Academic literature on the topic 'Internet des objets – Protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Internet des objets – Protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Internet des objets – Protection"

1

AR, Azhari. "Perlindungan Hukum Terhadap Karya Cipta Di Media Internet." Jurnal Hukum Kaidah: Media Komunikasi dan Informasi Hukum dan Masyarakat 22, no. 2 (2023): 278–90. http://dx.doi.org/10.30743/jhk.v22i2.6492.

Full text
Abstract:
The legal aspect becomes very important because the law is expected to be able to overcome various problems that arise related to IPR. The law must be able to provide protection for a person's intellectual work, so that it is able to develop the creative power of society which ultimately leads to the goal of protecting IPR. In addition, the technological aspect is also one of the factors that becomes very dominant in the development and protection of IPR. Protection of Copyright as Movable Objects That Have no Form, that Copyright is an intangible movable object in accordance with what is stip
APA, Harvard, Vancouver, ISO, and other styles
2

Haza, Marion. "Objets culturels dystopiques et adolescence." Topique 160, no. 1 (2024): 97–110. http://dx.doi.org/10.3917/top.160.0097.

Full text
Abstract:
Après avoir redéfini utopie et dystopie, cet article déploie l’analogie entre processus pubertaire et scénario dystopique. L’adolescent est bien une figure de héros de sa propre histoire, résistant au tourment pubertaire pour s’inscrire dans la société en tant que futur adulte, parfois dans un sacrifice psychopathologique. Les objets culturels adolescents servent de portage et de protection face à ce parcours dystopique : les fictions dystopiques des adolescents contemporains (livres, manga, jeux vidéo, etc.) figurent leurs conflictualités internes, rendent possible des indentifications ou con
APA, Harvard, Vancouver, ISO, and other styles
3

Sargaldakova, Zh Z., and D. A. Kutmanalieva. "PROTECTION OF COPYRIGHT OBJECTS ON THE INTERNET." Vestnik of the Kyrgyz-Russian Slavic University 24, no. 3 (2024): 96–100. http://dx.doi.org/10.36979/1694-500x-2024-24-3-96-100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Meiller, Yannick. "La sécurité de l’information devrait être plus présente dans les programmes des écoles de management." Sécurité et stratégie 32, no. 4 (2024): 12–16. http://dx.doi.org/10.3917/sestr.032.0012.

Full text
Abstract:
Titulaire d’un doctorat en Informatique et Intelligence artificielle (systèmes industriels), obtenu à ISAE-Supaéro, Yannick Meiller est professeur à ESCP Europe . Ses travaux de recherche et ses enseignements portent pour l’essentiel sur le numérique et les domaines associés (traitements de l’information, Internet des objets, protection des données à caractère personnel, sécurité, systèmes d’information…), ainsi que sur le management de projets innovants . Il nous explique ici pourquoi la sécurité de l’information est un sujet à enseigner dans les écoles de management .
APA, Harvard, Vancouver, ISO, and other styles
5

WANG, Haixiang, Jingyi CAO, and Zhe LIU. "Energy Internet and Its Trusted Protection Architecture." Wuhan University Journal of Natural Sciences 27, no. 2 (2022): 169–76. http://dx.doi.org/10.1051/wujns/2022272169.

Full text
Abstract:
Through the combination of new energy and Internet technology, the Energy Internet deeply integrates various complex network systems such as power, transportation and natural gas, aiming to change the energy utilization model and promote the sustainable development of economy and society. The Energy Internet takes the power grid as the "Backbone Network" , integrating the autonomous units of distributed energy, and integrating information and energy through the open-peer information and energy integration architecture. Information interaction scenarios of the Energy Internet information intera
APA, Harvard, Vancouver, ISO, and other styles
6

Samahalska, Y. "Personal data protection in the Internet." Uzhhorod National University Herald. Series: Law 2, no. 82 (2024): 259–63. http://dx.doi.org/10.24144/2307-3322.2024.82.2.41.

Full text
Abstract:
A personal daily communication is connected with giving and receiving a large amount of information. A common visit to a website can provide its owner with information about its users (cookies). A registration will provide the owner with a confidential information. In this view, it became necessary to protect a person and to regulate a separate subtype of such information called “personal data”. The concept of “personal data” is not new for Ukraine. The Law “On Protection of Personal Data” was adopted in 2010, however, the practice of its realization shows that the subjects of relations relate
APA, Harvard, Vancouver, ISO, and other styles
7

KUCHUK, Andrii, and Yuliia SIHALOVA. "LEGAL REGULATION OF COPYRIGHT ON THE INTERNET: GENERAL STATE." Naukovyy Visnyk Dnipropetrovs kogo Derzhavnogo Universytety Vnutrishnikh Sprav, no. 1 (October 2, 2024): 102–7. http://dx.doi.org/10.31733/2078-3566-2023-5-102-107.

Full text
Abstract:
The urgency of the study is determined by the necessity of a systematic study of the state of copyright protection, in particular due to the constant development of the information sphere. The issue of protection of intellectual property rights (and, in particular, copyright) on the Internet is constantly a subject of discussion among legal scholars. It is indicated that access to the Internet is important for a modern person to develop his personality. Providing access to the Internet has become a necessity for many aspects of the life of a modern person. The Internet is an unlimited source o
APA, Harvard, Vancouver, ISO, and other styles
8

Logvynenko, M. I., I. V. Karikh, and A. V. Dykovets. "Problems of protection of copyright objects in the network Internet." Legal Horizons 15, no. 28 (2019): 21–25. http://dx.doi.org/10.21272/legalhorizons.2019.i15.p21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Logvynenko, M. I., I. V. Karikh, and A. V. Dykovets. "Problems of protection of copyright objects in the network Internet." Legal Horizons 15, no. 28 (2019): 21–25. http://dx.doi.org/10.21272/legalhorizons.2019.i15.p:21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kurniawan Sihombing, Agung, Rika Ratna Permata, and Tasya Safiranita Ramli. "Comparison of Digital Copyright Protection on Over the Top (OTT) Streaming Content Media in Indonesia and the United States." PADJADJARAN Jurnal Ilmu Hukum (Journal of Law) 8, no. 2 (2021): 183–212. http://dx.doi.org/10.22304/pjih.v8n2.a2.

Full text
Abstract:
In the rapid technological development, physical boundaries have begun to disappear. The internet has created a ‘free culture’. In addition, the era is challenging the copyright concept along with the emergence of ‘digital copyright’. It has become the main commodity of Over-the-Top services providing means of communication and entertainment through the internet. Content streaming service like Netflix uses films, as well as other cinematographic works, as its main commodities. OTT Streaming media helps to protect copyright holders' rights that previously have been violated by illegal streaming
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Internet des objets – Protection"

1

Nicomette, Vincent. "La protection dans les systèmes à objets répartis." Phd thesis, Institut National Polytechnique de Toulouse - INPT, 1996. http://tel.archives-ouvertes.fr/tel-00175252.

Full text
Abstract:
La protection des systèmes répartis est un problème complexe : en quelles entités du système peut-on avoir confiance et étant donné cette confiance, comment assurer la protection du système global. L'approche adoptée dans cette thèse consiste à combiner d'une part une gestion globale et centralisée des droits d'accès aux objets persistants du système par un serveur d'autorisation et d'autre part une protection locale par un noyau de sécurité sur chaque site du système réparti. Ce noyau contrôle les accès à tous les objets locaux (persistants ou temporaires) et a de plus la responsabilité de la
APA, Harvard, Vancouver, ISO, and other styles
2

Morel, Victor. "Enhancing transparency and consent in the internet of things." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI073.

Full text
Abstract:
Le nombre d’appareils connectés à Internet ne cesse d’augmenter, certaines perspectives prédisant 75 milliards d’appareils d’ici 2025. L’Internet des Objets envisagé il y a 20 ans se matérialise à une vitesse soutenue, mais cette croissance n’est pas sans conséquence. Le nombre croissant d’appareils suscite en effet des possibilités de surveillance jamais vu auparavant. Un cap a été franchi en 2018 pour la protection de l’intimité numérique (privacy), avec la mise en application du Règlement Européen sur la Protection des Données (RGPD) dans l’Union Européenne. Il impose des obligations aux re
APA, Harvard, Vancouver, ISO, and other styles
3

Ould, yahia Youcef. "Proposition d’un modèle de sécurité pour la protection de données personnelles dans les systèmes basés sur l’internet des objets." Electronic Thesis or Diss., Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1242.

