نتایج جستجو برای: security and privacy
تعداد نتایج: 16851797 فیلتر نتایج به سال:
BYOD is a growing trend in corporate environments, where employees bring their own devices to work. Factors that have led to the growing popularity of BYOD include the benefits of work flexibility, increased productivity, and efficiency of employees. Despite these benefits, there are concerns over information security and privacy. Since BYOD allows employees to access organisational data anytim...
Cloud computing is without a doubt one of the most significant innovations presented in the global technological map. This new generation of technology has the potential to positively change our lives since on the one hand it provides capabilities that make our digital lives much easier, than before, while on the other hand it assists developers in creating services that can be disseminated eas...
Database mining can be defined as the process of mining for implicit, formerly unidentified, and potentially essential information from awfully huge databases by efficient knowledge discovery techniques. The privacy and security of user information have become significant public policy anxieties and these anxieties are receiving increased interest by the both public and government lawmaker and ...
The world is currently at the dawn of a new era characterized by global transformation reshaping how we interact with our surroundings and each other [...]
Although the fifth generation (5G) wireless networks are yet to be fully investigated, visionaries of 6th (6G) echo systems have already come into discussion. Therefore, in order consolidate and solidify security privacy 6G networks, we survey how may impact envisioned systems, possible challenges with different technologies, potential solutions. We provide our vision on key performance indicat...
The rapid development and extensive use of digital technologies, electronic mail, Internet and mobile communication systems, and electronic commerce applications lead to the collection and processing of huge amounts of personal data. The increasing reliance on the information systems conducts to the selection of security controls, that are driven by the business needs and the associated securit...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید