To see the other types of publications on this topic, follow the link: Regulatory Compliance Data Breaches.

Journal articles on the topic 'Regulatory Compliance Data Breaches'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Regulatory Compliance Data Breaches.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Raghupathi, Wullianallur, Viju Raghupathi, and Aditya Saharia. "Analyzing Health Data Breaches: A Visual Analytics Approach." AppliedMath 3, no. 1 (2023): 175–99. http://dx.doi.org/10.3390/appliedmath3010011.

Full text
Abstract:
This research studies the occurrence of data breaches in healthcare provider settings regarding patient data. Using visual analytics and data visualization tools, we study the distribution of healthcare breaches by state. We review the main causes and types of breaches, as well as their impact on both providers and patients. The research shows a range of data breach victims. Network servers are the most popular location for common breaches, such as hacking and information technology (IT) incidents, unauthorized access, theft, loss, and improper disposal. We offer proactive recommendations to p
APA, Harvard, Vancouver, ISO, and other styles
2

Situmeang, Ampuan, Jihyun Park, Lu Sudirman, Ninne Zahara Silviani, and Shenti Agustini. "Evaluating Data Breach Notification Protocols." Lentera Hukum 12, no. 1 (2025): 42–61. https://doi.org/10.19184/ejlh.v12i1.47621.

Full text
Abstract:
Data protection is one of the most important aspects of the digital economy, with its legal implications extending across digital landscapes. The failure to protect data in data breaches can threaten the interests of owners and expose them to various risks. Legal compliance regarding how owners are notified of data breaches is important to prevent this, necessitating deep legal discourse and analysis. Using a comparative legal research method with a statutory approach, this study dissects norms within Indonesia and South Korea’s legal systems to analyze their differences in legal compliance re
APA, Harvard, Vancouver, ISO, and other styles
3

Balogun, Adebayo Yusuf. "Strengthening Compliance with Data Privacy Regulations in U.S. Healthcare Cybersecurity." Asian Journal of Research in Computer Science 18, no. 1 (2025): 154–73. https://doi.org/10.9734/ajrcos/2025/v18i1555.

Full text
Abstract:
This study evaluates the state of data privacy and cybersecurity compliance within the U.S. healthcare sector, leveraging data from the U.S. Department of Health & Human Services Breach Portal, Verizon Data Breach Investigations Report, and the Health IT Dashboard. A quantitative methodology comprising descriptive statistical analysis, K-means clustering, and multivariate regression was employed to examine healthcare data breaches, categorize cybersecurity threats, and identify compliance challenges. Findings revealed a persistent increase in breaches, with hacking/IT incidents comprising
APA, Harvard, Vancouver, ISO, and other styles
4

Gbadebo, Michael Olayinka, Ademola Oluwaseun Salako, Oluwatosin Selesi-Aina, Olumide Samuel Ogungbemi, Omobolaji Olufunmilayo Olateju, and Oluwaseun Oladeji Olaniyi. "Augmenting Data Privacy Protocols and Enacting Regulatory Frameworks for Cryptocurrencies via Advanced Blockchain Methodologies and Artificial Intelligence." Journal of Engineering Research and Reports 26, no. 11 (2024): 7–27. http://dx.doi.org/10.9734/jerr/2024/v26i111311.

Full text
Abstract:
This study examines the effectiveness of current data privacy protocols within cryptocurrency platforms, focusing on encryption strength, anonymity techniques, and AI-powered regulatory compliance tools. Data were sourced from CoinMarketCap and Kaggle, including metrics like Bit Strength, Breach Incidents, and Anonymity Scores, which were analyzed using descriptive statistics, t-tests, and logistic regression. Results showed no significant relationship between encryption strength and breach incidents (p = 0.817), indicating that encryption strength may not be a primary factor in breach prevent
APA, Harvard, Vancouver, ISO, and other styles
5

Apurva, Shelke* Aditi Shinde Samruddhi Shinde Karan Shinde Saurabh Shinde S. D. Mankar. "Data Integrity in Pharmaceutical Sciences." International Journal of Pharmaceutical Sciences 3, no. 4 (2025): 1142–48. https://doi.org/10.5281/zenodo.15185271.

Full text
Abstract:
The abstract highlights the importance of data integrity, especially in the pharmaceutical industry. It emphasizes that accurate and reliable data is essential for organizational stability and performance. The ALCOA principles (Attributable, Legible, Contemporaneous, Original, and Accurate) are recommended by regulatory bodies like the USFDA to ensure data integrity. Violations can occur due to data manipulation, inadequate procedures, or shared accounts. A study found that most breaches occurred in quality control (QC), with China and India having the highest number of violations. The study u
APA, Harvard, Vancouver, ISO, and other styles
6

Pimenta Rodrigues, Gabriel Arquelau, André Luiz Marques Serrano, Amanda Nunes Lopes Espiñeira Lemos, et al. "Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review." Data 9, no. 2 (2024): 27. http://dx.doi.org/10.3390/data9020027.

