Academic literature on the topic '4604 Cybersecurity and privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic '4604 Cybersecurity and privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "4604 Cybersecurity and privacy"
Bojanova, Irena, Jeffrey Voas, Morris Chang, and Linda Wilbanks. "Cybersecurity or Privacy [Guest editors' introduction]." IT Professional 18, no. 5 (September 2016): 16–17. http://dx.doi.org/10.1109/mitp.2016.80.
Full textMishra, Neha. "Privacy, Cybersecurity, and GATS Article XIV: A New Frontier for Trade and Internet Regulation?" World Trade Review 19, no. 3 (May 2, 2019): 341–64. http://dx.doi.org/10.1017/s1474745619000120.
Full textBarth, Susanne, Menno D. T. de Jong, and Marianne Junger. "Lost in privacy? Online privacy from a cybersecurity expert perspective." Telematics and Informatics 68 (March 2022): 101782. http://dx.doi.org/10.1016/j.tele.2022.101782.
Full textPehlivan, Ceyhun Necati. "Global Privacy News." Global Privacy Law Review 1, Issue 1 (March 1, 2020): 63–76. http://dx.doi.org/10.54648/gplr2020009.
Full textKhatoun, Rida, and Sherali Zeadally. "Cybersecurity and Privacy Solutions in Smart Cities." IEEE Communications Magazine 55, no. 3 (March 2017): 51–59. http://dx.doi.org/10.1109/mcom.2017.1600297cm.
Full textLandwehr, C., D. Boneh, J. C. Mitchell, S. M. Bellovin, S. Landau, and M. E. Lesk. "Privacy and Cybersecurity: The Next 100 Years." Proceedings of the IEEE 100, Special Centennial Issue (May 2012): 1659–73. http://dx.doi.org/10.1109/jproc.2012.2189794.
Full textPattanasri, Thanaphol. "Mandatory Data Breach Notification and Hacking the Smart Home: A Legal Response to Cybersecurity?" QUT Law Review 18, no. 2 (March 1, 2019): 268. http://dx.doi.org/10.5204/qutlr.v18i2.752.
Full textPattanasri, Thanaphol. "Mandatory Data Breach Notification and Hacking the Smart Home: A Legal Response to Cybersecurity?" QUT Law Review 18, no. 2 (March 5, 2019): 268. http://dx.doi.org/10.5204/qutlr.v18i2.770.
Full textJofre, Marc, Diana Navarro-Llobet, Ramon Agulló, Jordi Puig, Gustavo Gonzalez-Granadillo, Juan Mora Zamorano, and Ramon Romeu. "Cybersecurity and Privacy Risk Assessment of Point-of-Care Systems in Healthcare—A Use Case Approach." Applied Sciences 11, no. 15 (July 21, 2021): 6699. http://dx.doi.org/10.3390/app11156699.
Full textLandwehr, Carl. "Prolog to the Section on Privacy and Cybersecurity." Proceedings of the IEEE 100, Special Centennial Issue (May 2012): 1657–58. http://dx.doi.org/10.1109/jproc.2012.2189820.
Full textDissertations / Theses on the topic "4604 Cybersecurity and privacy"
Akbari, Koochaksaraee Amir. "End-User Security & Privacy Behaviour on Social Media: Exploring Posture, Proficiency & Practice." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39310.
Full textDell'Elce, Martina. "Industria 4.0 ed Internet of Things, nuove sfide per la cybersecurity." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Find full textDas, Sauvik. "Social Cybersecurity: Reshaping Security Through An Empirical Understanding of Human Social Behavior." Research Showcase @ CMU, 2017. http://repository.cmu.edu/dissertations/982.
Full textBheemanathini, Sai Nikhil. "A Systematic Review of Blockchain Technology: Privacy Concerns, Security Challenges, and Solutions." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1563273858006378.
Full textDoyle, Marc. "Comprehending the Safety Paradox and Privacy Concerns with Medical Device Remote Patient Monitoring." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1090.
Full textSantos, Susana Isabel da Silva. "“Estudo das perceções de cibersegurança e cibercrime e das implicações na formulação de Políticas Públicas - estudo exploratório do caso português." Master's thesis, Instituto Superior de Ciências Sociais e Políticas, 2018. http://hdl.handle.net/10400.5/16235.
