Academic literature on the topic 'Information security legislations'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information security legislations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Information security legislations"

1

Nte, Ngboawaji Daniel, Vigo Augustine Teru, and Arifin Ridwan. "Challenges of information security laws and legislations in Nigeria’s institutions of higher education: Views from Yola, Adamawa state." Research and Development in Education (RaDEn) 4, no. 2 (2024): 1498–519. https://doi.org/10.22219/raden.v4i2.35711.

Full text
Abstract:
The menace of threats against information security worldwide cannot be overemphasis. The whole gamut of statecraft, national security, public safety, international trade and indeed postmodernity revolves around information security. As a country, Nigeria is part of a global system facing this monumental threat and institutions of higher education are a subset of the vulnerability circle. This work therefore seeks to evaluate the challenges of implementation of information security laws and legislations in Nigerian institutions of higher education with special focus of higher education institut
APA, Harvard, Vancouver, ISO, and other styles
2

Tang, Chang Long. "Establish a Dynamic Business Driven Integrative Information Security Architecture." Applied Mechanics and Materials 513-517 (February 2014): 1309–15. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1309.

Full text
Abstract:
With Respect to the challenges most organizations are facing when considering information security management, especially how to demonstrate the value of security to senior leadership and how to meet all kinds of legislations in one place, this article describes a dynamic business driven integrative information security architecture to address those problems. By designing the architecture through three levels which are domain level, component level, and control level, the architecture is target to establish alignment and traceability between business and security, build customer service concep
APA, Harvard, Vancouver, ISO, and other styles
3

Parraguez Kobek, Luisa, and Erick Caldera. "Cyber Security and Habeas Data: The Latin American response to information security and data protection." OASIS, no. 24 (November 3, 2016): 109. http://dx.doi.org/10.18601/16577558.n24.07.

Full text
Abstract:
Habeas Data is not a commonly known concept, yet it is widely acknowledged in certain circles that deal with information security and data protection. Though it has been around for decades, it has recently gained momentum in Latin America. It is the legal notion that protects any and all information pertaining to the individual, from personal to financial, giving them the power to decide how and where such data can be used. At the same time, most Latin American countries have created laws that protect individuals if their information is misused. This article examines the concept of Habeas Data
APA, Harvard, Vancouver, ISO, and other styles
4

Al-Suqri, Mohammed Nasser, Salim Said Alkindi, Naifa Eid Saleem, and Marwa Suliman Al-Nabhani. "Libraries and National Security: A Review of the Evidence and a Proposed New Strategic Direction." Journal of Arts and Social Sciences [JASS] 11, no. 3 (2023): 17–27. http://dx.doi.org/10.53542/jass.v11i3.4479.

Full text
Abstract:
The article aims to identify and discuss the various roles that libraries hold with regard to national security and to use the findings to propose a more clearly delineated future role for the global and national communities which reconciles these diverse and sometimes conflicting roles. The review of literature revealed that the roles of libraries with regard to national security fall mainly into two categories. That which has received most attention, mainly in the U.S. context, involves co-operation with the provisions of national security legislation which relate to libraries and their user
APA, Harvard, Vancouver, ISO, and other styles
5

余梦凝. "国外个人信息保护理论及立法". 國際人文社科研究 2, № 3 (2023): 72–84. https://doi.org/10.63944/q3abbt37.

Full text
Abstract:
The importance of personal information protection has become more prominent in the era of digitization. Studying and sorting out foreign personal information protection theories, principles, legislative models, and studying foreign experiences has certain practical significance. There are differences in personal information appellation in different countries, and personal information protection theories also have their own characteristics. The emergence of personal privacy theory, code theory, self Cybernetics, etc. has an important impact on personal information protection legislation. The da
APA, Harvard, Vancouver, ISO, and other styles
6

Gupta, Manvi, and Ayush Gupta. "Cyber Security Legal Framework in India – Overlaps, Problems and Challenges." Journal of Business Management and Information Systems 12, no. 1 (2025): 11–20. https://doi.org/10.48001/jbmis.1201002.

Full text
Abstract:
Cybersecurity in India is governed by a complex legal framework designed to protect information infrastructure, secure data, and mitigate cyber threats. The increasing digitalization across sectors has amplified the need for robust cybersecurity laws. The legal framework is still evolving and continuous steps have been taken by the authorities to promulgate legislations as and when required as evidenced in the last decade. In this paper, we examine the evolving cybersecurity legal framework in India and highlight the major problems and challenges. We explore the major legislation that deals wi
APA, Harvard, Vancouver, ISO, and other styles
7

Tretiak, Maria. "Specific Features of Protection Against Computer-Aided Criminal Infringements on Cashless (Electronic) Funds in Contemporary Criminal Legislations of Belarus and Russia." Russian Journal of Criminology 15, no. 5 (2021): 592–604. http://dx.doi.org/10.17150/2500-4255.2021.15(5).592-604.

