Journal articles on the topic 'Regulatory Compliance Data Breaches'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Regulatory Compliance Data Breaches.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Raghupathi, Wullianallur, Viju Raghupathi, and Aditya Saharia. "Analyzing Health Data Breaches: A Visual Analytics Approach." AppliedMath 3, no. 1 (2023): 175–99. http://dx.doi.org/10.3390/appliedmath3010011.
Full textSitumeang, Ampuan, Jihyun Park, Lu Sudirman, Ninne Zahara Silviani, and Shenti Agustini. "Evaluating Data Breach Notification Protocols." Lentera Hukum 12, no. 1 (2025): 42–61. https://doi.org/10.19184/ejlh.v12i1.47621.
Full textBalogun, Adebayo Yusuf. "Strengthening Compliance with Data Privacy Regulations in U.S. Healthcare Cybersecurity." Asian Journal of Research in Computer Science 18, no. 1 (2025): 154–73. https://doi.org/10.9734/ajrcos/2025/v18i1555.
Full textGbadebo, Michael Olayinka, Ademola Oluwaseun Salako, Oluwatosin Selesi-Aina, Olumide Samuel Ogungbemi, Omobolaji Olufunmilayo Olateju, and Oluwaseun Oladeji Olaniyi. "Augmenting Data Privacy Protocols and Enacting Regulatory Frameworks for Cryptocurrencies via Advanced Blockchain Methodologies and Artificial Intelligence." Journal of Engineering Research and Reports 26, no. 11 (2024): 7–27. http://dx.doi.org/10.9734/jerr/2024/v26i111311.
Full textApurva, Shelke* Aditi Shinde Samruddhi Shinde Karan Shinde Saurabh Shinde S. D. Mankar. "Data Integrity in Pharmaceutical Sciences." International Journal of Pharmaceutical Sciences 3, no. 4 (2025): 1142–48. https://doi.org/10.5281/zenodo.15185271.
Full textPimenta Rodrigues, Gabriel Arquelau, André Luiz Marques Serrano, Amanda Nunes Lopes Espiñeira Lemos, et al. "Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review." Data 9, no. 2 (2024): 27. http://dx.doi.org/10.3390/data9020027.
Full textSree, Sandhya Kona. "Security and Compliance in Big Data Ingestion Pipelines: Examining security challenges and compliance considerations associated with ingesting sensitive data into big data environments and proposing solutions to mitigate risks." Journal of Scientific and Engineering Research 7, no. 12 (2020): 230–35. https://doi.org/10.5281/zenodo.11667613.
Full textDirgantara, Febrian, Dharma Setiawan Negara, Didit Darmawan, Endra Andie Aryanto, and Alwi Mohamad Shahab. "Legal Responsibility of Companies in Cases of Personal Data Breaches." Innovative: Journal Of Social Science Research 5, no. 1 (2025): 5053–65. https://doi.org/10.31004/innovative.v5i1.18046.
Full textSnigdha, Esrat Zahan, Muhammad Saqib Jalil, Fares Mohammed Dahwal, et al. "Cybersecurity in Healthcare IT Systems: Business Risk Management and Data Privacy Strategies." American Journal of Engineering and Technology 07, no. 03 (2025): 163–84. https://doi.org/10.37547/tajet/volume07issue03-15.
Full textVaishnavi, R., and Robert M. Sandeepthi. "Cybersecurity Challenges and Regulatory Compliance in Neobanking in India." TECHNO REVIEW Journal of Technology and Management 4, no. 4 (2024): 24–33. https://doi.org/10.31305/trjtm2024.v04.n04.004.
Full textO.O., Tursunov. "THE IMPACT AND CHALLENGES OF FINANCIAL CYBERSECURITY: SAFEGUARDING THE DIGITAL ECONOMY." Innovative Development in Educational Activities 2, no. 11 (2023): 299–304. https://doi.org/10.5281/zenodo.8045118.
Full textNanyeneke Ravana Mayeke. "Evaluating the cost-benefit dynamics of cybersecurity compliance investments: A multi-sectoral analysis across financial, educational, and e-commerce industries." Computer Science & IT Research Journal 6, no. 4 (2025): 266–87. https://doi.org/10.51594/csitrj.v6i4.1914.
