Academic literature on the topic 'Data security and protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data security and protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Data security and protection"

1

Carey, Peter, and David Berry. "DATA PROTECTION — SECURITY." Computer Law & Security Review 18, no. 2 (March 2002): 112–13. http://dx.doi.org/10.1016/s0267-3649(02)03010-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Begum, Shameena, V. Ratna Vasuki, and K. V. V. Srinivas K.V.V.Srinivas. "Data Security and Protection in Cloud Computing." International Journal of Scientific Research 1, no. 2 (June 1, 2012): 31–34. http://dx.doi.org/10.15373/22778179/jul2012/9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

MALIK, MAREK. "Data Protection and Security." Pacing and Clinical Electrophysiology 17, no. 2 (February 1994): 240–41. http://dx.doi.org/10.1111/j.1540-8159.1994.tb01376.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

A. J., Geetha. "Data Security and Protection." Indian Journal of Computer Science 8, no. 5 (October 31, 2023): 38. http://dx.doi.org/10.17010/ijcs/2023/v8/i5/173323.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ignisca, Vira, and Danylo Vdovenko. "ANALYSIS OF METHODS DATA SECURITY." Information systems and technologies security, no. 1 (3-4) (2020): 52–56. http://dx.doi.org/10.17721/ists.2020.4.53-57.

Full text
Abstract:
The article analyzes the main methods of information protection, from which it is possible to conclude that no method of data protection is ideal for all situations. It is important to choose an enterprise solution that provides comprehensive functionality, a flexible range of data protection options, broad support for platform and data types, and proven success in production implementations. The choice of method of information protection should take into account many circumstances that may arise during the implementation of a particular method. Due to the variety of data generated today, in addition to increasing the number of new platforms, flexibility can be a critical aspect of the data protection solution. A careful review of the requirements should make it easy to compare them with the relevant data protection methods, and it is necessary to make sure that the solution includes everything necessary to meet these requirements. Choosing the right method of information protection becomes much more difficult when more complex environments with many conflicting variables are involved, as it must support several options to provide flexibility to protect and meet data confidentiality, integrity and availability requirements. Only the integrated use of different measures can ensure reliable protection of information, because each method or measure has weaknesses and strengths. In some situations, internal security policies or regulations may forcibly change one method of data protection to another. Today, most standards, such as PCI DSS and HIPAA, allow a combination of the aforementioned methods, but these standards usually lag behind available or new data protection technologies. The set of methods and means of information protection includes software and hardware, protective transformations and organizational measures. A set of such methods, which are focused on protecting information, should protect them depending on whether the information is stored, moved or copied, accessed or used.
APA, Harvard, Vancouver, ISO, and other styles
6

Qureshi, Anique A., and Joel G. Siegel. "Information security and data protection." International Journal of Computer Applications in Technology 14, no. 1/2/3 (2001): 1. http://dx.doi.org/10.1504/ijcat.2001.000256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Martín del Rey, A., J. L. Hernández Pastora, and G. Rodríguez Sánchez. "3D medical data security protection." Expert Systems with Applications 54 (July 2016): 379–86. http://dx.doi.org/10.1016/j.eswa.2016.02.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Highland, Harold Joseph. "Microcomputer security: Data protection techniques." Computers & Security 4, no. 2 (June 1985): 123–34. http://dx.doi.org/10.1016/0167-4048(85)90016-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Atri, Preyaa. "Enhancing Big Data Security through Comprehensive Data Protection Measures: A Focus on Securing Data at Rest and In-Transit." International Journal of Computing and Engineering 5, no. 4 (May 24, 2024): 44–55. http://dx.doi.org/10.47941/ijce.1920.