Full text
Abstract:
The dominance of a distance form of interactions in modern conditions resulted in an increase in operations with cashless (electronic) funds, which led to a growth of the number of acquisitive cybercrimes. The author examines criminal law measures of protecting cashless (electronic) funds against criminal infringements in the cybersphere and conducts legal analysis of regulations on acquisitive crimes against property and information security reflected in criminal legislations of Belarus and Russia. Special attention is paid to the characteristic features of protection measures against acquisi
APA, Harvard, Vancouver, ISO, and other styles
8

Vikhrova, Olga. "Harmonization of Media Legislation in the Eurasian Economic Union Countries as a Factor of Information Security." Theoretical and Practical Issues of Journalism 11, no. 3 (2022): 489–508. http://dx.doi.org/10.17150/2308-6203.2022.11(3).489-508.

Full text
Abstract:
The article substantiates the need to harmonize the national laws governing the activities of the media of the EAEU countries in order to ensure information security in the post-Soviet space in the context of exacerbation of international geopolitical conflicts and intensification of information confrontation. The authors identify some aspects of media space regulation that are not robust legislatively including the conceptual apparatus, regulation of social media and copyright on social media platforms. The study analyzed main legislative acts regulating the activities of mass media in the co
APA, Harvard, Vancouver, ISO, and other styles
9

YANG, Mu, and Wen Xin LIM. "Recent Development of Internet Finance in China." East Asian Policy 07, no. 03 (2015): 46–60. http://dx.doi.org/10.1142/s1793930515000276.

Full text
Abstract:
The internet finance sector in China, buoyed by the rise of online payment services, online person-to-person (P2P) lending platforms and online sales of financial products, is a revolutionary means of financing. New in China, relevant legislations are lagging behind product innovations. Internet finance risks are more in risk control and consumer information security. Despite the need to regulate China’s internet banking, the key is to strike a subtle balance between stability and financial market liberalisation.
APA, Harvard, Vancouver, ISO, and other styles
10

Weerasinghe, D., K. Elmufti, V. Rakocevic, and M. Rajarajan. "Patient Privacy Protection Using Anonymous Access Control Techniques." Methods of Information in Medicine 47, no. 03 (2008): 235–40. http://dx.doi.org/10.3414/me9116.

Full text
Abstract:
Summary Objective: The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distributed databases into a single patient medical record with the patient identity. Methods: In this paper we present a protocol that can be used to authenticate and authorize patients to healthcare services without providing the pati
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Information security legislations"

1

Wells, William Ward. "Information security program development." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Banerjea-Brodeur, Nicolas Paul. "Advance passenger information passenger name record : privacy rights and security awareness." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.

Full text
Abstract:
An in-depth study of Advance Passenger Information and Passenger Name Record has never been accomplished prior to the events of September 11 th. It is of great importance to distinguish both of these concepts as they entail different legal consequence. API is to be understood as a data transmission that Border Control Authorities possess in advance in order to facilitate the movements of passengers. It is furthermore imperative that harmonization and inter-operability between States be achieved in order for this system to work. Although the obligations seem to appear for air carriers to
APA, Harvard, Vancouver, ISO, and other styles
3

Desai, Mohammed Reza. "An integrated approach for information security compliance in a financial services organisation." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2396.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2016.<br>The aim of this research is to identify and explore the factors affecting information security compliance of information security policies and regulations, in a financial services organisation. The organisation has to comply with information security regulations and legislations by righteousness of its operations in light of the fact that any wrong doing together with misuse of data, are continually expanding. Corporate embarrassments comes about due to rupture of security, results in expanded thoughtful
APA, Harvard, Vancouver, ISO, and other styles
4

Sjöström, Elin. "Ett lapptäcke av säkerhetsskydd över Sverige : Utmaningar för civila verksamheter vid applicering av säkerhetsskyddsanalys för stärkt nationell säkerhet." Thesis, Linköpings universitet, Informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-159636.