Full textArjun, Mantri. "Ensuring Data Security and Privacy During Data Migration." European Journal of Advances in Engineering and Technology 6, no. 3 (2019): 111–15. https://doi.org/10.5281/zenodo.13354011.
Full textSchatz, Daniel, and Rabih Bashroush. "The impact of repeated data breach events on organisations’ market value." Information & Computer Security 24, no. 1 (2016): 73–92. http://dx.doi.org/10.1108/ics-03-2014-0020.
Full textOluwabiyi Oluwawapelumi Ajakaye, Ayobami Gabriel Olanrewaju, David Fawehinmi, Rasheed Afolabi, and Gold Mebari Pius-Kiate. "Integrating Artificial Intelligence in organizational cybersecurity: Enhancing consumer data protection in the U.S. Fintech Sector." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 2802–21. https://doi.org/10.30574/wjarr.2025.26.1.1421.
Full textReddy, Haritha Madhava. "Blockchain Technology and Security Compliance." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem24353.
Full textOlawale, Habeeb Olatunji, Ngozi Joan Isibor, and Joyce Efekpogua Fiemotongha. "A Predictive Compliance Analytics Framework Using AI and Business Intelligence for Early Risk Detection." International Journal of Management and Organizational Research 2, no. 2 (2023): 190–95. https://doi.org/10.54660/ijmor.2023.2.2.190-195.
Full textDavid Akokodaripon, Favour Oluwaseun Alonge-Essiet, Akorede Victor Aderoju, and Oluwatosin Reis. "Implementing data governance in financial systems: Strategies for ensuring compliance and security in multi-source data integration projects." Computer Science & IT Research Journal 5, no. 10 (2024): 2263–82. http://dx.doi.org/10.51594/csitrj.v5i10.1631.
Full textRatnangi, Nirek. "Improving Data Privacy and Compliance in ERP Systems using Linux VMs in Multi-Tenant Cloud Environments." European Journal of Advances in Engineering and Technology 9, no. 7 (2022): 87–89. https://doi.org/10.5281/zenodo.13919438.
Full textSoumya Khanna, Nizam Ashraf Khan. "“Restorative Justice as an Economic Policy Tool: A Cost-Benefit Analysis in the Healthcare Sector”." European Economic Letters (EEL) 15, no. 2 (2025): 3720–34. https://doi.org/10.52783/eel.v15i2.3207.
Full textReshma, Sudra. "Regulatory compliance with AI and risks involved in finance and banking sectors." Journal of Scientific and Engineering Research 11, no. 1 (2024): 276–85. https://doi.org/10.5281/zenodo.12794295.
Full textTiwo, Olufisayo Juliana, Temilade Oluwatoyin Adesokan-Imran, Damilola Comfort Babarinde, Seun Michael Oyekunle, Abayomi Titilola Olutimehin, and Oluwaseun Oladeji Olaniyi. "Advancing Security in Cloud-based Patient Information Systems with Quantum-resistant Encryption for Healthcare Data." Asian Journal of Research in Computer Science 18, no. 4 (2025): 187–208. https://doi.org/10.9734/ajrcos/2025/v18i4615.
Full textAdebola, Folorunso, Babalola Olufunbi, Edger Nwatu Chineme, and Adedoyin Adebisi. "A comprehensive model for ensuring data compliance in cloud computing environment." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 1983–95. https://doi.org/10.5281/zenodo.15105749.
Full textKapil, Dharika. "Implementing Effective Data Security Measures in Fintech Applications: Address the importance of and approaches to securing sensitive financial data." European Journal of Advances in Engineering and Technology 8, no. 11 (2021): 24–27. https://doi.org/10.5281/zenodo.10889828.
Full textYamini, Kannan, and Kapil Dharika. "Security Challenges and Solutions in Cloud Computing for Fintech." Journal of Scientific and Engineering Research 9, no. 8 (2022): 140–46. https://doi.org/10.5281/zenodo.11220646.
