Showing 1 - 10 of 1,235
Persistent link: https://www.econbiz.de/10003863302
This paper describes and implements the University's log management system. In this scope, are also described, the collection, the archiving, the accessibility, the maintenance for availability, integrity and confidentiality, as well as the verification of the retention time of the information...
Persistent link: https://www.econbiz.de/10012894235
The problems of digitalisation and transition of companies into the digital markets has become one of the crucial issues in contemporary business. Digital transformation is changing markets and interactions. These trends impose a question on how secure is this environment and how companies are...
Persistent link: https://www.econbiz.de/10012228045
Persistent link: https://www.econbiz.de/10011864607
Since 11 September 2001, many 'hard' and 'soft' security strategies have been introduced to enable more intensive surveillance and control of the movement of 'suspect populations'. Suicide bombings have since generated a step-change in asymmetric threat analysis and public perceptions of risk....
Persistent link: https://www.econbiz.de/10014071589
Persistent link: https://www.econbiz.de/10013532104
The use of Internet of Things devices (IoT) by individuals in their homes has led to new opportunities for companies, to adapt their products, services and offers, based on the user profile. At the same time, these new services involve the reinterpretation of existing requirements regarding data...
Persistent link: https://www.econbiz.de/10012938955
Chapter 1. Data Sovereignty -- Chapter 2. Digital Governance -- Chapter 3. Conflicts of Law -- Chapter 4. Technical Complexities -- Chapter 5. Comparative Legal Strategies -- Chapter 6. Emerging Topics in Data Sovereignty and Digital Governance.
Persistent link: https://www.econbiz.de/10013406959
Persistent link: https://www.econbiz.de/10000333342