Search

Results: 6
Network Forensics
Network forensics investigations aim to uncover evidence about criminal or unauthorized activities facilitated by, or targeted to, a given networking technology. Understanding the fundamental investigative principles is equally...
Published by: IGI Global
An Overview of Recent Development in Privacy Regulations and Future Research Opportunities
This chapter provides an overview of several recently proposed or passed privacy-related regulations, including General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), Illinois Video Interview Act...
Published by: IGI Global
Cybersecurity Standardisation for SMEs
There are various challenges regarding the development and use of cybersecurity standards for SMEs. In particular, SMEs need guidance in interpreting and implementing cybersecurity practices and adopting the standards to their...
Published by: IGI Global
Use of Internet of Things With Data Prediction on Healthcare Environments
Internet of Things (IoT) is a constantly growing paradigm that promises to revolutionize healthcare applications and could be associated with several other techniques. Data prediction is another widely used paradigm, where data...
Published by: IGI Global
A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications
Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention in both academia and industry due to the sensitiveness of medical system. In the past decade, extensive research has been...
Published by: IGI Global
Risk Reduction Privacy Preserving Approach for Accessing Electronic Health Records
In the healthcare field, preserving privacy of the patient's electronic health records has been an elementary issue. Numerous techniques have been emerged to maintain privacy of the susceptible information. Acting as a first...
Published by: IGI Global