Full text
Abstract:
Les technologies de l'Internet des objets (IdO) et de l'externalisation des services informatiques ont conduit à l'émergence de nouvelles menace sur la vie privée des utilisateurs. Cependant, l'implémentation des moyens de sécurité traditionnels sur les équipements de l'IdO constitue un premier défi lié aux limites de capacités. D'un autre côté, la délégation du traitement et du stockage des données, nous pose le problème de confiance envers les fournisseurs de service.Dans ce contexte, nous avons proposé une solution de chiffrement qui assure une protection de données centrée sur leurs propri
APA, Harvard, Vancouver, ISO, and other styles
4

Ould, yahia Youcef. "Proposition d’un modèle de sécurité pour la protection de données personnelles dans les systèmes basés sur l’internet des objets." Thesis, Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1242/document.

Full text
Abstract:
Les technologies de l'Internet des objets (IdO) et de l'externalisation des services informatiques ont conduit à l'émergence de nouvelles menace sur la vie privée des utilisateurs. Cependant, l'implémentation des moyens de sécurité traditionnels sur les équipements de l'IdO constitue un premier défi lié aux limites de capacités. D'un autre côté, la délégation du traitement et du stockage des données, nous pose le problème de confiance envers les fournisseurs de service.Dans ce contexte, nous avons proposé une solution de chiffrement qui assure une protection de données centrée sur leurs propri
APA, Harvard, Vancouver, ISO, and other styles
5

Celosia, Guillaume. "Privacy challenges in wireless communications of the Internet of Things." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI069.

Full text
Abstract:
Également connue sous le nom d'Internet des Objets (IdO), la prolifération des objets connectés offre des opportunités sans précédent aux consommateurs. Des moniteurs d'activité physique aux assistants médicaux, en passant par les appareils électroménagers pour maisons intelligentes, les objets IdO évoluent dans une pléthore de domaines d'application. Cependant, les avantages qu'ils peuvent apporter à notre société augmentent conjointement avec leurs implications en matière de vie privée. Communiquant continuellement de précieuses informations par le biais de liaisons non filaires telles que l
APA, Harvard, Vancouver, ISO, and other styles
6

Lanna, Maximilien. "La protection des données à caractère personnel à l’épreuve de l’automesure connectée." Thesis, Paris 2, 2019. http://www.theses.fr/2019PA020026.

Full text
Abstract:
Le droit des données à caractère personnel est aujourd’hui un droit en pleine mutation. La protection qu’il est censé conférer aux individus est confrontée à l’apparition de nouvelles pratiques reposant sur l’utilisation de dispositifs permettant une collecte à grande échelle de données à caractère personnel. S’inscrivant dans ce cadre, la pratique de l’automesure connectée ou quantified-self a contribué, par ses modalités de fonctionnement, à une remise en cause des principes protecteurs instaurés depuis la fin des années 1970 par la loi Informatique et Libertés.Cette étude poursuit un double
APA, Harvard, Vancouver, ISO, and other styles
7

Junges, Pierre-Marie. "Évaluation à l'échelle de l'Internet du niveau d'exposition des objets connectés face aux risques de sécurité." Electronic Thesis or Diss., Université de Lorraine, 2022. http://www.theses.fr/2022LORR0078.

Full text
Abstract:
L'usage des objets de l'Internet des Objets (IdO) dans nos environnements personnel ou professionnel facilite nos interactions du quotidien, mais ces derniers souffrent souvent de problèmes de sécurité. L'enjeu de cette thèse est d'évaluer la sécurité des objets IdO à l'échelle de l'Internet selon plusieurs axes. Pour ce faire, les travaux proposés doivent satisfaire plusieurs contraintes comme le passage à l'échelle, la gestion de l'hétérogénéité des objets IdO ou, dans le cas d'une analyse de trafic réseau, l'impossibilité d'intercepter les communications sans-fil d'objets IdO. Nous nous som
APA, Harvard, Vancouver, ISO, and other styles
8

Moreira, da Costa Thiago. "OPP_IoT An ontology-based privacy preservation approach for the Internet of Things." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM003/document.