Full text
Abstract:
Purpose: This research paper aims to enhance Big Data security by implementing comprehensive data protection measures, focusing on securing data at rest and in transit. In the era of Big Data, organizations handle vast quantities of data characterized by high velocity, volume, and variety, which complicates management and increases security risks. Methodology: The study examines various data protection strategies, including encryption, access control, data masking, immutable storage, tokenization, and physical security for data at rest. For data in transit, it explores encryption protocols, secure transfer methods like SSH and TLS, VPNs, Zero Trust architecture, and secure APIs. These methods are crucial for safeguarding sensitive information and preventing unauthorized access. Findings: The findings highlight common security challenges in Big Data, such as data breaches, unauthorized access, and integrity issues. The study emphasizes the need for robust protection measures and offers a comprehensive view of the data security landscape. Implementing these strategies helps organizations safeguard sensitive information and ensure compliance with international data protection regulations, enhancing their overall security posture. Unique contribution to theory policy and practice: This paper contributes to theory, policy, and practice by advocating comprehensive data protection strategies. It stresses the importance of continuous monitoring and regulatory compliance, providing practical insights into best practices and technologies that protect Big Data. The research supports developing robust data protection policies and practices, advancing knowledge in Big Data security.
APA, Harvard, Vancouver, ISO, and other styles
10

Shahul Ikram, Nur Adlin Hanisah. "DATA BREACHES EXIT STRATEGY: A COMPARATIVE ANALYSIS OF DATA PRIVACY LAWS." Malaysian Journal of Syariah and Law 12, no. 1 (April 15, 2024): 135–47. http://dx.doi.org/10.33102/mjsl.vol12no1.458.

Full text
Abstract:
Data has become highly valuable in the era of digitalisation and is the main target of cybercriminals. Cybercriminals steal data by exploiting system vulnerabilities. The rise of catastrophic data breach incidents affects business operations, reputation and legal standing, leading to business disruptions, financial loss and reputation damage. These incidents have raised data security concerns. The frequent incident is partly due to insufficient security measures in place. This article employs doctrinal research focusing on legal principles based on legislation to analyse Malaysia’s legal framework for protecting personal data in Malaysia and a comparison with other jurisdictions, i.e. the European Union General Data Protection Regulation (GDPR), the Singapore Personal Data Protection Act 2012 and the China Personal Information Protection Law (PIPL). The findings show that Malaysia’s data protection laws fall short of the international norm in some areas. This article suggests that Malaysian policymakers may amend the Personal Data Protection Act 2010 to align with international data protection standards to strengthen data security measures in preventive, detective and responsive data breaches. Consequently, this article provides an analysis of data protection laws in Malaysia and compares them with other advanced jurisdictions. It offers valuable insights into the challenges and opportunities involved in safeguarding personal data, the legal framework, and organisational strategies related to data privacy and security.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Data security and protection"

1

Neophytou, Andonis. "Computer security : data control and protection." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834504.

Full text
Abstract:
Computer security is a crucial area for any organization based on electronic devices that process data. The security of the devices themselves and the data they process are the backbone of the organization. Until today there have been no completely secure systems or procedures until and a lot of research is being done in this area. It impossible for a machine or a mechanical procedure to "guess" all possible events and lead to conclusive, cohesive and comprehensive secure systems, because of: 1) the human factor, and 2) acts of nature (fire, flood etc). However, proper managerial control can alleviate the extent of the damage caused by those factors.The purpose of this study is to examine the different frameworks of computer security. Emphasis is given to data/database security and the various kinds of attacks on the data. Controls over these attacks and preventative measures will be discussed, and high level language programs will demonstrate the protection issues. The Oracle, SOL query language will be used to demonstrate these controls and prevention measures. In addition the FORTRAN high level language will be used in conjunction with SOL (Only the FORTRAN and COBOL compilers are available for embedded SOL). The C language will be used to show attacks on password files and also as an encryption/decryption program.This study was based mainly on research. An investigation of literature spanning the past decade, was examined to produce the ideas and methods of prevention and control discussed in the study.
Department of Computer Science
APA, Harvard, Vancouver, ISO, and other styles
2

Ammar, Bassem AbuBakr. "Error protection and security for data transmission." Thesis, Lancaster University, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.421640.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Oduyiga, Adeshola Oyesanya. "Security in Cloud Storage : A Suitable Security Algorithm for Data Protection." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34428.

Full text
Abstract:
The purpose of this thesis work was to conduct a general research on existing security techniques and come up with a considerable algorithm for data security in cloud storage. Cloud storage is an infrastructure or is a model of computer data storage in which the digital data is stored in logical pools. It unifies object storage for both developers and enterprises, from live applications data to cloud archival. It help to save valuable space on PC computers or mobile devices and provides the easy storage and access of data anywhere in the world. However, just as the benefits of cloud computing abounds, so also are the risks involved. If data are not well secured or encrypted before deployment for storage in the cloud, in case of negligence on the side of the developers, then hackers can gain unauthorized access to the data. The behavior of existing security algorithms on data were studied, the encryption and decryption process of the each algorithm on data was studied and also their weaknesses against attacks. Apart from data encryption, security policies also plays an important roll in cloud storage which was also covered in this report. The research work was conducted through the use of online publications, literature review, books, academic publications and reputable research materials. The study showed that regardless of the challenges in cloud storage, there is still a suitable algorithm for protecting data against attack in the cloud.
APA, Harvard, Vancouver, ISO, and other styles
4

Benson, Glenn Stuart. "A formal protection model of security in distributed systems." Diss., Georgia Institute of Technology, 1989. http://hdl.handle.net/1853/12238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mai, Guangcan. "Biometric system security and privacy: data reconstruction and template protection." HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/544.

Full text
Abstract:
Biometric systems are being increasingly used, from daily entertainment to critical applications such as security access and identity management. It is known that biometric systems should meet the stringent requirement of low error rate. In addition, for critical applications, the security and privacy issues of biometric systems are required to be concerned. Otherwise, severe consequence such as the unauthorized access (security) or the exposure of identity-related information (privacy) can be caused. Therefore, it is imperative to study the vulnerability to potential attacks and identify the corresponding risks. Furthermore, the countermeasures should also be devised and patched on the systems. In this thesis, we study the security and privacy issues in biometric systems. We first make an attempt to reconstruct raw biometric data from biometric templates and demonstrate the security and privacy issues caused by the data reconstruction. Then, we make two attempts to protect biometric templates from being reconstructed and improve the state-of-the-art biometric template protection techniques.
APA, Harvard, Vancouver, ISO, and other styles
6

Tyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.

Full text
Abstract:
The corporate scandals of the last few years have changed the face of information security and its governance. Information security has been elevated to the board of director level due to legislation and corporate governance regulations resulting from the scandals. Now boards of directors have corporate responsibility to ensure that the information assets of an organisation are secure. They are forced to embrace information security and make it part of business strategies. The new support from the board of directors gives information security weight and the voice from the top as well as the financial muscle that other business activities experience. However, as an area that is made up of specialist activities, information security may not easily be comprehended at board level like other business related activities. Yet the board of directors needs to provide oversight of information security. That is, put an information security programme in place to ensure that information is adequately protected. This raises a number of challenges. One of the challenges is how can information security be understood and well informed decisions about it be made at the board level? This dissertation provides a mechanism to present information at board level on how information security is implemented according to the vision of the board of directors. This mechanism is built upon well accepted and documented concepts of information security. The mechanism (termed An Organisational Information Security Profile or OISP) will assist organisations with the initialisation, monitoring, measuring, reporting and reviewing of information security programmes. Ultimately, the OISP will make it possible to know if the information security endeavours of the organisation are effective or not. If the information security programme is found to be ineffective, The OISP will facilitate the pointing out of areas that are ineffective and what caused the ineffectiveness. This dissertation also presents how the effectiveness or ineffctiveness of information security can be presented at board level using well known visualisation methods. Finally the contribution, limits and areas that need more investigation are provided.
APA, Harvard, Vancouver, ISO, and other styles
7

Salles, Ernesto J. "The impact on quality of service when using security-enabling filters to provide for the security of run-time extensible virtual environments." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FSalles.pdf.

Full text
Abstract:
Thesis (M.S. in Modeling, Virtual Environments and Simulation)--Naval Postgraduate School, September 2002.
Thesis advisor(s): J. Bret Michael, Michael Capps, Don McGregor. Includes bibliographical references (p. 123-127). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
8

Cannon, Jennifer Elizabeth. "Strategies for Improving Data Protection to Reduce Data Loss from Cyberattacks." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7277.

Full text
Abstract:
Accidental and targeted data breaches threaten sustainable business practices and personal privacy, exposing all types of businesses to increased data loss and financial impacts. This single case study was conducted in a medium-sized enterprise located in Brevard County, Florida, to explore the successful data protection strategies employed by the information system and information technology business leaders. Actor-network theory was the conceptual framework for the study with a graphical syntax to model data protection strategies. Data were collected from semistructured interviews of 3 business leaders, archival documents, and field notes. Data were analyzed using thematic, analytic, and software analysis, and methodological triangulation. Three themes materialized from the data analyses: people--inferring security personnel, network engineers, system engineers, and qualified personnel to know how to monitor data; processes--inferring the activities required to protect data from data loss; and technology--inferring scientific knowledge used by people to protect data from data loss. The findings are indicative of successful application of data protection strategies and may be modeled to assess vulnerabilities from technical and nontechnical threats impacting risk and loss of sensitive data. The implications of this study for positive social change include the potential to alter attitudes toward data protection, creating a better environment for people to live and work; reduce recovery costs resulting from Internet crimes, improving social well-being; and enhance methods for the protection of sensitive, proprietary, and personally identifiable information, which advances the privacy rights for society.
APA, Harvard, Vancouver, ISO, and other styles
9

De, Lange Joshua. "A framework for information security management in local government." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/7588.

Full text
Abstract:
Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the business operations of any enterprise. Information and communication technology (ICT) systems are heavily relied upon to store, process and transmit this valuable commodity. Due to its immense value, information and related ICT resources have to be adequately protected. This protection of information is commonly referred to as information security.
APA, Harvard, Vancouver, ISO, and other styles
10

Kane, Douglas Robert. "Web-based dissemination system for the Trusted Computing Exemlar [i.e. Exemplar] project." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FKane.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005.
Thesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 127-128). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Data security and protection"

1

Endrijonas, Janet. Data security. Rocklin, Calif: Prima Pub., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1952-, Gordon John, ed. Practical data security. Aldershot, England: Ashgate, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Frank, Lars. EDP-security. Amsterdam: Elsevier Science, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brocx, W. H. J. 1939-, ed. Data security manual: Guidelines and procedures for data protection. Dordrecht [Netherlands]: D. Riedel, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ziegler, Sébastien, ed. Internet of Things Security and Data Protection. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04984-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

American Bar Association. Section of Antitrust Law., ed. Data security handbook. Chicago, Ill: ABA Section of Antitrust Law, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Atluri, Vijay. Security of Data and Transaction Processing. Boston, MA: Springer US, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Y, Chow Stephen, Goldstone David, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Data security & identity theft. Boston, MA: MCLE, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Y, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Y, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Data security and protection"

