|
|
|
Dominik Molitor, Wullianallur Raghupathi, Aditya Saharia and Viju Raghupathi
While data breaches are a frequent and universal phenomenon, the characteristics and dimensions of data breaches are unexplored. In this novel exploratory research, we apply machine learning (ML) and text analytics to a comprehensive collection of data b...
ver más
|
|
|
|
|
|
|
Karl van der Schyff, Greg Foster, Karen Renaud and Stephen Flowerday
Online users are responsible for protecting their online privacy themselves: the mantra is custodiat te (protect yourself). Even so, there is a great deal of evidence pointing to the fact that online users generally do not act to preserve the privacy of ...
ver más
|
|
|
|
|
|
|
Sanaa Kaddoura, Ramzi A. Haraty, Karam Al Kontar and Omar Alfandi
In the current Internet of things era, all companies shifted from paper-based data to the electronic format. Although this shift increased the efficiency of data processing, it has security drawbacks. Healthcare databases are a precious target for attack...
ver más
|
|
|
|
|
|
|
Philip Nyblom, Gaute Wangen and Vasileios Gkioulos
Social media are getting more and more ingrained into everybody?s lives. With people?s more substantial presence on social media, threat actors exploit the platforms and the information that people share there to deploy and execute various types of attac...
ver más
|
|
|
|
|
|
|
Frantisek Sudzina and Antonin Pavlicek
A number of positive and negative trends are becoming more prevalent, along with the widespread use of information and communication technologies in everyday life?negative ones being virtual offences such as stalking, bullying, identity theft, scamming a...
ver más
|
|
|
|
|
|
|
Guma Ali, Mussa Ally Dida and Anael Elikana Sam
Smartphone technology has improved access to mobile money services (MMS) and successful mobile money deployment has brought massive benefits to the unbanked population in both rural and urban areas of Uganda. Despite its enormous benefits, embracing the ...
ver más
|
|
|
|
|
|
|
Vic Grout
The embodiment of the potential loss of privacy through a combination of artificial intelligence algorithms, big data analytics and Internet of Things technology might be something as simple, yet potentially terrifying, as an integrated app capable of re...
ver más
|
|
|
|
|
|
|
Ghizlane MOUKHLISS,Olaf MALASSE,RedaFilali Hilali,Hicham Belhadaoui
Nowadays, dematerialization is an integral part of our daily lives, whether in the private sphere, the professional sphere or relations to the administration. The issue of dematerialization includes increased data security against fraud, trust, and the m...
ver más
|
|
|
|
|
|
|
Tri Hoang Vo, Woldemar Fuhrmann, Klaus-Peter Fischer-Hellmann and Steven Furnell
In recent years, enterprise applications have begun to migrate from a local hosting to a cloud provider and may have established a business-to-business relationship with each other manually. Adaptation of existing applications requires substantial implem...
ver más
|
|
|
|
|
|
|
Bushra Mohamed Elamin Elnaim
The following research paper is focusing on the research of online retailing adoption while challenges that are being faced in the area of system and network security. The research explores the major issues that put noticeable influence on the decision o...
ver más
|
|
|
|