نتایج جستجو برای: security and privacy

تعداد نتایج: 16851797  

2015
Abubakar Bello Garba Jocelyn Armarego David Murray

BYOD is a growing trend in corporate environments, where employees bring their own devices to work. Factors that have led to the growing popularity of BYOD include the benefits of work flexibility, increased productivity, and efficiency of employees. Despite these benefits, there are concerns over information security and privacy. Since BYOD allows employees to access organisational data anytim...

Journal: :Computer Standards & Interfaces 2014
Christos Kalloniatis Haralambos Mouratidis Vassilis Manousakis Shareeful Islam Stefanos Gritzalis Evangelia Kavakli

Cloud computing is without a doubt one of the most significant innovations presented in the global technological map. This new generation of technology has the potential to positively change our lives since on the one hand it provides capabilities that make our digital lives much easier, than before, while on the other hand it assists developers in creating services that can be disseminated eas...

2013
Dileep Kumar Singh Vishnu Swaroop Madan Mohan Malaviya

Database mining can be defined as the process of mining for implicit, formerly unidentified, and potentially essential information from awfully huge databases by efficient knowledge discovery techniques. The privacy and security of user information have become significant public policy anxieties and these anxieties are receiving increased interest by the both public and government lawmaker and ...

Journal: :International Journal of Human Capital and Information Technology Professionals 2016

Journal: :Lecture Notes in Computer Science 2021

Journal: :Sustainability 2023

The world is currently at the dawn of a new era characterized by global transformation reshaping how we interact with our surroundings and each other [...]

Journal: :IEEE open journal of the Communications Society 2021

Although the fifth generation (5G) wireless networks are yet to be fully investigated, visionaries of 6th (6G) echo systems have already come into discussion. Therefore, in order consolidate and solidify security privacy 6G networks, we survey how may impact envisioned systems, possible challenges with different technologies, potential solutions. We provide our vision on key performance indicat...

2001
V. ZORKADIS E. SIOUGLE

The rapid development and extensive use of digital technologies, electronic mail, Internet and mobile communication systems, and electronic commerce applications lead to the collection and processing of huge amounts of personal data. The increasing reliance on the information systems conducts to the selection of security controls, that are driven by the business needs and the associated securit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید