Academic literature on the topic 'ICT Integration and Data Security and Privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ICT Integration and Data Security and Privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "ICT Integration and Data Security and Privacy"
UHIRIWE, ALICE, and Dushimimana Jean de Dieu DR. "EFFECT OF INFORMATION COMMUNICATION TECHNOLOGY (ICT) ON PROJECT PERFORMANCE. A CASE OF BUILDING RESILIENCE IN LEADING TEACHING AND LEARNING TOGETHER PROJECT (BRLTLT) IN KICUKIRO DISTRICT, RWANDA." International Journal of Social Science and Humanities Research 13, no. 2 (2025): 175–87. https://doi.org/10.5281/zenodo.15295160.
Full textResearcher. "BALANCING FUNCTIONALITY AND SECURITY: A FRAMEWORK FOR IOT SOFTWARE INTEGRATION WITH THIRD-PARTY SERVICES IN CRITICAL SECTORS." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 263–79. https://doi.org/10.5281/zenodo.13970070.
Full textAbdussalam, Ali Ahmed, Belrzaeg Mohamed, Nassar Yasser, J. El-Khozondar Hala, Khaleel Mohamed, and Alsharif Abdulgader. "A comprehensive review towards smart homes and cities considering sustainability developments, concepts, and future trends." World Journal of Advanced Research and Reviews 19, no. 1 (2023): 1482–89. https://doi.org/10.5281/zenodo.10335712.
Full textKumbo, Lazaro Inon, Deogratias Tasilo Mahuwi, Bernad Joseph Hayuma, Victor Simon Nkwera, Christopher Denis Ntyangiri, and Martin Ludovick Mushi. "Review of Blockchain Technology on Data Security and Privacy: Recommendations for Advancing Tanzania's ICT Sector." ABUAD Journal of Engineering Research and Development (AJERD) 7, no. 2 (2024): 475–83. http://dx.doi.org/10.53982/ajerd.2024.0702.45-j.
Full textMartin, Parmar, and Shah Parth. "Internet of things-blockchain integration: a robust data security approach for end-to-end communication." Internet of things-blockchain integration: a robust data security approach for end-to-end communication 32, no. 2 (2023): 1050–57. https://doi.org/10.11591/ijeecs.v32.i2.pp1050-1057.
Full textAgbesanya, Dr Felicia Olufunke, Dr James Oladiipo Folorunso, and Dr Adedayo Adeniran Odunlami. "Adoption and Management of ICT in Schools: Strategies for the Administrators in Nigerian Tertiary Institution." International Journal of Research and Innovation in Social Science VIII, no. VII (2024): 2838–46. http://dx.doi.org/10.47772/ijriss.2024.807220.
Full textIbrahim, Umar. "The Role of Cloud Computing in Transforming ICT Infrastructure in Educational Institutions." International Journal of Applied and Scientific Research 2, no. 2 (2024): 213–26. http://dx.doi.org/10.59890/ijasr.v2i2.1333.
Full textIbrahim, Umar. "The Role of Cloud Computing in Transforming ICT Infrastructure in Educational Institutions." Role of Cloud Computing in Transforming ICT Infrastructure in Educational Institutions 2, Vol. 2 No. 2 (2024): February 2024 (2024): 14. https://doi.org/10.59890/ijasr.v2i2.1333.
Full textS, Sanjith, Ranjit Jeba Thangaiah P, Macklin Abraham Navamani J, and Venkataramana Attada. "Integration of Blockchain Technology for Security and Privacy Enhancement in Wireless Body Area Network Systems." Indian Journal of Science and Technology 16, no. 41 (2023): 3583–90. https://doi.org/10.17485/IJST/v16i41.1610.
Full textS, Sanjith, Ranjit Jeba Thangaiah P, Macklin Abraham Navamani J, and Venkataramana Attada. "Integration of Blockchain Technology for Security and Privacy Enhancement in Wireless Body Area Network Systems." Indian Journal of Science and Technology 16, no. 41 (2023): 3583–90. https://doi.org/10.17485/IJST/v16i41.1610.