1

Garbis, Jason, and Jerry W. Chapman. "Data Protection." In Zero Trust Security, 163–72. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6702-8_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lenhard, Thomas H. "Data Protection and Data Security." In Data Security, 3–4. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-35494-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lakshmi, Vasantha. "Data Protection." In Beginning Security with Microsoft Technologies, 173–230. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4853-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ots, Karl. "Workload Protection – Data." In Azure Security Handbook, 77–95. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7292-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Islam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management, 1–7. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_95-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Islam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management, 1–7. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_95-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Islam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management, 223–29. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_95.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Weber, Peter, Roland Gabriel, Thomas Lux, and Katharina Menke. "Data Security and Data Protection." In Basics in Business Informatics, 281–308. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-35859-4_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Long, Ian. "Data Protection and Data Security." In The Complete Company Policies, 41–64. London: Routledge, 2024. http://dx.doi.org/10.4324/9781003258995-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Degoulet, Patrice, and Marius Fieschi. "Security and Data Protection." In Introduction to Clinical Informatics, 193–203. New York, NY: Springer New York, 1997. http://dx.doi.org/10.1007/978-1-4612-0675-0_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Data security and protection"

1

Li, Yifeng. "Blockchain transaction data privacy protection scheme." In Fifth International Conference on Computer Communication and Network Security (CCNS 2024), edited by Zhiyong Xiong and Zhaolong Ning, 37. SPIE, 2024. http://dx.doi.org/10.1117/12.3038136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"TOWARDS DATA PROTECTION COMPLIANCE." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2010. http://dx.doi.org/10.5220/0002981802130216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shi, Yue. "Data Security and Privacy Protection in Public Cloud." In 2018 IEEE International Conference on Big Data (Big Data). IEEE, 2018. http://dx.doi.org/10.1109/bigdata.2018.8622531.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Su, Chunli. "Big Data Security and Privacy Protection." In 2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS). IEEE, 2019. http://dx.doi.org/10.1109/icvris.2019.00030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Aparajit, Srushti, Rashi Shah, Riddhi Chopdekar, and Rupali Patil. "Data Protection: The Cloud Security Perspective." In 2022 3rd International Conference for Emerging Technology (INCET). IEEE, 2022. http://dx.doi.org/10.1109/incet54531.2022.9825151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jiang, Yixiang, Yuangen Xu, Qi Xu, Limei Fang, and Cong Lin. "Tobacco Industry Data Security Protection System." In 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS). IEEE, 2019. http://dx.doi.org/10.1109/ccoms.2019.8821674.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Dongpo. "Big Data Security and Privacy Protection." In 8th International Conference on Management and Computer Science (ICMCS 2018). Paris, France: Atlantis Press, 2018. http://dx.doi.org/10.2991/icmcs-18.2018.56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vázquez-Naya, Jose. "Protection and security of medical data." In MOL2NET'21, Conference on Molecular, Biomedical & Computational Sciences and Engineering, 7th ed. Basel, Switzerland: MDPI, 2021. http://dx.doi.org/10.3390/mol2net-07-11848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Boehnen, Christopher, David Bolme, and Patrick Flynn. "Biometrics IRB best practices and data protection." In SPIE Defense + Security, edited by Ioannis A. Kakadiaris, Ajay Kumar, and Walter J. Scheirer. SPIE, 2015. http://dx.doi.org/10.1117/12.2181981.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kan, Senwen, Jennifer Dworak, and James George Dunham. "Echeloned IJTAG data protection." In 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST). IEEE, 2016. http://dx.doi.org/10.1109/asianhost.2016.7835558.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Data security and protection"

1

Adams, C. Independent Data Unit Protection Generic Security Service Application Program Interface (IDUP-GSS-API). RFC Editor, December 1998. http://dx.doi.org/10.17487/rfc2479.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Park, Soontae, Antonio García Zaballos, Enrique Iglesias Rodriguez, Pau Puig Gabarró, Kwanghee Choi, Donghwan Oh, Hyein Song, and Junok Lim. Roadmap for the Establishment of a Big Data Analysis Center for Critical Infrastructure Protection in Latin America and the Caribbean post COVID-19. Inter-American Development Bank, January 2022. http://dx.doi.org/10.18235/0003930.

