Academic literature on the topic 'Security and Privacy issues and its approaches'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security and Privacy issues and its approaches.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security and Privacy issues and its approaches"

1

Kanika*1, Alka Agrawal2 &. R.A. Khan3. "AN OVERVIEW OF PRIVACY PRESERVATION IN BIG DATA." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 7 (2017): 61–71. https://doi.org/10.5281/zenodo.822970.

Full text
Abstract:
Mobile with mega pixel cameras, social networking sites, wireless sensor networks, earth-orbiting satellites, finance market etc continuously generating more and more data than ever before: 90% of world’s data has been produced in last two years. This huge amount of data is generated by different sources. Verification, authorization, authenticity, privacy such types of security issues is becoming major concern of big data in heterogeneous environments. To maintain the authenticity and preserve privacy of large amount of data is always an issue. In this paper authors discussed the data privacy
APA, Harvard, Vancouver, ISO, and other styles
2

Baig, Ahmed Fraz, and Sigurd Eskeland. "Security, Privacy, and Usability in Continuous Authentication: A Survey." Sensors 21, no. 17 (2021): 5967. http://dx.doi.org/10.3390/s21175967.

Full text
Abstract:
Continuous authentication has been proposed as a possible approach for passive and seamless user authentication, using sensor data comprising biometric, behavioral, and context-oriented characteristics. Since these are personal data being transmitted and are outside the control of the user, this approach causes privacy issues. Continuous authentication has security challenges concerning poor matching rates and susceptibility of replay attacks. The security issues are mainly poor matching rates and the problems of replay attacks. In this survey, we present an overview of continuous authenticati
APA, Harvard, Vancouver, ISO, and other styles
3

Ramakrishnan, Mr R. "Privacy Challenges and Solutions in Big Data Analytics: A Comprehensive Review." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 2435–40. http://dx.doi.org/10.22214/ijraset.2024.62103.

Full text
Abstract:
Abstract: Large data collections with a more intricate and diversified structure are referred to as "big data." These traits are typically associated with more challenges when it comes to storing, analyzing, and applying additional procedures or getting results. The technique of analyzing vast quantities of intricate data to uncover patterns or connections that are concealed is known as "big data analytics." Nonetheless, there is a clear conflict between big data's extensive use and its security and privacy. This paper examines privacy needs in big data, distinguishes between privacy and secur
APA, Harvard, Vancouver, ISO, and other styles
4

Mylavathi, G. A., N. M. Mallika, and K. Mohanraj. "Survey of Security and Privacy Issues in Big Data Analytics." Asian Journal of Computer Science and Technology 8, S1 (2019): 33–35. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1972.

Full text
Abstract:
Due to the reasons such as the rapid growth and spread of network services, mobile devices, and online users on the Internet leading to a remarkable increase in the amount of data. Almost each trade is making an attempt to address this large information. Big data phenomenon has begun to gain importance. However, it’s not solely terribly tough to store massive information and analyses them with ancient applications, however conjointly it’s difficult privacy and security issues. For this reason, this paper discusses the massive information, its scheme, considerations on massive information and p
APA, Harvard, Vancouver, ISO, and other styles
5

Abdulsalam, Yunusa Simpa, and Mustapha Hedabou. "Security and Privacy in Cloud Computing: Technical Review." Future Internet 14, no. 1 (2021): 11. http://dx.doi.org/10.3390/fi14010011.

Full text
Abstract:
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of the pay-as-you-go price model. However, outsourcing information and business applications to the cloud or a third party raises security and privacy concerns, which have become critical in adopting cloud implementation and services. Researchers and affected organisations have proposed different security approaches in the literature to tackle the
APA, Harvard, Vancouver, ISO, and other styles
6

Tiwari,, Arun. "Security and Privacy Analysis in Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31055.

Full text
Abstract:
The concept of the Internet of Things (IoT) promises to make all electronic devices smart, connected and capable of functioning together seamlessly courtesy of a worldwide network that links virtual elements with physical ones. Every IoT item in this network has a unique identification number to indicate its position in this system. In addition, connectivity is important for effective coordination with some low-tech gadgets. In this chapter, we shall be discussing the relevant IoT systems and security issues related to them including privacy, security attacks, means of securing IoT environment
APA, Harvard, Vancouver, ISO, and other styles
7

Massis, Bruce. "The Internet of Things and its impact on the library." New Library World 117, no. 3/4 (2016): 289–92. http://dx.doi.org/10.1108/nlw-12-2015-0093.

