Listing 1 - 10 of 6395 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Choose an application
Biometric and security technologies are the key components for providing reliable solution against cyber terrorism or damage in order to improve the nation safety Biometric provides methods to identify the uniqueness of each individual identity Therefore with biometric solution, scientists are able to determine ways to accurately identify people based upon their physical and behavioral characteristics However, improvements in biometric equipment, interoperability and database accuracy are crucial for nation safety This is also applied for other security technology solutions ISBAST2014 provides researchers with an excellent platform for dissemination of latest research findings and the state of practice in the areas of biometric and security technologies This conference covers areas such as biometric, forensic, cloud computing, network security and cybersecurity However, the scope is not limited to the aforementioned areas ISBAST2014 enables participants to learn the latest tre.
Choose an application
The International Conference on Information Systems Security and Privacy aims at creating a meeting point of researchers and practitioners that address security and privacy challenges that concern information systems, especially in organizations, including not only technological issues but also social issues The conference welcomes papers of either practical or theoretical nature, presenting research or applications addressing all aspects of security and privacy, such as methods to improve the accuracy of data, encryption techniques to conceal information in transit and avoid data breaches, identity protection, biometrics, access control policies, location information and mobile systems privacy, transactional security, social media privacy control, web and email vulnerabilities, trust management, compliance violations in organizations, security auditing, and so on.
Choose an application
The requirements for a systems/software engineering process for privacy-oriented considerations regarding products, services, and systems utilizing employee, customer, or other external user's personal data are defined by this standard. Organizations and projects that are developing and deploying products, systems, processes, and applications that involve personal information are candidate users of the IEEE Std 7002™ standard. Specific procedures, diagrams, and checklists are provided for users of the IEEE Std 7002 standard to perform conformity assessments on their specific privacy practices. Privacy impact assessments (PIAs) are described as a tool for both identifying where privacy controls and measures are needed and for confirming they are in place.
Choose an application
This text covers the 1999 IEEE Symposium on Security and Privacy in Computing. The papers are aimed at researchers, professors, practitioners, students, and other computing professionals.
Choose an application
Cybersecurity is an active and important area of study, practice, and research today. It spans various fields including cyber terrorism, cyber warfare, electronic civil disobedience, governance and security, hacking and hacktivism, information management and security, internet and controls, law enforcement, national security, privacy, protection of society and the rights of the individual, social engineering, terrorism, and more. This book compiles original and innovative findings on issues relating to cybersecurity and threats. This comprehensive reference explores the developments, methods, approaches, and surveys of cyber threats and security in a wide variety of fields and endeavors. It specifically focuses on cyber threats, cyberattacks, cyber techniques, artificial intelligence, cyber threat actors, and other related cyber issues. The book provides researchers, practitioners, academicians, military professionals, government officials, and other industry professionals with an in-depth discussion of the state-of-the-art advances in the field of cybersecurity.
Choose an application
This user-friendly Handbook offers guidance and practical suggestions for small and medium-sized enterprises (SMEs) that could facilitate compliance with the General Data Protection Regulation (GDPR). Being primarily addressed to enterprises for which personal data processing is an auxiliary activity, the Handbook explains how to navigate the barrage of resources available on GDPR. In doing so it provides an overview of the main actors in the European data protection landscape. It also clarifies the scope of data protection law and the scope of its application to SMEs. The Handbook introduces concepts and principles that form the crux of personal data protection legal framework and then it unpacks the theory and practice of the risk-based approach to personal data protection. The Handbook seeks to go beyond a mere description of GDPR provisions and obligations stemming from them. It includes a set of proactive measures that were put forward by European DPAs and bodies. In addition, it provides references to other publicly available (open access) resources that also provide practical suggestions.
Choose an application
Jeder von uns hinterlässt Datenspuren, beim Surfen, Onlineshopping und in den Social Media. Es sind der Staat, die Wirtschaft, aber auch Kriminelle, die Zugang zu diesen Daten haben oder sich zu verschaffen wissen. Dieser Sachverhalt hat große Bedeutung für den Einzelnen, aber auch für die demokratische Gesellschaft, die es zu verstehen gilt. Barbara Wiesner stellt Aspekte der Verarbeitung von privaten Daten vor, die Laien selten bekannt sind. Dabei orientiert sie sich an Zitaten von Persönlichkeiten aus Wirtschaft, Wissenschaft und Politik und regt dazu an, sich eine eigene Meinung zu bilden. So wird das Thema Privatheit vor dem Hintergrund vielfältiger digitaler Datenkanäle ausgeleuchtet.
Listing 1 - 10 of 6395 | << page >> |
Sort by
|