Full text
Abstract:
Data breaches result in data loss, including personal, health, and financial information that are crucial, sensitive, and private. The breach is a security incident in which personal and sensitive data are exposed to unauthorized individuals, with the potential to incur several privacy concerns. As an example, the French newspaper Le Figaro breached approximately 7.4 billion records that included full names, passwords, and e-mail and physical addresses. To reduce the likelihood and impact of such breaches, it is fundamental to strengthen the security efforts against this type of incident and,
APA, Harvard, Vancouver, ISO, and other styles
7

Sree, Sandhya Kona. "Security and Compliance in Big Data Ingestion Pipelines: Examining security challenges and compliance considerations associated with ingesting sensitive data into big data environments and proposing solutions to mitigate risks." Journal of Scientific and Engineering Research 7, no. 12 (2020): 230–35. https://doi.org/10.5281/zenodo.11667613.

Full text
Abstract:
The exponential growth of big data has profoundly impacted the way organizations manage and analyze vast amounts of information. As businesses increasingly rely on big data environments to drive decision-making and innovation, the security and compliance of data ingestion pipelines have emerged as critical areas of concern. These pipelines, responsible for transferring and processing sensitive information from various sources to data storage systems, are susceptible to numerous security risks and regulatory challenges. This paper explores the multifaceted security threats associated with big d
APA, Harvard, Vancouver, ISO, and other styles
8

Dirgantara, Febrian, Dharma Setiawan Negara, Didit Darmawan, Endra Andie Aryanto, and Alwi Mohamad Shahab. "Legal Responsibility of Companies in Cases of Personal Data Breaches." Innovative: Journal Of Social Science Research 5, no. 1 (2025): 5053–65. https://doi.org/10.31004/innovative.v5i1.18046.

Full text
Abstract:
Personal data leak cases in Indonesia are becoming an increasingly pressing issue in the digital era. This study aims to analyze the legal responsibility of companies in cases of personal data leaks, identify the main factors causing the incident, and evaluate weaknesses in the existing regulatory and supervisory systems. A normative legal approach is used by reviewing Law Number 27 of 2022 concerning Personal Data Protection and other related regulations. The results of the study indicate that data leaks are caused by weak security infrastructure, low employee awareness, and lack of complianc
APA, Harvard, Vancouver, ISO, and other styles
9

Snigdha, Esrat Zahan, Muhammad Saqib Jalil, Fares Mohammed Dahwal, et al. "Cybersecurity in Healthcare IT Systems: Business Risk Management and Data Privacy Strategies." American Journal of Engineering and Technology 07, no. 03 (2025): 163–84. https://doi.org/10.37547/tajet/volume07issue03-15.

Full text
Abstract:
The security threats against healthcare IT systems create multiple significant hazards to patient data purity together with compliance requirements and ongoing organizational operations. These days growing healthcare digitization has caused cyberattacks like ransomware and data breaches and phishing attacks to increase sharply while creating financial damage and reputation loss for healthcare facilities. The research will examine how business risk management combines with data privacy strategies to safeguard healthcare cybersecurity structures through analysis of risk mitigation plans and regu
APA, Harvard, Vancouver, ISO, and other styles
10

Vaishnavi, R., and Robert M. Sandeepthi. "Cybersecurity Challenges and Regulatory Compliance in Neobanking in India." TECHNO REVIEW Journal of Technology and Management 4, no. 4 (2024): 24–33. https://doi.org/10.31305/trjtm2024.v04.n04.004.

Full text
Abstract:
Neo-banking, a fully digital approach to banking, has redefined the financial landscape in India by offering seamless, user-friendly services without the need for physical branches. This transformation has enabled cost efficiency, 24/7 accessibility, and innovative financial solutions tailored to tech-savvy customers. However, the digital-first nature of neo-banking also introduces significant cybersecurity challenges, such as phishing attacks, data breaches, and identity theft, which threaten customer trust and operational stability. Neobanks must strictly adhere to RBI guidelines, the Data P
APA, Harvard, Vancouver, ISO, and other styles
11

O.O., Tursunov. "THE IMPACT AND CHALLENGES OF FINANCIAL CYBERSECURITY: SAFEGUARDING THE DIGITAL ECONOMY." Innovative Development in Educational Activities 2, no. 11 (2023): 299–304. https://doi.org/10.5281/zenodo.8045118.

Full text
Abstract:
<em>This article explores the impact and challenges of financial cybersecurity, emphasizing the need for robust measures to safeguard the digital economy. It highlights the far-reaching consequences of financial cybersecurity breaches, including financial losses, data breaches, disruption of services, and regulatory repercussions. The article identifies and addresses the key challenges faced by financial institutions, such as sophisticated cyberattacks, third-party risks, regulatory compliance, insider threats, and the need for enhanced authentication and encryption. The solutions proposed inc
APA, Harvard, Vancouver, ISO, and other styles
12

Nanyeneke Ravana Mayeke. "Evaluating the cost-benefit dynamics of cybersecurity compliance investments: A multi-sectoral analysis across financial, educational, and e-commerce industries." Computer Science & IT Research Journal 6, no. 4 (2025): 266–87. https://doi.org/10.51594/csitrj.v6i4.1914.

Full text
Abstract:
Following the assertion of recent studies (Balogun, 2025) establishing the foundational role of compliance investments in mitigating data privacy breaches within U.S. healthcare; while the study is limited to the cost-benefit dynamics of such investments across other critical industries, this study investigates cybersecurity compliance investments and outcomes across financial, educational, and e-commerce sectors using quantitative methods. Data were drawn from the SEC EDGAR database, IBM Cost of a Data Breach Report, and the Privacy Rights Clearinghouse. Descriptive statistics, multivariate r
APA, Harvard, Vancouver, ISO, and other styles
13

Arjun, Mantri. "Ensuring Data Security and Privacy During Data Migration." European Journal of Advances in Engineering and Technology 6, no. 3 (2019): 111–15. https://doi.org/10.5281/zenodo.13354011.

