Showing 1 - 19 results of 19 for search '"data breach"', query time: 0.10s Refine Results
  1. 1
  2. 2

    Load-Balanced Secure Routing Protocol for Wireless Sensor Networks by Wang Xin-sheng, Zhan Yong-zhao, Wang Liang-min

    Published 2013-06-01
    “…Depending on characters of hops, the nodes can rapidly find a route among multiple optimal routes by the policy of the twice probability routing selection. Data breach is prevented by data encryption, and data security is realized by one-way hash key chain and symmetric key authentication. …”
    Get full text
    Article
  3. 3

    Challenges and Opportunities for Data Sharing Related to Artificial Intelligence Tools in Health Care in Low- and Middle-Income Countries: Systematic Review and Case Study From Tha... by Aprajita Kaushik, Capucine Barcellona, Nikita Kanumoory Mandyam, Si Ying Tan, Jasper Tromp

    Published 2025-02-01
    “…Key solutions included building a conducive digital ecosystem—having shared data input platforms for health facilities to ensure data uniformity and to develop easy-to-understand consent forms, having standardized guidelines for data sharing, and having compensation policies for data breach victims. ConclusionsAlthough AI in LMICs has the potential to overcome health inequalities, these countries face technical, political, legal, policy, and organizational barriers to sharing data, which impede effective AI development and deployment. …”
    Get full text
    Article
  4. 4

    Personal data security as a form of legal certainty for the fulfillment of consumer rights for online loans by N.G.N. Renti Maharaini Kerti

    Published 2024-10-01
    “…Personal data security has become a very important issue, given the many cases of data breaches that can harm consumers. This study aims to analyse the role of personal data security in the fulfilment of consumer rights in online lending services, as well as to evaluate the existing legal certainty related to consumer personal data protection. …”
    Get full text
    Article
  5. 5

    Artificial Intelligence in Public Relations: Potential Benefits and Drawbacks by Ömer Faruk Zararsız

    Published 2024-06-01
    “…However, the use of artificial intelligence also poses potential threats in areas that are crucial to the success of public relations, such as propaganda, privacy, data breaches, ethics, disinformation, and misinformation. …”
    Get full text
    Article
  6. 6

    Exploring the Potential of Blockchain Technology in an IoT-Enabled Environment: A Review by Deepak, Preeti Gulia, Nasib Singh Gill, Mohammad Yahya, Punit Gupta, Prashant Kumar Shukla, Piyush Kumar Shukla

    Published 2024-01-01
    “…However, security concerns in IoT systems are significant, as compromised devices can lead to data breaches and privacy violations. Blockchain technology can enhance IoT security by providing decentralized consensus, immutability, and transparent transaction records, ensuring secure and trustworthy communication and data integrity. …”
    Get full text
    Article
  7. 7

    Integrating artificial intelligence into healthcare systems: opportunities and challenges by Bongs Lainjo

    Published 2024-10-01
    “…While tools like telemedicine and remote patient monitoring improve access to care, they also increase the risk of unauthorized data breaches. To address these concerns, healthcare organizations must promote a culture of accountability, ensuring that healthcare providers remain vigilant about patient data security. …”
    Get full text
    Article
  8. 8

    Integration of Artificial Intelligence and Blockchain Technology in Healthcare and Agriculture by Sonali Vyas, Mohammad Shabaz, Prajjawal Pandit, L. Rama Parvathy, Isaac Ofori

    Published 2022-01-01
    “…On the other side, intelligent healthcare systems are incredibly vulnerable to data breaches and other malicious assaults. Recently, blockchain technology has emerged as a potentially transformative option for enhancing data management, access control, and integrity inside healthcare systems. …”
    Get full text
    Article
  9. 9

    A Secure Framework for Privacy-Preserving Analytics in Healthcare Records Using Zero-Knowledge Proofs and Blockchain in Multi-Tenant Cloud Environments by S. Bharath Babu, K. R. Jothi

    Published 2025-01-01
    “…In the realm of healthcare analytics, preserving the privacy of sensitive data while enabling valuable insights poses a significant challenge, particularly given the increasing prevalence of data breaches and the sensitivity of personal health information. …”
    Get full text
    Article
  10. 10

    Establishing A Personal Data Protection Agency for E-Commerce in Indonesia by Bilqis Laila Nuzul Sa'adah, Sukarmi Sukarmi, Reka Dewantara

