Shukla et al., 2022 - Google Patents
Data ethics and challengesShukla et al., 2022
- Document ID
- 7724326155505206226
- Author
- Shukla S
- George J
- Tiwari K
- Kureethara J
- Publication year
External Links
Snippet
Data is the essential element of contemporary society. This generation has evolved into a data-informed society. Advancements in technology in various forms catapult this evolution. Organizations utilize data for better decision-making, customercentric facilities, and target …
- 241000282414 Homo sapiens 0 abstract description 89
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
- G06F17/30595—Relational databases
- G06F17/30598—Clustering or classification
- G06F17/30601—Clustering or classification including cluster or class visualization or browsing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/30713—Clustering or classification including cluster or class visualization or browsing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30994—Browsing or visualization
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/24—Editing, e.g. insert/delete
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09B—EDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
- G09B7/00—Electrically-operated teaching apparatus or devices working with questions and answers
- G09B7/02—Electrically-operated teaching apparatus or devices working with questions and answers of the type wherein the student is expected to construct an answer to the question which is presented or wherein the machine gives an answer to the question presented by a student
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09B—EDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
- G09B5/00—Electrically-operated educational appliances
- G09B5/02—Electrically-operated educational appliances with visual presentation of the material to be studied, e.g. using film strip
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Michael et al. | Privacy, data rights and cybersecurity: Technology for good in the achievement of sustainable development goals | |
O'Hara et al. | The spy in the coffee machine: the end of privacy as we know it | |
Weichbroth et al. | Security of cryptocurrencies: A view on the state-of-the-art research and current developments | |
Shukla et al. | Data ethics and challenges | |
Falco et al. | Confronting cyber risk: An embedded endurance strategy for cybersecurity | |
Ramos et al. | Blockchain for Artificial Intelligence (AI): enhancing compliance with the EU AI Act through distributed ledger technology. A cybersecurity perspective | |
Abdulqader et al. | A Responsible AI Development for Sustainable Enterprises: A Review of Integrating Ethical AI with IoT and Enterprise Systems | |
Davidoff | Data breaches: crisis and opportunity | |
Iannarelli et al. | Information governance and security: protecting and managing your company's proprietary information | |
Mayounga | Cyber-supply chain visibility: A grounded theory of cybersecurity with supply chain management | |
Shukla et al. | Data privacy | |
Davidoff et al. | Ransomware and cyber extortion: response and prevention | |
Maahs | Managerial strategies small businesses use to prevent cybercrime | |
Pratt-Sensie | Security strategies to prevent data breaches in infrastructure as a service cloud computing | |
Anthony | Barriers to Adoption of Advanced Cybersecurity Tools in Organizations | |
Gonzalez III et al. | Cybersecurity: Current writings on threats and protection | |
Kizza et al. | Securing the information infrastructure | |
Hanson et al. | Distributed Ledgers | |
Forde | Security strategies for hosting sensitive information in the commercial cloud | |
Ogudebe | Challenges of digital privacy in banking organizations | |
Waghmare | Security and ethical considerations when using ChatGPT | |
Zuhri | The illusion of the cyber intelligence era | |
Gracy | A global analysis of data breaches from 2004 to 2024 | |
Karake et al. | Enforcing cybersecurity in developing and emerging economies: Institutions, laws and policies | |
Morgan | Ethical Issues in cybersecurity: employing red teams, responding to ransomware attacks and attempting botnet takedowns |