Journal articles on the topic 'Data security and protection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Data security and protection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Carey, Peter, and David Berry. "DATA PROTECTION — SECURITY." Computer Law & Security Review 18, no. 2 (March 2002): 112–13. http://dx.doi.org/10.1016/s0267-3649(02)03010-8.
Full textBegum, Shameena, V. Ratna Vasuki, and K. V. V. Srinivas K.V.V.Srinivas. "Data Security and Protection in Cloud Computing." International Journal of Scientific Research 1, no. 2 (June 1, 2012): 31–34. http://dx.doi.org/10.15373/22778179/jul2012/9.
Full textMALIK, MAREK. "Data Protection and Security." Pacing and Clinical Electrophysiology 17, no. 2 (February 1994): 240–41. http://dx.doi.org/10.1111/j.1540-8159.1994.tb01376.x.
Full textA. J., Geetha. "Data Security and Protection." Indian Journal of Computer Science 8, no. 5 (October 31, 2023): 38. http://dx.doi.org/10.17010/ijcs/2023/v8/i5/173323.
Full textIgnisca, Vira, and Danylo Vdovenko. "ANALYSIS OF METHODS DATA SECURITY." Information systems and technologies security, no. 1 (3-4) (2020): 52–56. http://dx.doi.org/10.17721/ists.2020.4.53-57.
Full textQureshi, Anique A., and Joel G. Siegel. "Information security and data protection." International Journal of Computer Applications in Technology 14, no. 1/2/3 (2001): 1. http://dx.doi.org/10.1504/ijcat.2001.000256.
Full textMartín del Rey, A., J. L. Hernández Pastora, and G. Rodríguez Sánchez. "3D medical data security protection." Expert Systems with Applications 54 (July 2016): 379–86. http://dx.doi.org/10.1016/j.eswa.2016.02.001.
Full textHighland, Harold Joseph. "Microcomputer security: Data protection techniques." Computers & Security 4, no. 2 (June 1985): 123–34. http://dx.doi.org/10.1016/0167-4048(85)90016-1.
Full textAtri, Preyaa. "Enhancing Big Data Security through Comprehensive Data Protection Measures: A Focus on Securing Data at Rest and In-Transit." International Journal of Computing and Engineering 5, no. 4 (May 24, 2024): 44–55. http://dx.doi.org/10.47941/ijce.1920.
Full textShahul Ikram, Nur Adlin Hanisah. "DATA BREACHES EXIT STRATEGY: A COMPARATIVE ANALYSIS OF DATA PRIVACY LAWS." Malaysian Journal of Syariah and Law 12, no. 1 (April 15, 2024): 135–47. http://dx.doi.org/10.33102/mjsl.vol12no1.458.
Full textReddy Gopireddy, Ravindar, and Sandhya Rani Koppanathi. "Post - Breach Data Security: Strategies for Recovery and Future Protection." International Journal of Science and Research (IJSR) 7, no. 12 (December 5, 2018): 1609–14. http://dx.doi.org/10.21275/sr24731204000.
Full textFang, Ze Nan, Jian Ming Zhou, and Jing Song Zhang. "A Practical Data Security Protection Technology." Advanced Materials Research 846-847 (November 2013): 1620–23. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1620.
Full textAnita, Dombale. "Data Rakshak." International Journal for Research in Applied Science and Engineering Technology 11, no. 11 (November 30, 2023): 1978–85. http://dx.doi.org/10.22214/ijraset.2023.56957.
Full textBolshakov, A. S., A. I. Zhila, and A. V. Osin. "FUZZY LOGIC DATA PROTECTION MANAGEMENT." H&ES Research 13, no. 4 (2021): 37–47. http://dx.doi.org/10.36724/2409-5419-2021-13-4-37-47.
Full textGama, Cruz. "Data protection and personal data protection." Brazilian Journal of Clinical Medicine and Review 1, Suppl.1 (April 15, 2023): 18. http://dx.doi.org/10.52600/2965-0968.bjcmr.2023.1.suppl.1.18.
Full textLivshitz, Ilya. "Assessment of the Impact of General Data Protection Regulation on Enterprise Security in the Russian Federation." Voprosy kiberbezopasnosti, no. 4(38) (2020): 66–75. http://dx.doi.org/10.21681/2311-3456-2020-04-66-75.
Full textSwanzy, Percy Nathan, Arnold Mashud Abukari, and Edward Danso Ansong. "Data Security Framework for Protecting Data in Transit and Data at Rest in the Cloud." Current Journal of Applied Science and Technology 43, no. 6 (May 13, 2024): 61–77. http://dx.doi.org/10.9734/cjast/2024/v43i64387.
Full textViana da Silva, Marcos Vinicius, Erick Da Luz Scherf, and Jose Everton Da Silva. "THE RIGHT TO DATA PROTECTION VERSUS “SECURITY”." Revista Direitos Culturais 15, no. 36 (April 27, 2020): 209–32. http://dx.doi.org/10.20912/rdc.v15i36.18.
Full textPounder, Chris. "Security and the new Data Protection law." Computers & Security 17, no. 2 (January 1998): 124–28. http://dx.doi.org/10.1016/s0167-4048(97)81981-5.
Full textSaxby, Stephen. "Data protection act 1984: Security and accuracy of data." Computer Law & Security Review 2, no. 2 (July 1986): 14. http://dx.doi.org/10.1016/0267-3649(86)90065-8.
Full textWilliamson, J. D. "Data protection and the clinician: guidelines on data security." BMJ 291, no. 6507 (November 23, 1985): 1516–19. http://dx.doi.org/10.1136/bmj.291.6507.1516.
Full textReddy Gopireddy, Ravindar. "AI-Powered Security in Cloud Environments: Enhancing Data Protection and Threat Detection." International Journal of Science and Research (IJSR) 10, no. 11 (November 5, 2021): 1568–72. http://dx.doi.org/10.21275/sr24731135001.
Full textAhmed, Musa Midila, and Aishatu Musa Ahmed. "Citizens’ Data Protection in E-government System." International Journal of Innovative Computing 13, no. 2 (November 24, 2023): 1–9. http://dx.doi.org/10.11113/ijic.v13n2.389.
Full textNugraha, Arya Adhi, and Asyahri Hadi Nasyuha. "Integrating ISO 27001 and Indonesia's Personal Data Protection Law for Data Protection Requirement Model." Journal of Information Systems and Informatics 6, no. 2 (June 14, 2024): 1052–69. http://dx.doi.org/10.51519/journalisi.v6i2.754.
Full textKnowen, Cosmas, Lamek Ronoh, and Anne Mugalavai. "Prioritizing Personal Data Protection in Insurance Organizations." Journal of Information Security and Cybercrimes Research 6, no. 1 (June 22, 2023): 40–56. http://dx.doi.org/10.26735/enpo6596.
Full textHidayatulloh, Hidayatulloh. "HUMAN RIGHTS AND DATA PROTECTION IN THE DIGITAL FINANCIAL ECOSYSTEM." JHR (Jurnal Hukum Replik) 11, no. 1 (April 1, 2023): 12. http://dx.doi.org/10.31000/jhr.v11i1.8110.
Full textAl-Museelem, Waleed, and Chun Lin Li. "Data Security and Data Privacy in Cloud Computing." Advanced Materials Research 905 (April 2014): 687–92. http://dx.doi.org/10.4028/www.scientific.net/amr.905.687.
Full textIstván, Zsolt, Soujanya Ponnapalli, and Vijay Chidambaram. "Software-defined data protection." Proceedings of the VLDB Endowment 14, no. 7 (March 2021): 1167–74. http://dx.doi.org/10.14778/3450980.3450986.
Full textJohn, Nicolas, and Maximilian Wellmann. "Data security management and data protection for video conferencing software." International Cybersecurity Law Review 1, no. 1-2 (October 2020): 39–50. http://dx.doi.org/10.1365/s43439-020-00013-4.
Full textDai, Xue Bing, Zhao Jing Wang, and Yan Zhang. "Data Security and Privacy Protection of Cloud Computing." Advanced Materials Research 846-847 (November 2013): 1570–73. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1570.
Full textCorones, Stephen, and Juliet Davis. "Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions." Federal Law Review 45, no. 1 (March 2017): 65–95. http://dx.doi.org/10.1177/0067205x1704500104.
Full textBogosavljević, Mirjana. "Protection of Personal Data in Documents: Application of the Law on Personal Data Protection in Serbia and Abroad." Moderna arhivistika 2, no. 1 (May 1, 2019): 106–15. http://dx.doi.org/10.54356/ma/2019/ghkv7413.
Full textГулов, Владимир Павлович, Виктор Анатольевич Хвостов, Владимир Петрович Косолапов, and Галина Владимировна Сыч. "PERSONAL DATA PROTECTION FEATURES IN MOBILE MEDICINE." СИСТЕМНЫЙ АНАЛИЗ И УПРАВЛЕНИЕ В БИОМЕДИЦИНСКИХ СИСТЕМАХ, no. 3() (September 30, 2020): 171–76. http://dx.doi.org/10.36622/vstu.2020.19.3.022.
Full textZhurakovskyi, Bohdan, and Oleksiy Nedashkivskiy. "SYSTEM TO COLLECT INFORMATION WHEN TRANSFERRING DATA TO RADIO CHANNELS." Cybersecurity: Education, Science, Technique 3, no. 15 (2022): 6–34. http://dx.doi.org/10.28925/2663-4023.2022.15.634.