Full text
Abstract:
Purpose – The purpose of this paper is to consider the Internet of Things (IOT) and its potential impact on libraries. Design/methodology/approach – This paper presents a literature review and a commentary on this topic that have been addressed by professionals, researchers and practitioners. Findings – In communicating the issues when comprehending the scope of the IOT, libraries need not succumb to the sometimes near-hysteria that surrounds the rhetoric regarding security and privacy. But, librarians must actively engage in the conversation and its subsequent actions to respond to patrons wh
APA, Harvard, Vancouver, ISO, and other styles
8

Sivan, Remya, and Zuriati Ahmad Zukarnain. "Security and Privacy in Cloud-Based E-Health System." Symmetry 13, no. 5 (2021): 742. http://dx.doi.org/10.3390/sym13050742.

Full text
Abstract:
Cloud based healthcare computing have changed the face of healthcare in many ways. The main advantages of cloud computing in healthcare are scalability of the required service and the provision to upscale or downsize the data storge, collaborating Artificial Intelligence (AI) and machine learning. The current paper examined various research studies to explore the utilization of intelligent techniques in health systems and mainly focused into the security and privacy issues in the current technologies. Despite the various benefits related to cloud-computing applications for healthcare, there ar
APA, Harvard, Vancouver, ISO, and other styles
9

Tareq, Imad, Bassant M. Elbagoury, Salsabil El-Regaily, and El-Sayed M. El-Horbaty. "A survey about deep learning and federated Learning in cyberse-curity." Periodicals of Engineering and Natural Sciences (PEN) 12, no. 1 (2024): 75–100. https://doi.org/10.21533/pen.v12.i1.23.

Full text
Abstract:
Advances in Artificial Intelligence (AI) technology have led to the strengthening of traditional systems' cybersecurity capabilities in a variety of applications. However, these embedded machine learning models have exposed these systems to a new set of vulnerabilities known as AI assaults. These systems are now attractive targets for cyberattacks, jeopardizing the security and safety of bigger systems that include them. As a result, DL approaches are critical to transitioning network and system protection from providing safe communication between systems to intelligence systems in security. F
APA, Harvard, Vancouver, ISO, and other styles
10

Reddy, Manjunath, Nur Mohammad Ali Chisty, and Anusha Bodepudi. "A Review of Cybersecurity and Biometric Authentication in Cloud Network." Engineering International 10, no. 1 (2022): 9–18. http://dx.doi.org/10.18034/ei.v10i1.652.

Full text
Abstract:
Cloud computing uses few resources to give customers complete distant services via the internet. Data privacy, security, and reliability are major issues with cloud computing. Security is the biggest issue. This study discusses the biometrics framework and safe cloud computing identity management method. This paper discusses cloud computing security challenges and reviews cloud access framework approaches. It describes a novel fingerprint access-based authentication system to protect cloud services from DOS and DDoS attacks. This biometrics-based system can secure cloud services from illegal a
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security and Privacy issues and its approaches"

1

Cho, Jihoon. "Cryptographic approaches to security and privacy issues in pervasive computing." Thesis, Royal Holloway, University of London, 2014. http://repository.royalholloway.ac.uk/items/7272f105-8c80-462d-95eb-36f3de8ddaad/1/.

Full text
Abstract:
Technological innovation has enabled tiny devices to participate in pervasive com- puting. Such devices are particularly vulnerable to security and privacy threats, because of their limited computing resources and relatively weak physical security. We investigate possible cryptographic solutions to security and privacy problems arising in two kinds of emerging pervasive computing networks: Personal Area Net- works (PANs) and the EPCglobal Network. A number of key management schemes have been proposed for use in PANs, but these schemes only support key management within a PAN. However, as peopl
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Security and Privacy issues and its approaches"

1

Sloot, Bart, and Aviva Groot, eds. The Handbook of Privacy Studies. Amsterdam University Press, 2018. http://dx.doi.org/10.5117/9789462988095.

