2018 Second International Conference on Computing Methodologies and Communication (ICCMC) 2018
DOI: 10.1109/iccmc.2018.8487245
|View full text |Cite
|
Sign up to set email alerts
|

Automated and Cloud Enabling Cyber Security Improvement in Selected Institutions/Organizations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…The CS literature typically focuses on low-level goals. Scholars have formulated methodologies for embedding privacy by design (Karim & Rawat, 2022;Thapa & Camtepe, 2021;Zalloum & Alamleh, 2020), for transparency by design (Schufrin et al, 2020), and for security by design (Tareke et al, 2018). Privacy by design often involves data protection and security because the solutions entail minimising data use (Conte et al, 2022) and making data more secure (Toli & Preneel, 2018), less accessible and less widely distributed (Zalloum & Alamleh, 2020).…”
Section: Loyaltymentioning
confidence: 99%
“…The CS literature typically focuses on low-level goals. Scholars have formulated methodologies for embedding privacy by design (Karim & Rawat, 2022;Thapa & Camtepe, 2021;Zalloum & Alamleh, 2020), for transparency by design (Schufrin et al, 2020), and for security by design (Tareke et al, 2018). Privacy by design often involves data protection and security because the solutions entail minimising data use (Conte et al, 2022) and making data more secure (Toli & Preneel, 2018), less accessible and less widely distributed (Zalloum & Alamleh, 2020).…”
Section: Loyaltymentioning
confidence: 99%
“…This is how the cloud combines the key and sends or shows the information. Accessing data from some unknown person is challenging [9][10][11][12][13]. The research by M. Rai [10,14] suggests ways to protect the data from cybercriminals.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Accessing data from some unknown person is challenging [9][10][11][12][13]. The research by M. Rai [10,14] suggests ways to protect the data from cybercriminals. In this era, everyone is living on the Internet.…”
Section: Literature Reviewmentioning
confidence: 99%