Showing 141 - 160 results of 341 for search '"data breach"', query time: 0.16s Refine Results
  1. 141

    Safe clinical photography: best practice guidelines for risk management and mitigation by Rajiv Chandawarkar, Prakash Nadkarni

    Published 2021-05-01
    “…Based on a literature search of both PubMed and the web (via Google) with key phrases and child terms (for PubMed), the risks and consequences of data breaches in individual processes in clinical photography are identified. …”
    Get full text
    Article
  2. 142

    Essays on Information Technology, Human Capital, and the Future of Work by Steffen, Sebastian

    Published 2022
    “…Substantive and Symbolic Talent Acquisition in Response to Data Breaches’, I use the data from the first chapter to study firms’ hiring responses to data breaches. …”
    Get full text
    Thesis
  3. 143

    Cloud Digital Forensics: Beyond Tools, Techniques, and Challenges by Annas Wasim Malik, David Samuel Bhatti, Tae-Jin Park, Hafiz Usama Ishtiaq, Jae-Cheol Ryou, Ki-Il Kim

    Published 2024-01-01
    “…Furthermore, the research has scrutinized several well-documented data breaches, analyzing the financial consequences they inflicted. …”
    Get full text
    Article
  4. 144

    Evaluation the Information Security Management System: A Path Towards ISO 27001 Certification by Jevelin Jevelin, Ahmad Faza

    Published 2023-11-01
    “…It introduces the context of pervasive data breaches that necessitate stringent security measures. …”
    Get full text
    Article
  5. 145

    Data collection : use and misuse by Lim, Jessica, Ng, Kah Hwa

    Published 2019
    “…Possible remedies will be suggested to curb personal data misuse and data breaches will be discussed.…”
    Get full text
    Get full text
    Conference Paper
  6. 146

    Features state of hemostasis and immunopathological reactions in epstein-barr virus infection in children by S. A. Hmilevskaya, I. A. Zaitseva, N. I. Zryachkin, I. A. Berezhnova

    Published 2015-07-01
    “…The revealed correlation of data breaches with the severity of the infectious process. …”
    Get full text
    Article
  7. 147

    Classifying Database Users for Intrusion Prediction and Detection in Data Security by Cigdem Bakir*, Veli Hakkoymaz

    Published 2020-01-01
    “…Recently however, with the widespread use of the internet, some security problems, such as unauthorized access, data breaches, code infection, malware infections, data leaks and distributed denial of service attacks have emerged. …”
    Get full text
    Article
  8. 148

    Challenges of Complying with Data Protection and Privacy Regulations by A. Lonzetta, T. Hayajneh

    Published 2021-04-01
    “…This influx in data, partnered with challenges complying with data protection and privacy regulations and the absence of a comprehensive global data protection and privacy strategy, has contributed to data breaches and data misusage. In order to reduce these incidents, updates must be made to existing regulations and included in future regulations. …”
    Get full text
    Article
  9. 149

    Blockchain Integration in Industry 5.0: A Security Experiment for Resilience Assessment by Natalia Taskaeva, Pathani Ashish, Dhaliwal Navdeep, Rajasekhar N., Khatkar Monika

    Published 2024-01-01
    “…Security issues highlight the need of ongoing watchfulness; in the R&D department, data breaches have increased by 30%. The Manufacturing department scored 85% on the resilience evaluation, which reveals diversity in departmental flexibility. …”
    Get full text
    Article
  10. 150

    PbDinEHR: A Novel Privacy by Design Developed Framework Using Distributed Data Storage and Sharing for Secure and Scalable Electronic Health Records Management by Farida Habib Semantha, Sami Azam, Bharanidharan Shanmugam, Kheng Cher Yeo

    Published 2023-04-01
    “…The complete solution is expected to provide progressive resistance in the face of continuous data breaches in the patient information domain.…”
    Get full text
    Article
  11. 151

    A Data Taxonomy for Adaptive Multifactor Authentication in the Internet of Health Care Things by Tance Suleski, Mohiuddin Ahmed