Full text
Abstract:
The Handbook of Privacy Studies is the first book in the world that brings together several disciplinary perspectives on privacy, such as the legal, ethical, medical, informatics and anthropological perspective. Privacy is in the news almost every day: mass surveillance by intelligence agencies, the use of social media data for commercial profit and political microtargeting, password hacks and identity theft, new data protection regimes, questionable reuse of medical data, and concerns about how algorithms shape the way we think and decide. This book offers interdisciplinary background informa
APA, Harvard, Vancouver, ISO, and other styles
2

Artemov, V., N. Golovanova, A. Gravina, et al. Criminal law and economic activity (ratio of private and public interests). INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1160944.

Full text
Abstract:
The scientific and practical guide is devoted to the formation of a comprehensive and systematic approach to improving the activities of the court and preliminary investigation bodies in cases of crimes committed in the field of business and other economic activities (including taking into account the experience of law enforcement practice in criminal prosecution of entrepreneurs in a number of foreign countries). The problem of establishing a balance between the duties of judicial and investigative bodies within their competence to take measures to ensure economic security and to respect the
APA, Harvard, Vancouver, ISO, and other styles
3

Durakova, Irina, Svetlana Pugach, Aleksandra Mitrofanova, et al. HR Management in Russia: the Policy of diversity and inclusiveness. Book 10. INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1876366.

Full text
Abstract:
The monograph contains the results of research concerning, firstly, the specifics of the formation of the strategy and policy of personnel diversity, the specifics of youth as an object of diversified personnel management; issues of discrimination of employees in the workplace. Secondly, the promotion of scientific thought in the development of a productive model of hybrid employment, solving the problems of motivational HR diversity of public civil servants; determining the prospects for a rational balance of freedom and security in the modern world; presenting a new paradigm for combining wo
APA, Harvard, Vancouver, ISO, and other styles
4

Ortiz, Juan Carlos. Private Armed Forces and Global Security. ABC-CLIO, LLC, 2010. http://dx.doi.org/10.5040/9798216001409.

Full text
Abstract:
Through an array of theoretical approaches and empirical material, this comprehensive and accessible volume surveys private armed forces and directly challenges conventional stereotypes of security contractors. Private Armed Forces and Global Security: A Guide to the Issues is the first book to provide a comprehensive yet accessible survey of the private military groups involved in conflicts worldwide. Organized around four themes, it covers the history of private military forces since 1600, the main contemporary actors and their defining characteristics, the environments in which private arme
APA, Harvard, Vancouver, ISO, and other styles
5

Cadwalader, George. Homeland Security. Edited by Derek S. Reveron, Nikolas K. Gvosdev, and John A. Cloud. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780190680015.013.21.

Full text
Abstract:
The terrorist attacks of September 11, 2001 caused a seismic shift in how the United States organizes and executes the mission of securing the homeland. The creation and growth of the Department of Homeland Security is the most visible manifestation of this change. However, the homeland security discipline contemplates shared responsibilities and a unity of effort among all levels of government, the private sector, and the general public. The wide array of stakeholders, alongside an expanding definition of what constitutes homeland security, presents complex challenges for policymakers. With t
APA, Harvard, Vancouver, ISO, and other styles
6

Ojanperä, Sanna, Eduardo López, and Mark Graham, eds. Human Development and the Data Revolution. Oxford University PressOxford, 2025. https://doi.org/10.1093/oso/9780198879145.001.0001.

Full text
Abstract:
Abstract Human Development and the Data Revolution tackles a topic that in the age of data and digitalization has become timely in global development: what are the potential uses of large-scale data in the contexts of development, in particular, what techniques, data sources, and possibilities exist for harnessing large datasets and new online data to address persistent concerns regarding human development, inequality, exclusion, and participation. It also sheds light into the challenges and obstacles related to the safe and effective use of big data and computational approaches in development
APA, Harvard, Vancouver, ISO, and other styles
7

Baggett, Ryan K., and Brian K. Simpkins. Homeland Security and Critical Infrastructure Protection. Praeger, 2018. http://dx.doi.org/10.5040/9798400666155.

