To see the other types of publications on this topic, follow the link: Cloud Computing in Legal Practice.

Journal articles on the topic 'Cloud Computing in Legal Practice'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cloud Computing in Legal Practice.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wang, Faye Fangfei. "Jurisdiction and Cloud Computing: Further Challenges to Internet Jurisdiction." European Business Law Review 24, Issue 5 (2013): 589–616. http://dx.doi.org/10.54648/eulr2013029.

Full text
Abstract:
As a result of technologic innovation and optimization, the advent of cloud computing may change the way we work, communicate with each other and share information. In the cloud-based environment, access to computing resources (such as storage, processing and software) has shifted from an internal network to a public network in particular in the public cloud environment. It may challenge the allocation of responsibility among cloud providers, cloud customers and cloud users. Subsequently it may affect the attribution of title to data controllers and data processors. This paper undertakes prima
APA, Harvard, Vancouver, ISO, and other styles
2

Vumo, Ambrosio Patricio. "A Study into Privacy and Legal Issues in Cloud Computing: The Mozambican Context." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 511–17. http://dx.doi.org/10.34190/iccws.19.1.2095.

Full text
Abstract:
During the last 10 years, Cloud computing has become an evolving technology providing several benefits such as cost reduction and high flexibility. However, one of the main challenges related to cloud computing is related to data security and privacy. Despite this, worldwide many countries, specially developed countries have adopted cloud computing technology. In Africa, specifically in the Southern African Development Community (SADC), Mozambique is one the countries who has recently adopted cloud computing technology. However, on the contrary to countries such as Mauritius and South Africa,
APA, Harvard, Vancouver, ISO, and other styles
3

Kaur, Prabhpreet, and Monika Sachdeva. "A Survey On Cloud Computing and Its Benefits." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 4 (2015): 6643–48. http://dx.doi.org/10.24297/ijct.v15i4.6905.

Full text
Abstract:
Cloud computing is an increasingly popular paradigm for accessing computing resources. In practice, cloud service providers tend to offer services that can be grouped into three categories: software as a service, platform as a service, and infrastructure as a service. Cloud computing represents a shift away from computing as a product that is purchased, to computing as a service that is delivered to consumers over the internet from large-scale data centers – or ‘clouds’. This paper discusses some of the research challenges for cloud computing from an enterprise or organizational perspect
APA, Harvard, Vancouver, ISO, and other styles
4

Grzegorek, Agnieszka. "Bezpieczeństwo oraz aspekty prawne przetwarzania danych w chmurze obliczeniowej." Studia Iuridica 72 (April 17, 2018): 149–63. http://dx.doi.org/10.5604/01.3001.0011.7592.

Full text
Abstract:
Many issues need to be considered and tackled before moving data into the cloud. Adoption of cloud computing raises concerns and questions in particular with respect to security, control and privacy in cloud computing environment. Users should be aware where their data will be stored and what law governs. In a case where personal data are to be processed it is important for the contracting parties to ensure that requirements and obligations placed on them pursuant to the EU data protection laws will be fulfilled. This article also includes an overview of typical terms and conditions of cloud c
APA, Harvard, Vancouver, ISO, and other styles
5

Oluwafemi Clement Adeusi, Yusuf Olalekan Adebayo, Praise Ayomide Ayodele, Tajudeen Tunde Onikoyi, Kayode Blessing Adebayo, and Ibrahim Oyeyemi Adenekan. "IT standardization in cloud computing: Security challenges, benefits, and future directions." World Journal of Advanced Research and Reviews 22, no. 3 (2024): 2050–57. http://dx.doi.org/10.30574/wjarr.2024.22.3.1982.

Full text
Abstract:
Cloud computing has revolutionized information technology, offering scalable solutions for businesses. However, security concerns hinder widespread adoption, especially among SMEs. This review examines IT standardization in cloud environments, focusing on security challenges and benefits. We explore cloud computing concepts, deployment strategies, and service models. Security challenges are analyzed from organizational, technological, and legal perspectives. The study highlights potential security benefits and introduces Security as a Service. Future trends in cloud security, including AI and
APA, Harvard, Vancouver, ISO, and other styles
6

Oluwafemi, Clement Adeusi, Olalekan Adebayo Yusuf, Ayomide Ayodele Praise, Tunde Onikoyi Tajudeen, Blessing Adebayo Kayode, and Oyeyemi Adenekan Ibrahim. "IT standardization in cloud computing: Security challenges, benefits, and future directions." World Journal of Advanced Research and Reviews 22, no. 3 (2024): 2050–57. https://doi.org/10.5281/zenodo.14769174.

