Shukla et al., 2022 - Google Patents
Data privacyShukla et al., 2022
- Document ID
- 2943664231179937585
- Author
- Shukla S
- George J
- Tiwari K
- Kureethara J
- Publication year
- Publication venue
- Data Ethics and Challenges
External Links
Snippet
Data privacy is a private and public phenomenon and its operations have implications for the individual and the society. This understanding of privacy ceases it from being viewed as a simple technological process and highlights different factors that are associated with it …
- 238000000034 method 0 abstract description 12
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Michael et al. | Privacy, data rights and cybersecurity: Technology for good in the achievement of sustainable development goals | |
| Jin | Artificial intelligence and consumer privacy | |
| Zafar et al. | Current state of information security research in IS | |
| Kshetri | Cybersecurity management: An organizational and strategic approach | |
| Albakri et al. | Sharing cyber threat intelligence under the general data protection regulation | |
| Georgiopoulou et al. | GDPR compliance: proposed technical and organizational measures for cloud provider | |
| Jiang | Cybersecurity policies in China | |
| Shukla et al. | Data ethics and challenges | |
| Shukla et al. | Data privacy | |
| Praveen et al. | Cyber Victimization in the Healthcare Industry: Analyzing Offender Motivations and Target Characteristics through Routine Activities Theory (RAT) and Cyber-Routine Activities Theory (Cyber-RAT) | |
| Parker | Healthcare regulations, threats, and their impact on cybersecurity | |
| Wodi | Data privacy and security: Fair information principles and data management strategies in a changing world | |
| Deb | The data privacy landscape during COVID-19: An exploration of some of the major data privacy regulations and trends | |
| Rajadorai et al. | Data Protection and Data Privacy Act for BIG DATA Governance | |
| Waghmare | Security and ethical considerations when using ChatGPT | |
| Ayyagari | Data breaches and carding | |
| Yaroshenko et al. | Legal Protection of Employee Privacy in the Workplace | |
| JOSEPH | The Effectiveness of Cybersecurity Measures in Preventing Cyber-Attacks on Mobile Payment Systems | |
| Gracy | A global analysis of data breaches from 2004 to 2024 | |
| Matwyshyn | Harboring data: Information security, law, and the corporation | |
| Pattanasri | Mandatory data breach notification and hacking the smart home: A legal response to cybersecurity? | |
| Kohr | The Rise of Smart Devices; Implications of the Internet of Things in Healthcare | |
| AL-Shuaili | Critical Evaluation of Personal Data Privacy Issues and Regulation Gap in Oman Cyberspace | |
| Wyman | Can HIPAA Be Saved? The Continuing Relevance and Evolution of Healthcare Privacy and Security Standards | |
| Apau et al. | Inclination of Insider Threats’ Mitigation and Implementation: Concurrence View from Malaysian Employees |