A comparative review of data encryption methods in the USA and Europe

A Atadoga, OA Farayola, BS Ayinla, OO Amoo… - Computer Science & IT …, 2024 - fepbl.com
Data encryption is a critical aspect of modern information security, and understanding the
approaches taken by different regions is vital for a comprehensive analysis. In the United …

Global semiconductor supply chain resilience challenges and mitigation strategies: A novel integrated decomposed fuzzy set Delphi, WINGS and QFD model

MA Moktadir, J Ren - International Journal of Production Economics, 2024 - Elsevier
The recent COVID-19 pandemic, Ukrainian-Russian conflict, China-US trade war, and
current environmental concerns regarding carbon emissions have all made the …

[HTML][HTML] A Framework for Assessing Innovations, Business Models and Sustainability for Software Companies Using Hybrid Multiple-Criteria Decision-Making

W Torbacki - Sustainability, 2024 - mdpi.com
The management staff of software companies are constantly looking for ways to build market
advantage and win business strategies. Introducing changes in companies is a costly …

The many features which make the eIDAS 2 Digital Wallet either risky or the ideal vehicle for the transition to post-quantum encryption

G Comandè, M Varilek - Computer Law & Security Review, 2024 - Elsevier
Abstract The amended Digital Identity Framework Regulation (“eIDAS 2 ″) is expected to be
implemented by 2026, including its new solution of the Digital Identity Wallet from each …

An Intelligent Fusion Framework for Risk Assessment of Notarial Activities in the Digital Era: Balancing Speed and Legal Security with ICT

LFP Piñas, LRM Chávez, CJL Chapeta… - Full Length …, 2024 - americaspg.com
The integration of Information and Communication Technologies (ICT) into notarial activities
has revolutionized the way procedures are processed by significantly enhancing speed and …

Securing Software Development through People Maturity: A Fuzzy-AHP Decision Making Framework

HA Al Hashimi, AO Almagrabi, HS Alwageed… - 2024 - preprints.org
In the fast-changing world of software development, the protection of software products has
emerged as an imperative requirement. This paper presents a new way to increase the …

Työntekijöiden tietoturvatietoisuus puolustuskeinona sähköpostikalasteluun pk-yrityksissä

H Hakala - 2024 - jyx.jyu.fi
Inhimillisten tekijöiden, kuten huolimattomuuden ja virheiden merkitys tieto-murroissa on
merkittävä. Esimerkiksi Verizonin Data Breach Investigations Raportin DBIR (2023) sekä …