Showing 121 - 140 results of 341 for search '"data breach"', query time: 0.22s Refine Results
  1. 121

    Image processing and machine learning for data investigation in flash memory by Chew, Wei Min

    Published 2023
    “…Digital forensics is an important tool for analyzing and preserving digital evidence in the event of a cyberattack or data breach. This project focuses on investigating data stored in flash memory of unfunctional electronic devices using image processing and machine learning techniques. …”
    Get full text
    Final Year Project (FYP)
  2. 122

    Data wiping tool: ByteEditor Technique by Ahmad Riduan, Nuraqilah Haidah, Mohd Foozy, Cik Feresa, A. Hamid, Isredza Rahmi Binti, Shamala, Palaniappan, Othman, Nur Fadzilah

    Published 2021
    “…Regarding wiping tools, nowadays, lots of wiping tools face issue such as data breach because the wiping tools are unable to delete the data permanently from the devices. …”
    Get full text
    Other
  3. 123

    Trusted cloud computing framework for healthcare sector by Bamiah, Mervat Adib, Brohi, Sarfraz Nawaz, Chuprat, Suriayati, Ab. Manan, Jamalul Lail

    Published 2014
    “…Lack of consumers' knowledge about their data storage location may lead to violating rules and regulations of Health Insurance Portability and Accountability Act (HIPAA) that can cost them huge penalty. Fear of data breach by internal or external hackers may decrease consumers' trust in adopting cloud computing and benefiting from its promising features. …”
    Article
  4. 124

    Adopting ISO/IEC 27005:2011-based risk treatment plan to prevent patients data theft by Hamit, Laura Cassandra, Md. Sarkan, Haslina, Mohd. Azmi, Nurulhuda Firdaus, Mahrin, Mohd. Naz’ri, Chuprat, Suriayati, Yahya, Yazriwati

    Published 2020
    “…The concern raised in late 2017 regarding 46.2 million mobile device subscriber's data breach had the Malaysian police started an investigation looking for the source of the leak. …”
    Get full text
    Article
  5. 125

    Acceptability of a computer-tailored and pedometer-based socio-cognitive intervention in a secondary coronary heart disease prevention program: A qualitative study by Julie Houle, Maria-Cecilia Gallani, Myriam Pettigrew, Geneviève Laflamme, Luc Mathieu, François Boudreau, Paul Poirier, Sylvie Cossette

    Published 2020-01-01
    “…However, patients expressed concern about the online security, fearing possible data breach. Some clinicians felt the pedometer may not be able to evaluate physical activities other than walking. …”
    Get full text
    Article
  6. 126

    Intrusion Detection on AWS Cloud through Hybrid Deep Learning Algorithm by Balajee R M, Jayanthi Kannan M K

    Published 2023-03-01
    “…A recent survey for the cloud environment involving 300 organizations in North America with 500 or more employees who had spent a minimum of USD 1 million on cloud infrastructure, as per March 2022 statistics, stated that 79% of organizations experienced at least one cloud data breach. In the year 2022, the AWS cloud provider leads the market share with 34% and a USD 200 billion cloud market, proving important and producing the motivation to improve the detection of intrusion with respect to network security on the basis of the AWS cloud dataset. …”
    Get full text
    Article
  7. 127

    A novel subset-based polynomial design for enhancing the security of short message-digest with inflated avalanche and random responses by P. Karthik, P. Shanthibala, Akashdeep Bhardwaj, Salil Bharany, Heejung Yu, Yousaf Bin Zikria

    Published 2023-01-01
    “…The data breach and the integrity violation of remote data remain significant issues in the domain of information security. …”
    Get full text
    Article
  8. 128

    Secure Medical Data Against Unauthorized Access Using Decoy Technology in Distributed Edge Computing Networks by Imran Khan, Anwar Ghani, Syed Muhammad Saqlain, Muhammad Usman Ashraf, Abdulrahman Alzahrani, Do-Hyeun Kim

    Published 2023-01-01
    “…This adaptation includes features like real-time data breach alerts and automated surveillance. As new communication and computing models emerge, fresh security and privacy concerns arise within medical and health-related data. …”
    Get full text
    Article
  9. 129