Full text
Abstract:
Informationssäkerhet är idag någonting som blivit allt viktigare med den ökade mängd information som bearbetas och den ökade risken för antagonistiska händelser. Att bygga upp ett omfattande säkerhetsskydd genom att genomföra en grundläggande säkerhetsskyddsanalys är därför av vikt för de verksamheter som kan påverka Sveriges säkerhet. Denna studie har undersökt detta genom att besvara två frågeställningar: 1.Vilka utmaningar finns det vid applicering av säkerhetsskyddsanalys för civila verksamheter inom Sverige? och 2. Hur bör dessa verksamheter applicera säkerhetsskyddsanalys för att handska
APA, Harvard, Vancouver, ISO, and other styles
5

Кунєв, Ю. Д. "Правове забезпечення інформаційної безпеки як предмет правового дослідження". Thesis, Національний авіаційний університет, 2021. https://er.nau.edu.ua/handle/NAU/53719.

Full text
Abstract:
Мета статті полягає у формулюванні проблем та визначенні теоретичних основ їх розв’язання щодо нормативно-правового регулювання сфери інформаційної безпеки. Методи дослідження: комплексний підхід до створення теоретичної картини об’єкта та застосування методологічної схеми «подвійного знання» про об’єкт як такий та про знання, що його описують і зображують; порівняльно-правового та доктринального пізнання інформаційного законодавства, а також метод узагальнення та моделювання нових теоретичних знань інформаційного права. Результати: визначені проблеми подальшого розвитку правового забезп
APA, Harvard, Vancouver, ISO, and other styles
6

Skolmen, Dayne Edward. "Protection of personal information in the South African cloud computing environment: a framework for cloud computing adoption." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/12747.

Full text
Abstract:
Cloud Computing has advanced to the point where it may be considered an attractive proposition for an increasing number of South African organisations, yet the adoption of Cloud Computing in South Africa remains relatively low. Many organisations have been hesitant to adopt Cloud solutions owing to a variety of inhibiting factors and concerns that have created mistrust in Cloud Computing. One of the top concerns identified is security within the Cloud Computing environment. The approaching commencement of new data protection legislation in South Africa, known as the Protection of Personal Info
APA, Harvard, Vancouver, ISO, and other styles
7

Kampourakis, Ioannis [Verfasser]. "Dialectics of Transparency and Secrecy in the Information Age : The Role of Whistleblowing Legislation in the Regulatory Governance of Markets and in National Security / Ioannis Kampourakis." Berlin : Freie Universität Berlin, 2019. http://d-nb.info/1195081014/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ledenstam, David, and Gustav Jonasson. "Kom ihåg att glömma bort : Fallstudie av organisationers förändringsarbete ur ett informationssäkerhetsperspektiv." Thesis, Uppsala universitet, Institutionen för informatik och media, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-355584.

Full text
Abstract:
Changes is always a relevant factor in organisations. The 25th of May 2018 the General Data Protection Regulation (GDPR) becomes enforceable as EU law, which will be a cause for change for a lot of organisation’s way of handling data, possibly endangering the information’s security. This essay aims to study three organizations and how they have prepared for GDPR. They will be analyzed from a change-management- and information security perspective, to conclude how the organisations conceive the magnitude of the change, and to see how they have implemented solutions for keeping the data safe aft
APA, Harvard, Vancouver, ISO, and other styles
9

Ratkevičienė, Sigita. "Šengeno informacinės sitemos vaidmuo ir teisinis reglamentavimas užtikrinant valstybių narių saugumą." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2006. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20061227_184131-28545.

Full text
Abstract:
In this thesis the role of the Shengen Information Sytem (SIS) in the field of security of the Member States was evaluated and legislation of the aforementioned system was analysed. The curent version of SIS was dissertated and componed with a new version of SIS (SIS II) of with creationis is in progress. The attention was paid to the advantages and disadvantages of both current version of SIS and the new one. Significance of SIS in the field of protection of the Shengen area was evaluated. In the thesis SIS was presented as one of the most important compensatory tools.
APA, Harvard, Vancouver, ISO, and other styles
10

Kroft, Karel. "Audit cloudových služeb pro malé a střední podniky." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-203958.