Full text
Abstract:
Cloud computing has revolutionized information technology, offering scalable solutions for businesses. However, security concerns hinder widespread adoption, especially among SMEs. This review examines IT standardization in cloud environments, focusing on security challenges and benefits. We explore cloud computing concepts, deployment strategies, and service models. Security challenges are analyzed from organizational, technological, and legal perspectives. The study highlights potential security benefits and introduces Security as a Service. Future trends in cloud security, including AI and
APA, Harvard, Vancouver, ISO, and other styles
7

Shanbhag, Rishabh Rajesh, Ugandhar Dasi, Nikhil Singla, Rajkumar Balasubramanian, and Siddhant Benadikar. "Overview of Cloud Computing in the Process Control Industry." International Journal of Computer Science and Mobile Computing 9, no. 10 (2020): 121–46. http://dx.doi.org/10.47760/ijcsmc.2020.v09i10.016.

Full text
Abstract:
Much of the existing literature on cloud computing in process control industry discusses research up to 2019 and this paper aims at presenting a detailed apprehension of the cloud computing technologies being implemented in the process control industry up to the specified year. This paper introduces the principal ideas of cloud computing, the utilization of the technologies in process control systems and potential advantages and disadvantages. It also focuses on the critical areas for application, best practices, and such ideas as the suitability of AI in the spheres of education, healthcare,
APA, Harvard, Vancouver, ISO, and other styles
8

Alwageed, Hathal Salamah, Ismail Keshta, Rafiq Ahmad Khan, Abdulrahman Alzahrani, Muhammad Usman Tariq, and Anwar Ghani. "An empirical study for mitigating sustainable cloud computing challenges using ISM-ANN." PLOS ONE 19, no. 9 (2024): e0308971. http://dx.doi.org/10.1371/journal.pone.0308971.

Full text
Abstract:
The significance of cloud computing methods in everyday life is growing as a result of the exponential advancement and refinement of artificial technology. As cloud computing makes more progress, it will bring with it new opportunities and threats that affect the long-term health of society and the environment. Many questions remain unanswered regarding sustainability, such as, "How will widely available computing systems affect environmental equilibrium”? When hundreds of millions of microcomputers are invisible to each other, what will society look like? What does this mean for social sustai
APA, Harvard, Vancouver, ISO, and other styles
9

Cinar, Burak. "The Role of Cloud Service Brokers: Enhancing Security and Compliance in Multi-cloud Environments." Journal of Engineering Research and Reports 25, no. 10 (2023): 1–11. http://dx.doi.org/10.9734/jerr/2023/v25i10995.

Full text
Abstract:

 The goal of this study is to put encryption key management strategies into practice while taking legal restrictions and the necessity for data accessibility into account. In order to reduce the danger of unauthorized access to cloud resources, this article explores the creation of Identity and Access Management (IAM) solutions that successfully apply role-based access control and abide by the least privilege principle. The advancement of digital business is both facilitated and disrupted by the usage of cloud technologies. Spending on cloud computing platforms and infrastructure is expe
APA, Harvard, Vancouver, ISO, and other styles
10

Rishabh Rajesh Shanbhag, Rajkumar Balasubramanian, Ugandhar Dasi, Nikhil Singla, and Siddhant Benadikar. "Case Studies and Best Practices in Cloud-Based Big Data Analytics for Process Control." International Journal for Research Publication and Seminar 13, no. 5 (2022): 292–311. http://dx.doi.org/10.36676/jrps.v13.i5.1462.

Full text
Abstract:
In this research paper, case studies and exemplars and lessons learnt in cloud-based big data analytics for process control are reviewed. The paper presents big data, cloud computing and industrial process control system with prospects of enhancing effectiveness, increasing production rates, and effective decision making in the industries. The research in this paper involves a comprehensive literature review of the research topic, and an extension of the analysis to four specific business industries as well as a discussion of architectural elements for cloud-based big data solutions for proces
APA, Harvard, Vancouver, ISO, and other styles
11

Janet Julia Ang'udi. "Security challenges in cloud computing: A comprehensive analysis." World Journal of Advanced Engineering Technology and Sciences 10, no. 2 (2023): 155–81. http://dx.doi.org/10.30574/wjaets.2023.10.2.0304.

Full text
Abstract:
The security issues surrounding cloud computing, a quickly developing technology that is now essential to both personal and business computing, are thoroughly examined in this study. Cloud computing presents serious security risks that require careful attention, despite its many advantages such as scalability, cost-effectiveness, and flexibility. In-depth discussions of a number of important security topics are covered in this paper, including network security, access control, data breaches, legal and regulatory framework compliance, and new threats and vulnerabilities. The paper illuminates t
APA, Harvard, Vancouver, ISO, and other styles
12

Elsawy, Elsayed Salah. "The Reality of Using Cloud Computing in Information and Record Management in Oman." Journal of Ecohumanism 3, no. 4 (2024): 2884–98. http://dx.doi.org/10.62754/joe.v3i4.3804.

Full text
Abstract:
The aim of this study is to explore the main applications of cloud computing in records management and to understand the views of records managers on the use of these applications in Omani institutions. It aims to identify the benefits, potential challenges, and the proposed solutions associated with the implementation of cloud computing in records management. The study used the descriptive analytical approach and conducted surveys to collect data on the use of cloud computing applications to manage, store, and access records in Omani institutions. The study included the views of 105 records m
APA, Harvard, Vancouver, ISO, and other styles
13

Dharmawan, Ni Ketut Supasti, Desak Putu Dewi Kasih, and Deris Stiawan. "Personal data protection and liability of internet service provider: a comparative approach." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 4 (2019): 3175. http://dx.doi.org/10.11591/ijece.v9i4.pp3175-3184.

Full text
Abstract:
The users of electronic service provider often suffered losses caused by internet services did not work properly including losses due to leakage of personal data protection stored in cloud computing. The study aims to examine electronic service provider liability upon their failure performing internet services properly and security attacks on cloud computing. This study was normative legal research by examining national and international legal materials. The finding shows that the electronic provider shall be responsible based on right and obligation agreed under the agreement. Related to clou
APA, Harvard, Vancouver, ISO, and other styles
14

Ni, Ketut Supasti Dharmawan, Putu Dewi Kasih Desak, and Stiawan Deris. "Personal data protection and liability of internet service provider: a comparative approach." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 4 (2019): 3175–84. https://doi.org/10.11591/ijece.v9i4.pp3175-3184.

Full text
Abstract:
The users of electronic service provider often suffered losses caused by internet services did not work properly including losses due to leakage of personal data protection stored in cloud computing. The study aims to examine electronic service provider liability upon their failure performing internet services properly and security attacks on cloud computing. This study was normative legal research by examining national and international legal materials. The finding shows that the electronic provider shall be responsible based on right and obligation agreed under the agreement. Related to clou
APA, Harvard, Vancouver, ISO, and other styles
15

Apeh Jonathan Apeh, Azeez Olanipekun Hassan, Olajumoke Omotola Oyewole, Ololade Gilbert Fakeyede, Patrick Azuka Okeleke, and Olubukola Rhoda Adaramodu. "GRC STRATEGIES IN MODERN CLOUD INFRASTRUCTURES: A REVIEW OF COMPLIANCE CHALLENGES." Computer Science & IT Research Journal 4, no. 2 (2023): 111–25. http://dx.doi.org/10.51594/csitrj.v4i2.609.

Full text
Abstract:
This research paper delves into the intricate landscape of Governance, Risk, and Compliance (GRC) in modern cloud infrastructures. As organisations increasingly migrate critical operations to the cloud, they encounter data security, legal compliance, and effective vendor management challenges. The paper explores a comprehensive range of GRC strategies, technological solutions, and best practices to address these challenges. It investigates the evolving regulatory landscape, the shared responsibility model, and the dynamic nature of cloud environments. Technological solutions, including cloud-n
APA, Harvard, Vancouver, ISO, and other styles
16

Adebola, Folorunso, Adewa Adeola, Babalola Olufunbi, and Edger Nwatu Chineme. "A governance framework model for cloud computing: role of AI, security, compliance, and management." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 1969–82. https://doi.org/10.5281/zenodo.15105740.

Full text
Abstract:
The rapid adoption of cloud computing has transformed how organizations manage their IT resources, necessitating robust governance frameworks to address the complexities and risks inherent in cloud environments. This review proposes a comprehensive governance framework model that integrates the roles of artificial intelligence (AI), security, compliance, and management to enhance the effectiveness of cloud operations.  AI plays a critical role in optimizing resource allocation and improving decision-making processes within cloud governance. By leveraging machine learning algorithms, organ
APA, Harvard, Vancouver, ISO, and other styles
17

Badzeliuk, P. "Advocacy in the cloud: new digital challenges and realities of today." Uzhhorod National University Herald. Series: Law, no. 71 (August 25, 2022): 333–37. http://dx.doi.org/10.24144/2307-3322.2022.71.56.

Full text
Abstract:
Digitization has become a buzzword in the legal world, arousing considerable interest in the future of the legal profession. A number of innovative legal service providers have entered the legal services market, which is currently challenging the monopoly of lawyers on the practice of law and, ultimately, changing the way of production in the legal field. We have already witnessed significant digitization in due diligence, contract review, legal research, electronic detection, document forecasting and automation technologies, and tools such as client portals and Internet collaboration platform
APA, Harvard, Vancouver, ISO, and other styles
18

Adebola Folorunso, Adeola Adewa, Olufunbi Babalola, and Chineme Edgar Nwatu. "A governance framework model for cloud computing: role of AI, security, compliance, and management." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 1969–82. http://dx.doi.org/10.30574/wjarr.2024.24.2.3513.

Full text
Abstract:
The rapid adoption of cloud computing has transformed how organizations manage their IT resources, necessitating robust governance frameworks to address the complexities and risks inherent in cloud environments. This review proposes a comprehensive governance framework model that integrates the roles of artificial intelligence (AI), security, compliance, and management to enhance the effectiveness of cloud operations. AI plays a critical role in optimizing resource allocation and improving decision-making processes within cloud governance. By leveraging machine learning algorithms, organizatio
APA, Harvard, Vancouver, ISO, and other styles
19

Miseviciene, Regina, Daiva Kalvaitiene, Vilma Riskeviciene, Danute Ambraziene, and Dalius Makackas. "CLOUD COMPUTING BASED INFRASTRUCTURE IN EDUCATION: INVESTING INTO THE PRIVATE INFRASTRUCTURE OR USING OUTSOURCING SERVICES." SOCIETY. INTEGRATION. EDUCATION. Proceedings of the International Scientific Conference 5 (May 25, 2018): 369–79. http://dx.doi.org/10.17770/sie2018vol1.3132.

Full text
Abstract:
The main challenge for higher education in the nearest future is the global competitiveness, as the present global market requires the higher schools to present their courses in the international level. Thus, traditional universities must adapt educational infrastructures in response with the global requirement. Outsourcing of cloud computing based services increased over the years. The solutions allow not only create more effective teaching methods and new communication chances for the whole education society, but also to reduce costs of installing and maintaining programs.Aim of the article
APA, Harvard, Vancouver, ISO, and other styles
20

Kappiarathel, Shahsoor Muhammad. "Legal Tech and the Future of Litigation: Transforming Justice through Innovation." Indiana Journal of Arts & Literature 6, no. 2 (2025): 01–04. https://doi.org/10.5281/zenodo.14970194.

Full text
Abstract:
<strong>Abstract:</strong> The legal profession is experiencing a fundamental transformation with the application of technology in the litigation process. Technology advancements like blockchain, cloud computing, and data analytics are revolutionizing the manner in which legal professionals handle case management, research, and the production of evidence. These innovations have transformed efficiency, accessibility, and transparency to a significant degree, rendering litigation more efficient. This paper addresses the growing role of technology in litigation and the value it adds in document m
APA, Harvard, Vancouver, ISO, and other styles
21

Osinachi Deborah Segun-Falade, Iveren M. Leghemo, Chinekwu Somtochukwu Odionu, and Chima Azubuike. "A conceptual framework for data governance in big data and cloud environments: Integrating security, compliance, and data quality." International Journal of Science and Research Archive 12, no. 2 (2024): 2984–3002. https://doi.org/10.30574/ijsra.2024.12.2.1177.

Full text
Abstract:
The proliferation of big data and cloud computing has transformed the digital landscape, enabling organizations to harness vast amounts of information for strategic decision-making. However, this shift has introduced complex challenges related to data governance, necessitating a comprehensive framework that integrates security, compliance, and data quality. This paper proposes a conceptual framework for data governance in big data and cloud environments, addressing the critical need for a cohesive approach to managing data assets. The framework emphasizes the importance of establishing robust
APA, Harvard, Vancouver, ISO, and other styles
22

Smith, William P. "“Can we borrow your phone? Employee privacy in the BYOD era”." Journal of Information, Communication and Ethics in Society 15, no. 4 (2017): 397–411. http://dx.doi.org/10.1108/jices-09-2015-0027.

Full text
Abstract:
Purpose This paper aims to (a) summarize the legal and ethical foundations of privacy with connections to workplace emails and text messages, (b) describe trends and challenges related to “Bring Your Own Device” (BYOD), and (c) propose legal and nonlegal questions these trends will raise in the foreseeable future. Design/methodology/approach Based on a review of legal cases and scholarship related to workplace privacy, implications for BYOD practices are proposed. Findings Primarily due to property rights, employers in the USA have heretofore been granted wide latitude in monitoring employee c
APA, Harvard, Vancouver, ISO, and other styles
23

Mushtaque Temrekar, Ms Misba. "A Comparative Analysis of Global Data Privacy Regulations and Their Implementation by Major Cloud Service Providers." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem46907.

Full text
Abstract:
Abstract As businesses continue to adopt cloud computing for their digital operations, the importance of data privacy and regulatory compliance has become increasingly pronounced. While cloud platforms offer scalable solutions for storage, processing, and service delivery, their global presence introduces challenges in adhering to complex legal requirements. This paper explores how three leading cloud service providers—Amazon Web Services (AWS), Microsoft Azure, and Google Cloud—implement and navigate key data protection regulations, including the European Union’s General Data Protection Regul
APA, Harvard, Vancouver, ISO, and other styles
24

Shivathmika, N. "Intrusion Detection and Prevention Using Honeypot Network for Cloud Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 192–95. http://dx.doi.org/10.22214/ijraset.2022.45091.

Full text
Abstract:
Abstract: The rapid increase in the number of users, there is a rise in issues related to hardware failure, web hosting, space and memory allocation of data, which is directly or indirectly leading to the loss of data. With the objective of providing services that are reliable, fast and low in cost, we turn to cloud-computing practices. With a tremendous development in this technology, there is ever increasing chance of its security being compromised by malicious users. A way to divert malicious traffic away from systems is by using Honeypot. It is a colossal strategy that has shown signs of i
APA, Harvard, Vancouver, ISO, and other styles
25

С.В., Давымока. "Правовые проблемы обработки персональных данных при использовании облачных CRM платформ". International Law Journal 7, № 5 (2024): 91–95. http://dx.doi.org/10.58224/2658-5693-2024-7-5-91-95.

Full text
Abstract:
широкое распространение облачных вычислительных технологий поднимает ряд правовых вопросов, связанных с обработкой и защитой персональных данных, решение которых является актуальной задачей для дальнейшего развития общества знаний и цифровой экономики в Российской Федерации. В статье проведен глубокий анализ современных публикаций, выявляющих основные правовые проблемы в этой сфере. Обобщена обширная правоприменительная практика на основе судебных решений и рекомендаций Роскомнадзора и Банка России. Дается развернутое определение облачным CRM (Customer Relationship Management) – платформам, ра
APA, Harvard, Vancouver, ISO, and other styles
26

Khan, Md Nazrul Islam. "LEGAL DOCUMENTATION AND CASE MANAGEMENT: A SYSTEMATIC REVIEW OF DIGITIZATION TRENDS AND CYBERSECURITY CHALLENGES IN LEGAL SUPPORT ROLES." Review of Applied Science and Technology 02, no. 01 (2023): 01–25. https://doi.org/10.63125/21hf4w52.

Full text
Abstract:
This systematic review investigates the evolving landscape of legal documentation and case management in the digital era, with a particular focus on how emerging technologies and cybersecurity challenges are reshaping institutional practices and legal support roles. Anchored in the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) 2020 framework, this study systematically analyzed 87 peer-reviewed publications from 2001 to 2023. The sources were selected from a cross-disciplinary set of databases, including Scopus, Web of Science, IEEE Xplore, and ProQuest, ensuring c
APA, Harvard, Vancouver, ISO, and other styles
27

Wang, Shumin, Xin Jiang, and Muhammad Bilawal Khaskheli. "The Role of Technology in the Digital Economy’s Sustainable Development of Hainan Free Trade Port and Genetic Testing: Cloud Computing and Digital Law." Sustainability 16, no. 14 (2024): 6025. http://dx.doi.org/10.3390/su16146025.

Full text
Abstract:
In an era of swift technical advancement, the confluence of digital technology, security, and the digital economy bears substantial implications. This research aims to investigate the complex interplay among patient rights, genetic testing, and cloud computing, with a particular emphasis on the legal contexts that govern these fields. Individuals must possess the ability to properly interact with health-related information and understand the economic components of digital platforms. Genetic testing and cloud computing are two areas where these literacies overlap, presenting distinct difficulti
APA, Harvard, Vancouver, ISO, and other styles
28

Brown, Emmanuel Kpakpo. "Digital Forensic and Distributed Evidence." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 357–62. http://dx.doi.org/10.22624/aims/crp-bk3-p57.

Full text
Abstract:
Digital Forensics investigation is the science and legal process of investigating computer/cybercrimes and digital media or objects to gather evidence. This new and fast evolving field encompasses computer forensics, network forensics, mobile forensics, cloud computing forensics, and IoT forensics; and for this reason have digital evidence distributed widely when the need arises for crime prosecution. Digital evidence must be authentic, accurate, complete, and convincing to the jury for legal admissibility at the court of law. In many instances due to the distributed nature of digital forensic
APA, Harvard, Vancouver, ISO, and other styles
29

Rodwald, Przemysław. "Choosing a password breaking strategy with imposed time restrictions." Bulletin of the Military University of Technology 68, no. 1 (2019): 79–100. http://dx.doi.org/10.5604/01.3001.0013.1467.

Full text
Abstract:
The aim of the article is to present the password breaking methodology in case when an attacker (forensic investigator, court expert, pen tester) has imposed time restrictions. This is a typical situation during many legal investigations where computers are seized by legal authorities but they are protected by passwords. At the beginning, the current state of law in that matter is presented, along with good practices in seizing the evidence. Then, the ways of storing static passwords in information systems are showed, after which various classes of password breaking methods are reviewed (dicti
APA, Harvard, Vancouver, ISO, and other styles
30

Micah, Ezekiel Elton Mike, Ibrahim Halidu Saidu, Taiwo Ibitomi, and Bello Sambo Sanusi. "Digital Forensics in the Era of Cybercrime: Emerging Trends and Challenges for Forensic Accountants in Nigeria." European Journal of Accounting, Auditing and Finance Research 11, no. 9 (2023): 85–100. http://dx.doi.org/10.37745/ejaafr.2013/vol11n985100.

Full text
Abstract:
This study examined the impact of technology on digital forensics and the challenges faced by forensic accountants in the era of cybercrime. The study highlights the four dimensions in which technology has an impact on digital forensics: technical, legal, organizational, and educational. The paper also discusses how emerging technologies such as artificial intelligence and machine learning can be used in digital forensics, along with the challenges they present. Cloud computing is also examined, and the challenges it poses for forensic accountants who need to access and analyze financial data
APA, Harvard, Vancouver, ISO, and other styles
31

Lange, Christian, Maksim Abdul Latif, Yusuf Çelik, A. Melle Lyklema, Dafne E. van Kuppevelt, and Janneke van der Zwaan. "Text Mining Islamic Law." Islamic Law and Society 28, no. 3 (2021): 234–81. http://dx.doi.org/10.1163/15685195-bja10009.