Full textAdhikari, Sanjaya. "Necessity of Big Data Security and its Relation to National Security." Unity Journal 5, no. 1 (March 25, 2024): 1–14. http://dx.doi.org/10.3126/unityj.v5i1.63137.
Full text石, 飞杰. "Citizen Data Security Protection from the Perspective of “DiDi” Security Review." Open Journal of Legal Science 09, no. 06 (2021): 663–69. http://dx.doi.org/10.12677/ojls.2021.96095.
Full textAmarendra Reddy, P., Sheikh Gouse, and P. Bhaskara Reddy. "Security and Privacy Mechanisms of Big Data." International Journal of Engineering & Technology 7, no. 4.39 (December 13, 2018): 730–33. http://dx.doi.org/10.14419/ijet.v7i4.39.26264.
Full textMichelberger, Pál, and Ágnes Kemendi. "DATA, INFORMATION AND IT SECURITY - SOFTWARE SUPPORT FOR SECURITY ACTIVITIES." Problems of Management in the 21st Century 15, no. 2 (December 10, 2020): 108–24. http://dx.doi.org/10.33225/pmc/20.15.108.
Full textQin, Peng, Wei Li, and Ke Ding. "A Big Data Security Architecture Based on Blockchain and Trusted Data Cloud Center." Wireless Communications and Mobile Computing 2022 (August 31, 2022): 1–8. http://dx.doi.org/10.1155/2022/7272405.
Full textLiu, Xiangguo, Huijun Du, Zhonglong Wang, Jianfei Chen, Jia Peng, and Yue Liu. "Application of Data Security Protection in Smart Grid Based on Computer Electronic Technology." Journal of Physics: Conference Series 2774, no. 1 (July 1, 2024): 012024. http://dx.doi.org/10.1088/1742-6596/2774/1/012024.
Full textDahlian Persadha, Pratama, Loso Judijanto, Melly Susanti, and Heru Kreshna Reza. "DATA PRIVACY AND SECURITY PROTECTION STRATEGIES IN LIBRARY ELECTRONIC RESOURCES MANAGEMENT." Holistik Analisis Nexus 1, no. 7 (July 6, 2024): 115–22. http://dx.doi.org/10.62504/nexus742.
Full textAkhramovych, Volodymyr. "DATA PROTECTION AT THE STAGES OF ITS FUNCTIONING." Cybersecurity: Education, Science, Technique 1, no. 21 (2023): 149–61. http://dx.doi.org/10.28925/2663-4023.2023.21.149161.
Full textMoreira da Veiga Pessoa, Bruno. "GENERAL DATA PROTECTION LAW." Revista Gênero e Interdisciplinaridade 4, no. 02 (May 5, 2023): 250–69. http://dx.doi.org/10.51249/gei.v4i02.1327.
Full textDu, Min, Guochao Hu, and Xu Zhang. "Research and Construction of Government Data Security System Based on Hierarchical Protection." Advances in Engineering Technology Research 7, no. 1 (November 7, 2023): 623. http://dx.doi.org/10.56028/aetr.7.1.623.2023.
Full textK.A., Chicherov, and Norkina A. N. "Confidential Data Protection as a Means of Ensuring Information Security." KnE Social Sciences 3, no. 2 (February 15, 2018): 85. http://dx.doi.org/10.18502/kss.v3i2.1528.
Full textKravchuk, V. "Foreign experience of personal data protection in social networks." Uzhhorod National University Herald. Series: Law 2, no. 78 (August 31, 2023): 49–53. http://dx.doi.org/10.24144/2307-3322.2023.78.2.7.
Full textParraguez Kobek, Luisa, and Erick Caldera. "Cyber Security and Habeas Data: The Latin American response to information security and data protection." OASIS, no. 24 (November 3, 2016): 109. http://dx.doi.org/10.18601/16577558.n24.07.
Full textSingh, Gurpreet, and Susmita Mishra. "CLOUD COMPUTING SECURITY AND DATA PROTECTION: A REVIEW." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 7 (May 14, 2015): 5887–94. http://dx.doi.org/10.24297/ijct.v14i7.1893.
Full textYu, Yang. "Encryption Technology for Computer Network Data Security Protection." Security and Communication Networks 2022 (August 22, 2022): 1–9. http://dx.doi.org/10.1155/2022/1789222.
Full textGolubova, Anguelina, and Vera Shumilina. "INFORMATION SECURITY AND DATA PROTECTION IN MODERN SOCIETY." Science & World, no. 2 (June 10, 2022): 6–10. http://dx.doi.org/10.26526/2307-9401-2022-2-6-10.
Full text