Full textSreekanth, Pasunuru. "The Role of Hardware Security Modules (HSMs) in Modern Data Protection Strategies." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 8, no. 2 (2020): 1–6. https://doi.org/10.5281/zenodo.14382552.
Full textKhuan, Hendri, Amin Zaki, and Faizal Razak. "Corporate Responsibility for Violations of Online Consumer Data Privacy." Rechtsnormen: Journal of Law 3, no. 1 (2025): 1–10. https://doi.org/10.70177/rjl.v3i1.2065.
Full textOlawale, Habeeb Olatunji, Adegbola Oluwole Ogedengbe, Maxwell Nana Ameyaw, Temitayo Oluwaseun Jejeniwa, and Solomon Christopher Friday. "Standardizing Compliance Practices across AML, ESG, and Transaction Monitoring for Financial Institutions." Journal of Frontiers in Multidisciplinary Research 5, no. 2 (2024): 75–93. https://doi.org/10.54660/.jfmr.2024.5.2.75-93.
Full textMusyoka, Geoffrey Vundi, Robert Murungi Mutua, and Jecton Tocho. "AI-Based Framework for Government Oversight of Personal Data Consent Compliance: A Case Study of Nairobi County." International Journal of Professional Practice 12, no. 6 (2024): 40–48. https://doi.org/10.71274/ijpp.v12i6.498.
Full textRaveendra Reddy Pasala. "Salesforce data protection and compliance with AI." World Journal of Advanced Research and Reviews 22, no. 2 (2024): 2329–35. https://doi.org/10.30574/wjarr.2024.22.2.0596.
Full textVishnupriya, S. Devarajulu. "Safeguarding Health Data: Best Practices Ensuring Confidential Patient Health Information." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 11, no. 5 (2023): 1–4. https://doi.org/10.5281/zenodo.13959626.
Full textAdebola Folorunso, Olufunbi Babalola, Chineme Edgar Nwatu, and Adebisi Adedoyin. "A comprehensive model for ensuring data compliance in cloud computing environment." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 1983–95. http://dx.doi.org/10.30574/wjarr.2024.24.2.3514.
Full textAlugoju, Narasimha Rao. "Data Protection in the Cloud: Ensuring Security and Compliance for Organizational Data." International Journal for Research in Applied Science and Engineering Technology 12, no. 12 (2024): 1590–96. https://doi.org/10.22214/ijraset.2024.66087.
Full textYadav, DR T. Chandrasekhar, Kasturi Kala, Raja Ishwarya Roy Kolachina, Mourya Chandra Kanneganti, and Shanmukha Sai Pasupuleti. "Data Privacy Concerns and their Impact on Consumer Trust in Digital Marketing." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–7. http://dx.doi.org/10.55041/ijsrem38555.
Full textDr. Rachna Thakkar. "Data Privacy and Consumer Trust in Social Media Marketing." International Research Journal on Advanced Engineering and Management (IRJAEM) 3, no. 03 (2025): 494–99. https://doi.org/10.47392/irjaem.2025.0078.
Full textMosope Williams and Tina Charles Mbakwe-Obi. "Integrated strategies for database protection: Leveraging anomaly detection and predictive modelling to prevent data breaches." World Journal of Advanced Research and Reviews 24, no. 3 (2024): 1098–115. https://doi.org/10.30574/wjarr.2024.24.3.3795.
Full textLiu, Yanling, and Yun Li. "Financial Data Security Management in the Era of Big Data." Proceedings of Business and Economic Studies 8, no. 2 (2025): 37–42. https://doi.org/10.26689/pbes.v8i2.10259.
Full textMital, Patel *. Praful Bharadia Piyush Patel. "Data Integrity breach: A critical challenge faced by the pharmaceutical industry throughout the regulatory audit." International Journal of Pharmaceutical Sciences 2, no. 7 (2024): 538–50. https://doi.org/10.5281/zenodo.12686521.
Full textAkshaya, U. Bhandarkar*1 Balaji J.2 Jasvanth R.2 Dinesh Ragavendra S.2. "Ensuring Data Integrity In The Pharmaceutical Industry: Benefits, Challenges, Key Considerations And Best Practices." International Journal in Pharmaceutical Sciences 2, no. 10 (2024): 1198–210. https://doi.org/10.5281/zenodo.13971925.
