Showing 1 - 20 results of 25 for search '"data breach"', query time: 0.06s Refine Results
  1. 1
  2. 2

    Load-Balanced Secure Routing Protocol for Wireless Sensor Networks by Wang Xin-sheng, Zhan Yong-zhao, Wang Liang-min

    Published 2013-06-01
    “…Depending on characters of hops, the nodes can rapidly find a route among multiple optimal routes by the policy of the twice probability routing selection. Data breach is prevented by data encryption, and data security is realized by one-way hash key chain and symmetric key authentication. …”
    Get full text
    Article
  3. 3

    Challenges and Opportunities for Data Sharing Related to Artificial Intelligence Tools in Health Care in Low- and Middle-Income Countries: Systematic Review and Case Study From Tha... by Aprajita Kaushik, Capucine Barcellona, Nikita Kanumoory Mandyam, Si Ying Tan, Jasper Tromp

    Published 2025-02-01
    “…Key solutions included building a conducive digital ecosystem—having shared data input platforms for health facilities to ensure data uniformity and to develop easy-to-understand consent forms, having standardized guidelines for data sharing, and having compensation policies for data breach victims. ConclusionsAlthough AI in LMICs has the potential to overcome health inequalities, these countries face technical, political, legal, policy, and organizational barriers to sharing data, which impede effective AI development and deployment. …”
    Get full text
    Article
  4. 4

    Personal data security as a form of legal certainty for the fulfillment of consumer rights for online loans by N.G.N. Renti Maharaini Kerti

    Published 2024-10-01
    “…Personal data security has become a very important issue, given the many cases of data breaches that can harm consumers. This study aims to analyse the role of personal data security in the fulfilment of consumer rights in online lending services, as well as to evaluate the existing legal certainty related to consumer personal data protection. …”
    Get full text
    Article
  5. 5

    Implementation of Coding Theory with The Extended Hamming Code in Steganography by Nurul Jannah, Nur Hamid

    Published 2024-01-01
    “…Data security needs to be considered to avoid noise when sending data or data breaches by hackers. In this article, we implement data security using a combination of coding theory and steganography. …”
    Get full text
    Article
  6. 6

    Enhancing data security and protection in marketing: a comparative analysis of Golang and PHP approaches by ROBU Elena

    Published 2023-11-01
    “…We delve into the importance of data security in marketing, highlighting the potential risks and consequences of data breaches. The paper provides an overview of Golang and PHP, discussing their security features, performance, and scalability. …”
    Get full text
    Article
  7. 7

    Artificial Intelligence in Public Relations: Potential Benefits and Drawbacks by Ömer Faruk Zararsız

    Published 2024-06-01
    “…However, the use of artificial intelligence also poses potential threats in areas that are crucial to the success of public relations, such as propaganda, privacy, data breaches, ethics, disinformation, and misinformation. …”
    Get full text
    Article
  8. 8

    Exploring the Potential of Blockchain Technology in an IoT-Enabled Environment: A Review by Deepak, Preeti Gulia, Nasib Singh Gill, Mohammad Yahya, Punit Gupta, Prashant Kumar Shukla, Piyush Kumar Shukla

    Published 2024-01-01
    “…However, security concerns in IoT systems are significant, as compromised devices can lead to data breaches and privacy violations. Blockchain technology can enhance IoT security by providing decentralized consensus, immutability, and transparent transaction records, ensuring secure and trustworthy communication and data integrity. …”
    Get full text
    Article
  9. 9

    Integrating artificial intelligence into healthcare systems: opportunities and challenges by Bongs Lainjo

    Published 2024-10-01
    “…While tools like telemedicine and remote patient monitoring improve access to care, they also increase the risk of unauthorized data breaches. To address these concerns, healthcare organizations must promote a culture of accountability, ensuring that healthcare providers remain vigilant about patient data security. …”
    Get full text
    Article
  10. 10

    Integration of Artificial Intelligence and Blockchain Technology in Healthcare and Agriculture by Sonali Vyas, Mohammad Shabaz, Prajjawal Pandit, L. Rama Parvathy, Isaac Ofori

    Published 2022-01-01
    “…On the other side, intelligent healthcare systems are incredibly vulnerable to data breaches and other malicious assaults. Recently, blockchain technology has emerged as a potentially transformative option for enhancing data management, access control, and integrity inside healthcare systems. …”
    Get full text
    Article
  11. 11

    Crypto Deep Ring Topology Firewall in Sensitive Data Transmission and Retrieval in Cloud by Vikas K. Soman, V. Natarajan

    Published 2024-01-01
    “…To prevent this attack on the cloud data, this manuscript proposes a crypto deep ring topology firewall to protect the cloud from data breaches. The data transmission has been performed using egress ring topology crypto encryption that solves the difficulty in isolating the traffic path between the edge and cloud network. …”
    Get full text
    Article
  12. 12

    Mitigating Cyber Risks in AI-Driven Circular Economy Implementations by Iryna Bashynska, Olha Prokopenko

    Published 2024-12-01
    “…At the same time, the study addresses the cybersecurity risks associated with these systems, including data breaches, system vulnerabilities, and ethical concerns. …”
    Get full text
    Article
  13. 13

    A Secure Framework for Privacy-Preserving Analytics in Healthcare Records Using Zero-Knowledge Proofs and Blockchain in Multi-Tenant Cloud Environments by S. Bharath Babu, K. R. Jothi

    Published 2025-01-01
    “…In the realm of healthcare analytics, preserving the privacy of sensitive data while enabling valuable insights poses a significant challenge, particularly given the increasing prevalence of data breaches and the sensitivity of personal health information. …”
    Get full text
    Article
  14. 14

    Contextual access control based on attribute-based encryption with hidden lattice structure for removable storage media by Bo CHEN, Ling YU, Xiao-hui QIANG, Yan WANG

    Published 2014-04-01
    “…To prevent data breaches via removable storage media, the way to enhance the access control capability of hosts within trusted zone with removable storage media attached was explored. …”
    Get full text
    Article
  15. 15

    South African Electoral Commission’s mobile app for voters: Data privacy and security dimensions by Nawal Omar, Scott Timcke

    Published 2024-12-01
    “…The analysis revealed several security and privacy concerns, including inadequately secured API keys, the potential for unauthorised access, and the potential for data breaches. In addition, the presence of advertising and analytics trackers suggested third-party data-sharing, raising concerns about transparency and user consent. …”
    Get full text
    Article
  16. 16

    Establishing A Personal Data Protection Agency for E-Commerce in Indonesia by Bilqis Laila Nuzul Sa'adah, Sukarmi Sukarmi, Reka Dewantara

    Published 2024-12-01
    “…The findings suggest that the absence of detailed implementation regulations and lack of a specific regulatory body create significant legal uncertainties, exposing users to potential data breaches. Establishing the LPDP is expected to strengthen data protection measures, enhance consumer trust, and provide legal certainty in Indonesia's digital economy. …”
    Get full text
    Article
  17. 17

    DLCDroid an android apps analysis framework to analyse the dynamically loaded code by Rati Bhan, Rajendra Pamula, K Susheel Kumar, Nand Kumar Jyotish, Prasun Chandra Tripathi, Parvez Faruki, Jyoti Gajrani

    Published 2025-01-01
    “…Even the most sophisticated static analysis tools struggle to detect data breaches caused by DLC. Our analysis demonstrates that conventional tools areill-equipped to handle DLC. …”
    Get full text
    Article
  18. 18

    Deep learning technology: enabling safe communication via the internet of things by Ramiz Salama, Hitesh Mohapatra, Tuğşad Tülbentçi, Fadi Al-Turjman

    Published 2025-02-01
    “…Despite offering many advantages, the diversified architecture and wide connectivity of IoT make it vulnerable to various cyberattacks, potentially leading to data breaches and financial loss. Preventing such attacks on the IoT ecosystem is essential to ensuring its security.MethodsThis paper introduces a software-defined network (SDN)-enabled solution for vulnerability discovery in IoT systems, leveraging deep learning. …”
    Get full text
    Article
  19. 19

    Research on new energy power plant network traffic anomaly detection method based on EMD by Danni Liu, Shengda Wang, YutongLi, Ji Du, Jia Li

    Published 2025-01-01
    “…Methodology This research propose Network Quality Assessment (NQA) traffic management algorithms to prevent illegal access and data breaches, this involves strong security measures such as encryption, firewalls, and encrypted communication methods. …”
    Get full text
    Article
  20. 20

    Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging by Ikram Benfarhat, Vik Tor Goh, Chun Lim Siow, Muhammad Sheraz, Teong Chee Chuah

    Published 2025-01-01
    “…These issues are particularly critical in electric vehicle charging stations (EVCSs) due to the sensitive data involved, such as data breaches, unauthorized access, and privacy concerns. …”
    Get full text
    Article