Full text
Abstract:
Data migration is a critical process for transferring data between different storage systems, formats, or computing environments, often driven by technological upgrades, cloud adoption, and organizational restructuring. Ensuring data security and privacy during this process is paramount to prevent data breaches and comply with regulatory requirements. This paper discusses comprehensive strategies, including encryption, access control, adherence to data protection regulations, and effective data governance, to mitigate risks associated with data migration. By implementing these techniques, orga
APA, Harvard, Vancouver, ISO, and other styles
14

Schatz, Daniel, and Rabih Bashroush. "The impact of repeated data breach events on organisations’ market value." Information & Computer Security 24, no. 1 (2016): 73–92. http://dx.doi.org/10.1108/ics-03-2014-0020.

Full text
Abstract:
Purpose – This study aims to examine the influence of one or more information security breaches on an organisation’s stock market value as a way to benchmark the wider economic impact of such events. Design/methodology/approach – An event studies-based approach was used where a measure of the event’s economic impact can be constructed using security prices observed over a relatively short period of time. Findings – Based on the results, it is argued that, although no strong conclusions could be made given the current data constraints, there was enough evidence to show that such correlation exi
APA, Harvard, Vancouver, ISO, and other styles
15

Oluwabiyi Oluwawapelumi Ajakaye, Ayobami Gabriel Olanrewaju, David Fawehinmi, Rasheed Afolabi, and Gold Mebari Pius-Kiate. "Integrating Artificial Intelligence in organizational cybersecurity: Enhancing consumer data protection in the U.S. Fintech Sector." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 2802–21. https://doi.org/10.30574/wjarr.2025.26.1.1421.

Full text
Abstract:
Financial technology (fintech) companies face escalating cyber threats that jeopardize consumer data. This research investigates how integrating artificial intelligence (AI) into organizational cybersecurity can enhance consumer data protection in the U.S. fintech industry. We pose key questions on AI’s role in threat detection, its current use cases and challenges in fintech cybersecurity, and the effectiveness of deep learning models in preventing data breaches. A comprehensive literature review reveals that AI techniques – particularly deep learning models like Long Short-Term Memory (LSTM)
APA, Harvard, Vancouver, ISO, and other styles
16

Reddy, Haritha Madhava. "Blockchain Technology and Security Compliance." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem24353.

Full text
Abstract:
The current digital landscape is constantly under cybersecurity risks and data breaches, making trust and security systems of paramount concern. Blockchain technology offers promising solutions to enhance security and transparency in various sectors. However, it is important to understand the risks associated and proceed with caution with this revolutionary technology, as countless individuals and organizations may be left vulnerable to the fear of data breaches and regulatory pitfalls. This fear, therefore, should not be taken lightly. The struggle to ensure this technology aligns with securi
APA, Harvard, Vancouver, ISO, and other styles
17

Olawale, Habeeb Olatunji, Ngozi Joan Isibor, and Joyce Efekpogua Fiemotongha. "A Predictive Compliance Analytics Framework Using AI and Business Intelligence for Early Risk Detection." International Journal of Management and Organizational Research 2, no. 2 (2023): 190–95. https://doi.org/10.54660/ijmor.2023.2.2.190-195.

Full text
Abstract:
In an era of escalating regulatory complexity and costly compliance breaches, this paper proposes a predictive compliance analytics framework that harnesses artificial intelligence and business intelligence tools to enable early risk detection in financial and insurance sectors. By integrating machine learning models with interactive dashboard platforms such as Tableau, SQL, and Python, the framework transforms traditional reactive compliance approaches into a proactive, data-driven system. The framework incorporates diverse data sources, advanced algorithms, and real-time visualization to ide
APA, Harvard, Vancouver, ISO, and other styles
18

David Akokodaripon, Favour Oluwaseun Alonge-Essiet, Akorede Victor Aderoju, and Oluwatosin Reis. "Implementing data governance in financial systems: Strategies for ensuring compliance and security in multi-source data integration projects." Computer Science & IT Research Journal 5, no. 10 (2024): 2263–82. http://dx.doi.org/10.51594/csitrj.v5i10.1631.

Full text
Abstract:
This study explores the complexities of implementing data governance within financial systems, focusing on strategies to ensure compliance and security in multi-source data integration projects. The primary aim was to identify challenges and establish a comprehensive framework to enhance data integrity, confidentiality, and regulatory adherence in the financial sector. Using a mixed-methods approach, the research included an extensive literature review, case studies, and expert interviews to gain insights into current practices, challenges, and emerging trends in data governance. Key findings
APA, Harvard, Vancouver, ISO, and other styles
19

Ratnangi, Nirek. "Improving Data Privacy and Compliance in ERP Systems using Linux VMs in Multi-Tenant Cloud Environments." European Journal of Advances in Engineering and Technology 9, no. 7 (2022): 87–89. https://doi.org/10.5281/zenodo.13919438.

Full text
Abstract:
The adoption of Enterprise Resource Planning (ERP) systems in multi-tenant cloud environments has brought significant operational efficiency. However, it also presents challenges related to data privacy and compliance. This paper explores the use of Linux-based Virtual Machines (VMs) as a solution to enhance data privacy and ensure compliance with regulations in multi-tenant cloud environments. The study focuses on leveraging the inherent security features of Linux and virtualization techniques to isolate data and enforce compliance across different tenants. The findings suggest that Linux VMs
APA, Harvard, Vancouver, ISO, and other styles
20

Soumya Khanna, Nizam Ashraf Khan. "“Restorative Justice as an Economic Policy Tool: A Cost-Benefit Analysis in the Healthcare Sector”." European Economic Letters (EEL) 15, no. 2 (2025): 3720–34. https://doi.org/10.52783/eel.v15i2.3207.

Full text
Abstract:
The escalating frequency and sophistication of healthcare data breaches pose significant challenges to public health institutions, extending beyond immediate financial and regulatory penalties to erode patient trust and organizational reputation. Traditional incident response frameworks, primarily focused on legal compliance and financial mitigation, often fall short in addressing the profound socio-emotional harms experienced by affected individuals. This paper develops a comprehensive conceptual framework to analyze healthcare data breach response, specifically exploring the potential of int
APA, Harvard, Vancouver, ISO, and other styles
21

Reshma, Sudra. "Regulatory compliance with AI and risks involved in finance and banking sectors." Journal of Scientific and Engineering Research 11, no. 1 (2024): 276–85. https://doi.org/10.5281/zenodo.12794295.

Full text
Abstract:
Artificial intelligence is an essential part of the world and acts as a powerful catalyst driving transformative modifications in various industries. AI encompasses different technologies such as computer vision, language processing, and machine learning. The financial sector has integrated AI technology into services and products. The introduction of artificial intelligence in banking services has transformed the sector into more customer-oriented and technologically relatable. Regulatory compliance is considered armor since it protects financial institutions from vulnerabilities that can lea
APA, Harvard, Vancouver, ISO, and other styles
22

Tiwo, Olufisayo Juliana, Temilade Oluwatoyin Adesokan-Imran, Damilola Comfort Babarinde, Seun Michael Oyekunle, Abayomi Titilola Olutimehin, and Oluwaseun Oladeji Olaniyi. "Advancing Security in Cloud-based Patient Information Systems with Quantum-resistant Encryption for Healthcare Data." Asian Journal of Research in Computer Science 18, no. 4 (2025): 187–208. https://doi.org/10.9734/ajrcos/2025/v18i4615.

Full text
Abstract:
The increasing adoption of cloud-based patient information systems in healthcare enhances efficiency and accessibility but introduces significant cybersecurity risks. Traditional encryption methods, such as RSA and ECC, are becoming vulnerable due to rapid advancements in quantum computing, necessitating the transition to quantum-resistant encryption. This study evaluates the effectiveness of post-quantum cryptographic (PQC) solutions in securing cloud-stored healthcare data. Using publicly available datasets, including HHS breach records, NIST PQC benchmarks, and HIMSS cybersecurity reports,
APA, Harvard, Vancouver, ISO, and other styles
23

Adebola, Folorunso, Babalola Olufunbi, Edger Nwatu Chineme, and Adedoyin Adebisi. "A comprehensive model for ensuring data compliance in cloud computing environment." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 1983–95. https://doi.org/10.5281/zenodo.15105749.

Full text
Abstract:
As organizations increasingly adopt cloud computing, ensuring data compliance has become a critical priority. Cloud environments pose unique challenges in meeting regulatory requirements due to their distributed and often multi-tenant nature. This review presents a comprehensive model for achieving data compliance in cloud computing, addressing essential aspects such as data privacy, security, sovereignty, and governance. The model emphasizes a structured, layered approach to compliance, integrating risk assessment, data governance, continuous monitoring, and incident management to ensure comp
APA, Harvard, Vancouver, ISO, and other styles
24

Kapil, Dharika. "Implementing Effective Data Security Measures in Fintech Applications: Address the importance of and approaches to securing sensitive financial data." European Journal of Advances in Engineering and Technology 8, no. 11 (2021): 24–27. https://doi.org/10.5281/zenodo.10889828.

Full text
Abstract:
<strong>ABSTRACT</strong> In this research paper, we address the critical role of data security in the rapidly evolving FinTech sector. We explore the challenges and strategies for establishing robust data security systems, emphasizing the consequences of data breaches and common vulnerabilities. The paper highlights the efficacy of technologies like encryption, blockchain, and cloud security, supported by real-world case studies from leading FinTech companies. Additionally, we examine regulatory frameworks and standards essential for maintaining data security. Concluding with the proposal of
APA, Harvard, Vancouver, ISO, and other styles
25

Yamini, Kannan, and Kapil Dharika. "Security Challenges and Solutions in Cloud Computing for Fintech." Journal of Scientific and Engineering Research 9, no. 8 (2022): 140–46. https://doi.org/10.5281/zenodo.11220646.

Full text
Abstract:
This research paper presents an in-depth analysis of the prevalent security concerns in cloud-based FinTech applications. The emerging interaction of financial services and technology, collectively known as FinTech, has been substantially facilitated by cloud computing, offering services characterized by flexibility, scalability, and cost-efficiency. However, the adoption of cloud environments for FinTech applications unveils a series of security challenges. Ranging from breaches of data to shared technology vulnerabilities, these threats pose a significant risk to the privacy and integrity of
APA, Harvard, Vancouver, ISO, and other styles
26

Sreekanth, Pasunuru. "The Role of Hardware Security Modules (HSMs) in Modern Data Protection Strategies." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 8, no. 2 (2020): 1–6. https://doi.org/10.5281/zenodo.14382552.

Full text
Abstract:
As data breaches and cyber threats continue to escalate, robust security measures are essential for safeguarding sensitive information in today&rsquo;s digital landscape. Hardware Security Modules (HSMs) have become a critical component of modern data protection strategies. This paper explores the vital role of HSMs in managing encryption keys, ensuring data integrity, and supporting compliance in high-security environments. Through practical examples, we will analyze the various applications of HSMs in cryptographic operations, cloud security, and regulatory compliance. We will also discuss h
APA, Harvard, Vancouver, ISO, and other styles
27

Khuan, Hendri, Amin Zaki, and Faizal Razak. "Corporate Responsibility for Violations of Online Consumer Data Privacy." Rechtsnormen: Journal of Law 3, no. 1 (2025): 1–10. https://doi.org/10.70177/rjl.v3i1.2065.

Full text
Abstract:
Background: As digital platforms evolve, consumer privacy concerns related to online data breaches have risen. Companies are increasingly held responsible for the protection of consumer data. The need to assess corporate responsibility in such violations is critical for consumer trust and regulatory frameworks. Objective: This study aims to explore the extent of corporate responsibility in online consumer data privacy violations and the legal and ethical implications for businesses involved. Method: A qualitative research design was adopted, utilizing a case study approach. Relevant case law a
APA, Harvard, Vancouver, ISO, and other styles
28

Olawale, Habeeb Olatunji, Adegbola Oluwole Ogedengbe, Maxwell Nana Ameyaw, Temitayo Oluwaseun Jejeniwa, and Solomon Christopher Friday. "Standardizing Compliance Practices across AML, ESG, and Transaction Monitoring for Financial Institutions." Journal of Frontiers in Multidisciplinary Research 5, no. 2 (2024): 75–93. https://doi.org/10.54660/.jfmr.2024.5.2.75-93.

Full text
Abstract:
In today’s complex regulatory landscape, financial institutions face mounting pressure to standardize compliance practices across Anti-Money Laundering (AML), Environmental, Social, and Governance (ESG), and transaction monitoring frameworks. Fragmented compliance efforts often lead to operational inefficiencies, regulatory breaches, and reputational damage. This study proposes an integrated compliance standardization framework that unifies AML, ESG, and transaction monitoring through data-driven governance, cross-functional controls, and risk-based alignment. The goal is to develop a cohesive
APA, Harvard, Vancouver, ISO, and other styles
29

Musyoka, Geoffrey Vundi, Robert Murungi Mutua, and Jecton Tocho. "AI-Based Framework for Government Oversight of Personal Data Consent Compliance: A Case Study of Nairobi County." International Journal of Professional Practice 12, no. 6 (2024): 40–48. https://doi.org/10.71274/ijpp.v12i6.498.

Full text
Abstract:
In the rapidly advancing digital landscape, safeguarding individual privacy and enforcing compliance with personal data regulations have become increasingly critical. This study focuses on the challenge of inadequate government oversight in monitoring real-time compliance with personal data consent, using Nairobi County as a case study. The research introduces an AI-based framework designed to automate the detection of potential privacy breaches, verify adherence to consent agreements, and strengthen regulatory enforcement processes. Grounded in regulatory compliance theory, the study aims to
APA, Harvard, Vancouver, ISO, and other styles
30

Raveendra Reddy Pasala. "Salesforce data protection and compliance with AI." World Journal of Advanced Research and Reviews 22, no. 2 (2024): 2329–35. https://doi.org/10.30574/wjarr.2024.22.2.0596.

Full text
Abstract:
The data breach and regulatory scrutiny are spreading across the Organization; in such a phase, the Organization that is utilizing Customer Relationship Management (CRM), which is a selling force, faces the challenges of securing the data and compliance. Given the greater prevalence of sensitive customer data being processed, businesses must deploy stringent strategies that protect and keep information in line with strict regulations like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). This article will review how Salesforce, data protection, and c
APA, Harvard, Vancouver, ISO, and other styles
31

Vishnupriya, S. Devarajulu. "Safeguarding Health Data: Best Practices Ensuring Confidential Patient Health Information." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 11, no. 5 (2023): 1–4. https://doi.org/10.5281/zenodo.13959626.

Full text
Abstract:
The use of electronic health records with sensitive patient data transferring through multiple routes has resulted in the need to have appropriate best practices in the protection of health information. More critical challenges are presented by hacking and data breaches, unauthorized access, and manipulation. Advanced best practices that protect sensitive patient data by using some of the complicated encryption methods, multi-factor authentication, and the use of blockchain technology with assurance regarding compliance with regulatory requirements present by HIPAA and GDPR. This research shin
APA, Harvard, Vancouver, ISO, and other styles
32

Adebola Folorunso, Olufunbi Babalola, Chineme Edgar Nwatu, and Adebisi Adedoyin. "A comprehensive model for ensuring data compliance in cloud computing environment." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 1983–95. http://dx.doi.org/10.30574/wjarr.2024.24.2.3514.

