-
141
Safe clinical photography: best practice guidelines for risk management and mitigation
Published 2021-05-01“…Based on a literature search of both PubMed and the web (via Google) with key phrases and child terms (for PubMed), the risks and consequences of data breaches in individual processes in clinical photography are identified. …”
Get full text
Article -
142
Essays on Information Technology, Human Capital, and the Future of Work
Published 2022“…Substantive and Symbolic Talent Acquisition in Response to Data Breaches’, I use the data from the first chapter to study firms’ hiring responses to data breaches. …”
Get full text
Thesis -
143
Cloud Digital Forensics: Beyond Tools, Techniques, and Challenges
Published 2024-01-01“…Furthermore, the research has scrutinized several well-documented data breaches, analyzing the financial consequences they inflicted. …”
Get full text
Article -
144
Evaluation the Information Security Management System: A Path Towards ISO 27001 Certification
Published 2023-11-01“…It introduces the context of pervasive data breaches that necessitate stringent security measures. …”
Get full text
Article -
145
Data collection : use and misuse
Published 2019“…Possible remedies will be suggested to curb personal data misuse and data breaches will be discussed.…”
Get full text
Get full text
Conference Paper -
146
Features state of hemostasis and immunopathological reactions in epstein-barr virus infection in children
Published 2015-07-01“…The revealed correlation of data breaches with the severity of the infectious process. …”
Get full text
Article -
147
Classifying Database Users for Intrusion Prediction and Detection in Data Security
Published 2020-01-01“…Recently however, with the widespread use of the internet, some security problems, such as unauthorized access, data breaches, code infection, malware infections, data leaks and distributed denial of service attacks have emerged. …”
Get full text
Article -
148
Challenges of Complying with Data Protection and Privacy Regulations
Published 2021-04-01“…This influx in data, partnered with challenges complying with data protection and privacy regulations and the absence of a comprehensive global data protection and privacy strategy, has contributed to data breaches and data misusage. In order to reduce these incidents, updates must be made to existing regulations and included in future regulations. …”
Get full text
Article -
149
Blockchain Integration in Industry 5.0: A Security Experiment for Resilience Assessment
Published 2024-01-01“…Security issues highlight the need of ongoing watchfulness; in the R&D department, data breaches have increased by 30%. The Manufacturing department scored 85% on the resilience evaluation, which reveals diversity in departmental flexibility. …”
Get full text
Article -
150
PbDinEHR: A Novel Privacy by Design Developed Framework Using Distributed Data Storage and Sharing for Secure and Scalable Electronic Health Records Management
Published 2023-04-01“…The complete solution is expected to provide progressive resistance in the face of continuous data breaches in the patient information domain.…”
Get full text
Article -
151
A Data Taxonomy for Adaptive Multifactor Authentication in the Internet of Health Care Things
Published 2023-08-01“…During the COVID-19 pandemic, studies have shown that cybercriminals are exploiting the health care industry, and data breaches are targeting user credentials through authentication vulnerabilities. …”
Get full text
Article -
152
A Survey on IoT Security Using Cryptographic Algorithms
Published 2023-01-01“…IoT devices are vulnerable to a range of security hazards, including malware attacks, unauthorised access, and data breaches, which may jeopardise the confidentiality, integrity, and accessibility of the data they collect and process. …”
Get full text
Article -
153
Analyses on standards and regulations for connected and automated vehicles: Identifying the certifications roadmap
Published 2023-12-01“…Protecting Connected and Automated Vehicle (CAV) from cyber attacks and data breaches is a major challenge facing the deployment of driverless vehicles. …”
Get full text
Article -
154
Ethical Dilemmas and Privacy Issues in Emerging Technologies: A Review
Published 2023-01-01“…Having vague and inconsistent ethical guidelines leaves potential gray areas leading to privacy, ethical, and data breaches that must be resolved. This paper examines the ethical dimensions and dilemmas associated with emerging technologies and provides potential methods to mitigate their legal/regulatory issues.…”
Get full text
Article -
155
Impact of Artificial Intelligence (AI) Technology in Healthcare Sector: A Critical Evaluation of Both Sides of the Coin
Published 2024-01-01“…However, there are few controversies such as increased chances of data breaches, concern for clinical implementation, and potential healthcare dilemmas. …”
Get full text
Article -
156
Notches on the dial: a call to action to develop plain language communication with the public about users and uses of health data
Published 2019-08-01“…The media and members of the public have taken notice, with high profile news stories about data breaches and privacy concerns [2-4] alongside some stories that call for increased use of data [5,6]. …”
Get full text
Article -
157
A lightweight framework for cyber risk management in Western Balkan higher education institutions
Published 2024-04-01“…Higher education institutions (HEIs) have a significant presence in cyberspace. Data breaches in academic institutions are becoming prevalent. …”
Get full text
Article -
158
Security Perception of IoT Devices in Smart Homes
Published 2022-02-01“…The results show that users’ awareness of data breaches, ransomware attacks, personal information access breaches, and device vulnerabilities have an effect on IoT security importance. …”
Get full text
Article -
159
“Who Should I Trust with My Data?” Ethical and Legal Challenges for Innovation in New Decentralized Data Management Technologies
Published 2023-06-01“…News about personal data breaches or data abusive practices, such as Cambridge Analytica, has questioned the trustworthiness of certain actors in the control of personal data. …”
Get full text
Article -
160
Intrusion detection attack patterns in cloud computing: trust and risk assessment
Published 2018“…Cloud services are also exposed to security incidents, such as data breaches and other malicious activities. To mitigate risks to the confidentiality, integrity, and availability of assets, but also minimise loss to cloud service providers and users, the attack trust and risk elements need to be identified, classified, and prioritised. …”
Get full text
Conference or Workshop Item