Gotowa bibliografia na temat „Security and Privacy issues and its approaches”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Security and Privacy issues and its approaches”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Security and Privacy issues and its approaches"

1

Kanika*1, Alka Agrawal2 &. R.A. Khan3. "AN OVERVIEW OF PRIVACY PRESERVATION IN BIG DATA." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 7 (2017): 61–71. https://doi.org/10.5281/zenodo.822970.

Pełny tekst źródła
Streszczenie:
Mobile with mega pixel cameras, social networking sites, wireless sensor networks, earth-orbiting satellites, finance market etc continuously generating more and more data than ever before: 90% of world’s data has been produced in last two years. This huge amount of data is generated by different sources. Verification, authorization, authenticity, privacy such types of security issues is becoming major concern of big data in heterogeneous environments. To maintain the authenticity and preserve privacy of large amount of data is always an issue. In this paper authors discussed the data privacy
Style APA, Harvard, Vancouver, ISO itp.
2

Baig, Ahmed Fraz, and Sigurd Eskeland. "Security, Privacy, and Usability in Continuous Authentication: A Survey." Sensors 21, no. 17 (2021): 5967. http://dx.doi.org/10.3390/s21175967.

Pełny tekst źródła
Streszczenie:
Continuous authentication has been proposed as a possible approach for passive and seamless user authentication, using sensor data comprising biometric, behavioral, and context-oriented characteristics. Since these are personal data being transmitted and are outside the control of the user, this approach causes privacy issues. Continuous authentication has security challenges concerning poor matching rates and susceptibility of replay attacks. The security issues are mainly poor matching rates and the problems of replay attacks. In this survey, we present an overview of continuous authenticati
Style APA, Harvard, Vancouver, ISO itp.
3

Ramakrishnan, Mr R. "Privacy Challenges and Solutions in Big Data Analytics: A Comprehensive Review." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 2435–40. http://dx.doi.org/10.22214/ijraset.2024.62103.

Pełny tekst źródła
Streszczenie:
Abstract: Large data collections with a more intricate and diversified structure are referred to as "big data." These traits are typically associated with more challenges when it comes to storing, analyzing, and applying additional procedures or getting results. The technique of analyzing vast quantities of intricate data to uncover patterns or connections that are concealed is known as "big data analytics." Nonetheless, there is a clear conflict between big data's extensive use and its security and privacy. This paper examines privacy needs in big data, distinguishes between privacy and secur
Style APA, Harvard, Vancouver, ISO itp.
4

Mylavathi, G. A., N. M. Mallika, and K. Mohanraj. "Survey of Security and Privacy Issues in Big Data Analytics." Asian Journal of Computer Science and Technology 8, S1 (2019): 33–35. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1972.

Pełny tekst źródła
Streszczenie:
Due to the reasons such as the rapid growth and spread of network services, mobile devices, and online users on the Internet leading to a remarkable increase in the amount of data. Almost each trade is making an attempt to address this large information. Big data phenomenon has begun to gain importance. However, it’s not solely terribly tough to store massive information and analyses them with ancient applications, however conjointly it’s difficult privacy and security issues. For this reason, this paper discusses the massive information, its scheme, considerations on massive information and p
Style APA, Harvard, Vancouver, ISO itp.
5

Abdulsalam, Yunusa Simpa, and Mustapha Hedabou. "Security and Privacy in Cloud Computing: Technical Review." Future Internet 14, no. 1 (2021): 11. http://dx.doi.org/10.3390/fi14010011.

Pełny tekst źródła
Streszczenie:
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of the pay-as-you-go price model. However, outsourcing information and business applications to the cloud or a third party raises security and privacy concerns, which have become critical in adopting cloud implementation and services. Researchers and affected organisations have proposed different security approaches in the literature to tackle the
Style APA, Harvard, Vancouver, ISO itp.
6

Tiwari,, Arun. "Security and Privacy Analysis in Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31055.

Pełny tekst źródła
Streszczenie:
The concept of the Internet of Things (IoT) promises to make all electronic devices smart, connected and capable of functioning together seamlessly courtesy of a worldwide network that links virtual elements with physical ones. Every IoT item in this network has a unique identification number to indicate its position in this system. In addition, connectivity is important for effective coordination with some low-tech gadgets. In this chapter, we shall be discussing the relevant IoT systems and security issues related to them including privacy, security attacks, means of securing IoT environment
Style APA, Harvard, Vancouver, ISO itp.
7

Massis, Bruce. "The Internet of Things and its impact on the library." New Library World 117, no. 3/4 (2016): 289–92. http://dx.doi.org/10.1108/nlw-12-2015-0093.

