Showing 181 - 200 results of 341 for search '"data breach"', query time: 0.50s Refine Results
  1. 181

    Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things by Geethapriya Thamilarasu, Shiven Chawla

    Published 2019-04-01
    “…When attacks on IoT networks go undetected for longer periods, it affects availability of critical systems for end users, increases the number of data breaches and identity theft, drives up the costs and impacts the revenue. …”
    Get full text
    Article
  2. 182

    Blockchained Trustable Federated Learning Utilizing Voting Accountability for Malicious Actor Mitigation by Brian Stanley, Sang-Gon Lee, Elizabeth Nathania Witanto

    Published 2023-05-01
    “…However, traditional FL schemes still rely on a centralized server, making them vulnerable to security risks, such as data breaches and tampering of models caused by malicious actors attempting to gain access by masquerading as trainers. …”
    Get full text
    Article
  3. 183

    A New System for Surveillance and Digital Contact Tracing for COVID-19: Spatiotemporal Reporting Over Network and GPS by Wang, Shaoxiong, Ding, Shuizi, Xiong, Li

    Published 2020-06-01
    “…However, there are a number of unresolved questions about the use of smartphone data for health surveillance, including how to protect individual privacy and provide safeguards against data breaches.…”
    Get full text
    Article
  4. 184

    A Metamodel for Web Application Security Evaluation by Shao-Fang Wen

    Published 2023-11-01
    “…Organizations face constant risks associated with vulnerabilities in their web-based software systems, which can result in data breaches, service disruptions, and a loss of trust. …”
    Get full text
    Article
  5. 185

    Botching Human Factors in Cybersecurity in Business Organizations by Nobles Calvin

    Published 2018-12-01
    “…The mounting cyber-attacks, data breaches, and ransomware attacks are a result of human-enabled errors, in fact, 95% of all cyber incidents are human-enabled. …”
    Get full text
    Article
  6. 186

    Infrastructure, Attitude and Weather: Today’s Threats to Supply Chain Security by Stephen Blank

    Published 2016-06-01
    “…Technology-based threats to supply chains, such as cybercrimes, data breaches and IT failures, now appear more frequently in the literature on supply chain security. …”
    Get full text
    Article
  7. 187

    Parametric study of doubler plate reinforced circular hollow section T-joints at elevated temperature by Foo, Bo Lim

    Published 2015
    “…Nevertheless, this study seeks to provide an insight on this aspect through the use of empirical data, breaching these gaps and the laying the foundation in which further studies can be built on. …”
    Get full text
    Final Year Project (FYP)
  8. 188

    Applying Blockchain Technology to Security-Related Aspects of Electronic Healthcare Record Infrastructure by Ryno Adlam, Bertram Haskins

    Published 2021-12-01
    “…There has been a rise in the number of data breaches related to EHRs. The infrastructure used by EHRs does not assure the privacy and security of patients’ medical records. …”
    Get full text
    Article
  9. 189

    Cyberattacks and Security of Cloud Computing: A Complete Guideline by Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas, Sadaqat Ur Rehman

    Published 2023-10-01
    “…Taking these security trends into account, we move to security problems, including data breaches, data confidentiality, data access controllability, authentication, inadequate diligence, phishing, key exposure, auditing, privacy preservability, and cloud-assisted IoT applications. …”
    Get full text
    Article
  10. 190

    Image Steganography Using LSB and Hybrid Encryption Algorithms by May Alanzy, Razan Alomrani, Bashayer Alqarni, Saad Almutairi

    Published 2023-10-01
    “…In today’s era of widespread web technology and cloud computing, ensuring data security has become a crucial concern across various industries. Instances of data breaches and vulnerabilities in cloud storage have emphasized the need for robust data protection and communication protocols, particularly in sectors like social media, military, and research. …”
    Get full text
    Article
  11. 191

    A Systematic Literature Review of Information Security in Chatbots by Jing Yang, Yen-Lin Chen, Lip Yee Por, Chin Soon Ku

    Published 2023-05-01
    “…The review finds that chatbots face various security threats, including malicious input, user profiling, contextual attacks, and data breaches, and that solutions such as blockchain technology, end-to-end encryption, and organizational controls can be used to mitigate these concerns. …”
    Get full text
    Article
  12. 192

    Provenance graph generation for intrusion detection by Chong, Wai Mun

    Published 2023
    “…Consequently, commercial IDSs may fail to detect intrusions for extended periods, leading to substantial financial losses and data breaches for organizations. Provenance graphs are directed graphs that documents the lineage and history of data, and their associated activities. …”
    Get full text
    Final Year Project (FYP)
  13. 193

    Setting a disordered password on a photonic memory by Su, Shih-Wei, Gou, Shih-Chuan, Chew, Lock Yue, Chang, Yu-Yen, Yu, Ite A., Kalachev, Alexey, Liao, Wen-Te

    Published 2018
    “…However, we wish to address the intrinsic risk of data breaches in existing schemes of photonic memory. …”
    Get full text
    Get full text
    Journal Article
  14. 194

    The Application of Blockchain in Social Media: A Systematic Literature Review by Mahamat Ali Hisseine, Deji Chen, Xiao Yang

    Published 2022-06-01
    “…However, there are many limitations to the use of social media, such as misinformation, lack of effective content moderation, digital piracy, data breaches, identity fraud, and fake news. In order to address these limitations, several studies have introduced the application of Blockchain technology in social media. …”
    Get full text
    Article
  15. 195

    An efficient chain code for access control in hyper ledger fabric healthcare system by Smitha Mohan M, L. Sujihelen

    Published 2023-09-01
    “…However, the use of EHRs by healthcare practitioners creates the risk of data breaches and jeopardizes patient confidentiality. …”
    Get full text
    Article
  16. 196

    Designing a Governance System for Cybersecurity of Foreign Investment in Europe by Federica Cristani

    Published 2023-07-01
    “…In the last years, the most frequent (documented) cyber-threats have been: malware; phishing attacks; spam; denial of service; ransomware; insider threat; data breaches; information leakage; cryptojacking and cyber espionage. …”
    Get full text
    Article
  17. 197

    Cyber Literacy Skills of Estonians: Activities and Policies For Encouraging Knowledge-Based Cyber Security Attitudes by Kate-Riin Kont

    Published 2023-05-01
    “…A human error is a central target of cyber attacks, phishing scams, and data breaches. Cyber criminals are becoming more and more inventive. …”
    Get full text
    Article
  18. 198

    Promise and Provisos of Artificial Intelligence and Machine Learning in Healthcare by Bhardwaj A

    Published 2022-07-01
    “…Reliability of input data, interpretation of output data, data proprietorship, consumer privacy, and liability issues due to potential for data breaches will all have to be addressed. Of equal concern will be decreased human interaction in clinical care, patient satisfaction, affordability, and skepticism regarding cost-benefit. …”
    Get full text
    Article
  19. 199

    Enhancing User Data Privacy and Trust through the Implementation of the OTrace Protocol: Development, Challenges, and Impact Assessment by Wen, Dian

    Published 2024
    “…In the digital age, safeguarding user data privacy and rebuilding trust in digital platforms have become critical priorities as data breaches and misuse continue to rise. This thesis ex- plores the novel traceability and accountability protocol - OTrace, which tackles these issues by providing users with enhanced control and transparency over their personal data through advanced consent mechanisms and data traceability features. …”
    Get full text
    Thesis
  20. 200

    Diagnostic of Data Processing by Brazilian Organizations—A Low Compliance Issue by Sâmmara Éllen Renner Ferrão, Artur Potiguara Carvalho, Edna Dias Canedo, Alana Paula Barbosa Mota, Pedro Henrique Teixeira Costa, Anderson Jefferson Cerqueira

    Published 2021-04-01
    “…In addition, our findings also revealed that 16.3% of organizations have not established a procedure or methodology to verify that the LGPD principles are being respected during the development of services that will handle personal data from the product or service design phase to its execution and 20% of the organizations did not establish a communication process to the personal data holders, regarding the possible data breaches. The result of the diagnostic allows organizations and data users to have an overview of how the treatment of personal data of their customers is being treated and which points of attention are in relation to the principles of LGPD.…”
    Get full text
    Article