Full textRamalingam, Sundarrajan, and Dr Daksha ,. Borada. "Compliance & Data Security in Bi: Ensuring Compliance and Security in Bi Frameworks Handling Sensitive Data." International Journal of Research in Modern Engineering & Emerging Technology 13, no. 3 (2025): 362–76. https://doi.org/10.63345/ijrmeet.org.v13.i3.23.
Full textFaraz, Asgher Mangi. "Fortifying Fintech Security: Advanced Strategies for Protecting Financial Data and Assets." Emerging Science Research Volume 2025 (January 7, 2025): 1–11. https://doi.org/10.5281/zenodo.14610477.
Full textApooyin Agboola Emmanuel. "The impact of cybersecurity on financial reporting: Strengthening data integrity and regulatory compliance." International Journal of Science and Research Archive 14, no. 2 (2025): 626–37. https://doi.org/10.30574/ijsra.2025.14.2.0427.
Full textMetibemu, Olufunke Cynthia, Temilade Oluwatoyin Adesokan-Imran, Adekunbi Justina Ajayi, Olufisayo Juliana Tiwo, Abayomi Titilola Olutimehin, and Oluwaseun Oladeji Olaniyi. "Developing Proactive Threat Mitigation Strategies for Cloud Misconfiguration Risks in Financial SaaS Applications." Journal of Engineering Research and Reports 27, no. 3 (2025): 393–413. https://doi.org/10.9734/jerr/2025/v27i31442.
Full textTomisin Abimbola, Taiwo Oluwanisola Omoloja, Muhammed Azeez, and Vivian Falomo. "Design, development and optimization of blockchain-based secure data management for nanotechnology in healthcare." Open Access Research Journal of Science and Technology 12, no. 1 (2024): 018–29. http://dx.doi.org/10.53022/oarjst.2024.12.1.0107.
Full textAmuta, Michael Aduojo, Muridzo Muonde, Ashiata Yetunde Mustapha, and Akachukwu Obianuju Mbata. "A Risk Management Framework for Navigating Regulatory Compliance in Pharmaceutical Sales and Distribution Operations." International Journal of Multidisciplinary Research and Growth Evaluation 1, no. 1 (2020): 173–82. https://doi.org/10.54660/.ijmrge.2020.1.1.173-182.
Full textResearcher. "SECURING THE CLOUD: A COMPREHENSIVE ANALYSIS OF DATA PROTECTION AND REGULATORY COMPLIANCE IN RULE-BASED ELIGIBILITY SYSTEMS." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 432–47. https://doi.org/10.5281/zenodo.13991239.
Full textBibitayo Ebunlomo Abikoye and Cedrick Agorbia-Atta. "Securing the cloud: Advanced solutions for government data protection." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 901–5. http://dx.doi.org/10.30574/wjarr.2024.23.2.2420.
Full textBibitayo, Ebunlomo Abikoye, and Agorbia-Atta Cedrick. "Securing the cloud: Advanced solutions for government data protection." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 901–5. https://doi.org/10.5281/zenodo.14848512.
Full textSeun Solomon Bakare, Adekunle Oyeyemi Adeniyi, Chidiogo Uzoamaka Akpuokwe, and Nkechi Emmanuella Eneh. "DATA PRIVACY LAWS AND COMPLIANCE: A COMPARATIVE REVIEW OF THE EU GDPR AND USA REGULATIONS." Computer Science & IT Research Journal 5, no. 3 (2024): 528–43. http://dx.doi.org/10.51594/csitrj.v5i3.859.
Full textOluoha, Oluchukwu Modesta, Abisola Odeshina, Oluwatosin Reis, Friday Okpeke, Verlinda Attipoe, and Omamode Henry Orieno. "Artificial Intelligence Integration in Regulatory Compliance: A Strategic Model for Cybersecurity Enhancement." Journal of Frontiers in Multidisciplinary Research 3, no. 1 (2022): 35–46. https://doi.org/10.54660/.ijfmr.2022.3.1.35-46.
Full text