Pełny tekst źródła
Streszczenie:
Purpose – The purpose of this paper is to consider the Internet of Things (IOT) and its potential impact on libraries. Design/methodology/approach – This paper presents a literature review and a commentary on this topic that have been addressed by professionals, researchers and practitioners. Findings – In communicating the issues when comprehending the scope of the IOT, libraries need not succumb to the sometimes near-hysteria that surrounds the rhetoric regarding security and privacy. But, librarians must actively engage in the conversation and its subsequent actions to respond to patrons wh
Style APA, Harvard, Vancouver, ISO itp.
8

Sivan, Remya, and Zuriati Ahmad Zukarnain. "Security and Privacy in Cloud-Based E-Health System." Symmetry 13, no. 5 (2021): 742. http://dx.doi.org/10.3390/sym13050742.

Pełny tekst źródła
Streszczenie:
Cloud based healthcare computing have changed the face of healthcare in many ways. The main advantages of cloud computing in healthcare are scalability of the required service and the provision to upscale or downsize the data storge, collaborating Artificial Intelligence (AI) and machine learning. The current paper examined various research studies to explore the utilization of intelligent techniques in health systems and mainly focused into the security and privacy issues in the current technologies. Despite the various benefits related to cloud-computing applications for healthcare, there ar
Style APA, Harvard, Vancouver, ISO itp.
9

Tareq, Imad, Bassant M. Elbagoury, Salsabil El-Regaily, and El-Sayed M. El-Horbaty. "A survey about deep learning and federated Learning in cyberse-curity." Periodicals of Engineering and Natural Sciences (PEN) 12, no. 1 (2024): 75–100. https://doi.org/10.21533/pen.v12.i1.23.

Pełny tekst źródła
Streszczenie:
Advances in Artificial Intelligence (AI) technology have led to the strengthening of traditional systems' cybersecurity capabilities in a variety of applications. However, these embedded machine learning models have exposed these systems to a new set of vulnerabilities known as AI assaults. These systems are now attractive targets for cyberattacks, jeopardizing the security and safety of bigger systems that include them. As a result, DL approaches are critical to transitioning network and system protection from providing safe communication between systems to intelligence systems in security. F
Style APA, Harvard, Vancouver, ISO itp.
10

Reddy, Manjunath, Nur Mohammad Ali Chisty, and Anusha Bodepudi. "A Review of Cybersecurity and Biometric Authentication in Cloud Network." Engineering International 10, no. 1 (2022): 9–18. http://dx.doi.org/10.18034/ei.v10i1.652.

Pełny tekst źródła
Streszczenie:
Cloud computing uses few resources to give customers complete distant services via the internet. Data privacy, security, and reliability are major issues with cloud computing. Security is the biggest issue. This study discusses the biometrics framework and safe cloud computing identity management method. This paper discusses cloud computing security challenges and reviews cloud access framework approaches. It describes a novel fingerprint access-based authentication system to protect cloud services from DOS and DDoS attacks. This biometrics-based system can secure cloud services from illegal a
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Security and Privacy issues and its approaches"

1

Cho, Jihoon. "Cryptographic approaches to security and privacy issues in pervasive computing." Thesis, Royal Holloway, University of London, 2014. http://repository.royalholloway.ac.uk/items/7272f105-8c80-462d-95eb-36f3de8ddaad/1/.

Pełny tekst źródła
Streszczenie:
Technological innovation has enabled tiny devices to participate in pervasive com- puting. Such devices are particularly vulnerable to security and privacy threats, because of their limited computing resources and relatively weak physical security. We investigate possible cryptographic solutions to security and privacy problems arising in two kinds of emerging pervasive computing networks: Personal Area Net- works (PANs) and the EPCglobal Network. A number of key management schemes have been proposed for use in PANs, but these schemes only support key management within a PAN. However, as peopl
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Security and Privacy issues and its approaches"

1

Sloot, Bart, and Aviva Groot, eds. The Handbook of Privacy Studies. Amsterdam University Press, 2018. http://dx.doi.org/10.5117/9789462988095.