Full text
Abstract:
As organizations increasingly adopt cloud computing, ensuring data compliance has become a critical priority. Cloud environments pose unique challenges in meeting regulatory requirements due to their distributed and often multi-tenant nature. This review presents a comprehensive model for achieving data compliance in cloud computing, addressing essential aspects such as data privacy, security, sovereignty, and governance. The model emphasizes a structured, layered approach to compliance, integrating risk assessment, data governance, continuous monitoring, and incident management to ensure comp
APA, Harvard, Vancouver, ISO, and other styles
33

Alugoju, Narasimha Rao. "Data Protection in the Cloud: Ensuring Security and Compliance for Organizational Data." International Journal for Research in Applied Science and Engineering Technology 12, no. 12 (2024): 1590–96. https://doi.org/10.22214/ijraset.2024.66087.

Full text
Abstract:
The widespread adoption of cloud computing has transformed the way organizations store, process, and access data, offering unparalleled scalability and flexibility. However, this shift to cloud-based infrastructures has also introduced new vulnerabilities and security challenges. Cyberattacks targeting cloud environments, including data breaches, unauthorized access, and misconfigurations, threaten the confidentiality, integrity, and availability of sensitive information. This article examines the critical strategies and technologies necessary to safeguard organizational data in the cloud, foc
APA, Harvard, Vancouver, ISO, and other styles
34

Yadav, DR T. Chandrasekhar, Kasturi Kala, Raja Ishwarya Roy Kolachina, Mourya Chandra Kanneganti, and Shanmukha Sai Pasupuleti. "Data Privacy Concerns and their Impact on Consumer Trust in Digital Marketing." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–7. http://dx.doi.org/10.55041/ijsrem38555.

Full text
Abstract:
The rise of digital marketing has transformed consumer-brand interactions through personalized strategies and targeted ads driven by extensive consumer data. However, increased data collection has sparked privacy concerns, affecting consumer trust. This study examines how dataprivacy concerns impact consumer trust, engagement, and willingness to share information in digital marketing. Key privacy issues include over-collection, lack of transparency, unauthorized sharing, and data breaches. Using a mixed-methods approach, with quantitative surveys of 600 participants and qualitative interviews
APA, Harvard, Vancouver, ISO, and other styles
35

Dr. Rachna Thakkar. "Data Privacy and Consumer Trust in Social Media Marketing." International Research Journal on Advanced Engineering and Management (IRJAEM) 3, no. 03 (2025): 494–99. https://doi.org/10.47392/irjaem.2025.0078.

Full text
Abstract:
In today’s digital landscape, social media marketing is pivotal in consumer engagement and brand outreach. However, the increasing concern over data privacy has raised significant ethical and regulatory issues. Companies leverage vast amounts of consumer data to personalize advertisements, but unauthorized data collection, lack of transparency, and frequent data breaches have eroded consumer trust (Smith et al., 2021; Jones &amp; Patel, 2020). This research investigates the relationship between data privacy practices and consumer trust, analyzing key factors such as regulatory compliance, ethi
APA, Harvard, Vancouver, ISO, and other styles
36

Mosope Williams and Tina Charles Mbakwe-Obi. "Integrated strategies for database protection: Leveraging anomaly detection and predictive modelling to prevent data breaches." World Journal of Advanced Research and Reviews 24, no. 3 (2024): 1098–115. https://doi.org/10.30574/wjarr.2024.24.3.3795.

Full text
Abstract:
In the era of digital transformation, safeguarding databases from breaches is critical to maintaining organizational integrity and trust. With the increasing complexity and volume of data, traditional database protection methods are often insufficient to counter sophisticated threats. This paper explores the integration of anomaly detection systems and predictive modelling as a robust strategy to mitigate database vulnerabilities. Anomaly detection systems play a pivotal role in identifying irregular activities, such as unauthorized access or unusual data usage patterns, by leveraging real-tim
APA, Harvard, Vancouver, ISO, and other styles
37

Liu, Yanling, and Yun Li. "Financial Data Security Management in the Era of Big Data." Proceedings of Business and Economic Studies 8, no. 2 (2025): 37–42. https://doi.org/10.26689/pbes.v8i2.10259.

Full text
Abstract:
In the era of big data, the financial industry is undergoing profound changes. By integrating multiple data sources such as transaction records, customer interactions, market trends, and regulatory requirements, big data technology has significantly improved the decision-making efficiency, customer insight, and risk management capabilities of financial institutions. The financial industry has become a pioneer in the application of big data technology, which is widely used in scenarios such as fraud detection, risk management, customer service optimization, and smart transactions. However, fina
APA, Harvard, Vancouver, ISO, and other styles
38

Mital, Patel *. Praful Bharadia Piyush Patel. "Data Integrity breach: A critical challenge faced by the pharmaceutical industry throughout the regulatory audit." International Journal of Pharmaceutical Sciences 2, no. 7 (2024): 538–50. https://doi.org/10.5281/zenodo.12686521.

Full text
Abstract:
Manufacturing of pharmaceutical products consists of multiple steps and the generation of several data connected to the different manufacturing processes. All the data that is generated as a result of product manufacturing should be accurate and reliable. Because it will directly relate to the quality of the pharmaceutical product. it is the basic necessity of any pharmaceutical industry to produce such a product that is reliable for its quality throughout the entire life cycle of the product. currently, There is various regulatory guidelines are available for data integrity maintenance starti
APA, Harvard, Vancouver, ISO, and other styles
39

Akshaya, U. Bhandarkar*1 Balaji J.2 Jasvanth R.2 Dinesh Ragavendra S.2. "Ensuring Data Integrity In The Pharmaceutical Industry: Benefits, Challenges, Key Considerations And Best Practices." International Journal in Pharmaceutical Sciences 2, no. 10 (2024): 1198–210. https://doi.org/10.5281/zenodo.13971925.

