Showing 1 - 10 of 121
the interests of their citizen, to establish basic social security, to promote a successful development process, and to … guarantee security and human rights. The regional disintegration processes after the period of imperialism and the fall of the …
Persistent link: https://www.econbiz.de/10009449012
that have not yet been adequately dealt with in the scientific study of war and peace. …
Persistent link: https://www.econbiz.de/10009471599
Privacy is a very diverse field of research and due to its subjective nature, open to many interpretations and representations. Information Privacy forms a key component of Privacy related to research, particularly its importance to Information Technology and the increasing collection and use of...
Persistent link: https://www.econbiz.de/10009434833
disadvantages such as security, privacy, reliability, physical location of data and the unavailability of service due to crashes or …
Persistent link: https://www.econbiz.de/10009434867
When considering information security and privacy issues most of the attention has previously focused on data … operational and transactional data. Specifically, the security and privacy protection of metadata and metastructure information of … new perspective for information security and privacy. It is termed Meta Privacy and is concerned with the protection and …
Persistent link: https://www.econbiz.de/10009434918
Privacy is a very diverse field of research and due to its subjective nature, open to many interpretations and representations. Information Privacy forms a key component of Privacy related to research, particularly its importance to Information Technology and the increasing collection and use of...
Persistent link: https://www.econbiz.de/10009434924
Proxy signature helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original signer (e.g. the president of a company) is not available to sign a specific document. If the original signer can not forge valid proxy signatures through impersonating...
Persistent link: https://www.econbiz.de/10009434970
When considering information security and privacy issues most of the attention has previously focussed on data … operational and transactional data. Specifically, the security and privacy protection of metadata and metastructure information of … new perspective for information security and privacy. It is termed Meta Privacy and is concerned with the protection and …
Persistent link: https://www.econbiz.de/10009434971
incorporation of IT Security measures in each SDLC phase is also discussed. This is due to its direct relevance and correlation with … information system privacy issues. The proposed methodology involves identifying the privacy and security issues in each phase …. From there appropriate privacy protecting and security techniques are applied to address these issues. Special mention is …
Persistent link: https://www.econbiz.de/10009434972
Preserving Privacy and the protection of personally identifiable information (PII) have been of increasing interest over the last few years. Many privacy advocates, and a significant portion of the general public, feared that the new initiatives used in an attempt to fight terrorism, would have...
Persistent link: https://www.econbiz.de/10009434973