard. That said, the collection of metadata creates opportunities for abuse of power, and so judgments about the trustworthiness and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Engaging the Public in Ethical Reasoning About Big Data.Justin Anthony Knapp - 2016 - In Soren Adam Matei & Jeff Collman (eds.), Ethical Reasoning in Big Data: An Exploratory Analysis. Springer. pp. 43-52.
    The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical about Big Data research seriously and how to communicate messages designed to build trust in specific big data projects and the institution of science in general. This chapter explores the implications of various examples of engaging the public in online activities such as Wikipedia that contrast with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Ownership of personal data in the Internet of Things.Václav Janeček - 2018 - Computer Law and Security Review 34 (5):1039-52.
    This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  45. Artificial intelligent smart home automation with secured camera management-based GSM, cloud computing and arduino.Musaddak Abdul Zahra & Laith A. Abdul-Rahaim Musaddak M. Abdul Zahra, Marwa Jaleel Mohsin - 2020 - Periodicals of Engineering and Natural Sciences 8 (4):2160-2168.
    Home management and controlling have seen a great introduction to network that enabled digital technology, especially in recent decades. For the purpose of home automation, this technique offers an exciting capability to enhance the connectivity of equipment within the home. Also, with the rapid expansion of the Internet, there are potentials that added to the remote control and monitoring of such network-enabled devices. In this paper, we had been designed and implemented a fully manageable and secure smart home automation system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. The Axiology of Necrologies: Using Natural Language Processing to Examine Values in Obituaries (Dissertation Code and Limited Data).Jacob Levernier - 2016 - Dissertation, University of Oregon
    This dissertation is centrally concerned with exploring obituaries as repositories of values. Obituaries are a publicly-available natural language source that are variably written for members of communities that are wide (nation- level) and narrow (city-level, or at the level of specific groups therein). Because they are explicitly summative, limited in size, and written for consumption by a public audience, obituaries may be expected to express concisely the aspects of their subjects’ lives that the authors (often family members living in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  76
    Strategies for Healthcare Disaster Management in the Context of Technology Innovation: the Case of Bulgaria.Radostin Vazov, R. Kanazireva, T. Grynko & Oleksandr P. Krupskyi - 2024 - Medicni Perspektivi 29 (2):215-228.
    In Bulgaria, integrating technology and innovation is crucial for advancing sustainable healthcare disaster management, enhancing disaster response and recovery, and minimizing long-term environmental and social impacts. The purpose of the study is to assess the impact of modern technological innovations on the effectiveness of disaster management in health care in Bulgaria with a focus on Health Information Systems (HIS), Telemedicine, Telehealth, e-Health, Electronic Health Records, Artificial Intelligence (AI), Public Communication Platforms, and Data Security and Privacy. These innovations, when (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Management Information System of Public Secondary Schools in Sagbayan District: A Proposed Implementation.Fernando Enad & Nestor Balicoco - 2023 - Psychology and Education: A Multidisciplinary Journal 13 (1):1-7.
    This research tackled the challenges public secondary schools in Sagbayan District, Bohol, faced regarding records management. The study employed a mixed research design, combining both descriptive-qualitative and descriptive- quantitative methods. The qualitative phase involved conducting in-depth interviews and focus group discussions with relevant stakeholders involved in records management. On the other hand, the quantitative phase utilized survey questionnaires to gather data from relevant stakeholders to determine the acceptability of the proposed MIS among end-users. The first phase findings revealed various (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. The Official Website as an Essential E-Governance Tool: A Comparative Analysis of the Romanian Cities’ Websites in 2019 and 2022.Gheorghe-Ilie Farte, Nicu Gavriluță & Virgil Stoica - 2022 - Sustainability 14 (11):1-23.
    This paper aims to measure the quality of all Romanian cities’ websites in 2019 and 2022, before and after the disruptive event of COVID-19. Since the official websites are the core instrument of e-governance, the changes in the quality of Romanian cities’ websites reflect the changes in the development of urban e-governance in Romania. The COVID-19 lockdowns and contact restrictions and the moving of most activities into the online environment had the potential to impact the performance of Romanian cities’ websites (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Improving the market for livestock production households to alleviate food insecurity in the Philippines.Minh-Phuong Thi Duong, Ni Putu Wulan Purnama Sari, Adrino Mazenda, Tam-Tri Le, Minh-Hoang Nguyen & Quan-Hoang Vuong - manuscript
    Food security is one of the major concerns in the Philippines. Although livestock and poultry production accounts for a significant proportion of the country’s agricultural output, smallholder households are still vulnerable to food insecurity. The current study aims to examine how livestock production and selling difficulties affect smallholder households’ food-insecure conditions. For this objective, Bayesian Mindsponge Framework (BMF) analytics was employed on a dataset of the Food and Agriculture Organization’s Data in Emergencies Monitoring (DIEM) system. We found that (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 988