    Published 2023-08-01
    “…During the COVID-19 pandemic, studies have shown that cybercriminals are exploiting the health care industry, and data breaches are targeting user credentials through authentication vulnerabilities. …”
    Get full text
    Article
  12. 152

    A Survey on IoT Security Using Cryptographic Algorithms by Sai Bella Mohan, Bhatia Max

    Published 2023-01-01
    “…IoT devices are vulnerable to a range of security hazards, including malware attacks, unauthorised access, and data breaches, which may jeopardise the confidentiality, integrity, and accessibility of the data they collect and process. …”
    Get full text
    Article
  13. 153

    Analyses on standards and regulations for connected and automated vehicles: Identifying the certifications roadmap by Meriem Benyahya, Anastasija Collen, Niels Alexander Nijdam

    Published 2023-12-01
    “…Protecting Connected and Automated Vehicle (CAV) from cyber attacks and data breaches is a major challenge facing the deployment of driverless vehicles. …”
    Get full text
    Article
  14. 154

    Ethical Dilemmas and Privacy Issues in Emerging Technologies: A Review by Lubna Luxmi Dhirani, Noorain Mukhtiar, Bhawani Shankar Chowdhry, Thomas Newe

    Published 2023-01-01
    “…Having vague and inconsistent ethical guidelines leaves potential gray areas leading to privacy, ethical, and data breaches that must be resolved. This paper examines the ethical dimensions and dilemmas associated with emerging technologies and provides potential methods to mitigate their legal/regulatory issues.…”
    Get full text
    Article
  15. 155

    Impact of Artificial Intelligence (AI) Technology in Healthcare Sector: A Critical Evaluation of Both Sides of the Coin by Md. Ashrafur Rahman, Evangelos Victoros, Julianne Ernest, Rob Davis, Yeasna Shanjana, Md. Rabiul Islam

    Published 2024-01-01
    “…However, there are few controversies such as increased chances of data breaches, concern for clinical implementation, and potential healthcare dilemmas. …”
    Get full text
    Article
  16. 156

    Notches on the dial: a call to action to develop plain language communication with the public about users and uses of health data by P Alison Paprica, Kimberlyn McGrail, Michael J Schull, Dr.

    Published 2019-08-01
    “…The media and members of the public have taken notice, with high profile news stories about data breaches and privacy concerns [2-4] alongside some stories that call for increased use of data [5,6]. …”
    Get full text
    Article
  17. 157

    A lightweight framework for cyber risk management in Western Balkan higher education institutions by Krenar Kepuska, Milo Tomasevic

    Published 2024-04-01
    “…Higher education institutions (HEIs) have a significant presence in cyberspace. Data breaches in academic institutions are becoming prevalent. …”
    Get full text
    Article
  18. 158

    Security Perception of IoT Devices in Smart Homes by Lili Nemec Zlatolas, Nataša Feher, Marko Hölbl

    Published 2022-02-01
    “…The results show that users’ awareness of data breaches, ransomware attacks, personal information access breaches, and device vulnerabilities have an effect on IoT security importance. …”
    Get full text
    Article
  19. 159

    “Who Should I Trust with My Data?” Ethical and Legal Challenges for Innovation in New Decentralized Data Management Technologies by Haleh Asgarinia, Andres Chomczyk Penedo, Beatriz Esteves, Dave Lewis

    Published 2023-06-01
    “…News about personal data breaches or data abusive practices, such as Cambridge Analytica, has questioned the trustworthiness of certain actors in the control of personal data. …”
    Get full text
    Article
  20. 160

    Intrusion detection attack patterns in cloud computing: trust and risk assessment by Chrysikos, Alexandros

    Published 2018
    “…Cloud services are also exposed to security incidents, such as data breaches and other malicious activities. To mitigate risks to the confidentiality, integrity, and availability of assets, but also minimise loss to cloud service providers and users, the attack trust and risk elements need to be identified, classified, and prioritised. …”
    Get full text
    Conference or Workshop Item