Full textDissertations / Theses on the topic "ICT Integration and Data Security and Privacy"
Hu, Jun. "Privacy-Preserving Data Integration in Public Health Surveillance." Thèse, Université d'Ottawa / University of Ottawa, 2011. http://hdl.handle.net/10393/19994.
Full textEnríquez, Luis. "Personal data breaches : towards a deep integration between information security risks and GDPR compliance risks." Electronic Thesis or Diss., Université de Lille (2022-....), 2024. http://www.theses.fr/2024ULILD016.
Full textNÓBREGA, Thiago Pereira da. "Pareamento privado de atributos no contexto da resolução de entidades com preservação de privacidade." Universidade Federal de Campina Grande, 2018. http://dspace.sti.ufcg.edu.br:8080/jspui/handle/riufcg/1671.
Full textBerrios-Ayala, Mark. "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities." Honors in the Major Thesis, University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1547.
Full textBooks on the topic "ICT Integration and Data Security and Privacy"
Sang-in, Chŏn, ред. Hanʼguk hyŏndaesa: Chinsil kwa haesŏk. Nanam Chʻulpʻan, 2005.
Find full textShah, Rajiv, and Brendan Mcquade. Surveillance, Security, and Intelligence-Led Policing in Chicago. Edited by Larry Bennett, Roberta Garner, and Euan Hague. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252040597.003.0012.
Full textProtection of children's personal data: current challenges: a collection of materials. Institute for Digitalisation of Education of NAES of Ukraine, 2025. https://doi.org/10.33407/lib.naes.id/eprint/746007.
Full textICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings. Springer Berlin / Heidelberg, 2014.
Find full textJajodia, Sushil, Nora Cuppens-Boulahia, Frederic Cuppens, Anas Abou El Kalam, and Thierry Sans. ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings. Springer London, Limited, 2014.
Find full textJajodia, Sushil, Nora Cuppens-Boulahia, Frederic Cuppens, Anas Abou El Kalam, and Thierry Sans. ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings. Springer, 2016.
Find full textJajodia, Sushil, Nora Cuppens-Boulahia, and Frederic Cuppens. ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings. Springer, 2014.
Find full textRamonyai, Jerry. Data and Information Technology: Jquery Mobile, Financial Services, Privacy Policies, Security Testing, Software Troubleshooting,TR5 Argo, Continuous Integration and Continuous Delivery . Independently Published, 2022.
Find full textLeadership, Management and Data Science: Jquery Mobile, Financial Services, Privacy Policies, DM9, Security Testing, Software Troubleshooting, Argo, Continuous Integration and Continuous Delivery . Independently Published, 2022.
Find full textLiebling, Alison, Shadd Maruna, and Lesley McAra, eds. The Oxford Handbook of Criminology. Oxford University Press, 2017. http://dx.doi.org/10.1093/he/9780198719441.001.0001.
Full textBook chapters on the topic "ICT Integration and Data Security and Privacy"
Dubovitskaya, Alevtina, Visara Urovi, Matteo Vasirani, Karl Aberer, and Michael I. Schumacher. "A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18467-8_39.
Full textChen, Xiaoran, and Yu Gao. "Integration of Digital Art Works and Virtual Reality Technology." In The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89508-2_78.
Full textLi, Yueying. "System of Government Audit Information Integration Platform Based on Block Chain Technology." In The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89508-2_132.
Full textBozdemir, Beyza, Betül Aşkın Özdemir, and Melek Önen. "PRIDA: PRIvacy-Preserving Data Aggregation with Multiple Data Customers." In ICT Systems Security and Privacy Protection. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-65175-5_4.
Full textBurkert, Christian, Maximilian Blochberger, and Hannes Federrath. "Compiling Personal Data and Subject Categories from App Data Models." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78120-0_16.
