scroll to top
Press enter or spacebar to select a desired language.
Press enter or spacebar to select a desired language.
Your source for trusted research content

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "DATA security"

1 - 10 of 126,190 results for
 "DATA security"
Press enter or spacebar to adjust the number of results displayed.

Healthcare Cybersecurity Ethical Concerns during the COVID-19 Global Pandemic: A Rapid Review.

Publication Type: Academic Journal

Source(s): Healthcare (2227-9032). Nov2023, Vol. 11 Issue 22, p2983. 19p.

Abstract: Background and objectives: Healthcare organizations have endured significant challenges and relied upon telehealth and related technological advances during the COVID-19 pandemic to allow for the sustainment of care. The purpose of this study was to sy...

An Efficient Attribute-Based Encryption Scheme with Data Security Classification in the Multi-Cloud Environment.

Publication Type: Academic Journal

Source(s): Electronics (2079-9292). Oct2023, Vol. 12 Issue 20, p4237. 19p.

Abstract: As an increasing number of people and corporations move their data to the cloud side, how to ensure efficient and secure access to data stored on the cloud side has become a key focus of current research. Attribute-Based Encryption (ABE) is largely rec...

Survey on Blockchain-Based Data Storage Security for Android Mobile Applications.

Publication Type: Academic Journal

Source(s): Sensors (14248220). Nov2023, Vol. 23 Issue 21, p8749. 30p.

Abstract: This research paper investigates the integration of blockchain technology to enhance the security of Android mobile app data storage. Blockchain holds the potential to significantly improve data security and reliability, yet faces notable challenges su...

A Novel Approach for Improving the Security of IoT–Medical Data Systems Using an Enhanced Dynamic Bayesian Network.

Publication Type: Academic Journal

Source(s): Electronics (2079-9292). Oct2023, Vol. 12 Issue 20, p4316. 15p.

Abstract: IoT (Internet of Things) devices are increasingly being used in healthcare to collect and transmit patient data, which can improve patient outcomes and reduce costs. However, this also creates new challenges for data security and privacy. Thus, the maj...

An IHPO-WNN-Based Federated Learning System for Area-Wide Power Load Forecasting Considering Data Security Protection.

Publication Type: Academic Journal

Source(s): Energies (19961073). Oct2023, Vol. 16 Issue 19, p6921. 20p.

Abstract: With the rapid growth of power demand and the advancement of new power system intelligence, smart energy measurement system data quality and security are also facing the influence of diversified factors. To solve the series of problems such as low data...

NeoStarling: An Efficient and Scalable Collaborative Blockchain-Enabled Obstacle Mapping Solution for Vehicular Environments.

Publication Type: Academic Journal

Source(s): Sensors (14248220). Sep2023, Vol. 23 Issue 17, p7500. 29p.

Abstract: The Vehicular Self-Organizing Network (VANET) is a burgeoning research topic within Intelligent Transportation Systems, holding promise in enhancing safety and convenience for drivers. In general, VANETs require large amounts of data to be shared among...

Customer Data: Designing for Transparency and Trust.

Publication Type: Periodical

Source(s): Harvard Business Review. Winter2023 Special issue, p102-111. 10p. 2 Color Photographs.

Abstract: With the help of technology, companies today sweep up huge amounts of customer data. But they tend to be opaque about the information they collect and often resell, which leaves their customers feeling uneasy. Though that practice may give firms an edg...

Enhancing Microsoft 365 Security: Integrating Digital Forensics Analysis to Detect and Mitigate Adversarial Behavior Patterns.

Publication Type: Academic Journal

Source(s): Forensic Sciences. Sep2023, Vol. 3 Issue 3, p394-425. 32p.

Abstract: This research article investigates the effectiveness of digital forensics analysis (DFA) techniques in identifying patterns and trends in malicious failed login attempts linked to public data breaches or compromised email addresses in Microsoft 365 (M3...

A Multi-Round Zero Knowledge Proof Algorithm for Secure IoT and Blockchain Environments.

Publication Type: Academic Journal

Source(s): International Journal of Safety & Security Engineering. Sep2023, Vol. 13 Issue 4, p665-671. 7p.

Abstract: Presented herein is a novel algorithm for multi-round, zero-knowledge proof (ZKP), devised specifically for authenticating factorisation proofs within a variety of cryptographic applications. This advanced algorithm, while maintaining computational com...

Digital Repository as a Service (D-RaaS): Enhancing Access and Preservation of Cultural Heritage Artifacts.

Publication Type: Academic Journal

Source(s): Heritage (2571-9408). Oct2023, Vol. 6 Issue 10, p6881-6900. 20p.

Abstract: The employment of technology and digitization is crucial for cultural organizations to establish and sustain digital repositories for their cultural heritage artifacts. This exploitation is also essential in facilitating the presentation of cultural wo...

sponsored