58   Artículos

 
en línea
Paul Scalise, Matthew Boeding, Michael Hempel, Hamid Sharif, Joseph Delloiacovo and John Reed    
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Nume... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Tommy Nguyen, Garnet Yeates, Tony Ly and Umar Albalawi    
With the recent increase in phishing attacks and other kinds of malicious activities, increasing the awareness of security and privacy awareness is arguably one of the best proven ways of preventing these kinds of threats. The main challenge in security ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Karen Schnell, Kaushik Roy and Madhuri Siddula    
In the United States, there are laws and standards guiding how people should be informed about the use of their private data. However, the challenge of communicating these guidelines to the naïve user is still at its peak. Research has shown that the wil... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Veronika Belcheva, Tatiana Ermakova and Benjamin Fabian    
Privacy policies are the main method for informing Internet users of how their data are collected and shared. This study aims to analyze the deficiencies of privacy policies in terms of readability, vague statements, and the use of pacifying phrases conc... ver más
Revista: Information    Formato: Electrónico

 
en línea
Raza Nowrozy, Khandakar Ahmed, Hua Wang and Timothy Mcintosh    
This paper proposed a novel privacy model for Electronic Health Records (EHR) systems utilizing a conceptual privacy ontology and Machine Learning (ML) methodologies. It underscores the challenges currently faced by EHR systems such as balancing privacy ... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Christopher McCarthy, Yamikani Nyoni, Daud Jones Kachamba, Lumbani Benedicto Banda, Boyson Moyo, Cornelius Chisambi, James Banfill and Buho Hoshino    
Smallholder farmers in sub-Saharan Africa play a vital role in achieving food security and nutrition, yet they are often overlooked by development policies and lack access to the technology and information needed to increase their agricultural productivi... ver más
Revista: Agriculture    Formato: Electrónico

 
en línea
Hassan H. H. Aldboush and Marah Ferdous    
This research paper explores the ethical considerations in using financial technology (fintech), focusing on big data, artificial intelligence (AI), and privacy. Using a systematic literature-review methodology, the study identifies ethical and privacy i... ver más
Revista: International Journal of Financial Studies    Formato: Electrónico

 
en línea
Peng Zhang and Maged N. Kamel Boulos    
Generative AI (artificial intelligence) refers to algorithms and models, such as OpenAI?s ChatGPT, that can be prompted to generate various types of content. In this narrative review, we present a selection of representative examples of generative AI app... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Pratik Thantharate and Anurag Thantharate    
With the digitization of healthcare, an immense amount of sensitive medical data are generated and shared between various healthcare stakeholders?however, traditional health data management mechanisms present interoperability, security, and privacy chall... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Shouq Alrobaian, Saif Alshahrani and Abdulaziz Almaleh    
People are the weakest link in the cybersecurity chain when viewed in the context of technological advancement. People become vulnerable to trickery through contemporary technical developments such as social media platforms. Information accessibility and... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

« Anterior     Página: 1 de 4     Siguiente »