2022
DOI: 10.1007/978-981-19-0752-4
|View full text |Cite
|
Sign up to set email alerts
|

Data Ethics and Challenges

Abstract: translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 0 publications
0
2
0
1
Order By: Relevance
“…Data protection, which is seen as a fundamental right defending privacy, entails handling data securely to avoid loss, unauthorised access, or corruption (Shukla et al, 2022). It also guarantees that data is available and intact in accordance with legal and regulatory requirements.…”
Section: Davidmentioning
confidence: 99%
“…Data protection, which is seen as a fundamental right defending privacy, entails handling data securely to avoid loss, unauthorised access, or corruption (Shukla et al, 2022). It also guarantees that data is available and intact in accordance with legal and regulatory requirements.…”
Section: Davidmentioning
confidence: 99%
“…Otros campos de tematización ética emergen, o se renuevan con fuerza, ante el desarrollo material de las tecnologías. Así los relativos al manejo de datos (Shukla, Georg, Tiwari, y Varghese Kureethara, 2022): privacidad, seguridad, alteración de pautas éticas mediante uso de datos, entre tantos.…”
Section: La éTica En La Gestión Pública Como éTica Aplicadaunclassified
“…The paper does not discuss the key generation, distribution, or management processes for ECC-based encryption in the context of multimedia content. [23] Jacobian elliptic maps Complexity, implementation, performance, security, algorithmic intricacies, and standardization might pose issues in their practical usage. [24] Elliptic Curve Diffie-Hellman key…”
Section: Ref Nomentioning
confidence: 99%