Nothing Special   »   [go: up one dir, main page]

Shukla et al., 2022 - Google Patents

Data ethics and challenges

Shukla et al., 2022

Document ID
7724326155505206226
Author
Shukla S
George J
Tiwari K
Kureethara J
Publication year

External Links

Snippet

Data is the essential element of contemporary society. This generation has evolved into a data-informed society. Advancements in technology in various forms catapult this evolution. Organizations utilize data for better decision-making, customercentric facilities, and target …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • G06F17/30595Relational databases
    • G06F17/30598Clustering or classification
    • G06F17/30601Clustering or classification including cluster or class visualization or browsing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/30713Clustering or classification including cluster or class visualization or browsing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30994Browsing or visualization
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/24Editing, e.g. insert/delete
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09BEDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
    • G09B7/00Electrically-operated teaching apparatus or devices working with questions and answers
    • G09B7/02Electrically-operated teaching apparatus or devices working with questions and answers of the type wherein the student is expected to construct an answer to the question which is presented or wherein the machine gives an answer to the question presented by a student
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09BEDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
    • G09B5/00Electrically-operated educational appliances
    • G09B5/02Electrically-operated educational appliances with visual presentation of the material to be studied, e.g. using film strip

Similar Documents

Publication Publication Date Title
Michael et al. Privacy, data rights and cybersecurity: Technology for good in the achievement of sustainable development goals
O'Hara et al. The spy in the coffee machine: the end of privacy as we know it
Weichbroth et al. Security of cryptocurrencies: A view on the state-of-the-art research and current developments
Shukla et al. Data ethics and challenges
Falco et al. Confronting cyber risk: An embedded endurance strategy for cybersecurity
Ramos et al. Blockchain for Artificial Intelligence (AI): enhancing compliance with the EU AI Act through distributed ledger technology. A cybersecurity perspective
Abdulqader et al. A Responsible AI Development for Sustainable Enterprises: A Review of Integrating Ethical AI with IoT and Enterprise Systems
Davidoff Data breaches: crisis and opportunity
Iannarelli et al. Information governance and security: protecting and managing your company's proprietary information
Mayounga Cyber-supply chain visibility: A grounded theory of cybersecurity with supply chain management
Shukla et al. Data privacy
Davidoff et al. Ransomware and cyber extortion: response and prevention
Maahs Managerial strategies small businesses use to prevent cybercrime
Pratt-Sensie Security strategies to prevent data breaches in infrastructure as a service cloud computing
Anthony Barriers to Adoption of Advanced Cybersecurity Tools in Organizations
Gonzalez III et al. Cybersecurity: Current writings on threats and protection
Kizza et al. Securing the information infrastructure
Hanson et al. Distributed Ledgers
Forde Security strategies for hosting sensitive information in the commercial cloud
Ogudebe Challenges of digital privacy in banking organizations
Waghmare Security and ethical considerations when using ChatGPT
Zuhri The illusion of the cyber intelligence era
Gracy A global analysis of data breaches from 2004 to 2024
Karake et al. Enforcing cybersecurity in developing and emerging economies: Institutions, laws and policies
Morgan Ethical Issues in cybersecurity: employing red teams, responding to ransomware attacks and attempting botnet takedowns