Full text
Abstract:
Data integrity plays a critical role in the pharmaceutical industry, as it directly influences product quality, ensures patient safety, and maintains compliance with regulatory standards. It is the corner stone of the industry, ensuring the reliability of data used in drug development, manufacturing, testing, distribution and regulatory submissions. With increasing digitalization, maintaining data integrity has become more challenging, requiring robust systems and practices. Regulatory bodies such as the United States Food and Drug Administration [USFDA], European Medicines Agency [EMA] and Wo
APA, Harvard, Vancouver, ISO, and other styles
40

Ramalingam, Sundarrajan, and Dr Daksha ,. Borada. "Compliance & Data Security in Bi: Ensuring Compliance and Security in Bi Frameworks Handling Sensitive Data." International Journal of Research in Modern Engineering & Emerging Technology 13, no. 3 (2025): 362–76. https://doi.org/10.63345/ijrmeet.org.v13.i3.23.

Full text
Abstract:
In today’s rapidly evolving digital landscape, ensuring data compliance and robust security measures within business intelligence (BI) ecosystems has become crucial, especially in the context of handling sensitive customer information. Business Intelligence systems are designed to analyze vast amounts of data to provide valuable insights for strategic decision-making. However, the increasing reliance on these systems for sensitive business operations brings a higher risk of data breaches, unauthorized access, and violations of data protection regulations. This paper explores the importance of
APA, Harvard, Vancouver, ISO, and other styles
41

Faraz, Asgher Mangi. "Fortifying Fintech Security: Advanced Strategies for Protecting Financial Data and Assets." Emerging Science Research Volume 2025 (January 7, 2025): 1–11. https://doi.org/10.5281/zenodo.14610477.

Full text
Abstract:
The financial technology (fintech) sector has witnessed unprecedented growth in recent years, driven by innovations in digital payment systems, peer-to-peer lending platforms, blockchain technology, and mobile banking applications. However, this growth has been accompanied by an alarming rise in cybersecurity threats, ranging from data breaches and phishing attacks to sophisticated ransomware campaigns and insider threats. These vulnerabilities not only jeopardize sensitive financial data and digital assets but also erode consumer trust and pose significant compliance challenges. This article
APA, Harvard, Vancouver, ISO, and other styles
42

Apooyin Agboola Emmanuel. "The impact of cybersecurity on financial reporting: Strengthening data integrity and regulatory compliance." International Journal of Science and Research Archive 14, no. 2 (2025): 626–37. https://doi.org/10.30574/ijsra.2025.14.2.0427.

Full text
Abstract:
Cybersecurity plays a critical role in financial reporting by ensuring data integrity, confidentiality, and regulatory compliance. As financial institutions and corporations increasingly rely on digital systems for financial transactions and reporting, the risks associated with cyber threats have grown significantly. Cyberattacks, data breaches, and system vulnerabilities can compromise the accuracy and reliability of financial information, leading to severe financial, operational, and reputational consequences. This paper explores the impact of cybersecurity on financial reporting, emphasizin
APA, Harvard, Vancouver, ISO, and other styles
43

Metibemu, Olufunke Cynthia, Temilade Oluwatoyin Adesokan-Imran, Adekunbi Justina Ajayi, Olufisayo Juliana Tiwo, Abayomi Titilola Olutimehin, and Oluwaseun Oladeji Olaniyi. "Developing Proactive Threat Mitigation Strategies for Cloud Misconfiguration Risks in Financial SaaS Applications." Journal of Engineering Research and Reports 27, no. 3 (2025): 393–413. https://doi.org/10.9734/jerr/2025/v27i31442.

Full text
Abstract:
Cloud misconfigurations in financial Software-as-a-Service (SaaS) applications pose significant cybersecurity risks, leading to data breaches, financial losses, and reputational harm. This study utilizes data from the Cloud Security Alliance (CSA) Top Threats Dataset, Verizon Data Breach Investigations Report (DBIR), and the MITRE ATT&amp;CK Framework to examine the causes and types of misconfigurations, analyze their financial impact, and evaluate the effectiveness of mitigation strategies. A Chi-Square Test for Independence, Ordinary Least Squares (OLS) Regression, and Kaplan-Meier Survival
APA, Harvard, Vancouver, ISO, and other styles
44

Tomisin Abimbola, Taiwo Oluwanisola Omoloja, Muhammed Azeez, and Vivian Falomo. "Design, development and optimization of blockchain-based secure data management for nanotechnology in healthcare." Open Access Research Journal of Science and Technology 12, no. 1 (2024): 018–29. http://dx.doi.org/10.53022/oarjst.2024.12.1.0107.

