Zobrazeno 1 - 10
of 287
pro vyhledávání: '"SECURITY BREACH"'
Publikováno v:
IEEE Access, Vol 12, Pp 92198-92214 (2024)
Research into data security often emphasizes the need to understand the factors linked to security breaches, aiming to prevent future information security incidents. The advancement of digital technology has made safeguarding an organization’s sens
Externí odkaz:
https://doaj.org/article/3b5b53a3b1874d52bb1f0e3e4c4a7cfe
Publikováno v:
Future Internet, Vol 16, Iss 9, p 311 (2024)
With the rise of the Internet of Things (IoT), mobile crowdsourcing has become a leading application, leveraging the ubiquitous presence of smartphone users to collect and process data. Spatial crowdsourcing, which assigns tasks based on users’ geo
Externí odkaz:
https://doaj.org/article/12180a58d5e645e0a516ae433a762947
Publikováno v:
Mathematics, Vol 12, Iss 5, p 666 (2024)
In the era of big data, one of the key challenges is to discover process models and gain insights into business processes by analyzing event data recorded in information systems. However, Chaotic activity or infrequent behaviors often appear in actua
Externí odkaz:
https://doaj.org/article/6ede9753aea447f4b343b74454442b9e
Publikováno v:
Wroclaw Review of Law, Administration and Economics, Vol 11, Iss 2, Pp 31-47 (2022)
New quality that has been delivered by the provisions of General Data Protection Regulation (GDPR) (EU) 2016/679 is intended to secure a higher level of safety for personal data processing operations. The following elaboration was produced as an atte
Externí odkaz:
https://doaj.org/article/3fc82f582ff64454ba149d7dcf91301a
Autor:
Syed Emad Azhar Ali, Fong-Woon Lai, Ameenullah Aman, Muhammad Furquan Saleem, Salaheldin Hamad
Publikováno v:
Journal of Competitiveness, Vol 14, Iss 1, Pp 23-42 (2022)
A breach in information security (infosec) can materially impact a firm’s long-term competitiveness. For publicly listed firms, an infosec breach can have a long-lasting effect on their competitive stock performance, including their equity risk. De
Externí odkaz:
https://doaj.org/article/a4aa722478c24cc88547280e30c70451
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Janjarasjit, Suparak, Chan, Siew H.
Publikováno v:
Information & Computer Security, 2021, Vol. 29, Issue 1, pp. 187-206.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-07-2020-0118
Publikováno v:
Naučno-tehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki, Vol 21, Iss 4, Pp 592-598 (2021)
The widespread use of machine learning, including at critical information infrastructure facilities, entails risks of security threats in the absence of reliable means of protection. The article views the processes in machine learning systems as the
Externí odkaz:
https://doaj.org/article/43988b8c3969436aab97aac912f39f3c