    Perceived knowledge and practice in personal data handling by Ahmad, Nurul ‘Ain

    Published 2020
    “…These developments, however, posed new threats to the individual’s liberty and information privacy in case of a data breach or data abuse. This study is conducted to gain further understanding of the situation by investigating the current practices used by banks while dealing with customers’ personal data and also examines the level of perceived knowledge among bank personnel and customers regarding personal data handling. …”
    Get full text
    Thesis
  10. 130
  11. 131

    State of the art in adoption of contact tracing apps and recommendations regarding privacy protection and public health: systematic review by Kolasa, K, Mazzi, F, Leszczuk-Czubkowska, E, Zrubka, Z, Pentek, M

    Published 2021
    “…The information regarding the personal data breach and data gathered from children was mostly lacking. …”
    Journal article
  12. 132

    Social Media for Global Neurosurgery. Benefits and limitations of a groundbreaking approach to communication and education by Alfredo Conti, Marcello Magnani, Matteo Zoli, Ralf A. Kockro, Constantin Tuleasca, Simone Peschillo, Giuseppe Emmanuele Umana, Seow Wan Tew, George Jallo, Kanwaljeet Garg, Robert F. Spetzler, Jesus Lafuente, Bipin Chaurasia

    Published 2023-01-01
    “…Discussion and conclusion: The study provided a quantitative evaluation of impact, flaws and limitations of social medial for healthcare. Flaws were mostly data breach and insufficient quality of case reports. …”
    Get full text
    Article
  13. 133

    The Ethics of Using De-Identified Medical Data for Research without Informed Consent by Art Caplan, Prag Batra

    Published 2019-11-01
    “…Finally, increased education of research personnel regarding the risks of working with de-identified data and a set of best practices for storing and analyzing this data may also reduce the risk of inadvertent data breaches or re-identification. Thus, while informed consent is a valuable tool to protect de-identified data from posing a risk to individual privacy, it is not the only tool that can be used for this purpose. …”
    Get full text
    Article
  14. 134

    Countering cyber attacks and preserving the integrity and availability of critical systems / by Geetha, S., 1979-, editor 632033, Phamila, Asnath Victy, 1978-, editor

    Published 2019
    “…It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"…”
    Get full text
    text
  15. 135

    Autonomous Vehicles: The Cybersecurity Vulnerabilities and Countermeasures for Big Data Communication by Abdullah Algarni, Vijey Thayananthan

    Published 2022-11-01
    “…Research on big data has been primarily focused on mitigating CVs and minimizing big data breaches using appropriate countermeasures known as security solutions. …”
    Get full text
    Article
  16. 136

    Mapping the Psychosocialcultural Aspects of Healthcare Professionals’ Information Security Practices: Systematic Mapping Study by Yeng, Prosper Kandabongee, Szekeres, Adam, Yang, Bian, Snekkenes, Einar Arthur

    Published 2021-06-01
    “…BackgroundData breaches in health care are on the rise, emphasizing the need for a holistic approach to mitigation efforts. …”
    Get full text
    Article
  17. 137

    The Failure of Risk Management : Why It's Broken and How to Fix it / by Hubbard, Douglas W., 1962-, author 373783

    Published 2020
    “…This new edition will include new examples citing recent events (e.g. hurricanes and data breaches), new statistical methods, and updated data".…”
  18. 138

    A Comprehensive Survey on Data Utility and Privacy: Taking Indian Healthcare System as a Potential Case Study by Prathamesh Churi, Ambika Pawar, Antonio-José Moreno-Guerrero

    Published 2021-06-01
    “…Privacy threats and data breaches occur daily, and countries are mitigating the consequences caused by privacy and data breaches. …”
    Get full text
    Article
  19. 139

    Data security in ASEAN's digital economy: lessons from the Philippines by Enriquez, Jose Miguelito

    Published 2023
    “…Recent data breaches targeting Philippine government agencies have underscored the need to ensure a secure digital data environment. …”
    Get full text
    Commentary
  20. 140

    Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security by Wael Said, Ayman Mohamed Mostafa

    Published 2020-01-01
    “…In Databases, the most prevalent cause of data breaches comes from insiders who misuse their account privileges. …”
    Get full text
    Article