Full text
Abstract:
This report, a joint effort between the Korea Internet & Security Agency (KISA) and Inter-American Development Bank (IDB), emphasizes the rising importance of critical infrastructure protection for the Latin American and Caribbean (LAC) region and proposes ways to overcome existing and potential cybersecurity threats. Considering the unexpected and high-speed transformations brought on by the COVID-19 pandemic, it is important to get prepared for imminent threats. The report examines the status of information and communication technology (ICT) infrastructure protection in the region and suggests big data analysis as a solution. To make the case, the report discusses the role of Koreas Big Data Analysis Center in protecting critical infrastructures in the country and makes suggestions to build an institutional foundation, stronger governance, and an effective roadmap for the implementation of a similar center in the LAC region.
APA, Harvard, Vancouver, ISO, and other styles
3

Stankovic, Mirjana, and Agustín Ignacio Filippo. Global Value Chain Data for Mexico in the Automotive and Electronics Sectors. Inter-American Development Bank, September 2021. http://dx.doi.org/10.18235/0003664.

Full text
Abstract:
This report uses the Global Value Chain (GVC) data framework to provide scoping review and analysis of Mexico's current position and potential for using and harvesting GVC data in the automotive and electronics sectors. By conducting the study on GVCs data, we hope to broaden the understanding of the importance of data transfers for GVCs, production, and trade, underlining that data are critical to all companies and not only to the so-called "high-tech companies." Data protection, sharing, and security are also central to manufacturers in the automotive and electronics sectors. This report will review how datafication, data protection, sharing, and security impact Mexico's automotive and electronics industry. This information is analyzed from a global perspective and the viewpoint of Mexico to provide a holistic picture of the situation when identifying trajectories for entry, growth, and upgrading along GVCs that rely on datafication and digital transformation. It will also offer recommendations for regulators and policymakers on how to facilitate successful GVCs' data functioning and guidance for businesses on how to harvest data for growth and digital transformation.
APA, Harvard, Vancouver, ISO, and other styles
4

Gautrais, Vincent, and Nicolas Aubin. Assessment Model of Factors Relating to Data Flow: Instrument for the Protection of Privacy as well as Rights and Freedoms in the Development and Use of Artificial Intelligence. Observatoire international sur les impacts sociétaux de l'intelligence artificielle et du numérique, March 2022. http://dx.doi.org/10.61737/haoj6662.

Full text
Abstract:
This document proposes a model for assessing factors relating to data flow. Indeed, in order to increase the diligence of the players involved, systematic use is made of internal policies in which the latter spell out the guarantees they offer, whether in terms of privacy, transparency, security, fundamental freedoms, and so on. Based on the Guide des bonnes pratiques en intelligence artificielle (only available in French), this model seems to us to be a way for a provider to expose its diligence and the efforts it intends to make to handle data responsibly.
APA, Harvard, Vancouver, ISO, and other styles
5

Idris, Iffat. Documentation of Survivors of Gender-based Violence (GBV). Institute of Development Studies (IDS), July 2021. http://dx.doi.org/10.19088/k4d.2021.103.

Full text
Abstract:
This review is largely based on grey literature, in particular policy documents and reports by international development organizations. While there was substantial literature on approaches and principles to GBV documentation, there was less on remote service delivery such as helplines – much of this only in the wake of the COVID-19 pandemic. In addition, very little was found on actual examples of GBV documentation in developing contexts. By definition, gender featured strongly in the available literature; the particular needs of persons with disabilities were also addressed in discussions of overall GBV responses, but far less in GBV documentation. GBV documentation refers to the recording of data on individual GBV incidents in order to provide/refer survivors with/to appropriate support, and the collection of data of GBV incidents for analysis and to improve GBV responses. The literature notes that there are significant risks associated with GBV documentation, in relation to data protection. Failure to ensure information security can expose survivors, in particular, to harm, e.g. reprisal attacks by perpetrators, stigma, and ostracism by their families/ communities. This means that GBV documentation must be carried out with great care. A number of principles should always be applied when documenting GBV cases in order to protect survivors and prevent potential negative effects: do no harm, survivor-centered approach, survivor autonomy, informed consent, non-discrimination, confidentiality, and data protection (information security).
APA, Harvard, Vancouver, ISO, and other styles
6

Deb, Shourjya, and Virginie Baudais. The Challenges of Data Collection in Conflict-affected Areas: A Case Study in the Liptako-Gourma Region. Stockholm International Peace Research Institute, October 2022. http://dx.doi.org/10.55163/vwim3307.