Full text
Abstract:
A compelling overview of systems and strategies implemented to safeguard U.S. resources from a plethora of threats, the vulnerabilities and security gaps in these infrastructure systems, and options to enable the future security of the homeland. Since the first edition of this book was published in 2009, significant changes have occurred in the security landscape, both domestically and internationally. This second edition is thoroughly updated to reflect those changes, offering a complete review of the various security and resilience measures currently in place and potential strategies to safe
APA, Harvard, Vancouver, ISO, and other styles
8

Guitton, Clement. Inside the Enemy's Computer. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190699994.001.0001.

Full text
Abstract:
Attribution — tracing those responsible for a cyber attack — is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on technica
APA, Harvard, Vancouver, ISO, and other styles
9

Lind, Nancy S., and Erik T. Rankin, eds. Privacy in the Digital Age. ABC-CLIO, LLC, 2015. http://dx.doi.org/10.5040/9798216001386.

Full text
Abstract:
A collection of expert essays examines the privacy rights that have been lost in the post-9/11 era—giving students and others the knowledge they need to take back their constitutional protections. This timely two-volume collection shares information every citizen should have, tackling the erosion of privacy rights engendered by the ability of digital technology to intercept, mine, and store personal data, most often without the knowledge of those being monitored. Examining its subject through the lens of Fourth Amendment rights, the work focuses on technological advances that now gather person
APA, Harvard, Vancouver, ISO, and other styles
10

Spinello, Richard A. Regulating Cyberspace. Greenwood Publishing Group, Inc., 2002. http://dx.doi.org/10.5040/9798216006688.

Full text
Abstract:
This visionary book presents an interdisciplinary and cogent approach to the issue of Internet governance and control. By examining five critical areas in which the tension between freedom and control is most palpable—fair competition and open access, free expression, intellectual property, privacy rights, and security—Spinello guides the reader on a tour of the emerging body of law and public policy that has attempted to control the anarchy of cyberspace. In so doing, he defends the credo of Internet self-regulation, asserting that the same powerful and flexible architectures that created the
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security and Privacy issues and its approaches"

1

García, Natalia Borgoñós, María Hernández Padilla, and Antonio Fernando Skarmeta Gómez. "Privacy Preserving Enablers for Data Space Ecosystems." In Communications in Computer and Information Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-78572-6_5.

Full text
Abstract:
Abstract Data Spaces are ecosystems designed to allow multiple organizations or companies to share data in a secure manner. Despite the potential of these technologies, they encounter a number of challenges and privacy issues that limit their use. Privacy Preserving Enablers are mechanisms developed to tackle these difficulties, ensuring data integrity and access control. This paper aims to analyze the role of some Privacy Preserving Enablers and its integration with Connectors in the context of Data Spaces. The research will focus on key enablers, including a Self-Sovereign Identity with Zero
APA, Harvard, Vancouver, ISO, and other styles
2

Schachter, Christel. "Intelligenza Artificiale in Higher Education: applicazioni, sfide e rischi." In Studies on Adult Learning and Education. Firenze University Press, 2024. http://dx.doi.org/10.36253/979-12-215-0504-7.35.

Full text
Abstract:
This contribution represents a synthesis of the literature review conducted on the topic of Artificial Intelligence (AI) in Higher Education, with particular attention to orientation and human learning processes. The analysis has identified two main macro-themes. The first focuses on the current state of the art and future prospects of AI usage in Higher Education, distinguishing between technical and technological approaches and those more pedagogical in nature. Possible benefits emerge - such as increased personalization of orientation, teaching, and learning - although widespread adoption i
APA, Harvard, Vancouver, ISO, and other styles
3

Choudhry, Mani Deepak, M. Sundarrajan, S. Jeevanandham, and V. Saravanan. "Security and Privacy Issues in AI-based Biometric Systems." In AI Based Advancements in Biometrics and its Applications. CRC Press, 2024. http://dx.doi.org/10.1201/9781032702377-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bonura, Susanna, Davide dalle Carbonare, Roberto Díaz-Morales, Ángel Navia-Vázquez, Mark Purcell, and Stephanie Rossello. "Increasing Trust for Data Spaces with Federated Learning." In Data Spaces. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98636-0_5.