Pełny tekst źródła
Streszczenie:
The Handbook of Privacy Studies is the first book in the world that brings together several disciplinary perspectives on privacy, such as the legal, ethical, medical, informatics and anthropological perspective. Privacy is in the news almost every day: mass surveillance by intelligence agencies, the use of social media data for commercial profit and political microtargeting, password hacks and identity theft, new data protection regimes, questionable reuse of medical data, and concerns about how algorithms shape the way we think and decide. This book offers interdisciplinary background informa
Style APA, Harvard, Vancouver, ISO itp.
2

Artemov, V., N. Golovanova, A. Gravina, et al. Criminal law and economic activity (ratio of private and public interests). INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1160944.

Pełny tekst źródła
Streszczenie:
The scientific and practical guide is devoted to the formation of a comprehensive and systematic approach to improving the activities of the court and preliminary investigation bodies in cases of crimes committed in the field of business and other economic activities (including taking into account the experience of law enforcement practice in criminal prosecution of entrepreneurs in a number of foreign countries). The problem of establishing a balance between the duties of judicial and investigative bodies within their competence to take measures to ensure economic security and to respect the
Style APA, Harvard, Vancouver, ISO itp.
3

Durakova, Irina, Svetlana Pugach, Aleksandra Mitrofanova, et al. HR Management in Russia: the Policy of diversity and inclusiveness. Book 10. INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1876366.

Pełny tekst źródła
Streszczenie:
The monograph contains the results of research concerning, firstly, the specifics of the formation of the strategy and policy of personnel diversity, the specifics of youth as an object of diversified personnel management; issues of discrimination of employees in the workplace. Secondly, the promotion of scientific thought in the development of a productive model of hybrid employment, solving the problems of motivational HR diversity of public civil servants; determining the prospects for a rational balance of freedom and security in the modern world; presenting a new paradigm for combining wo
Style APA, Harvard, Vancouver, ISO itp.
4

Ortiz, Juan Carlos. Private Armed Forces and Global Security. ABC-CLIO, LLC, 2010. http://dx.doi.org/10.5040/9798216001409.

Pełny tekst źródła
Streszczenie:
Through an array of theoretical approaches and empirical material, this comprehensive and accessible volume surveys private armed forces and directly challenges conventional stereotypes of security contractors. Private Armed Forces and Global Security: A Guide to the Issues is the first book to provide a comprehensive yet accessible survey of the private military groups involved in conflicts worldwide. Organized around four themes, it covers the history of private military forces since 1600, the main contemporary actors and their defining characteristics, the environments in which private arme
Style APA, Harvard, Vancouver, ISO itp.
5

Cadwalader, George. Homeland Security. Edited by Derek S. Reveron, Nikolas K. Gvosdev, and John A. Cloud. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780190680015.013.21.

Pełny tekst źródła
Streszczenie:
The terrorist attacks of September 11, 2001 caused a seismic shift in how the United States organizes and executes the mission of securing the homeland. The creation and growth of the Department of Homeland Security is the most visible manifestation of this change. However, the homeland security discipline contemplates shared responsibilities and a unity of effort among all levels of government, the private sector, and the general public. The wide array of stakeholders, alongside an expanding definition of what constitutes homeland security, presents complex challenges for policymakers. With t
Style APA, Harvard, Vancouver, ISO itp.
6

Ojanperä, Sanna, Eduardo López, and Mark Graham, eds. Human Development and the Data Revolution. Oxford University PressOxford, 2025. https://doi.org/10.1093/oso/9780198879145.001.0001.

Pełny tekst źródła
Streszczenie:
Abstract Human Development and the Data Revolution tackles a topic that in the age of data and digitalization has become timely in global development: what are the potential uses of large-scale data in the contexts of development, in particular, what techniques, data sources, and possibilities exist for harnessing large datasets and new online data to address persistent concerns regarding human development, inequality, exclusion, and participation. It also sheds light into the challenges and obstacles related to the safe and effective use of big data and computational approaches in development
Style APA, Harvard, Vancouver, ISO itp.
7

Baggett, Ryan K., and Brian K. Simpkins. Homeland Security and Critical Infrastructure Protection. Praeger, 2018. http://dx.doi.org/10.5040/9798400666155.