    Published 2024-12-01
    “…The findings suggest that the absence of detailed implementation regulations and lack of a specific regulatory body create significant legal uncertainties, exposing users to potential data breaches. Establishing the LPDP is expected to strengthen data protection measures, enhance consumer trust, and provide legal certainty in Indonesia's digital economy. …”
    Get full text
    Article
  11. 11

    DLCDroid an android apps analysis framework to analyse the dynamically loaded code by Rati Bhan, Rajendra Pamula, K Susheel Kumar, Nand Kumar Jyotish, Prasun Chandra Tripathi, Parvez Faruki, Jyoti Gajrani

    Published 2025-01-01
    “…Even the most sophisticated static analysis tools struggle to detect data breaches caused by DLC. Our analysis demonstrates that conventional tools areill-equipped to handle DLC. …”
    Get full text
    Article
  12. 12

    Deep learning technology: enabling safe communication via the internet of things by Ramiz Salama, Hitesh Mohapatra, Tuğşad Tülbentçi, Fadi Al-Turjman

    Published 2025-02-01
    “…Despite offering many advantages, the diversified architecture and wide connectivity of IoT make it vulnerable to various cyberattacks, potentially leading to data breaches and financial loss. Preventing such attacks on the IoT ecosystem is essential to ensuring its security.MethodsThis paper introduces a software-defined network (SDN)-enabled solution for vulnerability discovery in IoT systems, leveraging deep learning. …”
    Get full text
    Article
  13. 13

    Research on new energy power plant network traffic anomaly detection method based on EMD by Danni Liu, Shengda Wang, YutongLi, Ji Du, Jia Li

    Published 2025-01-01
    “…Methodology This research propose Network Quality Assessment (NQA) traffic management algorithms to prevent illegal access and data breaches, this involves strong security measures such as encryption, firewalls, and encrypted communication methods. …”
    Get full text
    Article
  14. 14

    Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging by Ikram Benfarhat, Vik Tor Goh, Chun Lim Siow, Muhammad Sheraz, Teong Chee Chuah

    Published 2025-01-01
    “…These issues are particularly critical in electric vehicle charging stations (EVCSs) due to the sensitive data involved, such as data breaches, unauthorized access, and privacy concerns. …”
    Get full text
    Article
  15. 15

    Enhancing privacy and traceability of public health insurance claim system using blockchain technology by Andry Alamsyah, I. Putu Sadhu Setiawan

    Published 2025-02-01
    “…This rapid expansion brings heightened risks, including data breaches, fraud, and difficulties in safeguarding sensitive policyholder information. …”
    Get full text
    Article
  16. 16

    Development of a Solar-Powered Edge Processing Perimeter Alert System with AI and LoRa/LoRaWAN Integration for Drone Detection and Enhanced Security by Mateo Mejia-Herrera, Juan Botero-Valencia, José Ortega, Ruber Hernández-García

    Published 2025-01-01
    “…This technique is particularly relevant for security applications where there is a need to reduce the probability of intrusion or data breaches and to decentralize alert systems. Although drone detection has received great research attention, the ability to identify helicopters expands the spectrum of aerial threats that can be detected. …”
    Get full text
    Article
  17. 17

    Mathematical modelling-based blockchain with attention deep learning model for cybersecurity in IoT-consumer electronics by Hayam Alamro, Mohammed Maray, Jawhara Aljabri, Saad Alahmari, Monir Abdullah, Jehad Saad Alqurni, Faiz Abdullah Alotaibi, Abdelmoneim Ali Mohamed

    Published 2025-02-01
    “…Strong security measures are required to protect against unauthorized access, data breaches, and cyberattacks as these smart devices gather, transfer, and save sensitive information. …”
    Get full text
    Article
  18. 18
  19. 19

    Googling Patients by Emily Beer

    Published 2022-11-01
    “…For example, the FTC Act creates an obligation to maintain appropriate security of health data and requires entities to keep promises they make about privacy.[13] The Health Breach Notification Rule contains notice requirements for data breaches involving certain health information.[14] Additionally, the doctor-patient privilege protects confidential information from disclosure, and the exact confines of the privilege depend on the applicable statutes.[15] As these examples demonstrate, there are many different legal requirements that concern privacy and confidentiality in the health sphere. …”
    Get full text
    Article