Full text
Abstract:
AbstractDespite the need for data in a time of general digitization of organizations, many challenges are still hampering its shared use. Technical, organizational, legal, and commercial issues remain to leverage data satisfactorily, specially when the data is distributed among different locations and confidentiality must be preserved. Data platforms can offer “ad hoc” solutions to tackle specific matters within a data space. MUSKETEER develops an Industrial Data Platform (IDP) including algorithms for federated and privacy-preserving machine learning techniques on a distributed setup, detecti
APA, Harvard, Vancouver, ISO, and other styles
5

Macwan, Kamalkumar, and Sankita Patel. "Privacy Preservation Approaches for Social Network Data Publishing." In Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72236-4_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ohkubo, Miyako, Koutarou Suzuki, and Shingo Kinoshita. "Cryptographic Approaches for Improving Security and Privacy Issues of RFID Systems." In RFID Systems. John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470665251.ch17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mohan, Saranga, Sunita Panda, Ambar Bajpai, and Manoj Tolani. "Proactive Security Approaches for IoT in Health Monitoring Applications." In Security and Privacy Issues for IoT and WSN-based Real-time Applications. Chapman and Hall/CRC, 2025. https://doi.org/10.1201/9781003491910-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Takabi, Hassan, James B. D. Joshi, and Gail-Joon Ahn. "Security and Privacy in Cloud Computing." In Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2854-0.ch007.

Full text
Abstract:
Cloud computing paradigm has recently gained tremendous momentum. It has been found very promising for significant cost reduction and the increased operating efficiencies in computing. However, security and privacy issues pose as the key roadblock to its rapid adoption. In this chapter, the authors present the security and privacy challenges in Cloud computing environments and discuss how they are related to various delivery and deployment models, and are exacerbated by the unique aspects of Clouds. The authors also propose a comprehensive security framework for Cloud computing environments an
APA, Harvard, Vancouver, ISO, and other styles
9

Mahanty, Rasmita Kumari, Amrita Budarapu, Nayan Rai, and C. Bhagyashree. "Innovative Approaches in Early Detection of Depression." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-6996-8.ch010.

Full text
Abstract:
This chapter study is about Depression and it's a prevalent and significant medical disorder that significantly affects emotions, thoughts, and behaviors. As such, early detection and care are necessary to limit its severe repercussions, which include suicide and self-harm. Determining who is suffering from mental health issues is a difficult task that has historically relied on techniques such as patient interviews and Depression, Anxiety, and Stress (DAS) scores. Acknowledging the shortcomings of these traditional methods, this study seeks to develop a model designed especially for the early
APA, Harvard, Vancouver, ISO, and other styles
10

Vikash, Lalita Mishra, and Shirshu Varma. "Middleware Approach to Enhance the Security and Privacy in the Internet of Things." In Security and Privacy Issues in Sensor Networks and IoT. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-0373-7.ch007.

Full text
Abstract:
Internet of things is one of the most rapidly growing research areas. Nowadays, IoT is applicable in various diverse areas because of its basic feature i.e., anything would be available to anyone at anytime. Further, IoT aims to provide service in a pervasive environment, although different problems crop up when the researchers move towards pervasiveness. Security and Privacy are the most intense problems in the field of IoT. There are various approaches available to handle these issues: Architectural security, Database security, Secure communication, and Middleware approaches. This chapter's
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security and Privacy issues and its approaches"

1

Marcillo, Pablo, Ángel Leonardo Valdivieso Caraguay, and Myriam Hernandez-Alvarez. "Security in Vehicle-to-Infrastructure Communications." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002210.

Full text
Abstract:
By 2020, the number of connected vehicles will reach 250 million units. Thus, one of five vehicles worldwide will count on any wireless connection. Functional areas such as telecommunications, infotainment, automatic driving, or mobility services will have to face the implications caused by that growth. As long as vehicles require exchanging information with other vehicles or accessing external networks through a communication infrastructure, these vehicles must be part of a network. A VANET is a type of mobile network formed by base stations known as Road Side Units (RSU) and vehicles equippe
APA, Harvard, Vancouver, ISO, and other styles
2

S, Divya, and Gini R. "Enhancing Data Security in Cloud Computing using Block chain." In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/kjqt5979/ngcesi23p26.

Full text
Abstract:
Block chain (BC) and Software Defined Networking (SDN) are some of the most prominent emerging technologies in recent research. These technologies provide security, integrity, as well as confidentiality in their respective applications. Cloud computing has also been a popular comprehensive technology for several years. Confidential information is often shared with the cloud infrastructure to give customers access to remote resources, such as computation and storage operations. However, cloud computing also presents substantial security threats, issues, and challenges. Therefore, to overcome th
APA, Harvard, Vancouver, ISO, and other styles
3

Gupta, Aarya, and Eshaan Sarda. "Empirical Study on the Role of AI in Modern Education." In Transforming Knowledge: A Multidisciplinary Research on Integrative Learning Across Disciplines. The Bhopal School of Social Sciences, 2025. https://doi.org/10.51767/ic250458.

Full text
Abstract:
Purpose: This research paper aims to explore the evolving role of AI in modern education, analyzing its impact on personalized learning, intelligent tutoring, automated grading, student support, accessibility, and predictive analytics. It will examine how AI-driven tools enhance engagement, improve efficiency, and transform traditional teaching methods. Additionally, the paper will address ethical concerns, such as data privacy, AI biases, and over-reliance on technology. A key challenge discussed will be the financial burden of AI adoption, including costs associated with AI-powered applicati
APA, Harvard, Vancouver, ISO, and other styles
4

Gupta, Aarya, and Eshaan Sarda. "Empirical Study On The Role of AI In Modern Education." In Transforming Knowledge: A Multidisciplinary Research on Integrative Learning Across Disciplines. The Bhopal School of Social Sciences, 2025. https://doi.org/10.51767/ic250461.

Full text
Abstract:
Purpose This research paper aims to explore the evolving role of AI in modern education, analyzing its impact on personalized learning, intelligent tutoring, automated grading, student support, accessibility, and predictive analytics. It will examine how AI-driven tools enhance engagement, improve efficiency, and transform traditional teaching methods. Additionally, the paper will address ethical concerns, such as data privacy, AI biases, and over-reliance on technology. A key challenge discussed will be the financial burden of AI adoption, including costs associated with AI-powered applicatio
APA, Harvard, Vancouver, ISO, and other styles
5

Vićentijević, Kosana. "RIZICI PRIMENE VEŠTAČKE INTELIGENCIJE U KONTEKSTU ESG IZVEŠTAVANJA." In 5. naučni skup Računovodstvena znanja kao činilac ekonomskog i društvenog napretka. Ekonomski fakultetUniverziteta u Kragujevcu, 2025. https://doi.org/10.46793/rz25.569v.

Full text
Abstract:
The application of Artificial Intelligence (AI) in ESG reporting represents a significant step towards improving the efficiency and accuracy of data collection, processing, and verification related to sustainability. However, alongside numerous benefits, various risks may jeopardize the integrity of reports and stakeholder trust. This paper analyzes the key risks arising from the use of AI tools in the ESG reporting process, including ethical dilemmas, algorithmic cpacity, the potential for data manipulation, as well as issues related to data privacy and information security. Special attention
APA, Harvard, Vancouver, ISO, and other styles
6

Ding, Ding, Mauro Conti, and Agusti Solanas. "A smart health application and its related privacy issues." In 2016 Smart City Security and Privacy Workshop (SCSP-W). IEEE, 2016. http://dx.doi.org/10.1109/scspw.2016.7509558.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Almeida, Cristiano Paschoalim de, Heder Soares Bernardino, Jairo Francisco de Souza, and Luciana Conceição Dias Campos. "Real-Time Heart Failure Prediction: An Approach for Ambient Assisted Living." In Simpósio Brasileiro de Sistemas de Informação. Sociedade Brasileira de Computação, 2025. https://doi.org/10.5753/sbsi.2025.245972.

Full text
Abstract:
Context: The integration of IoT in healthcare has enhanced the capability of Ambient Assisted Living by enabling reliable real-time health monitoring, particularly for heart failure identification. Predictive models play a crucial role in identifying potential heart failures, improving patient outcomes through continuous monitoring and analysis. Problem: Traditional predictive models rely on centralized servers, facing issues like network latency, disruptions, and data overload. These challenges hinder real-time health data processing, limiting their ability to provide timely heart failure ris
APA, Harvard, Vancouver, ISO, and other styles
8

Koba, Olena. "ECONOMIC SECURITY AND LEVELS OF ITS FORMATION: CONCEPTUAL APPROACHES." In Current issues of economic development: problems, perspectives, international experiences. Publishing House “Baltija Publishing”, 2023. http://dx.doi.org/10.30525/978-9934-26-296-8-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shin, Kang G. "Research Issues and Approaches for Connected and Automated Vehicles." In CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy. ACM, 2017. http://dx.doi.org/10.1145/3029806.3029846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pankomera, Richard, and Darelle van Greunen. "Privacy and security issues for a patient-centric approach in public healthcare in a resource constrained setting." In 2016 IST-Africa Week Conference. IEEE, 2016. http://dx.doi.org/10.1109/istafrica.2016.7530664.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security and Privacy issues and its approaches"

1

Eastman, Brittany. Legal Issues Facing Automated Vehicles, Facial Recognition, and Privacy Rights. SAE International, 2022. http://dx.doi.org/10.4271/epr2022016.

Full text
Abstract:
Facial recognition software (FRS) is a form of biometric security that detects a face, analyzes it, converts it to data, and then matches it with images in a database. This technology is currently being used in vehicles for safety and convenience features, such as detecting driver fatigue, ensuring ride share drivers are wearing a face covering, or unlocking the vehicle. Public transportation hubs can also use FRS to identify missing persons, intercept domestic terrorism, deter theft, and achieve other security initiatives. However, biometric data is sensitive and there are numerous remaining
APA, Harvard, Vancouver, ISO, and other styles
2

Sabatino, Ester, Gustavo Müller, and Gustavo Ramírez Buchheister. The EU’s Approach to Nexus Issues in Conflict Prevention, Mediation and Resolution: Climate, Development and Gender. EsadeGeo. Center for Global Economy and Geopolitics, 2023. https://doi.org/10.56269/202310es.

Full text
Abstract:
This working paper conducts an in-depth analysis of the European Union's (EU) approach to nexus issues in conflict prevention, mediation, and resolution. In the realm of gender and conflict, it emphasises the EU's commitment to mainstreaming gender in its peacebuilding efforts in Guatemala. The EU aims to tackle gender-based violence and enhance women's political and economic participation. Despite its clear objectives, there is a level of ambiguity regarding the alignment of these actions with transformative gender principles, particularly regarding indigenous and rural communities in Latin A
APA, Harvard, Vancouver, ISO, and other styles
3

Desmidt, Sophie, Oriol Puig, Adrien Detges, Pia van Ackern, and Fabien Tondel. Climate change and resilience in the Central Sahel. European Centre for Development Policy Management, 2021. http://dx.doi.org/10.55317/casc011.

Full text
Abstract:
This policy paper summarises the main findings from research conducted under CASCADES on the Central Sahel, covering Burkina Faso, Mali and Niger. This research focused on key climate related challenges in the region, notably with regards to livelihoods, food security, human mobility and human security, including communal conflicts and violent extremism. The main conclusion is that climate change is and will be an important factor for the future of the Central Sahel. Both its current and future impacts, however, are intrinsically linked to socio-economic and political factors that must be emph
APA, Harvard, Vancouver, ISO, and other styles
4

Harangozó, Dániel. Croatia’s defence policy in the shadow of COVID-19 and the Russia-Ukraine war (2020-2023). Magyar Külügyi Intézet, 2023. http://dx.doi.org/10.47683/kkielemzesek.ke-2023.29.

Full text
Abstract:
This paper reviews some of the current issues in Croatian military and defence policy in the period 2020-2023. It concentrates on three topics: defence spending trends and major defence modernization projects, the conflict between the Prime Minister and the President and its effects on the defence system, and Croatia’s reaction to the Russia-Ukraine war. The paper concludes that after a longer period of stagnation and decrease, defence spending has shown an increasing trend since 2020-2021. Defence spending as a share of GDP approaches, and the share of equipment expenditure within defence spe
APA, Harvard, Vancouver, ISO, and other styles
5

Öjendal, Joakim, Monin Nong, Chanmony Sean, Zoe Sidana Bunnath, and Chanrith Ngin. The Political Economy of Land-Water Resource Governance in the Context of Food Security in Cambodia. Cambodia Development Resource Institute, 2023. https://doi.org/10.64202/wp.142.202311.

Full text
Abstract:
Water is central for a variety of livelihoods, development, economic growth, and food production. It is also very important in the large deltas of South and Southeast Asia. Yet, water is turning into a scare resource and global climate change is making its availability more unpredictable. Commercial interests and infrastructure development are also competing for water resources, sometimes at the expense of local smallholders. This report, which is a desk study combined with stakeholder interviews, aims to map out the issues and the previously unknown challenges to efficient water and land mana
APA, Harvard, Vancouver, ISO, and other styles
6

Kira, Beatriz, Rutendo Tavengerwei, and Valary Mumbo. Points à examiner à l'approche des négociations de Phase II de la ZLECAf: enjeux de la politique commerciale numérique dans quatre pays d'Afrique subsaharienne. Digital Pathways at Oxford, 2022. http://dx.doi.org/10.35489/bsg-dp-wp_2022/01.

Full text
Abstract:
Realities such as the COVID-19 pandemic have expedited the move to online operations, highlighting the undeniable fact that the world is continuing to go digital. This emphasises the need for policymakers to regulate in a manner that allows them to harness digital trade benefits while also avoiding associated risk. However, given that digital trade remains unco-ordinated globally, with countries adopting different approaches to policy issues, national regulatory divergence on the matter continues, placing limits on the benefits that countries can obtain from digital trade. Given these disparit
APA, Harvard, Vancouver, ISO, and other styles
7

Lewis, Dustin, Radhika Kapoor, and Naz Modirzadeh. Advancing Humanitarian Commitments in Connection with Countering Terrorism: Exploring a Foundational Reframing concerning the Security Council. Harvard Law School Program on International Law and Armed Conflict, 2021. http://dx.doi.org/10.54813/uzav2714.

Full text
Abstract:
The imperative to provide humanitarian and medical services on an urgent basis in armed conflicts is anchored in moral tenets, shared values, and international rules. States spend tens of billions of dollars each year to help implement humanitarian programs in conflicts across the world. Yet, in practice, counterterrorism objectives increasingly prevail over humanitarian concerns, often resulting in devastating effects for civilian populations in need of aid and protection in war. Not least, confusion and misapprehensions about the power and authority of States relative to the United Nations S
APA, Harvard, Vancouver, ISO, and other styles
8

Lambie-Mumford, Hannah, Rachel Loopstra, and Alex Okell. Household food insecurity in the UK: data and research landscape. Food Standards Agency, 2023. http://dx.doi.org/10.46756/sci.fsa.hee561.

Full text
Abstract:
Household food insecurity is a widely used concept in high-income countries to describe “uncertainty about future food availability and access, insufficiency in the amount and kind of food required for a healthy lifestyle, or the need to use socially unacceptable ways to acquire food.” (Anderson, 1990). In the UK, research focused on food insecurity was relatively rare before the rapid spread of food banks and growing usage from 2010 but since then, has burgeoned (Loopstra and Lambie-Mumford, 2023). There was very little peer-reviewed literature on the topic in the UK when DEFRA commissioned a
APA, Harvard, Vancouver, ISO, and other styles
9

Private sector and food security. Commercial Agriculture for Smallholders and Agribusiness (CASA), 2023. http://dx.doi.org/10.1079/20240191178.

Full text
Abstract:
The global community is facing escalating acute food insecurity crises, predominantly in Sub- Saharan Africa, due to climate change, the Russia-Ukraine conflict, and COVID-19 shocks. Related impacts on donor government budgets, domestic conflicts and limited fiscal capacity in countries already experiencing acute food insecurity, often on top of high chronic food insecurity levels, further exacerbate the issue. This policy brief examines the potential of private sector financing to alleviate acute food insecurity, through providing a targeted review of key mechanisms for mobilizing private sec
APA, Harvard, Vancouver, ISO, and other styles
10

Cybersecurity: Are We Ready in Latin America and the Caribbean? Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0006517.

Full text
Abstract:
The manner in which nation states and regions address cybersecurity capacity is essential for effective, efficient, and sustainable cybersecurity. The 2016 Cybersecurity Report is the result of the collaboration between the Inter-American Development Bank (IDB), the Organization of American States (OAS), and the Global Cyber Security Capacity Centre (GCSCC) at the University of Oxford. The report presents a complete picture and update on the status of cybersecurity (risks, challenges, and opportunities) of Latin America and the Caribbean countries. The first section consists of a series of ess
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!