-
1
-
2
Load-Balanced Secure Routing Protocol for Wireless Sensor Networks
Published 2013-06-01“…Depending on characters of hops, the nodes can rapidly find a route among multiple optimal routes by the policy of the twice probability routing selection. Data breach is prevented by data encryption, and data security is realized by one-way hash key chain and symmetric key authentication. …”
Get full text
Article -
3
Challenges and Opportunities for Data Sharing Related to Artificial Intelligence Tools in Health Care in Low- and Middle-Income Countries: Systematic Review and Case Study From Tha...
Published 2025-02-01“…Key solutions included building a conducive digital ecosystem—having shared data input platforms for health facilities to ensure data uniformity and to develop easy-to-understand consent forms, having standardized guidelines for data sharing, and having compensation policies for data breach victims. ConclusionsAlthough AI in LMICs has the potential to overcome health inequalities, these countries face technical, political, legal, policy, and organizational barriers to sharing data, which impede effective AI development and deployment. …”
Get full text
Article -
4
Personal data security as a form of legal certainty for the fulfillment of consumer rights for online loans
Published 2024-10-01“…Personal data security has become a very important issue, given the many cases of data breaches that can harm consumers. This study aims to analyse the role of personal data security in the fulfilment of consumer rights in online lending services, as well as to evaluate the existing legal certainty related to consumer personal data protection. …”
Get full text
Article -
5
Artificial Intelligence in Public Relations: Potential Benefits and Drawbacks
Published 2024-06-01“…However, the use of artificial intelligence also poses potential threats in areas that are crucial to the success of public relations, such as propaganda, privacy, data breaches, ethics, disinformation, and misinformation. …”
Get full text
Article -
6
Exploring the Potential of Blockchain Technology in an IoT-Enabled Environment: A Review
Published 2024-01-01“…However, security concerns in IoT systems are significant, as compromised devices can lead to data breaches and privacy violations. Blockchain technology can enhance IoT security by providing decentralized consensus, immutability, and transparent transaction records, ensuring secure and trustworthy communication and data integrity. …”
Get full text
Article -
7
Integrating artificial intelligence into healthcare systems: opportunities and challenges
Published 2024-10-01“…While tools like telemedicine and remote patient monitoring improve access to care, they also increase the risk of unauthorized data breaches. To address these concerns, healthcare organizations must promote a culture of accountability, ensuring that healthcare providers remain vigilant about patient data security. …”
Get full text
Article -
8
Integration of Artificial Intelligence and Blockchain Technology in Healthcare and Agriculture
Published 2022-01-01“…On the other side, intelligent healthcare systems are incredibly vulnerable to data breaches and other malicious assaults. Recently, blockchain technology has emerged as a potentially transformative option for enhancing data management, access control, and integrity inside healthcare systems. …”
Get full text
Article -
9
A Secure Framework for Privacy-Preserving Analytics in Healthcare Records Using Zero-Knowledge Proofs and Blockchain in Multi-Tenant Cloud Environments
Published 2025-01-01“…In the realm of healthcare analytics, preserving the privacy of sensitive data while enabling valuable insights poses a significant challenge, particularly given the increasing prevalence of data breaches and the sensitivity of personal health information. …”
Get full text
Article -
10
Establishing A Personal Data Protection Agency for E-Commerce in Indonesia
Published 2024-12-01“…The findings suggest that the absence of detailed implementation regulations and lack of a specific regulatory body create significant legal uncertainties, exposing users to potential data breaches. Establishing the LPDP is expected to strengthen data protection measures, enhance consumer trust, and provide legal certainty in Indonesia's digital economy. …”
Get full text
Article -
11
DLCDroid an android apps analysis framework to analyse the dynamically loaded code
Published 2025-01-01“…Even the most sophisticated static analysis tools struggle to detect data breaches caused by DLC. Our analysis demonstrates that conventional tools areill-equipped to handle DLC. …”
Get full text
Article -
12
Deep learning technology: enabling safe communication via the internet of things
Published 2025-02-01“…Despite offering many advantages, the diversified architecture and wide connectivity of IoT make it vulnerable to various cyberattacks, potentially leading to data breaches and financial loss. Preventing such attacks on the IoT ecosystem is essential to ensuring its security.MethodsThis paper introduces a software-defined network (SDN)-enabled solution for vulnerability discovery in IoT systems, leveraging deep learning. …”
Get full text
Article -
13
Research on new energy power plant network traffic anomaly detection method based on EMD
Published 2025-01-01“…Methodology This research propose Network Quality Assessment (NQA) traffic management algorithms to prevent illegal access and data breaches, this involves strong security measures such as encryption, firewalls, and encrypted communication methods. …”
Get full text
Article -
14
Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging
Published 2025-01-01“…These issues are particularly critical in electric vehicle charging stations (EVCSs) due to the sensitive data involved, such as data breaches, unauthorized access, and privacy concerns. …”
Get full text
Article -
15
Enhancing privacy and traceability of public health insurance claim system using blockchain technology
Published 2025-02-01“…This rapid expansion brings heightened risks, including data breaches, fraud, and difficulties in safeguarding sensitive policyholder information. …”
Get full text
Article -
16
Development of a Solar-Powered Edge Processing Perimeter Alert System with AI and LoRa/LoRaWAN Integration for Drone Detection and Enhanced Security
Published 2025-01-01“…This technique is particularly relevant for security applications where there is a need to reduce the probability of intrusion or data breaches and to decentralize alert systems. Although drone detection has received great research attention, the ability to identify helicopters expands the spectrum of aerial threats that can be detected. …”
Get full text
Article -
17
Mathematical modelling-based blockchain with attention deep learning model for cybersecurity in IoT-consumer electronics
Published 2025-02-01“…Strong security measures are required to protect against unauthorized access, data breaches, and cyberattacks as these smart devices gather, transfer, and save sensitive information. …”
Get full text
Article -
18
Digital health data security practices among health professionals in low-resource settings: cross-sectional study in Amhara Region, Ethiopia
Published 2025-02-01“…Currently, digital security breaches are becoming more common. Healthcare data breaches have compromised over 50 million medical records per year. …”
Get full text
Article -
19
Googling Patients
Published 2022-11-01“…For example, the FTC Act creates an obligation to maintain appropriate security of health data and requires entities to keep promises they make about privacy.[13] The Health Breach Notification Rule contains notice requirements for data breaches involving certain health information.[14] Additionally, the doctor-patient privilege protects confidential information from disclosure, and the exact confines of the privilege depend on the applicable statutes.[15] As these examples demonstrate, there are many different legal requirements that concern privacy and confidentiality in the health sphere. …”
Get full text
Article