Pełny tekst źródła
Streszczenie:
A compelling overview of systems and strategies implemented to safeguard U.S. resources from a plethora of threats, the vulnerabilities and security gaps in these infrastructure systems, and options to enable the future security of the homeland. Since the first edition of this book was published in 2009, significant changes have occurred in the security landscape, both domestically and internationally. This second edition is thoroughly updated to reflect those changes, offering a complete review of the various security and resilience measures currently in place and potential strategies to safe
Style APA, Harvard, Vancouver, ISO itp.
8

Guitton, Clement. Inside the Enemy's Computer. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190699994.001.0001.

Pełny tekst źródła
Streszczenie:
Attribution — tracing those responsible for a cyber attack — is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on technica
Style APA, Harvard, Vancouver, ISO itp.
9

Lind, Nancy S., and Erik T. Rankin, eds. Privacy in the Digital Age. ABC-CLIO, LLC, 2015. http://dx.doi.org/10.5040/9798216001386.

Pełny tekst źródła
Streszczenie:
A collection of expert essays examines the privacy rights that have been lost in the post-9/11 era—giving students and others the knowledge they need to take back their constitutional protections. This timely two-volume collection shares information every citizen should have, tackling the erosion of privacy rights engendered by the ability of digital technology to intercept, mine, and store personal data, most often without the knowledge of those being monitored. Examining its subject through the lens of Fourth Amendment rights, the work focuses on technological advances that now gather person
Style APA, Harvard, Vancouver, ISO itp.
10

Spinello, Richard A. Regulating Cyberspace. Greenwood Publishing Group, Inc., 2002. http://dx.doi.org/10.5040/9798216006688.

Pełny tekst źródła
Streszczenie:
This visionary book presents an interdisciplinary and cogent approach to the issue of Internet governance and control. By examining five critical areas in which the tension between freedom and control is most palpable—fair competition and open access, free expression, intellectual property, privacy rights, and security—Spinello guides the reader on a tour of the emerging body of law and public policy that has attempted to control the anarchy of cyberspace. In so doing, he defends the credo of Internet self-regulation, asserting that the same powerful and flexible architectures that created the
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Części książek na temat "Security and Privacy issues and its approaches"

1

García, Natalia Borgoñós, María Hernández Padilla, and Antonio Fernando Skarmeta Gómez. "Privacy Preserving Enablers for Data Space Ecosystems." In Communications in Computer and Information Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-78572-6_5.

Pełny tekst źródła
Streszczenie:
Abstract Data Spaces are ecosystems designed to allow multiple organizations or companies to share data in a secure manner. Despite the potential of these technologies, they encounter a number of challenges and privacy issues that limit their use. Privacy Preserving Enablers are mechanisms developed to tackle these difficulties, ensuring data integrity and access control. This paper aims to analyze the role of some Privacy Preserving Enablers and its integration with Connectors in the context of Data Spaces. The research will focus on key enablers, including a Self-Sovereign Identity with Zero
Style APA, Harvard, Vancouver, ISO itp.
2

Schachter, Christel. "Intelligenza Artificiale in Higher Education: applicazioni, sfide e rischi." In Studies on Adult Learning and Education. Firenze University Press, 2024. http://dx.doi.org/10.36253/979-12-215-0504-7.35.

Pełny tekst źródła
Streszczenie:
This contribution represents a synthesis of the literature review conducted on the topic of Artificial Intelligence (AI) in Higher Education, with particular attention to orientation and human learning processes. The analysis has identified two main macro-themes. The first focuses on the current state of the art and future prospects of AI usage in Higher Education, distinguishing between technical and technological approaches and those more pedagogical in nature. Possible benefits emerge - such as increased personalization of orientation, teaching, and learning - although widespread adoption i
Style APA, Harvard, Vancouver, ISO itp.
3

Choudhry, Mani Deepak, M. Sundarrajan, S. Jeevanandham, and V. Saravanan. "Security and Privacy Issues in AI-based Biometric Systems." In AI Based Advancements in Biometrics and its Applications. CRC Press, 2024. http://dx.doi.org/10.1201/9781032702377-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Bonura, Susanna, Davide dalle Carbonare, Roberto Díaz-Morales, Ángel Navia-Vázquez, Mark Purcell, and Stephanie Rossello. "Increasing Trust for Data Spaces with Federated Learning." In Data Spaces. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98636-0_5.

Pełny tekst źródła
Streszczenie:
AbstractDespite the need for data in a time of general digitization of organizations, many challenges are still hampering its shared use. Technical, organizational, legal, and commercial issues remain to leverage data satisfactorily, specially when the data is distributed among different locations and confidentiality must be preserved. Data platforms can offer “ad hoc” solutions to tackle specific matters within a data space. MUSKETEER develops an Industrial Data Platform (IDP) including algorithms for federated and privacy-preserving machine learning techniques on a distributed setup, detecti
Style APA, Harvard, Vancouver, ISO itp.
5

Macwan, Kamalkumar, and Sankita Patel. "Privacy Preservation Approaches for Social Network Data Publishing." In Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72236-4_9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Ohkubo, Miyako, Koutarou Suzuki, and Shingo Kinoshita. "Cryptographic Approaches for Improving Security and Privacy Issues of RFID Systems." In RFID Systems. John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470665251.ch17.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Mohan, Saranga, Sunita Panda, Ambar Bajpai, and Manoj Tolani. "Proactive Security Approaches for IoT in Health Monitoring Applications." In Security and Privacy Issues for IoT and WSN-based Real-time Applications. Chapman and Hall/CRC, 2025. https://doi.org/10.1201/9781003491910-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Takabi, Hassan, James B. D. Joshi, and Gail-Joon Ahn. "Security and Privacy in Cloud Computing." In Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2854-0.ch007.

Pełny tekst źródła
Streszczenie:
Cloud computing paradigm has recently gained tremendous momentum. It has been found very promising for significant cost reduction and the increased operating efficiencies in computing. However, security and privacy issues pose as the key roadblock to its rapid adoption. In this chapter, the authors present the security and privacy challenges in Cloud computing environments and discuss how they are related to various delivery and deployment models, and are exacerbated by the unique aspects of Clouds. The authors also propose a comprehensive security framework for Cloud computing environments an
Style APA, Harvard, Vancouver, ISO itp.
9

Mahanty, Rasmita Kumari, Amrita Budarapu, Nayan Rai, and C. Bhagyashree. "Innovative Approaches in Early Detection of Depression." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-6996-8.ch010.

Pełny tekst źródła
Streszczenie:
This chapter study is about Depression and it's a prevalent and significant medical disorder that significantly affects emotions, thoughts, and behaviors. As such, early detection and care are necessary to limit its severe repercussions, which include suicide and self-harm. Determining who is suffering from mental health issues is a difficult task that has historically relied on techniques such as patient interviews and Depression, Anxiety, and Stress (DAS) scores. Acknowledging the shortcomings of these traditional methods, this study seeks to develop a model designed especially for the early
Style APA, Harvard, Vancouver, ISO itp.
10

Vikash, Lalita Mishra, and Shirshu Varma. "Middleware Approach to Enhance the Security and Privacy in the Internet of Things." In Security and Privacy Issues in Sensor Networks and IoT. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-0373-7.ch007.

Pełny tekst źródła
Streszczenie:
Internet of things is one of the most rapidly growing research areas. Nowadays, IoT is applicable in various diverse areas because of its basic feature i.e., anything would be available to anyone at anytime. Further, IoT aims to provide service in a pervasive environment, although different problems crop up when the researchers move towards pervasiveness. Security and Privacy are the most intense problems in the field of IoT. There are various approaches available to handle these issues: Architectural security, Database security, Secure communication, and Middleware approaches. This chapter's
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Security and Privacy issues and its approaches"

1

Marcillo, Pablo, Ángel Leonardo Valdivieso Caraguay, and Myriam Hernandez-Alvarez. "Security in Vehicle-to-Infrastructure Communications." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002210.

Pełny tekst źródła
Streszczenie:
By 2020, the number of connected vehicles will reach 250 million units. Thus, one of five vehicles worldwide will count on any wireless connection. Functional areas such as telecommunications, infotainment, automatic driving, or mobility services will have to face the implications caused by that growth. As long as vehicles require exchanging information with other vehicles or accessing external networks through a communication infrastructure, these vehicles must be part of a network. A VANET is a type of mobile network formed by base stations known as Road Side Units (RSU) and vehicles equippe
Style APA, Harvard, Vancouver, ISO itp.
2

S, Divya, and Gini R. "Enhancing Data Security in Cloud Computing using Block chain." In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/kjqt5979/ngcesi23p26.

Pełny tekst źródła
Streszczenie:
Block chain (BC) and Software Defined Networking (SDN) are some of the most prominent emerging technologies in recent research. These technologies provide security, integrity, as well as confidentiality in their respective applications. Cloud computing has also been a popular comprehensive technology for several years. Confidential information is often shared with the cloud infrastructure to give customers access to remote resources, such as computation and storage operations. However, cloud computing also presents substantial security threats, issues, and challenges. Therefore, to overcome th
Style APA, Harvard, Vancouver, ISO itp.
3

Gupta, Aarya, and Eshaan Sarda. "Empirical Study on the Role of AI in Modern Education." In Transforming Knowledge: A Multidisciplinary Research on Integrative Learning Across Disciplines. The Bhopal School of Social Sciences, 2025. https://doi.org/10.51767/ic250458.

Pełny tekst źródła
Streszczenie:
Purpose: This research paper aims to explore the evolving role of AI in modern education, analyzing its impact on personalized learning, intelligent tutoring, automated grading, student support, accessibility, and predictive analytics. It will examine how AI-driven tools enhance engagement, improve efficiency, and transform traditional teaching methods. Additionally, the paper will address ethical concerns, such as data privacy, AI biases, and over-reliance on technology. A key challenge discussed will be the financial burden of AI adoption, including costs associated with AI-powered applicati
Style APA, Harvard, Vancouver, ISO itp.
4

Gupta, Aarya, and Eshaan Sarda. "Empirical Study On The Role of AI In Modern Education." In Transforming Knowledge: A Multidisciplinary Research on Integrative Learning Across Disciplines. The Bhopal School of Social Sciences, 2025. https://doi.org/10.51767/ic250461.

Pełny tekst źródła
Streszczenie:
Purpose This research paper aims to explore the evolving role of AI in modern education, analyzing its impact on personalized learning, intelligent tutoring, automated grading, student support, accessibility, and predictive analytics. It will examine how AI-driven tools enhance engagement, improve efficiency, and transform traditional teaching methods. Additionally, the paper will address ethical concerns, such as data privacy, AI biases, and over-reliance on technology. A key challenge discussed will be the financial burden of AI adoption, including costs associated with AI-powered applicatio
Style APA, Harvard, Vancouver, ISO itp.
5

Vićentijević, Kosana. "RIZICI PRIMENE VEŠTAČKE INTELIGENCIJE U KONTEKSTU ESG IZVEŠTAVANJA." In 5. naučni skup Računovodstvena znanja kao činilac ekonomskog i društvenog napretka. Ekonomski fakultetUniverziteta u Kragujevcu, 2025. https://doi.org/10.46793/rz25.569v.

Pełny tekst źródła
Streszczenie:
The application of Artificial Intelligence (AI) in ESG reporting represents a significant step towards improving the efficiency and accuracy of data collection, processing, and verification related to sustainability. However, alongside numerous benefits, various risks may jeopardize the integrity of reports and stakeholder trust. This paper analyzes the key risks arising from the use of AI tools in the ESG reporting process, including ethical dilemmas, algorithmic cpacity, the potential for data manipulation, as well as issues related to data privacy and information security. Special attention
Style APA, Harvard, Vancouver, ISO itp.
6

Ding, Ding, Mauro Conti, and Agusti Solanas. "A smart health application and its related privacy issues." In 2016 Smart City Security and Privacy Workshop (SCSP-W). IEEE, 2016. http://dx.doi.org/10.1109/scspw.2016.7509558.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Almeida, Cristiano Paschoalim de, Heder Soares Bernardino, Jairo Francisco de Souza, and Luciana Conceição Dias Campos. "Real-Time Heart Failure Prediction: An Approach for Ambient Assisted Living." In Simpósio Brasileiro de Sistemas de Informação. Sociedade Brasileira de Computação, 2025. https://doi.org/10.5753/sbsi.2025.245972.

Pełny tekst źródła
Streszczenie:
Context: The integration of IoT in healthcare has enhanced the capability of Ambient Assisted Living by enabling reliable real-time health monitoring, particularly for heart failure identification. Predictive models play a crucial role in identifying potential heart failures, improving patient outcomes through continuous monitoring and analysis. Problem: Traditional predictive models rely on centralized servers, facing issues like network latency, disruptions, and data overload. These challenges hinder real-time health data processing, limiting their ability to provide timely heart failure ris
Style APA, Harvard, Vancouver, ISO itp.
8

Koba, Olena. "ECONOMIC SECURITY AND LEVELS OF ITS FORMATION: CONCEPTUAL APPROACHES." In Current issues of economic development: problems, perspectives, international experiences. Publishing House “Baltija Publishing”, 2023. http://dx.doi.org/10.30525/978-9934-26-296-8-11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Shin, Kang G. "Research Issues and Approaches for Connected and Automated Vehicles." In CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy. ACM, 2017. http://dx.doi.org/10.1145/3029806.3029846.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Pankomera, Richard, and Darelle van Greunen. "Privacy and security issues for a patient-centric approach in public healthcare in a resource constrained setting." In 2016 IST-Africa Week Conference. IEEE, 2016. http://dx.doi.org/10.1109/istafrica.2016.7530664.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Security and Privacy issues and its approaches"

1

Eastman, Brittany. Legal Issues Facing Automated Vehicles, Facial Recognition, and Privacy Rights. SAE International, 2022. http://dx.doi.org/10.4271/epr2022016.

Pełny tekst źródła
Streszczenie:
Facial recognition software (FRS) is a form of biometric security that detects a face, analyzes it, converts it to data, and then matches it with images in a database. This technology is currently being used in vehicles for safety and convenience features, such as detecting driver fatigue, ensuring ride share drivers are wearing a face covering, or unlocking the vehicle. Public transportation hubs can also use FRS to identify missing persons, intercept domestic terrorism, deter theft, and achieve other security initiatives. However, biometric data is sensitive and there are numerous remaining
Style APA, Harvard, Vancouver, ISO itp.
2

Sabatino, Ester, Gustavo Müller, and Gustavo Ramírez Buchheister. The EU’s Approach to Nexus Issues in Conflict Prevention, Mediation and Resolution: Climate, Development and Gender. EsadeGeo. Center for Global Economy and Geopolitics, 2023. https://doi.org/10.56269/202310es.

Pełny tekst źródła
Streszczenie:
This working paper conducts an in-depth analysis of the European Union's (EU) approach to nexus issues in conflict prevention, mediation, and resolution. In the realm of gender and conflict, it emphasises the EU's commitment to mainstreaming gender in its peacebuilding efforts in Guatemala. The EU aims to tackle gender-based violence and enhance women's political and economic participation. Despite its clear objectives, there is a level of ambiguity regarding the alignment of these actions with transformative gender principles, particularly regarding indigenous and rural communities in Latin A
Style APA, Harvard, Vancouver, ISO itp.
3

Desmidt, Sophie, Oriol Puig, Adrien Detges, Pia van Ackern, and Fabien Tondel. Climate change and resilience in the Central Sahel. European Centre for Development Policy Management, 2021. http://dx.doi.org/10.55317/casc011.

Pełny tekst źródła
Streszczenie:
This policy paper summarises the main findings from research conducted under CASCADES on the Central Sahel, covering Burkina Faso, Mali and Niger. This research focused on key climate related challenges in the region, notably with regards to livelihoods, food security, human mobility and human security, including communal conflicts and violent extremism. The main conclusion is that climate change is and will be an important factor for the future of the Central Sahel. Both its current and future impacts, however, are intrinsically linked to socio-economic and political factors that must be emph
Style APA, Harvard, Vancouver, ISO itp.
4

Harangozó, Dániel. Croatia’s defence policy in the shadow of COVID-19 and the Russia-Ukraine war (2020-2023). Magyar Külügyi Intézet, 2023. http://dx.doi.org/10.47683/kkielemzesek.ke-2023.29.

Pełny tekst źródła
Streszczenie:
This paper reviews some of the current issues in Croatian military and defence policy in the period 2020-2023. It concentrates on three topics: defence spending trends and major defence modernization projects, the conflict between the Prime Minister and the President and its effects on the defence system, and Croatia’s reaction to the Russia-Ukraine war. The paper concludes that after a longer period of stagnation and decrease, defence spending has shown an increasing trend since 2020-2021. Defence spending as a share of GDP approaches, and the share of equipment expenditure within defence spe
Style APA, Harvard, Vancouver, ISO itp.
5

Öjendal, Joakim, Monin Nong, Chanmony Sean, Zoe Sidana Bunnath, and Chanrith Ngin. The Political Economy of Land-Water Resource Governance in the Context of Food Security in Cambodia. Cambodia Development Resource Institute, 2023. https://doi.org/10.64202/wp.142.202311.

Pełny tekst źródła
Streszczenie:
Water is central for a variety of livelihoods, development, economic growth, and food production. It is also very important in the large deltas of South and Southeast Asia. Yet, water is turning into a scare resource and global climate change is making its availability more unpredictable. Commercial interests and infrastructure development are also competing for water resources, sometimes at the expense of local smallholders. This report, which is a desk study combined with stakeholder interviews, aims to map out the issues and the previously unknown challenges to efficient water and land mana
Style APA, Harvard, Vancouver, ISO itp.
6

Kira, Beatriz, Rutendo Tavengerwei, and Valary Mumbo. Points à examiner à l'approche des négociations de Phase II de la ZLECAf: enjeux de la politique commerciale numérique dans quatre pays d'Afrique subsaharienne. Digital Pathways at Oxford, 2022. http://dx.doi.org/10.35489/bsg-dp-wp_2022/01.

Pełny tekst źródła
Streszczenie:
Realities such as the COVID-19 pandemic have expedited the move to online operations, highlighting the undeniable fact that the world is continuing to go digital. This emphasises the need for policymakers to regulate in a manner that allows them to harness digital trade benefits while also avoiding associated risk. However, given that digital trade remains unco-ordinated globally, with countries adopting different approaches to policy issues, national regulatory divergence on the matter continues, placing limits on the benefits that countries can obtain from digital trade. Given these disparit
Style APA, Harvard, Vancouver, ISO itp.
7

Lewis, Dustin, Radhika Kapoor, and Naz Modirzadeh. Advancing Humanitarian Commitments in Connection with Countering Terrorism: Exploring a Foundational Reframing concerning the Security Council. Harvard Law School Program on International Law and Armed Conflict, 2021. http://dx.doi.org/10.54813/uzav2714.

Pełny tekst źródła
Streszczenie:
The imperative to provide humanitarian and medical services on an urgent basis in armed conflicts is anchored in moral tenets, shared values, and international rules. States spend tens of billions of dollars each year to help implement humanitarian programs in conflicts across the world. Yet, in practice, counterterrorism objectives increasingly prevail over humanitarian concerns, often resulting in devastating effects for civilian populations in need of aid and protection in war. Not least, confusion and misapprehensions about the power and authority of States relative to the United Nations S
Style APA, Harvard, Vancouver, ISO itp.
8

Lambie-Mumford, Hannah, Rachel Loopstra, and Alex Okell. Household food insecurity in the UK: data and research landscape. Food Standards Agency, 2023. http://dx.doi.org/10.46756/sci.fsa.hee561.

Pełny tekst źródła
Streszczenie:
Household food insecurity is a widely used concept in high-income countries to describe “uncertainty about future food availability and access, insufficiency in the amount and kind of food required for a healthy lifestyle, or the need to use socially unacceptable ways to acquire food.” (Anderson, 1990). In the UK, research focused on food insecurity was relatively rare before the rapid spread of food banks and growing usage from 2010 but since then, has burgeoned (Loopstra and Lambie-Mumford, 2023). There was very little peer-reviewed literature on the topic in the UK when DEFRA commissioned a
Style APA, Harvard, Vancouver, ISO itp.
9

Private sector and food security. Commercial Agriculture for Smallholders and Agribusiness (CASA), 2023. http://dx.doi.org/10.1079/20240191178.

Pełny tekst źródła
Streszczenie:
The global community is facing escalating acute food insecurity crises, predominantly in Sub- Saharan Africa, due to climate change, the Russia-Ukraine conflict, and COVID-19 shocks. Related impacts on donor government budgets, domestic conflicts and limited fiscal capacity in countries already experiencing acute food insecurity, often on top of high chronic food insecurity levels, further exacerbate the issue. This policy brief examines the potential of private sector financing to alleviate acute food insecurity, through providing a targeted review of key mechanisms for mobilizing private sec
Style APA, Harvard, Vancouver, ISO itp.
10

Cybersecurity: Are We Ready in Latin America and the Caribbean? Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0006517.

Pełny tekst źródła
Streszczenie:
The manner in which nation states and regions address cybersecurity capacity is essential for effective, efficient, and sustainable cybersecurity. The 2016 Cybersecurity Report is the result of the collaboration between the Inter-American Development Bank (IDB), the Organization of American States (OAS), and the Global Cyber Security Capacity Centre (GCSCC) at the University of Oxford. The report presents a complete picture and update on the status of cybersecurity (risks, challenges, and opportunities) of Latin America and the Caribbean countries. The first section consists of a series of ess
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!