Full textOs serviços online tornaram-se uma parte importante das nossas vidas, nomeadamente porque permitem o acesso à informação em qualquer sítio, a qualquer momento. Por assim ser, este tipo de serviços é útil não apenas para os utilizadores, mas para qualquer empresa ou instituição pública, nomeadamente por ajudar a reduzir os seus custos operacionais – por via da redução da infraestrutura física, da menor necessidade de recursos humanos, apresentando-se ainda menos dispendiosa, mais célere e cômoda para qualquer utente, se pensarmos por exemplo nos serviços públicos. Posto isso, este projeto de dissertação procurou descrever as perceções de cibercrime e cibersegurança dos cidadãos portugueses. Os dados necessários à elaboração da investigação foram recolhidos entre os dias 6 de julho e 6 de setembro de 2015, totalizando um total de 431 respostas, de inquiridos nacionais. Os resultados obtidos demonstram a preocupação com a privacidade, nomeadamente com os dados pessoais. Das três dimensões encontradas, com impacto na dimensão depende – Perceção da Ação do Estado – salienta-se “Segurança de Dados e Familiarização” o que leva a crer que maiores níveis de conhecimento e consciencialização levam a melhores níveis de satisfação. A formação de dois clusters permitiu verificar que a característica mais evidente é o género do indivíduo, razão pela qual, posteriormente, foram analisas as variáveis com diferenças estatisticamente significantes. Desta análise, salientam-se as variáveis relativas ao entendimento sobre a matéria, e à satisfação com a Ação do Estado.
Online services have become an important part of our lives, in particular, because they allow access to information anywhere, anytime. Because of that, this type of service is useful not only for mere users but for any company or public institution, in particular by helping to reduce its operating costs – by reducing physical infrastructure, the need for human resources, for being even cheaper, faster and comfortable for any user, if we think, for example, of public services. Thus, this dissertation project aims to describe the perceptions of cybercrime and cybersecurity of Portuguese citizens. The data was collected between July 6 and September 6, 2015, with a total of 431 responses, from national respondents. The results obtained prove the concern for privacy, particularly with personal data. Of the three dimensions found, with impact on the dimension depends - State Action Perception - highlights "Data Security and Familiarization" which leads to believe that higher levels of knowledge and awareness lead to better levels of satisfaction. The formation of two clusters allowed us to verify that the most obvious characteristic is the gender of the individual, reason why, afterward, differences in the means of variables were analyzed. From this analysis, we highlight the variables related to the understanding of the subject and the satisfaction with the State Action.
N/A
Conzo, Naomi. "Privacy e "Social dilemma": aspetti etico-informatici legati al trattamento online dei dati personali sui social media." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2021.
Find full textRaad, Eliana. "Towards better privacy preservation by detecting personal events in photos shared within online social networks." Thesis, Dijon, 2015. http://www.theses.fr/2015DIJOS079/document.
Full textToday, social networking has considerably changed why people are taking pictures all the time everywhere they go. More than 500 million photos are uploaded and shared every day, along with more than 200 hours of videos every minute. More particularly, with the ubiquity of smartphones, social network users are now taking photos of events in their lives, travels, experiences, etc. and instantly uploading them online. Such public data sharing puts at risk the users’ privacy and expose them to a surveillance that is growing at a very rapid rate. Furthermore, new techniques are used today to extract publicly shared data and combine it with other data in ways never before thought possible. However, social networks users do not realize the wealth of information gathered from image data and which could be used to track all their activities at every moment (e.g., the case of cyberstalking). Therefore, in many situations (such as politics, fraud fighting and cultural critics, etc.), it becomes extremely hard to maintain individuals’ anonymity when the authors of the published data need to remain anonymous.Thus, the aim of this work is to provide a privacy-preserving constraint (de-linkability) to bound the amount of information that can be used to re-identify individuals using online profile information. Firstly, we provide a framework able to quantify the re-identification threat and sanitize multimedia documents to be published and shared. Secondly, we propose a new approach to enrich the profile information of the individuals to protect. Therefore, we exploit personal events in the individuals’ own posts as well as those shared by their friends/contacts. Specifically, our approach is able to detect and link users’ elementary events using photos (and related metadata) shared within their online social networks. A prototype has been implemented and several experiments have been conducted in this work to validate our different contributions
Chenthara, Shekha. "Privacy Preservation of Electronic Health Records Using Blockchain Technology: Healthchain." Thesis, 2021. https://vuir.vu.edu.au/42459/.
Full textAfzaliSeresht, Neda. "Explainable Intelligence for Comprehensive Interpretation of Cybersecurity Data in Incident Management." Thesis, 2022. https://vuir.vu.edu.au/44414/.
Full textBooks on the topic "4604 Cybersecurity and privacy"
Maleh, Yassine, Mohammad Shojafar, Mamoun Alazab, and Imed Romdhani, eds. Blockchain for Cybersecurity and Privacy. First edition. | Boca Raton, FL : CRC Press, 2020. | Series: Internal audit and it audit: CRC Press, 2020. http://dx.doi.org/10.1201/9780429324932.
Full textChoo, Kim-Kwang Raymond, Ali Dehghantanha, and Reza M. Parizi, eds. Blockchain Cybersecurity, Trust and Privacy. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38181-3.
Full textMoallem, Abbas, ed. HCI for Cybersecurity, Privacy and Trust. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77392-2.
Full textLukings, Melissa, and Arash Habibi Lashkari. Understanding Cybersecurity Law and Digital Privacy. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-88704-9.
Full textMoallem, Abbas, ed. HCI for Cybersecurity, Privacy and Trust. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-05563-8.
Full textSørensen, Lene, Knud Erik Skouby, and Samant Khajuria. Cybersecurity and Privacy - Bridging the Gap. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003337812.
Full textMoallem, Abbas, ed. HCI for Cybersecurity, Privacy and Trust. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22351-9.
Full textMoallem, Abbas, ed. HCI for Cybersecurity, Privacy and Trust. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50309-3.
Full textCybersecurity litigation: Consumer data protection and privacy. Washington, D.C: Bloomberg BNA, 2015.
Find full textSchünemann, Wolf J., and Max-Otto Baumann, eds. Privacy, Data Protection and Cybersecurity in Europe. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53634-7.
Full textBook chapters on the topic "4604 Cybersecurity and privacy"
Wilbanks, Linda R. "CyberSecurity Privacy Risks." In Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity, 191–98. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79997-7_24.
Full textManjikian, Mary. "The Problem of Privacy." In Cybersecurity Ethics, 69–99. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-6.
Full textQaddoura, Raneem, and Nameer N. El-Emam. "Privacy Preservation Tools and Techniques in Artificial Intelligence." In Cybersecurity, 161–82. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003145042-11.
Full textPhillips, Joshua, and Mark D. Ryan. "A Future for Privacy." In SpringerBriefs in Cybersecurity, 91–115. London: Springer London, 2014. http://dx.doi.org/10.1007/978-1-4471-6530-9_2.
Full textNurse, Jason R. C. "Cybersecurity Awareness." In Encyclopedia of Cryptography, Security and Privacy, 1–4. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1596-1.
Full textHodson, Christopher. "Cybersecurity Skills." In Encyclopedia of Cryptography, Security and Privacy, 1–5. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1577-1.
Full textLukings, Melissa, and Arash Habibi Lashkari. "Cybersecurity and Cybercrimes." In Understanding Cybersecurity Law and Digital Privacy, 59–96. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-88704-9_3.
Full textJiang, Honglu, Yifeng Gao, S. M. Sarwar, Luis GarzaPerez, and Mahmudul Robin. "Differential Privacy in Privacy-Preserving Big Data and Learning: Challenge and Opportunity." In Silicon Valley Cybersecurity Conference, 33–44. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96057-5_3.
Full textKilpala, Minna, Tommi Kärkkäinen, and Timo Hämäläinen. "Differential Privacy: An Umbrella Review." In Artificial Intelligence and Cybersecurity, 167–83. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-15030-2_8.
Full textStalla-Bourdillon, Sophie. "Privacy Versus Security… Are We Done Yet?" In SpringerBriefs in Cybersecurity, 1–90. London: Springer London, 2014. http://dx.doi.org/10.1007/978-1-4471-6530-9_1.
Full textConference papers on the topic "4604 Cybersecurity and privacy"
Wu, Yuxi, W. Keith Edwards, and Sauvik Das. "SoK: Social Cybersecurity." In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 2022. http://dx.doi.org/10.1109/sp46214.2022.9833757.
Full textBonfanti, Matteo E. "Enhancing Cybersecurity by Safeguarding Information Privacy." In ARES 2018: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3230833.3233289.
Full textBhatia, Jaspreet, Travis D. Breaux, Liora Friedberg, Hanan Hibshi, and Daniel Smullen. "Privacy Risk in Cybersecurity Data Sharing." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2994539.2994541.
Full textVakilinia, Iman, Deepak K. Tosh, and Shamik Sengupta. "Privacy-preserving cybersecurity information exchange mechanism." In 2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS). IEEE, 2017. http://dx.doi.org/10.23919/spects.2017.8046783.
Full textScott, Charles, Devin Wynne, and Chutima Boonthum-Denecke. "Examining the Privacy of Login Credentials Using Web-Based Single Sign-on - Are We Giving Up Security and Privacy for Convenience?" In 2016 Cybersecurity Symposium (CYBERSEC). IEEE, 2016. http://dx.doi.org/10.1109/cybersec.2016.019.
Full textBeckerle, Matthias, Argyro Chatzopoulou, and Simone Fischer-Hubner. "Towards Cybersecurity MOOC Certification." In 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2021. http://dx.doi.org/10.1109/eurospw54576.2021.00008.
Full textTavakolan, Mona, and Ismaeel A. Faridi. "Applying Privacy-Aware Policies in IoT Devices Using Privacy Metrics." In 2020 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI). IEEE, 2020. http://dx.doi.org/10.1109/ccci49893.2020.9256605.
Full textBeuran, Razvan, Cuong Pham, Dat Tang, Ken-ichi Chinen, Yasuo Tan, and Yoichi Shinoda. "CyTrONE: An Integrated Cybersecurity Training Framework." In 3rd International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2017. http://dx.doi.org/10.5220/0006206401570166.
Full textHutschenreuter, Helmar, Salva Çakmakçı, Christian Maeder, and Thomas Kemmerich. "Ontology-based Cybersecurity and Resilience Framework." In 7th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010233604580466.
Full textDavis, Brittany, Christopher Whitfield, and Mohd Anwar. "Extended Abstract: Ethical and Privacy Considerations in Cybersecurity." In 2018 16th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2018. http://dx.doi.org/10.1109/pst.2018.8514188.
Full textReports on the topic "4604 Cybersecurity and privacy"
O'Reilly, Patrick, Kristina Rigopoulos, Larry Feldman, and Greg Witte. 2020 Cybersecurity and Privacy Annual Report. National Institute of Standards and Technology, September 2021. http://dx.doi.org/10.6028/nist.sp.800-214.
Full textO'Reilly, Patrick D. 2021 Cybersecurity and Privacy Annual Report. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.800-220.
Full textMitchell, Matt, and Catalina Vallejo. Cybersecurity, Surveillance, and Privacy: An Interview with Matt Mitchell. Just Tech, Social Science Research Council, March 2022. http://dx.doi.org/10.35650/jt.3031.d.2022.
Full textBoeckl, Katie, Michael Fagan, William Fisher, Naomi Lefkovitz, Katerina N. Megas, Ellen Nadeau, Danna Gabel O'Rourke, Ben Piccarreta, and Karen Scarfone. Considerations for managing Internet of Things (IoT) cybersecurity and privacy risks. Gaithersburg, MD: National Institute of Standards and Technology, June 2019. http://dx.doi.org/10.6028/nist.ir.8228.
Full textProwell, Stacy, David Manz, Candace Culhane, Sheikh Ghafoor, Martine Kalke, Kate Keahey, Celeste Matarazzo, Chris Oehmen, Sean Peisert, and Ali Pinar. Position Papers for the ASCR Workshop on Cybersecurity and Privacy for Scientific Computing Ecosystems. Office of Scientific and Technical Information (OSTI), November 2021. http://dx.doi.org/10.2172/1843573.
Full textPookulangara, Sanjukta. Does Gender Matter: An Exploratory Study of Influence of Cybersecurity, Privacy, and Trust on Purchase Intention. Ames: Iowa State University, Digital Repository, November 2015. http://dx.doi.org/10.31274/itaa_proceedings-180814-52.
Full textHakmeh, Joyce, Emily Taylor, Allison Peters, and Sophia Ignatidou. The COVID-19 pandemic and trends in technology. Royal Institute of International Affairs, February 2021. http://dx.doi.org/10.55317/9781784134365.
Full text