Full text
Abstract:
The integration of nanotechnology in healthcare has brought about revolutionary advancements, particularly in diagnostics and therapeutics. However, managing the vast and sensitive data generated by these applications poses significant challenges, particularly concerning security, privacy, and regulatory compliance. This study explores the design, development, and optimization of a blockchain-based secure data management system tailored for nanotechnology applications in the United States healthcare sector. The proposed system leverages blockchain's decentralized and immutable ledger technolog
APA, Harvard, Vancouver, ISO, and other styles
45

Amuta, Michael Aduojo, Muridzo Muonde, Ashiata Yetunde Mustapha, and Akachukwu Obianuju Mbata. "A Risk Management Framework for Navigating Regulatory Compliance in Pharmaceutical Sales and Distribution Operations." International Journal of Multidisciplinary Research and Growth Evaluation 1, no. 1 (2020): 173–82. https://doi.org/10.54660/.ijmrge.2020.1.1.173-182.

Full text
Abstract:
Pharmaceutical sales and distribution operations are heavily regulated to ensure the integrity, safety, and efficacy of medicines throughout the supply chain. However, firms often encounter significant challenges navigating complex regulatory environments, particularly across jurisdictions with varying standards and enforcement mechanisms. This paper presents a comprehensive risk management framework designed to support pharmaceutical companies in identifying, assessing, and mitigating compliance risks associated with sales and distribution activities. Drawing on existing compliance models, ph
APA, Harvard, Vancouver, ISO, and other styles
46

Researcher. "SECURING THE CLOUD: A COMPREHENSIVE ANALYSIS OF DATA PROTECTION AND REGULATORY COMPLIANCE IN RULE-BASED ELIGIBILITY SYSTEMS." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 432–47. https://doi.org/10.5281/zenodo.13991239.

Full text
Abstract:
The adoption of cloud-based rule systems for eligibility determination has revolutionized how organizations process and manage sensitive data across various sectors, including healthcare, government, and finance. However, this technological shift introduces complex challenges in maintaining data security and regulatory compliance. This article presents a comprehensive analysis of the key security risks and compliance requirements associated with cloud-based eligibility determination systems. It examines the implications of handling sensitive personal, health, and financial data in cloud enviro
APA, Harvard, Vancouver, ISO, and other styles
47

Bibitayo Ebunlomo Abikoye and Cedrick Agorbia-Atta. "Securing the cloud: Advanced solutions for government data protection." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 901–5. http://dx.doi.org/10.30574/wjarr.2024.23.2.2420.

Full text
Abstract:
This study examines government agencies' critical security challenges when adopting cloud-based solutions. As governments increasingly migrate their services to the cloud to enhance efficiency and reduce costs, they must contend with significant risks, including data breaches, unauthorized access, and regulatory compliance. To mitigate these threats, the paper explores implementing robust security measures such as advanced encryption methods, multi-factor authentication (MFA), continuous monitoring, and Zero Trust Architecture. The research emphasizes the importance of adhering to internationa
APA, Harvard, Vancouver, ISO, and other styles
48

Bibitayo, Ebunlomo Abikoye, and Agorbia-Atta Cedrick. "Securing the cloud: Advanced solutions for government data protection." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 901–5. https://doi.org/10.5281/zenodo.14848512.

Full text
Abstract:
This study examines government agencies' critical security challenges when adopting cloud-based solutions. As governments increasingly migrate their services to the cloud to enhance efficiency and reduce costs, they must contend with significant risks, including data breaches, unauthorized access, and regulatory compliance. To mitigate these threats, the paper explores implementing robust security measures such as advanced encryption methods, multi-factor authentication (MFA), continuous monitoring, and Zero Trust Architecture. The research emphasizes the importance of adhering to internationa
APA, Harvard, Vancouver, ISO, and other styles
49

Seun Solomon Bakare, Adekunle Oyeyemi Adeniyi, Chidiogo Uzoamaka Akpuokwe, and Nkechi Emmanuella Eneh. "DATA PRIVACY LAWS AND COMPLIANCE: A COMPARATIVE REVIEW OF THE EU GDPR AND USA REGULATIONS." Computer Science & IT Research Journal 5, no. 3 (2024): 528–43. http://dx.doi.org/10.51594/csitrj.v5i3.859.

Full text
Abstract:
This Review provides an overview of the comparative review of data privacy laws and compliance, focusing on the European Union's General Data Protection Regulation (EU GDPR) and data protection regulations in the United States. The analysis explores key similarities and differences, emphasizing their implications for businesses and individuals. The EU GDPR, implemented in 2018, stands as a landmark regulation governing data protection and privacy for individuals within the European Union and the European Economic Area. In contrast, the United States lacks a comprehensive federal data privacy l
APA, Harvard, Vancouver, ISO, and other styles
50

Oluoha, Oluchukwu Modesta, Abisola Odeshina, Oluwatosin Reis, Friday Okpeke, Verlinda Attipoe, and Omamode Henry Orieno. "Artificial Intelligence Integration in Regulatory Compliance: A Strategic Model for Cybersecurity Enhancement." Journal of Frontiers in Multidisciplinary Research 3, no. 1 (2022): 35–46. https://doi.org/10.54660/.ijfmr.2022.3.1.35-46.

Full text
Abstract:
In the evolving digital landscape, organizations face mounting challenges in maintaining regulatory compliance while safeguarding their systems against increasingly sophisticated cyber threats. This paper proposes a strategic model for integrating Artificial Intelligence (AI) into regulatory compliance frameworks to enhance cybersecurity resilience. The model addresses the limitations of traditional compliance approaches, which often struggle to keep pace with dynamic regulatory changes and emerging threat vectors. By leveraging AI capabilities—such as machine learning, natural language proces
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!