Full textTzermias, Zacharias, Vassilis Prevelakis, and Sotiris Ioannidis. "Privacy Risks from Public Data Sources." In ICT Systems Security and Privacy Protection. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55415-5_13.
Full textKasimatis, Dimitrios, William J. Buchanan, Mwarwan Abubakar, et al. "Transforming EU Governance: The Digital Integration Through EBSI and GLASS." In ICT Systems Security and Privacy Protection. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-65175-5_18.
Full textAntignac, Thibaud, David Sands, and Gerardo Schneider. "Data Minimisation: A Language-Based Approach." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58469-0_30.
Full textGarg, Sonakshi, and Vicenç Torra. "Can Synthetic Data Preserve Manifold Properties?" In ICT Systems Security and Privacy Protection. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-65175-5_10.
Full textGuita, Vasco, Daniel Andrade, João Nuno Silva, and Miguel Correia. "Anonymous Trusted Data Relocation for TEEs." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06975-8_26.
Full textConference papers on the topic "ICT Integration and Data Security and Privacy"
Aljumah, Ahmad Ibrahim, Mohammed T. Nuseir, and Ghaleb El Refae. "Privacy and Data Protection on Social Network Sites as Driver of Social Integration." In 2024 11th International Conference on Social Networks Analysis, Management and Security (SNAMS). IEEE, 2024. https://doi.org/10.1109/snams64316.2024.10883809.
Full textNevrataki, Theodora, Anastasia Iliadou, George Ntolkeras, et al. "A survey on federated learning applications in healthcare, finance, and data privacy/data security." In ETLTC-ICETM2023 INTERNATIONAL CONFERENCE PROCEEDINGS: ICT Integration in Technical Education & Entertainment Technologies and Management. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0182160.
Full textKioskli, Kitty, Spyridon Papastergiou, Theofanis Fotis, Stefano Silvestri, and Haralambos Mouratidis. "A Self-Organized Swarm Intelligence Solution for Healthcare ICT Security." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004780.
Full textMiyaji, Atsuko, and Yoshitaka Nagao. "Privacy Preserving Data Integration Protocol." In 2020 15th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, 2020. http://dx.doi.org/10.1109/asiajcis50894.2020.00025.
Full textTafa, Igli, and Kevin Shahollari. "Reducing Cyber Incident Response to Protect CNI from Cyber Attacks using an N-SIEM Integration with an ICTI-CNI." In 2nd International Conference on Machine Learning Techniques and Data Science (MLDS 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111818.
Full textAks, Safriadi M. Yunus, Mila Karmila, Bryan Givan, et al. "A Review of Blockchain for Security Data Privacy with Metaverse." In 2022 International Conference on ICT for Smart Society (ICISS). IEEE, 2022. http://dx.doi.org/10.1109/iciss55894.2022.9915055.
Full textDwivedi, Akhilesh, Neeraj Patel, and Rishab Pastariya. "Deep Learning Innovations for IoT Network Security and Data Privacy." In 2023 IEEE International Conference on ICT in Business Industry & Government (ICTBIG). IEEE, 2023. http://dx.doi.org/10.1109/ictbig59752.2023.10455976.
Full textWang, Anduo, Jason Croft, and Eduard Dragut. "Reflections on Data Integration for SDN." In CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy. ACM, 2017. http://dx.doi.org/10.1145/3040992.3041006.
Full textMireku Kwakye, Michael, and Ken Barker. "Privacy-preservation in the integration and querying of multidimensional data models." In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7906971.
Full textAntonoaie, Cristina. "ASPECTS REGARDING ICT TRUST, SECURITY AND PRIVACY IN EU COUNTRIES." In eLSE 2020. University Publishing House, 2020. http://dx.doi.org/10.12753/2066-026x-20-156.
Full textReports on the topic "ICT Integration and Data Security and Privacy"
Dover, Mike. Open Source and Energy Interoperability: Opportunities for Energy Stakeholders in Canada. The Linux Foundation, 2024. https://doi.org/10.70828/vlfn5091.
Full textPasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Full text