Full text
Abstract:
La vulgarisation de l'informatique omniprésente à travers l'internet des objets (IdO) représente un défi pour la préservation de la vie privée et la confidentialité des individus.Les menaces contre la confidentialité sont directement liées à la capacité de détection de capteur dans l'IdO en suivant les individus dans presque toutes les situations de leur vie.Alliée à cela, les techniques d'exploration de données ont évolué et ont été utilisées pour extraire une multitude d’informations personnelles à partir de données du flux des données des capteurs.Ce modèle de confiance repose sur la fiabil
APA, Harvard, Vancouver, ISO, and other styles
9

Diop, Aïda Abdou. "Cryptographic mechanisms for device authentication and attestation in the internet of things." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS023.

Full text
Abstract:
En introduisant de nouvelles exigences de communications décentralisées entre les systèmes d’informations, l’Internet des Objets (IdO) et le Machine-to-Machine (M2M) ont révolutionné l’architecture de sécurité classique des dits systèmes. Dans cette nouvelle configuration, la sécurité et la protection des données à caractère personnel échangées puis stockées par ces systèmes est devenu un enjeu primordial pour le déploiement de ces nouveaux écosystèmes. Ces objets présentent aussi des contraintes physiques fortes impactant leurs fonctionnalités, notamment en termes de capacité de calcul et de
APA, Harvard, Vancouver, ISO, and other styles
10

Kouicem, Djamel Eddine. "Sécurité de l’Internet des objets pour les systèmes de systèmes." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2518.

Full text
Abstract:
L'internet des objets (IoT) est une nouvelle technologie qui vise à connecter des milliards d'objets physiques à Internet. Ces objets peuvent être engagés dans des relations complexes, notamment la composition et la collaboration avec d'autres systèmes indépendants et hétérogènes, afin de fournir de nouvelles fonctionnalités, conduisant ainsi à ce que l'on appelle les systèmes de systèmes (SoS). Les composants de l'IoT communiquent et collaborent dans des environnements distribués et dynamiques, confrontés à plusieurs problèmes de sécurité de grande ampleur. La sécurité es tconsidérée parmi le
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Internet des objets – Protection"

1

Piette-Coudol, Thierry. Les objets connectés: Sécurité juridique et technique. Lexis Nexis, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maksurov, Aleksey. The use of special knowledge in proving cases of crimes and offenses on the Internet. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1915941.

Full text
Abstract:
The monograph examines the use of modern evidentiary capabilities in the legal process, which are available in connection with human activity in the global information space, including new electronic types of evidence. Such evidence is acquired through the application of special knowledge. The legal bases of the application of special knowledge by the bodies carrying out preliminary investigation, as well as the directions of the application of special knowledge in criminal proceedings are disclosed.
 Special attention is paid to the peculiarities of proving involvement in crimes (offense
APA, Harvard, Vancouver, ISO, and other styles
3

Moura Vicente, Dário, and Sofia de Vasconcelos Casimiro, eds. Data Protection in the Internet. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-28049-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Galiardo, Antonio Cayón. Internet y derecho. Gobierno de Aragon, Departamento de Presidencia y Relaciones Institucionales, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ziegler, Sébastien, ed. Internet of Things Security and Data Protection. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04984-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Angel, Davara Rodríguez Miguel, and Davara & Davara., eds. Código de Internet. 3rd ed. Thomson/Aranzadi, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Angel, Davara Rodríguez Miguel, and Davara & Davara, eds. Código de Internet. Aranzadi, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Plaza, Anxo Tato, José Antonio Gómez Segade, and Angel Fernández-Albor Baltar. Comercio electrónico en Internet. Marcial Pons, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Albers, Marion, and Ingo Wolfgang Sarlet, eds. Personality and Data Protection Rights on the Internet. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-90331-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schaar, Peter. Datenschutz im Internet: Die Grundlagen. C.H. Beck, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Internet des objets – Protection"