Full text
Abstract:
Conducting research in the Sahel has become more challenging over the past 10 years, and the continuing deterioration of the security situation has restricted access to many areas. This SIPRI Insights paper provides an overview of the main challenges for researchers when conducting data collection in conflict-affected areas. The paper employs a case study of a humanitarian protection project that SIPRI has been working on in the Liptako-Gourma region. The project was designed in collaboration with the Danish Refugee Council (DRC) and three local research partners: the Centre for Democratic Governance (CGD) in Burkina Faso, Point Sud in Mali and the Laboratoire d’Études et de Recherche sur les Dynamiques Sociales et le Développement Local (LASDEL) in Niger. Using the case study, the paper identifies and outlines how the project addressed specific challenges. The paper also highlights key considerations for researchers to take into account when carrying out data collection and fieldwork in conflict zones. Evidence-based research can influence humanitarian and development initiatives and support shifts in policy and programming. The bottom-up research approach gives a voice to communities and alternative perspectives and advances evidence-based solutions that are locally driven, meaningful and sustainable for target populations.
APA, Harvard, Vancouver, ISO, and other styles
7

Author, Not Given. Y-12 Groundwater Protection Program Calendar Year 2000 Groundwater Monitoring Data Evaluation Report for the Upper East Fork Poplar Creek Hydrogeologic Regime at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee. Office of Scientific and Technical Information (OSTI), September 2001. http://dx.doi.org/10.2172/788789.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Amarante, Verónica, Rodrigo Arim, and Andrés Dean. Protecting Workers against Unemployment in Uruguay. Inter-American Development Bank, October 2011. http://dx.doi.org/10.18235/0011349.

Full text
Abstract:
This paper considers the main institutional features of the Uruguayan labor market and its recent evolution, with a focus on unemployment. The main policies aimed at protecting workers against unemployment are analyzed. Using administrative data from social security records, the paper studies the dynamics of the labor market. Particularly examined are inflows and outflows from the formal labor market, as well as the effect, in terms of earnings loss, of episodes out of the formal labor market. Finally, an impact evaluation of recent changes in the unemployment insurance program is presented.
APA, Harvard, Vancouver, ISO, and other styles
9

Rosenthal, David, Peter Samsel, and Cheryl Barbasch. Information Tools for Security Protection. Fort Belvoir, VA: Defense Technical Information Center, November 2002. http://dx.doi.org/10.21236/ada408503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lewis, Dustin, Radhika Kapoor, and Naz Modirzadeh. Advancing Humanitarian Commitments in Connection with Countering Terrorism: Exploring a Foundational Reframing concerning the Security Council. Harvard Law School Program on International Law and Armed Conflict, December 2021. http://dx.doi.org/10.54813/uzav2714.

