Listar por tema "Security of data"
Mostrando ítems 1-11 de 11
-
Contribution of corporate social responsibility to information security management
(2009)Contemporary societies develop scepticism about the social responsibility of businesses. There are expectations that firms/corporations/industries/ companies make more than just economic contributions. In the area of ... -
Data protection in smart cities: Application of the EU GDPR
(2019)Urban growth, combined with the development of digital technology, has led to the recent boom of smart cities worldwide. Smart cities make use of all available information and communications technology in the built environment ... -
Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers
(2007)Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performance of wireless networks, with effects similar to those of Denial of Service (DoS) attacks. In this paper we consider the ... -
The economic notion of trust
(2010)It is apprehended that the human element of trust is becoming the number one asset for the financial organisations. And since trust is a matter of relationships, financial organisations need to create, expand and maintain ... -
Elements of TinyML on Constrained Resource Hardware
(2022)The next phase of intelligent computing could be entirely reliant on the Internet of Things (IoT). The IoT is critical in changing industries into smarter entities capable of providing high-quality services and products. ... -
The importance of biometric sensor continuous secure monitoring
(2008)The security of a biometric information system depends partially on the ability of the biometric information sensor to authenticate itself securely to the processing centre it usually interacts with, thus ensuring that the ... -
The Insider Threat: Reasons, Effects and Mitigation Techniques
(2020)The insider threat is increasingly becoming extremely important for companies, organizations and even governments. A malicious, or even a careless, insider can cause severe damage to the resources and the reputation of an ... -
Modelling cyber-risk in an economic perspective
(2021)In this paper, we present a theoretical approach concerning the econometric modelling for the estimation of cyber-security risk, with the use of time-series analysis methods and alternatively with Machine Learning (ML) ... -
Quantum cryptography in maritime telecommunications
(2021)This article is about quantum cryptography in Maritime Telecommunications. Cryptography is necessary for the security of online communications, transportations, medicine, and other significant fields. This new research ... -
Studying the role of proximity in advancing innovation partnerships at the dawn of industry 4.0 era
(2020)The fourth Industrial revolution (a.k.a Industry 4.0 wave), presupposes the completion of digital business transformation. Industry 4.0 wave is based on cyber-physical production systems (CPS), aiming to connect the physical ... -
Voice interactive personalized security (VoIPSEC) protocol: Fortify internet telephony by providing end-to-end security through inbound key exchange and biometric verification
(2006)Secure end-to-end information exchange is a constant challenge in electronic communications. Novel security architectures and approaches are proposed constantly, to be followed by announcements of sophisticated attack ...