Showing 1 - 10 of 77
Cloud computing is a new paradigm model that offers different services to its customers. The increasing number of users for cloud services i.e. software, platform or infrastructure is one of the major reasons for security threats for customers' data. Some major security issues are highlighted in...
Persistent link: https://www.econbiz.de/10012043167
Cloud computing is a major technology enabler for providing efficient services at affordable costs by reducing the costs of traditional software and hardware licensing models. As it continues to evolve, it is widely being adopted by healthcare organisations. But hosting healthcare solutions on...
Persistent link: https://www.econbiz.de/10012043357
Beyond l-diversity model, an algorithm (l-BDT) based on state decision tree is proposed in this paper, which aims at protecting multi-sensitive attributes from being attacked. The algorithm considers the whole situations in equivalence partitioning for the first, prunes the decision tree...
Persistent link: https://www.econbiz.de/10012045929
One of the main challenges in cloud computing is to build a healthy and efficient storage for securely managing and preserving data. This means a cloud service provider needs to make sure that its clients' outsourced data are stored securely and, data queries and retrievals are executed...
Persistent link: https://www.econbiz.de/10012046299
Forensic animation is the use of digital animation technologies to recreate or simulate an event for use as probative evidence in a court proceeding. Acceptance by courts of this technology varies by jurisdiction. Some courts disallow its use because of the technology's prejudicial impact when...
Persistent link: https://www.econbiz.de/10012047755
As organisations are further developing ways to extract value from big data, the amount of personal data being stored in centralised systems is rising. These large data sets are becoming prime targets for hackers as well as raising concerns about end user privacy with how the data is handled....
Persistent link: https://www.econbiz.de/10012048019
This article describes how the information about an individual's personal health is among ones most sensitive and important intangible belongings. When health information is misused, serious non-revertible damage can be caused, e.g. through making intimidating details public or leaking it to...
Persistent link: https://www.econbiz.de/10012045721
This article explores the role of privacy policies on internet sites as a newly emerging news gatekeeping factor as well as part of the new web world wars between regulators and internet giants' privacy policies, like the one of Google. All these developments are related to both innovation...
Persistent link: https://www.econbiz.de/10012045978
Any theory may include partially and/or completely non-elucidated problems. If these are confirmed in practice, for a given time, such problems are presented as ‘laws' and after, ‘forgotten'. Of course, new theories may elucidate some of these problems but may also open some new other...
Persistent link: https://www.econbiz.de/10012047882
This research looks into how well the priorities of third party logistics providers in the UK are aligned to that of their customers and how these priorities change dependent upon industry segment and size. Additionally, it looks into how the levels of information communication technology (ICT)...
Persistent link: https://www.econbiz.de/10012042885