Full text
Abstract:
Abstract Digital humanities has a venerable pedigree, stretching back to the middle of the twentieth century, but despite noteworthy pioneering contributions it has not become a mainstream practice in Islamic Studies. This essay applies humanities computing to the study of Islamic law. We analyze a representative corpus of works of Islamic substantive law (furūʿ al-fiqh) from the beginnings of Islamic legal jurisprudence to the early modern period (2nd/8th-13th/19th c.) using several computational tools and methods: text-reuse network analysis based on plain-text annotations and html tags, clu
APA, Harvard, Vancouver, ISO, and other styles
32

Makhmudov, Teimur, and Vitalii Yesin. "Analysis of data search methods in cryptographically protected databases." Computer Science and Cybersecurity, no. 2 (December 26, 2022): 6–21. http://dx.doi.org/10.26565/2519-2310-2022-2-01.

Full text
Abstract:
The issue of compliance with data security, namely their confidentiality and integrity, generally being resolved through the use of appropriate cryptographic primitives, taking into account the development of computing power (and/or computational complexity of algorithms). But, in connection with the specific method of storage (in the cloud), the question arises of the effectiveness of the search for the necessary information. The problem considered in this paper is that encryption makes it impossible for an attacker to access data without access key, but deprives the legal owner of the data,
APA, Harvard, Vancouver, ISO, and other styles
33

Liu, Tingrui. "Toward Industry 4.0: A Study of China's Industrial Internet Industry and Its Readiness for Supply Chain Transformation." Advances in Economics, Management and Political Sciences 87, no. 1 (2024): 248–54. http://dx.doi.org/10.54254/2754-1169/87/20241000.

Full text
Abstract:
The Fourth Industrial Revolution, known as Industry 4.0, represents a transformative period in industrial production, characterized by the seamless integration of cutting-edge technologies into manufacturing and supply chain operations. This research delves into the preparedness of China's burgeoning industrial Internet sector to embrace the principles of Industry 4.0, with a particular focus on revolutionizing supply chain management practices. Through a comprehensive analysis encompassing strategic, legal, technological, and organizational dimensions, this study elucidates the significant ch
APA, Harvard, Vancouver, ISO, and other styles
34

Seshendranath Balla Venkata. "Architecting Enterprise-Scale Data Products: A Framework for Advanced Data Science and AI/ML Operations." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1724–34. https://doi.org/10.32628/cseit241061218.

Full text
Abstract:
This article presents a comprehensive framework for building enterprise-scale data products that power modern Customer &amp; Product Analytics, Data Science, artificial intelligence, and machine learning initiatives. The article examines the foundational architecture patterns, pipeline engineering strategies, and advanced distributed computing approaches in both on-prem and cloud. These are essential for developing robust data infrastructure capable of handling complex Data Analytics, Data Science, and AI/ML workflows. The article explores critical aspects of feature engineering at scale, real
APA, Harvard, Vancouver, ISO, and other styles
35

Regan, K., and P. R. O. Payne. "From Molecules to Patients: The Clinical Applications of Translational Bioinformatics." Yearbook of Medical Informatics 24, no. 01 (2015): 164–69. http://dx.doi.org/10.15265/iy-2015-005.

Full text
Abstract:
Summary Objective: In order to realize the promise of personalized medicine, Translational Bioinformatics (TBI) research will need to continue to address implementation issues across the clinical spectrum. In this review, we aim to evaluate the expanding field of TBI towards clinical applications, and define common themes and current gaps in order to motivate future research. Methods: Here we present the state-of-the-art of clinical implementation of TBI-based tools and resources. Our thematic analyses of a targeted literature search of recent TBI-related articles ranged across topics in genom
APA, Harvard, Vancouver, ISO, and other styles
36

AKSOY, Cenk. "Digital Business Ecosystems: An Environment Of Collaboration, Innovation, And Value Creation In The Digital Age." Journal of Business and Trade 4, no. 2 (2023): 156–80. http://dx.doi.org/10.58767/joinbat.1358560.

Full text
Abstract:
This article delves into the concept of Digital Business Ecosystems (DBEs), which have arisen due to the increasing interconnectedness of businesses and the growing reliance on digital technologies for value creation. DBEs are characterized by adaptability, scalability, and resilience, enabling businesses to collaborate, innovate, and adapt to changing market conditions. The article explores the components of DBEs, including actors, resources, and processes, and examines different DBE models, such as the hub-and-spoke, network, and layered models. Digital platforms play a critical role in DBEs
APA, Harvard, Vancouver, ISO, and other styles
37

Liu, Tingting. "Data Security Risk Assessment and Response Strategy for Large Language Models." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 104–9. https://doi.org/10.5281/zenodo.13117905.

Full text
Abstract:
In the era of artificial intelligence, large language models (LLMs) feature both positives and negatives when it comes to data security. The purpose of this paper is to present detailed recommendations for evaluating and managing the risks of data security connected with LLMs, using contemporary artificial intelligence algorithms and cloud-based information technologies. These are data asset categorization and rating, risk assessment models, and the observation of legal requirements and best practices regarding data safety. Key findings&rsquo; main message is the criticality of the systematic
APA, Harvard, Vancouver, ISO, and other styles
38

Klimushyn, P. S., V. Ye Roh, and T. P. Kolisnyk. "Legal aspects of functional security standardisation of the Internet of Things." Law and Safety 90, no. 3 (2023): 200–213. http://dx.doi.org/10.32631/pb.2023.3.17.

Full text
Abstract:
IoT technologies provide smart things with the ability to make decisions in the management of physical objects using intelligence and consensus. To support the Internet of Things, technologies such as built-in devices, cloud and fog computing, big data processing, machine learning, and artificial intelligence are used to produce intelligent physical objects. A review of existing security infrastructures for IoT-based intelligent environments shows that every connected device can be a potential entry point for an attack.&#x0D; An overview of the key aspects of security standards for smart envir
APA, Harvard, Vancouver, ISO, and other styles
39

Uddoh, Jeanette, Daniel Ajiga, Babawale Patrick Okare, and Tope David Aduloju. "Cross-Border Data Compliance and Sovereignty: A Review of Policy and Technical Frameworks." Journal of Frontiers in Multidisciplinary Research 2, no. 2 (2021): 68–74. https://doi.org/10.54660/.ijfmr.2021.2.2.68-74.

Full text
Abstract:
The exponential growth of cross-border data flows, driven by globalization, cloud computing, and digital economies, has intensified the need for robust frameworks to address data compliance and sovereignty. This paper provides a comprehensive review of policy and technical frameworks for ensuring cross-border data compliance and sovereignty, synthesizing insights from legal, technical, and economic perspectives. Through a systematic literature review, the study analyzes 120 peer-reviewed articles and industry reports from 2010 to 2025, employing a mixed-method approach that combines qualitativ
APA, Harvard, Vancouver, ISO, and other styles
40

Bryntsev, Alexander N. "The economy of platform solutions – a new stage of the country's development." Market economy problems, no. 3 (2021): 98–107. http://dx.doi.org/10.33051/2500-2325-2021-3-98-107.

Full text
Abstract:
In this article, the author examines a new stage in the development of Russia, associated with the functioning of information and intellectual platforms in the context of the formation of the digital economy. The subject of the research is platform solutions focused on the coordination and interfacing of the interests of subjects at the macro and micro levels. The purpose of the article is to identify the main directions of applying the efforts of state regulation to effectively solve the problems of strategic development of the national economy. Materials and methods. The methodological basis
APA, Harvard, Vancouver, ISO, and other styles
41

Kirchberg, Johanna, Johannes Fritzmann, Jürgen Weitz, and Ulrich Bork. "eHealth Literacy of German Physicians in the Pre–COVID-19 Era: Questionnaire Study." JMIR mHealth and uHealth 8, no. 10 (2020): e20099. http://dx.doi.org/10.2196/20099.

Full text
Abstract:
Background Digitalization is a disruptive technology that changes the way we deliver diagnostic procedures and treatments in medicine. Different stakeholders have varying interests in and expectations of the digitalization of modern medicine. Many recent digital advances in the medical field, such as the implementation of electronic health records, telemedical services, and mobile health apps, are increasingly used by medical professionals and patients. During the current pandemic outbreak of a novel coronavirus-caused respiratory disease (COVID-19), many modern information and communication t
APA, Harvard, Vancouver, ISO, and other styles
42

Saadatdoost, Robab, Alex Tze Hiang Sim, Hosein Jafarkarimi, Jee Mei Hee, and Leila Saadatdoost. "Cloud Computing for Teaching Practice." International Journal of Web-Based Learning and Teaching Technologies 9, no. 4 (2014): 50–68. http://dx.doi.org/10.4018/ijwltt.2014100104.

Full text
Abstract:
Recently researchers have shown an increased interest in cloud computing technology. It is becoming increasingly difficult to ignore cloud computing technology in education context. However rapid changes in information technology are having a serious effect on teaching framework designs. So far, however, there has been little discussion about cloud computing benefits in domains of teaching frameworks which propels us to study and redesign teaching frameworks considering cloud computing. The purpose of this paper is to review recent research into cloud computing and features which can be improv
APA, Harvard, Vancouver, ISO, and other styles
43

Jaskulski, Andrzej. "Cloud Computing in engineering practice." Mechanik, no. 5-6 (May 2015): 478–80. http://dx.doi.org/10.17814/mechanik.2015.5-6.207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Kholodnaya, E. V. "About some Legally Significant Features of Cloud Computing Technologies." Courier of Kutafin Moscow State Law University (MSAL)), no. 2 (April 28, 2023): 153–61. http://dx.doi.org/10.17803/2311-5998.2023.102.2.153-161.

Full text
Abstract:
The article examines the main legal approaches to determining the legal essence of cloud computing technologies, analyzes their stable features and advantages, and accumulates risks and threats of application. It is noted that in the Russian Federation, legal support for the sphere of cloud computing technologies is insufficient, including the absence of a definitive apparatus, the relevance of the adoption of a special law on information security, sections of which should be devoted, inter alia, to the legal foundations of cybersecurity when using cloud computing technologies, laying the foun
APA, Harvard, Vancouver, ISO, and other styles
45

Saini, Jaskaran Singh, Dinesh Kumar Saini, Punit Gupta, Chhattar Singh Lamba, and G. Madhusudhana Rao. "Cloud Computing: Legal Issues and Provision." Security and Communication Networks 2022 (August 1, 2022): 1–13. http://dx.doi.org/10.1155/2022/2288961.

Full text
Abstract:
Micro, Small, and Medium Enterprises (MSMEs) are gradually adopting cloud-based solutions using Information, Communication, and Technologies (ICT). Due to the lack of awareness regarding the legal challenges arising from jurisdictional issues of the Cloud Service Provider (CSP), MSMEs often get entangled in expensive litigations. The paper throws light on such legal conflicts and proposes new innovative ways (such as bilateral treaties, US CLOUD Act, Mutual Law Assistance Treaties, and In-house Capability) to tackle the same. Any domestic law governing data privacy must align with the globally
APA, Harvard, Vancouver, ISO, and other styles
46

Thomas, P. Y. "Cloud computing." Electronic Library 29, no. 2 (2011): 214–24. http://dx.doi.org/10.1108/02640471111125177.

Full text
Abstract:
PurposeThis paper aims to explore the educational potential of “cloud computing” (CC), and how it could be exploited in enhancing engagement among educational researchers and educators to better understand and improve their practice, in increasing the quality of their students' learning outcomes, and, thus, in advancing the scholarship of teaching and learning (SoTL) in a higher education context.Design/methodology/approachAdoption of the ideals of SoTL is considered an important approach for salvaging the higher education landscape around the world that is currently in a state of flux and evo
APA, Harvard, Vancouver, ISO, and other styles
47

Srikanth, Kandragula. "Legal and Regulatory Considerations in Cloud Computing." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 5, no. 3 (2019): 1–3. https://doi.org/10.5281/zenodo.14045404.

Full text
Abstract:
The burgeoning cloud computing industry, while offering a multitude of benefits forbusinesses in terms of scalability, agility, and cost-efficiency, presents a new and complexset of legal and regulatory challenges. This paper delves into these intricacies, outliningkey considerations for organizations transitioning to the cloud or already utilizing cloudservices. The focus areas encompass data privacy and security, ensuring compliance withindustry regulations, intellectual property rights, contractual issues such as service levelagreements and termination clauses, jurisdiction and dispute reso
APA, Harvard, Vancouver, ISO, and other styles
48

Djemame, Karim, Benno Barnitzke, Marcelo Corrales, et al. "Legal issues in clouds: towards a risk inventory." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 371, no. 1983 (2013): 20120075. http://dx.doi.org/10.1098/rsta.2012.0075.

Full text
Abstract:
Cloud computing technologies have reached a high level of development, yet a number of obstacles still exist that must be overcome before widespread commercial adoption can become a reality. In a cloud environment, end users requesting services and cloud providers negotiate service-level agreements (SLAs) that provide explicit statements of all expectations and obligations of the participants. If cloud computing is to experience widespread commercial adoption, then incorporating risk assessment techniques is essential during SLA negotiation and service operation. This article focuses on the le
APA, Harvard, Vancouver, ISO, and other styles
49

Davis, Michael, and Alice Sedsman. "Grey Areas - The Legal Dimensions of Cloud Computing." International Journal of Digital Crime and Forensics 2, no. 1 (2010): 30–39. http://dx.doi.org/10.4018/jdcf.2010010103.

Full text
Abstract:
Cloud computing has been heralded as a new era in the evolution of information and communications technologies. ICT giants have invested heavily in developing technologies and mega server facilities, which allow end users to access web-based software applications and store their data off-site. Businesses using cloud computing services will benefit from reduced operating costs as they cut back on ICT infrastructure and personnel. Individuals will no longer need to buy and install software and will have universal access to their data through any internet-ready device. Yet, hidden amongst the hos
APA, Harvard, Vancouver, ISO, and other styles
50

Nirbhay, Vashisht, Macker Sukriti, Khatri Indu, and Kaur Gurpreet. "PRINCIPLES OF CLOUD COMPUTING." International Journal For Technological Research In Engineering 7, no. 9 (2021): 6844. https://doi.org/10.5281/zenodo.5084671.

Full text
Abstract:
Cloud computing is the technology that is revolutionising various industries today. In the past decade, it has impacted Gaming, Automotive, Education, Research, Financial, Healthcare, Legal, Media Production and various other industries. It has made small businesses easier to run and flourish. It is impacting our lives every day. As of today, the world is going through the COVID-19 pandemic and various cloud-based technologies have surfaced and shown us the potential uses and power of Cloud. We must learn about cloud and its potential for its further growth, development, and adoption.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!