-
121
Image processing and machine learning for data investigation in flash memory
Published 2023“…Digital forensics is an important tool for analyzing and preserving digital evidence in the event of a cyberattack or data breach. This project focuses on investigating data stored in flash memory of unfunctional electronic devices using image processing and machine learning techniques. …”
Get full text
Final Year Project (FYP) -
122
Data wiping tool: ByteEditor Technique
Published 2021“…Regarding wiping tools, nowadays, lots of wiping tools face issue such as data breach because the wiping tools are unable to delete the data permanently from the devices. …”
Get full text
Other -
123
Trusted cloud computing framework for healthcare sector
Published 2014“…Lack of consumers' knowledge about their data storage location may lead to violating rules and regulations of Health Insurance Portability and Accountability Act (HIPAA) that can cost them huge penalty. Fear of data breach by internal or external hackers may decrease consumers' trust in adopting cloud computing and benefiting from its promising features. …”
Article -
124
Adopting ISO/IEC 27005:2011-based risk treatment plan to prevent patients data theft
Published 2020“…The concern raised in late 2017 regarding 46.2 million mobile device subscriber's data breach had the Malaysian police started an investigation looking for the source of the leak. …”
Get full text
Article -
125
Acceptability of a computer-tailored and pedometer-based socio-cognitive intervention in a secondary coronary heart disease prevention program: A qualitative study
Published 2020-01-01“…However, patients expressed concern about the online security, fearing possible data breach. Some clinicians felt the pedometer may not be able to evaluate physical activities other than walking. …”
Get full text
Article -
126
Intrusion Detection on AWS Cloud through Hybrid Deep Learning Algorithm
Published 2023-03-01“…A recent survey for the cloud environment involving 300 organizations in North America with 500 or more employees who had spent a minimum of USD 1 million on cloud infrastructure, as per March 2022 statistics, stated that 79% of organizations experienced at least one cloud data breach. In the year 2022, the AWS cloud provider leads the market share with 34% and a USD 200 billion cloud market, proving important and producing the motivation to improve the detection of intrusion with respect to network security on the basis of the AWS cloud dataset. …”
Get full text
Article -
127
A novel subset-based polynomial design for enhancing the security of short message-digest with inflated avalanche and random responses
Published 2023-01-01“…The data breach and the integrity violation of remote data remain significant issues in the domain of information security. …”
Get full text
Article -
128
Secure Medical Data Against Unauthorized Access Using Decoy Technology in Distributed Edge Computing Networks
Published 2023-01-01“…This adaptation includes features like real-time data breach alerts and automated surveillance. As new communication and computing models emerge, fresh security and privacy concerns arise within medical and health-related data. …”
Get full text
Article -
129
Perceived knowledge and practice in personal data handling
Published 2020“…These developments, however, posed new threats to the individual’s liberty and information privacy in case of a data breach or data abuse. This study is conducted to gain further understanding of the situation by investigating the current practices used by banks while dealing with customers’ personal data and also examines the level of perceived knowledge among bank personnel and customers regarding personal data handling. …”
Get full text
Thesis -
130
Patient Perspectives of Barriers and Facilitators for the Uptake of Pharmacogenomic Testing in Veterans Affairs’ Pharmacogenomic Testing for the Veterans (PHASER) Program
Published 2023-09-01“…In contrast, decliners prioritized the possibilities of data breach or the negative impact on healthcare insurance or Veterans Affairs benefits. …”
Get full text
Article -
131
State of the art in adoption of contact tracing apps and recommendations regarding privacy protection and public health: systematic review
Published 2021“…The information regarding the personal data breach and data gathered from children was mostly lacking. …”
Journal article -
132
Social Media for Global Neurosurgery. Benefits and limitations of a groundbreaking approach to communication and education
Published 2023-01-01“…Discussion and conclusion: The study provided a quantitative evaluation of impact, flaws and limitations of social medial for healthcare. Flaws were mostly data breach and insufficient quality of case reports. …”
Get full text
Article -
133
The Ethics of Using De-Identified Medical Data for Research without Informed Consent
Published 2019-11-01“…Finally, increased education of research personnel regarding the risks of working with de-identified data and a set of best practices for storing and analyzing this data may also reduce the risk of inadvertent data breaches or re-identification. Thus, while informed consent is a valuable tool to protect de-identified data from posing a risk to individual privacy, it is not the only tool that can be used for this purpose. …”
Get full text
Article -
134
Countering cyber attacks and preserving the integrity and availability of critical systems /
Published 2019“…It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"…”
Get full text
text -
135
Autonomous Vehicles: The Cybersecurity Vulnerabilities and Countermeasures for Big Data Communication
Published 2022-11-01“…Research on big data has been primarily focused on mitigating CVs and minimizing big data breaches using appropriate countermeasures known as security solutions. …”
Get full text
Article -
136
Mapping the Psychosocialcultural Aspects of Healthcare Professionals’ Information Security Practices: Systematic Mapping Study
Published 2021-06-01“…BackgroundData breaches in health care are on the rise, emphasizing the need for a holistic approach to mitigation efforts. …”
Get full text
Article -
137
The Failure of Risk Management : Why It's Broken and How to Fix it /
Published 2020“…This new edition will include new examples citing recent events (e.g. hurricanes and data breaches), new statistical methods, and updated data".…”
-
138
A Comprehensive Survey on Data Utility and Privacy: Taking Indian Healthcare System as a Potential Case Study
Published 2021-06-01“…Privacy threats and data breaches occur daily, and countries are mitigating the consequences caused by privacy and data breaches. …”
Get full text
Article -
139
Data security in ASEAN's digital economy: lessons from the Philippines
Published 2023“…Recent data breaches targeting Philippine government agencies have underscored the need to ensure a secure digital data environment. …”
Get full text
Commentary -
140
Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security
Published 2020-01-01“…In Databases, the most prevalent cause of data breaches comes from insiders who misuse their account privileges. …”
Get full text
Article