Big data and health care: challenges and opportunities for coordinated policy development in the EU

S Salas-Vega, A Haimann… - Health Systems & Reform, 2015 - Taylor & Francis
As global policy makers prioritize big data policy, it is important to try to outline expected
outcomes vis-à-vis health sector objectives. We identify initiatives aimed at promoting the …

Artificial intelligence and big data analytics in support of cyber defense

L Leenen, T Meyer - … in information security and cybernetic wars, 2019 - igi-global.com
Cybersecurity analysts rely on vast volumes of security event data to predict, identify,
characterize, and deal with security threats. These analysts must understand and make …

Information systems strategy and security policy: A conceptual framework

M Kamariotou, F Kitsios - Electronics, 2023 - mdpi.com
As technology evolves, businesses face new threats and opportunities in the areas of
information and information assets. These areas include information creation, refining …

Cybersecurity policy and the legislative context of the water and wastewater sector in South Africa

M Malatji, AL Marnewick, S von Solms - Sustainability, 2020 - mdpi.com
The water and wastewater sector is an important lifeline upon which other economic sectors
depend. Securing the sector's critical infrastructure is therefore important for any country's …

Factors affecting compliance with the national cybersecurity policy by SMMEs in South Africa

C Murphy, CQ Mtegha, W Chigona, TT Tuyeni - 2022 - digitalcommons.kennesaw.edu
ABSTRACT Technological advancements enable Small, Micro and Medium Enterprises
(SMMEs) to increase business value and gain a competitive advantage. However, despite …

Cyber-security awareness of South African state-mandated public sector organisations

ML Ngoma, M Keevy, P Rama - Southern African Journal of …, 2021 - journals.co.za
With the rapid advances in information communication technologies (ICTs), cyberspace has
provided organisations a platform to be more innovative in their operations. As a result …

Preserving Indigenous Knowledge for Traditional Xhosa Necklace Breadwork Ontology

K Giba, FA Elegbeleye, OA Esan - … International Conference on …, 2024 - ieeexplore.ieee.org
Indigenous Knowledge (IK) is central to the cultural heritage and identity of indigenous
people. It offers significant potential for socio-economic and environmental development …

Reflecting on cyber governance for a new world order: An ontological approach

V Greiman - European Conference on Research Methodology for …, 2018 - books.google.com
Who controls cyberspace is a question that remains unresolved by cyber stakeholders
around the globe. Since its invention half a century ago, the Internet has been largely owned …

Semantic technologies and big data analytics for cyber defence

L Leenen, T Meyer - Information Retrieval and Management …, 2018 - igi-global.com
The Governments, military forces and other organisations responsible for cybersecurity deal
with vast amounts of data that has to be understood in order to lead to intelligent decision …

Semantically rich framework to automate cyber insurance services

K Sane, KP Joshi, S Mittal - IEEE Transactions on Services …, 2021 - ieeexplore.ieee.org
With the rapid enhancements in technology and the adoption of web services, there has
been a significant increase in cyber threats faced by organizations in cyberspace. It has …