Full text
Abstract:
Cloud computing brings to the world of information systems many opportunities but also new risks. The main one is decreased customer ability to directly control the security of information and systems, because administration responsibility passes to providers. This thesis focuses on cloud services auditing from the small and medium enterprises perspective. In introduction, this work defines information system audit terminology, characterizes cloud services and analyzes international legislation. Standardization organizations, published standards and methodologies that are widely respected in I
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Information security legislations"

1

Torp, Jeffrey. Information security: Satisfying regulatory requirements. AlexInformation, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Baxter, John. State security, privacy and information. Harvester Wheatsheaf, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Blyth, Andrew. Information Assurance: Security in the Information Environment. Springer London, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Torp, Jeffrey. Information security: Guidance, standards, and issuances. AlexInformation, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

D, Baxter John. State security, privacy, and information. St. Martin's Press, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lewis, Ryan F. Information security laws: An introduction. Nova Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gifford, Nick. Information security: Managing the legal risks. CCH Australia Limited, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gifford, Nick. Information security: Managing the legal risks. CCH Australia Limited, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United States. Bureau of Justice Statistics. and Search Group, eds. Compendium of state privacy and security legislation: 1989 overview : privacy and security of criminal history information. U.S. Dept. of Justice, Office of Justice Program, Bureau of Justice Statistics, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

United States. Bureau of Justice Statistics. and Search Group, eds. Compendium of state privacy and security legislation: 1989 overview : privacy and security of criminal history information. U.S. Dept. of Justice, Office of Justice Program, Bureau of Justice Statistics, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Information security legislations"

1

Montasari, Reza, Hamid Jahankhani, and Fiona Carrol. "Combating Human Trafficking: An Analysis of International and Domestic Legislations." In Information Security Technologies for Controlling Pandemics. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72120-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Campbell, Tony. "Standards, Frameworks, Guidelines, and Legislation." In Practical Information Security Management. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1685-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lane, V. P. "Privacy and Data Protection Legislation." In Security of Computer Based Information Systems. Macmillan Education UK, 1985. http://dx.doi.org/10.1007/978-1-349-18011-0_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mehta, Nisarg, Priyansh Sanghavi, Manish Paliwal, and Madhu Shukla. "A Comprehensive Study on Cyber Legislation in G20 Countries." In Advancements in Smart Computing and Information Security. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23095-0_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Meints, Martin. "The Relationship between Data Protection Legislation and Information Security Related Standards." In The Future of Identity in the Information Society. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03315-5_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vasilenko-Zakharova, Olga V., and Anatoly V. Zubach. "Current State of Criminal Legislation and Law Enforcement Practice on Parole in the Russian Federation and the Republic of Lithuania." In Towards an Increased Security: Green Innovations, Intellectual Property Protection and Information Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93155-1_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Urmatova, Ainura D., Tamara I. Ganieva, Edil E. Moldoev, Tolkun S. Salybekova, and Kadyrbek A. Umetov. "The Use of Legal Intersectoral Terminology in the Process of Improving Legislation, Legislative Innovations on the Responsibility of Legal Entities in the Conditions of the Sovereignty of Kyrgyzstan." In Towards an Increased Security: Green Innovations, Intellectual Property Protection and Information Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93155-1_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Volchek, Katerina, Joanne Yu, Barbara Neuhofer, Roman Egger, and Mattia Rainoldi. "Co-creating Personalised Experiences in the Context of the Personalisation-Privacy Paradox." In Information and Communication Technologies in Tourism 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-65785-7_8.

Full text
Abstract:
AbstractThe personalisation-privacy paradox demonstrates a two-fold effect of tourists’ awareness about personalisation on their experience. Compulsory personal data agreements under the GDPR and similar legislation acts raise tourists’ concerns regarding privacy and security. The role of tourist awareness about the value of data-driven personalisation in their co-creation behaviour remains underexplored. This paper applies an exploratory experiment methodology to identify the effects of information about personalisation on tourists’ experience with travel information websites. It triangulates
APA, Harvard, Vancouver, ISO, and other styles
9

White, Garry L., Francis A. Méndez Mediavilla, and Jaymeen R. Shah. "Information Privacy." In Privacy Solutions and Security Frameworks in Information Protection. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2050-6.ch004.

Full text
Abstract:
In the Web dependent world, companies must respect and protect individuals’ information privacy. Companies develop and implement corporate information privacy policies to comply with the domestic and international information privacy laws and regulations. This paper investigates: (a) the approach used by multinational and domestic companies to develop and implement corporate information privacy policies; and (b) the perception of corporate managers/professionals toward information privacy legislation and secondary use of personally identifiable information (PII) that organizations collect. A s
APA, Harvard, Vancouver, ISO, and other styles
10

Mishra, Sushma. "Internal Auditing for Information Assurance." In Handbook of Research on Information Security and Assurance. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-59904-855-0.ch024.

Full text
Abstract:
Internal auditing has become increasingly important in current business environments. In this era of the Sarbanes- Oxley Act and other similar legislations, regulatory compliance requires elaborate organizational planning. Auditing helps organizations in internal control assessment, change management, and better governance preparedness, thus enhancing information assurance. Various facets of internal auditing are discussed in this chapter and the role of internal auditing in information assurance is analyzed. Future issues and trends with internal auditing are also presented.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Information security legislations"

1

Held, Craig. "Implementing Remote Wireless Monitoring of Pipeline Integrity and Cathodic Protection." In CORROSION 2010. NACE International, 2010. https://doi.org/10.5006/c2010-10028.

Full text
Abstract:
Abstract Energy and pipeline companies are wrestling to meet new, more strict, state and federal pipeline integrity requirements while trying to control operating costs. Unfortunate pipeline news events made corrosion and cathodic protection front page news. This elevated concerns to the extent that the U.S. Congress and several states are now working on legislation directed specifically toward cathodic protection practices. In addition, the U.S. Department of Transportation has shown new interest in regulating compliance, making adherence even more important in today’s world. Many companies a
APA, Harvard, Vancouver, ISO, and other styles
2

Yanev, Rysi, and Svetlana Nikoloska. "LEGAL AND CRIMINALISTIC FEATURES OF MONEY LAUNDERING IN THE REPUBLIC OF BULGARIA AND THE REPUBLIC OF NORTH MACEDONIA." In SECURITY HORIZONS. Faculty of Security- Skopje, 2021. http://dx.doi.org/10.20544/icp.2.5.21.p07.

Full text
Abstract:
Money laundering is incriminated in the criminal legislation of the Republic of Bulgaria and the Republic of North Macedonia as a separate criminal offense. The subject of this paper is the analysis of criminal acts with elements of money laundering to the two criminal legislations in order to obtain information about which criminal acts are incriminated, and the status of possible perpetrators. The evaluation of criminal acts based on the harmonization according to the Recommendations of international conventions and other legal documents will be thoroughly analyzed. Criminalistic characteris
APA, Harvard, Vancouver, ISO, and other styles
3

Mateeva, Zhivka. "NATURE OF THE CONTROL OVER THE PROTECTION OF CLASSIFIED INFORMATION, CARRIED OUT BY THE STATE COMMISSION OF INFORMATION SECURITY." In THE LAW AND THE BUSINESS IN THE CONTEMPORARY SOCIETY 2020. University publishing house "Science and Economics", University of Economics - Varna, 2020. http://dx.doi.org/10.36997/lbcs2020.263.

Full text
Abstract:
The report examines the control activities of the State Commission of Information Security, as one of the bodies ensuring compliance with the rules for protection of classified information. Undoubtedly, the fast and efficient protection of classified information is a matter of great public importance, and the unregulated disclosure or disclosure of information, as well as illegal access to it can damage the interests of the state and its security to varying degrees. The control performs basic public functions such as the lawful application of the legislation governing the protection of classif
APA, Harvard, Vancouver, ISO, and other styles
4

Bekara, Kheira, and Maryline Laurent. "A Semantic Information Model Based on the Privacy Legislation." In 2011 Conference on Network and Information Systems Security (SAR-SSI). IEEE, 2011. http://dx.doi.org/10.1109/sar-ssi.2011.5931375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Redford, Mike. "U.S. and EU Legislation on Cybercrime." In 2011 European Intelligence and Security Informatics Conference (EISIC). IEEE, 2011. http://dx.doi.org/10.1109/eisic.2011.38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gupta, Ms Saumya. "Data Privacy in The Digital Era: Balancing Innovation and Intellectual Property Rights." In Intellectual Property Rights: Issues and Challenges. The Bhopal School of Social Sciences, 2025. https://doi.org/10.51767/c250615.

Full text
Abstract:
As the digital landscape continues to evolve, the intersection of data privacy, innovation, and intellectual property rights (IPR) emerges as a critical focal point in contemporary discourse. This research paper delves into the multifaceted dynamics of data privacy within the digital era, emphasizing the imperative to strike a delicate balance between fostering innovation and safeguarding intellectual property. The paper commences by exploring the evolution of data protection laws, with a specific focus on India's journey in formulating a comprehensive regulatory framework. The examination enc
APA, Harvard, Vancouver, ISO, and other styles
7

Andreeva, Tatiana. "Information security of the state as one of the main components of state security." In Universitas Europaea: Towards a Knowledge Based Society Through Europeanisation and Globalisation. Free International University of Moldova, 2025. https://doi.org/10.54481/uekbs2024.v1.31.

Full text
Abstract:
The problem of the existence of any state lies in the possibility of ensuring state security by public authorities. A state that is unable to ensure its state security for one reason or another is not viable, and, sooner or later, ceases to exist. Ensuring state security is one of the most urgent tasks facing public authorities. And the understanding by the authorities of the importance of this issue is the basis for further steps in this area. State security is the state of protection of the state from internal and external threats, in which sovereignty, independence, state and territorial in
APA, Harvard, Vancouver, ISO, and other styles
8

Daniels, Jesse, and Sajal Bhatia. "Legislation and the Negative Impact on Cybersecurity in Healthcare." In 6th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009157906910697.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gahír, Jakub, and Denis Kontárová. "Systém riadenia informačnej bezpečnosti (ISMS) a návrh jeho implementácie u prevádzkovateľa letiska." In Práce a štúdie. University of Žilina, 2024. http://dx.doi.org/10.26552/pas.z.2024.2.5.

Full text
Abstract:
The thesis is mainly focused on solving the problem of information security management system, subsequent analysis of legislative requirements in the Slovak Republic and the EU and comparison of the current state of implementation of the information security management system in the selected area at the M. R. Štefánik Airport in Bratislava with the minimum requirements for the selected area specified in the legislation. The work is systematically divided, with the first part being devoted to introducing the reader to the issues of the information security management system. The second part is
APA, Harvard, Vancouver, ISO, and other styles
10

Koroied, S. O. "ENSURING INFORMATION SECURITY OF PARTICIPANTS IN CIVIL CASES RESIDING IN THE TEMPORARY OCCUPIED TERRITORY OF UKRAINE." In LEGAL SCIENCE, LEGISLATION AND LAW ENFORCEMENT: TRADITIONS AND NEW EUROPEAN APPROACHES. Izdevnieciba “Baltija Publishing”, 2023. http://dx.doi.org/10.30525/978-9934-26-324-8-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Information security legislations"

1

Pretorius, Christo. EU Employment Law and the AI Act: A Policy Brief Putting the Human Back in ‘Human-Centric’ Policy. European Center for Populism Studies (ECPS), 2024. http://dx.doi.org/10.55271/pop0002.

Full text
Abstract:
This policy paper analyzes the European Union’s (EU) AI Act, aimed at regulating Artificial Intelligence (AI) through four risk classifications related to data protection, privacy, security, and fundamental rights. While the Act establishes regulatory frameworks, it neglects employment security, a critical factor behind public mistrust of AI. The paper warns that failure to address this issue could deepen socio-economic inequalities and lead to political unrest. Recommendations include promoting collective negotiation between workers and employers, advocating for legislation on redundancies li
APA, Harvard, Vancouver, ISO, and other styles
2

LEONOV, T. M., V. M. BOLSHAKOVA, and P. YU NAUMOV. THEORETICAL AND LEGAL ASPECTS OF PROVIDING MEDICAL ASSISTANCE TO EMPLOYEES OF THE MILITARY PROSECUTOR’S OFFICE. Science and Innovation Center Publishing House, 2021. http://dx.doi.org/10.12731/2576-9634-2021-5-4-12.

Full text
Abstract:
The work is devoted to a comprehensive study of medical support, incl. sanatorium-resort treatment of employees of the military prosecutor’s office and members of their families (persons who are dependent on them). It is noted that health care is structurally included in services that, in addition to cash payments and benefits in kind, represent the entire social security system. The main attention in the article is focused on the analysis of the normative legal regulation of the health protection of employees of the military prosecutor’s office, as well as the provision of medical assistance
APA, Harvard, Vancouver, ISO, and other styles
3

Sandford, Robert, Kaveh Madani, Emily Lorra Hines, et al. The Future of Freshwater in Canada. Massey College and the United Nations University Institute for Water, 2023. https://doi.org/10.53328/inr23rs01.

Full text
Abstract:
In September of 2023, the Forum for Leadership on Water and Massey College at the University of Toronto partnered to offer a symposium that aimed to bring the water community in Canada together to break down barriers, generate ideas and agree on solutions to a growing water and water-related climate crisis in Canada. The purpose of the symposium was to engage and inspire meaningful conversation and debate across disciplines, affiliations and governments with respect to policy, legislation, finance and actions needed to ensure the sustainability of Canada’s great freshwater resource. This repor
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!