Full text
Abstract:
The imperative to provide humanitarian and medical services on an urgent basis in armed conflicts is anchored in moral tenets, shared values, and international rules. States spend tens of billions of dollars each year to help implement humanitarian programs in conflicts across the world. Yet, in practice, counterterrorism objectives increasingly prevail over humanitarian concerns, often resulting in devastating effects for civilian populations in need of aid and protection in war. Not least, confusion and misapprehensions about the power and authority of States relative to the United Nations Security Council to set policy preferences and configure legal obligations contribute significantly to this trajectory. In this guide for States, we present a framework to reconfigure relations between these core commitments by assessing the counterterrorism architecture through the lens of impartial humanitarianism. We aim in particular to provide an evidence base and analytical frame for States to better grasp key legal and policy issues related to upholding respect for principled humanitarian action in connection with carrying out the Security Council’s counterterrorism decisions. We do so because the lack of knowledge regarding interpretation and implementation of counterterrorism resolutions matters for the coherence, integrity, and comprehensiveness of humanitarian policymaking and protection of the humanitarian imperative. In addition to analyzing foundational concerns and evaluating discernible behaviors and attitudes, we identify avenues that States may take to help achieve pro-humanitarian objectives. We also endeavor to help disseminate indications of, and catalyze, States’ legally relevant positions and practices on these issues. In section 1, we introduce the guide’s impetus, objectives, target audience, and structure. We also describe the methods that we relied on and articulate definitions for key terms. In section 2, we introduce key legal actors, sources of law, and the notion of international legal responsibility, as well as the relations between international and national law. Notably, Security Council resolutions require incorporation into national law in order to become effective and enforceable by internal administrative and judicial authorities. In section 3, we explain international legal rules relevant to advancing the humanitarian imperative and upholding respect for principled humanitarian action, and we sketch the corresponding roles of humanitarian policies, programs, and donor practices. International humanitarian law (IHL) seeks to ensure — for people who are not, or are no longer, actively participating in hostilities and whose needs are unmet — certain essential supplies, as well as medical care and attention for the wounded and sick. States have also developed and implemented a range of humanitarian policy frameworks to administer principled humanitarian action effectively. Further, States may rely on a number of channels to hold other international actors to account for safeguarding the humanitarian imperative. In section 4, we set out key theoretical and doctrinal elements related to accepting and carrying out the Security Council’s decisions. Decisions of the Security Council may contain (binding) obligations, (non-binding) recommendations, or a combination of the two. UN members are obliged to carry out the Council’s decisions. Member States retain considerable interpretive latitude to implement counterterrorism resolutions. With respect to advancing the humanitarian imperative, we argue that IHL should represent a legal floor for interpreting the Security Council’s decisions and recommendations. In section 5, we describe relevant conduct of the Security Council and States. Under the Resolution 1267 (1999), Resolution 1989 (2011), and Resolution 2253 (2015) line of resolutions, the Security Council has established targeted sanctions as counterterrorism measures. Under the Resolution 1373 (2001) line of resolutions, the Security Council has adopted quasi-“legislative” requirements for how States must counter terrorism in their national systems. Implementation of these sets of resolutions may adversely affect principled humanitarian action in several ways. Meanwhile, for its part, the Security Council has sought to restrict the margin of appreciation of States to determine how to implement these decisions. Yet international law does not demand that these resolutions be interpreted and implemented at the national level by elevating security rationales over policy preferences for principled humanitarian action. Indeed, not least where other fields of international law, such as IHL, may be implicated, States retain significant discretion to interpret and implement these counterterrorism decisions in a manner that advances the humanitarian imperative. States have espoused a range of views on the intersections between safeguarding principled humanitarian action and countering terrorism. Some voice robust support for such action in relation to counterterrorism contexts. A handful call for a “balancing” of the concerns. And some frame respect for the humanitarian imperative in terms of not contradicting counterterrorism objectives. In terms of measures, we identify five categories of potentially relevant national counterterrorism approaches: measures to prevent and suppress support to the people and entities involved in terrorist acts; actions to implement targeted sanctions; measures to prevent and suppress the financing of terrorism; measures to prohibit or restrict terrorism-related travel; and measures that criminalize or impede medical care. Further, through a number of “control dials” that we detect, States calibrate the functional relations between respect for principled humanitarian action and countering terrorism. The bulk of the identified counterterrorism measures and related “control dials” suggests that, to date, States have by and large not prioritized advancing respect for the humanitarian imperative at the national level. Finally, in section 6, we conclude by enumerating core questions that a State may answer to help formulate and instantiate its values, policy commitments, and legal positions to secure respect for principled humanitarian action in relation to counterterrorism contexts.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography