Search

Your search keyword '"data security"' showing total 682 results

Search Constraints

Start Over You searched for: Descriptor "data security" Remove constraint Descriptor: "data security" Database OAIster Remove constraint Database: OAIster
682 results on '"data security"'

Search Results

1. Edge Computing for Real-Time Data Analytics: Exploring the Use of Edge Computing to Enable Real-Time Data Analytics in IoT Applications

2. The Use of Artificial Intelligence in Human Resources Processes as Part of Sustainable Development: Political and Organizational Aspects

3. HIPAA: A Demand to Modernize Health Legislation

4. Data Security Risk Assessment and Response Strategy for Large Language Models

5. Investigating Security Measures in Common Data Environments: Insights from AEC Industry Case Studies

6. Permission-Based Dynamic Access Control Models for Enhanced Data Security : Integrating Contextual Awareness and Role Flexibility for Secure Healthcare Data Management

7. Investigating Security Measures in Common Data Environments: Insights from AEC Industry Case Studies

8. Exploring Apple's Marketing Strategies Through the Lens of Maslow's Hierarchy of Needs : A Qualitative Study on Apple's Marketing Strategies and Consumer Needs

9. Exploring individual privacy concerns in mixed reality use situations : A qualitative study

10. Databaserat värdeskapande i rörelse : Potentialen i fordonsdata som öppna data

11. Introducing Generative Artificial Intelligence in Tech Organizations : Developing and Evaluating a Proof of Concept for Data Management powered by a Retrieval Augmented Generation Model in a Large Language Model for Small and Medium-sized Enterprises in Tech

12. Permission-Based Dynamic Access Control Models for Enhanced Data Security : Integrating Contextual Awareness and Role Flexibility for Secure Healthcare Data Management

13. Edge Computing for Real-Time Data Analytics: Exploring the Use of Edge Computing to Enable Real-Time Data Analytics in IoT Applications

14. Edge Computing for Real-Time Data Analytics: Exploring the Use of Edge Computing to Enable Real-Time Data Analytics in IoT Applications

15. Databaserat värdeskapande i rörelse : Potentialen i fordonsdata som öppna data

16. The Use of Artificial Intelligence in Human Resources Processes as Part of Sustainable Development: Political and Organizational Aspects

17. Introducing Generative Artificial Intelligence in Tech Organizations : Developing and Evaluating a Proof of Concept for Data Management powered by a Retrieval Augmented Generation Model in a Large Language Model for Small and Medium-sized Enterprises in Tech

18. The Use of Artificial Intelligence in Human Resources Processes as Part of Sustainable Development: Political and Organizational Aspects

19. Digitalkompetenzen von Grundschulkindern: Unfassbar und vermessen?!

20. Data governance for smart cities in China: the case of Shenzhen

21. Fintech Analysis of Personal Finance App Usage among Millennials

22. Fintech Analysis of Personal Finance App Usage among Millennials

23. Analysis and Utilization of the Base64 Algorithm for Image Encryption and Decryption Security in Web-Based Images

24. Analysis and Utilization of the Base64 Algorithm for Image Encryption and Decryption Security in Web-Based Images

25. Implementing SAP on Cloud: Leveraging Security and Privacy Technologies for Seamless Data Integration and Protection

26. Implementing SAP on Cloud: Leveraging Security and Privacy Technologies for Seamless Data Integration and Protection

27. Privacy-Preserving Federated Learning model for healthcare data

28. OODOOLL : Exploring the Potential of Data Physicalisations to Increase Awareness and Control of Personal Data Privacy

29. Evaluating the Ownership of Personal data in the Cloud by Optimizing the IT Architecture : Applying a reference architecture to make the ownership of personal data more clear within an organization

30. Securing Data in a Cloud Environment: Access Control, Encryption, and Immutability

31. A Survey on Cyber Security Threats and its Impact on Society

32. Skydd och incidentrespons inom IT-säkerhet : En studie kring utvecklingen av ransomware

33. Skydd och incidentrespons inom IT-säkerhet : En studie kring utvecklingen av ransomware

34. In-Depth Analysis of Encryption Techniques for the Protection of Mobile Health Care Applications

35. Methodology for Acquisition and Handling of Private Data

36. KONSEP AUPB UNTUK KEAMANAN DATA DALAM STANDARDISASI DAN SISTEM GEOCODING ALAMAT PERKOTAAN DAN PERDESAAN INDONESIA

37. Teknologian hyödyntämiseen liittyvä yksityisyydensuoja, tietoturva ja -suoja ikääntyneiden kotipalveluissa:kyselytutkimus johtajille

38. Role of Analytics in Supply Chain Management Industry in Lithuania: Big Data Analytics & AI

39. KONSEP AUPB UNTUK KEAMANAN DATA DALAM STANDARDISASI DAN SISTEM GEOCODING ALAMAT PERKOTAAN DAN PERDESAAN INDONESIA

40. Cloud IT Security Audit Strategies

41. Role of Analytics in Supply Chain Management Industry in Lithuania: Big Data Analytics & AI

42. Attribute-based Approaches for Secure Data Sharing in the Industry

43. Analysis and Utilization of the Base64 Algorithm for Image Encryption and Decryption Security in Web-Based Images

44. Analysis and Utilization of the Base64 Algorithm for Image Encryption and Decryption Security in Web-Based Images

45. The internet of toys: Working towards best practice in digital governance and the recognition of children’s rights in mediated contexts

46. Implementasi Sistem Keamanan File Menggunakan Algoritma AES untuk Mengamankan File Pribadi: Implementasi Sistem Keamanan File Menggunakan Algoritma AES untuk Mengamankan File Pribadi

47. Implementasi Sistem Keamanan File Menggunakan Algoritma AES untuk Mengamankan File Pribadi: Implementasi Sistem Keamanan File Menggunakan Algoritma AES untuk Mengamankan File Pribadi

48. Evaluating the Ownership of Personal data in the Cloud by Optimizing the IT Architecture : Applying a reference architecture to make the ownership of personal data more clear within an organization

49. OODOOLL : Exploring the Potential of Data Physicalisations to Increase Awareness and Control of Personal Data Privacy

50. Securing Data in a Cloud Environment: Access Control, Encryption, and Immutability

Catalog

Books, media, physical & digital resources