1

Eswaran, Subha P. "Intelligent Environment Protection." In Internet of Things (IoT). Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37468-6_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bell, Mary Ann, Bobby Ezell, and James L. Van Roekel. "Children's Internet Protection Act." In Cybersins and Digital Good Deeds. CRC Press, 2024. http://dx.doi.org/10.1201/9781003573302-15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Abadi, Martín. "Protection in Programming-Language Translations." In Secure Internet Programming. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48749-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Giannopoulou, Alexandra, and Valeria Ferrari. "Distributed Data Protection and Liability on Blockchains." In Internet Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17705-8_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Roth, Volker. "Mutual Protection of Co-operating Agents." In Secure Internet Programming. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48749-2_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rahim, Eva Rose. "Information Security in the Internet Age." In Beyond Data Protection. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33081-0_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Appleman, Dan. "Passwords: Your Key to the Internet." In Always Use Protection. Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0904-1_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wu, Chuan-Kun. "Privacy Protection in IoT Applications." In Internet of Things Security. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1372-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Moura Vicente, Dário, and Sofia de Vasconcelos Casimiro. "Data Protection in the Internet." In Ius Comparatum - Global Studies in Comparative Law. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-48675-4_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Leonti, Wolfgang C. "Protection of Internet Domain Names." In Key Aspects of German Business Law. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-540-24776-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Internet des objets – Protection"

1

Burton, S. A., and M. Bonner. "Elastomeric Corrosion Protection Performance and Compatibility with Cathodic Protection Systems." In CORROSION 1985. NACE International, 1985. https://doi.org/10.5006/c1985-85286.

Full text
Abstract:
Abstract The use of elastomers for the corrosion protection of steelwork is a subject of steadily growing interest, due to the realisation that severe environmental conditions on offshore structures require a coating capable of longevity without repetitive maintenance. From the first tentative steps 20 years ago in the Gulf of Mexico to the current application of high performance elastomers for complete riser protection systems in the North Sea, the evolution of the elastomeric coating has moved towards its recognition as a true engineering material. Existing corrosion protection systems often
APA, Harvard, Vancouver, ISO, and other styles
2

Ma, Ying, Yaguang Wang, and Yujie Xiao. "Personalized Continuous Location Privacy Protection in Internet of Vehicles." In 2025 IEEE 6th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT). IEEE, 2025. https://doi.org/10.1109/ainit65432.2025.11035145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Dan, Lingrao Wang, Shenglin Xu, Peng Dong, and Hongzhi Su. "A prediction method of relay protection defects." In 2024 IEEE 8th Conference on Energy Internet and Energy System Integration (EI2). IEEE, 2024. https://doi.org/10.1109/ei264398.2024.10991385.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ding, Xiaobing, Shenxing Shi, Jiang Yu, et al. "Exploration of New Power System Protection Architecture." In 2024 IEEE 8th Conference on Energy Internet and Energy System Integration (EI2). IEEE, 2024. https://doi.org/10.1109/ei264398.2024.10990568.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fleck, Andreas, and Florian Kammüller. "Implementing Privacy with Erlang Active Objects." In 2010 Fifth International Conference on Internet Monitoring and Protection. IEEE, 2010. http://dx.doi.org/10.1109/icimp.2010.27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Saiz-Laudo, Raul, and Marc Sanchez-Artigas. "Egeon: Software-Defined Data Protection for Object Storage." In 2022 22nd International Symposium on Cluster, Cloud and Internet Computing (CCGrid). IEEE, 2022. http://dx.doi.org/10.1109/ccgrid54584.2022.00019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Qiu, Zhen, Takeshi Ikenaga, and Satoshi Goto. "Robust Scalable Video Transmission using Object-Oriented Unequal Loss Protection over Internet." In APCCAS 2006 - 2006 IEEE Asia Pacific Conference on Circuits and Systems. IEEE, 2006. http://dx.doi.org/10.1109/apccas.2006.342547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kambovski, Igor. "SIGURNOST ČUVANjA I PRENOSA PODATAKA I INFORMACIJA KOD ELEKTRONSKE TRGOVINE I ELEKTRONSKOG (INTERNET) BANKARSTVA." In XV Majsko savetovanje: Sloboda pružanja usluga i pravna sigurnost. University of Kragujevac, Faculty of Law, 2019. http://dx.doi.org/10.46793/xvmajsko.899k.

Full text
Abstract:
Securing transaction and providing secure storage and transmission of information at electronic commerce and electronic banking is a very complex and expensive process. They are based on the establishment of a protected system and a protocol that will be able to identify possible fraud and analyze the risk and loss that can occur. The protection system demands installation of a predefined security mechanism such as access controll, user authentication, encryption of information and establishing of security protocol. Each system which is collecting and storing data and information belongs to th
APA, Harvard, Vancouver, ISO, and other styles
9

ZHELEZNYAKOV, R. A., A. A. KHACHATRYAN, M. A. BERBEROVA, and E. V. KURNASOV. "SECURITY TOOLS AND DATABASE PROTECTION IN THE IOT OF A MODERN UNIVERSITY." In GRAPHICON 2024. Omsk State Technical University, 2024. http://dx.doi.org/10.25206/978-5-8149-3873-2-2024-1036-1041.

Full text
Abstract:
The paper provides a theoretical description of the concept of security and protection of databases of a modern university. The IoT concept was taken as the object of study. The study examined the main security threats that Internet of Things (IoT) systems may face, such as network-level attacks, software vulnerabilities, and other risks. The methods of data encryption, user authentication, and access control that were implemented in the application to improve security were considered. A method for solving these security threats was also developed, including encryption settings, data backup, d
APA, Harvard, Vancouver, ISO, and other styles
10

Didero, Rachele, and Giovanni Maria Conti. "CAPABLE: Engineering, textile, and fashion Collaboration, for citizens' Awareness and Privacy Protection." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1001536.

Full text
Abstract:
Many private companies and public bodies in authoritarian and democratic states have joined facial recognition technology, used for various purposes. This situation is due to the general absence of a specific regulation that monitors its use. There is no consensus in society regarding the ethics of this technology. Furthermore, there are many doubts concerning the long-term ethical sustainability of facial recognition and its compliance with the law. A problem that emerges from the use of this technology is its obscurity. We do not know who is responsible for the decision automatically made; w
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Internet des objets – Protection"

1

Zhuo, Ran, Bradley Huffaker, KC Claffy, and Shane Greenstein. The Impact of the General Data Protection Regulation on Internet Interconnection. National Bureau of Economic Research, 2019. http://dx.doi.org/10.3386/w26481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cunha e Melo, Mariana, and Jonas de Abreu Castro. Section 230 and the future of the internet. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/ejp3ba.

Full text
Abstract:
The US Supreme Court is considering the fate of Section 230, a law that protects content platforms from liability for user-generated content. The case, Gonzalez v. Google, challenges the intermediary liability protection of Section 230. If the challenge succeeds, it could undermine the foundation of Web 2.0 and the internet's future. The case focuses on whether platforms like Google, Twitter, and TikTok should be held liable for third-party content from their recommendation engines. Challenging Section 230 could have severe consequences for freedom of expression and lead to restrictions on rec
APA, Harvard, Vancouver, ISO, and other styles
3

Aubry, Philippe, Nicolas Boileau, Marie Briandy, Marie-Christine Chauvat, Sandrine Conin, and Éric Min-Tung. Rapport sur le chantier IdRef en Normandie. Normandie Université, 2023. http://dx.doi.org/10.51203/rapport.nu.000003.

Full text
Abstract:
Suivant le développement des systèmes d’information et des plateformes, ouverts ou fermés, les identifiants pour la recherche se sont multipliés. Leur usage ainsi que leur amélioration est un enjeu pour le développement de l’écosystème de la science ouverte, comme l’indique la note d’orientation du Comité pour la science ouverte de 2019. Qu’ils concernent les structures de recherche, les auteurs ou les objets de la recherche, ils sont indispensables pour identifier et être facilement retrouvés sur internet, répondant ainsi au F des principes FAIR. Ces identifiants, nationaux et internationaux,
APA, Harvard, Vancouver, ISO, and other styles
4

Serafica, Ramonette, and Queen Cel Oren. Should the Philippines Adopt Net Neutrality Regulations? Philippine Institute for Development Studies, 2024. http://dx.doi.org/10.62986/pn2024.08.

Full text
Abstract:
Net neutrality is a contentious issue in internet regulation, looking at nondiscrimination and pricing policy. It espouses the idea that broadband service providers should charge consumers only once for internet access, not favor one content provider over another, and not charge content providers for sending information over broadband lines to end users. Advocates argue that this fosters innovation and protects freedom of expression, while critics warn that it could stifle investment and innovation. This paper examines the advantages and disadvantages of adopting net neutrality principles in t
APA, Harvard, Vancouver, ISO, and other styles
5

Krishnaswamy, Sudhir, and Jayna Kothari. Rights in Review: The Supreme Court in 2015. Centre for Law and Policy Research, 2016. http://dx.doi.org/10.54999/yvjn7797.

Full text
Abstract:
Rights in Review is a CLPR publication which analyses 15 key judgments ruled by the Supreme Court in 2015. This publication seeks to acquaint the reader with various aspects of fundamental rights protection and their relevance and impact. The year 2015 saw the Supreme Court extend its scope of protection of fundamental rights to the internet in the case of Shreya Singhal v Union of India. This case struck down Section 66A of the Information Technology Act of 2000.
APA, Harvard, Vancouver, ISO, and other styles
6

Park, Soontae, Antonio García Zaballos, Enrique Iglesias Rodriguez, et al. Roadmap for the Establishment of a Big Data Analysis Center for Critical Infrastructure Protection in Latin America and the Caribbean post COVID-19. Inter-American Development Bank, 2022. http://dx.doi.org/10.18235/0003930.

Full text
Abstract:
This report, a joint effort between the Korea Internet & Security Agency (KISA) and Inter-American Development Bank (IDB), emphasizes the rising importance of critical infrastructure protection for the Latin American and Caribbean (LAC) region and proposes ways to overcome existing and potential cybersecurity threats. Considering the unexpected and high-speed transformations brought on by the COVID-19 pandemic, it is important to get prepared for imminent threats. The report examines the status of information and communication technology (ICT) infrastructure protection in the region and su
APA, Harvard, Vancouver, ISO, and other styles
7

Jones, Emily, Beatriz Kira, Anna Sands, and Danilo B. Garrido Alves. The UK and Digital Trade: Which way forward? Blavatnik School of Government, 2021. http://dx.doi.org/10.35489/bsg-wp-2021/038.

Full text
Abstract:
The internet and digital technologies are upending global trade. Industries and supply chains are being transformed, and the movement of data across borders is now central to the operation of the global economy. Provisions in trade agreements address many aspects of the digital economy – from cross-border data flows, to the protection of citizens’ personal data, and the regulation of the internet and new technologies like artificial intelligence and algorithmic decision-making. The UK government has identified digital trade as a priority in its Global Britain strategy and one of the main sourc
APA, Harvard, Vancouver, ISO, and other styles
8

Sokolovsky, Dmitry, Sergey Sokolov, and Alexey Rezaykin. e-learning course "Informatics". SIB-Expertise, 2024. http://dx.doi.org/10.12731/er0785.29012024.

Full text
Abstract:
The e-learning course "Informatics" is compiled in accordance with the requirements of the Federal State Educational Standard of Higher Education in the specialty 33.05.01 Pharmacy (specialty level), approved by Order of the Ministry of Education and Science of the Russian Federation dated August 11, 2016 No. 1037, and taking into account the requirements of the professional standard 02.006 "Pharmacist", approved by order of the Ministry of Labor and Social Protection No. 91n of the Russian Federation dated March 9, 2016. The purpose of the course is to master the necessary amount of theoretic
APA, Harvard, Vancouver, ISO, and other styles
9

Saha, Devanik. Shockproof and Inclusive Fiscal Policies. Institute of Development Studies, 2023. http://dx.doi.org/10.19088/core.2023.005.

Full text
Abstract:
The Covid-19 pandemic has had a significant impact on the economies of most countries. What differed is the intensity of the impact, which ranged from mild economic contractions to devastating recessions and downturns. From a generic perspective, it is obvious to assume that high-income countries (HIC) would have faced lesser economic destruction than low- and middleincome countries (LMIC). However, a closer examination reveals that there are several factors that determined the impact of the pandemic on a country, as well as influenced its ability to respond. For instance, the existing economi
APA, Harvard, Vancouver, ISO, and other styles
10

BACCELLI, François, Sébastien CANDEL, Guy PERRIN, and Jean-Loup PUGET. Large Satellite Constellations: Challenges and Impact. Académie des sciences, 2024. http://dx.doi.org/10.62686/3.

Full text
Abstract:
The New Space Age (NewSpace) marks the advent of a new era in the use of space, characterized by the opening of space to new players, the use of new space technologies, new functionalities for satellites in orbit, and the development of satellite constellations, mainly in the fields of communications and Earth observation. These developments are underpinned by first-rate scientific and technological advances, as well as considerable public and private investment, in particular in the USA, China and, to a lesser extent, Europe. Fleets of small low- and medium-orbit satellites are replacing or c
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!