A Bag, S Kadiyan, S Newton… - New Perspectives and …, 2023 - igi-global.com
This chapter examines the implications of blockchain technology on the processing of personal data and its compliance with the general data protection regulation (GDPR) within …
P Bhardwaj, S Darrab, D Broneske, I Klose… - Future of Information and …, 2024 - Springer
This paper focuses on using metadata to enforce the right to be forgotten in large-scale data lakes. With the rise of cloud storage services for massive data storage, ensuring compliance …
Proses penemuan obat telah memasuki era baru dengan munculnya kecerdasan buatan (artificial intelligence/AI) dan big data. Pendekatan tradisional, panjang, dan mahal kini …
A typical cybersecurity incident involves a timeline, from attack, to threat identification, to response and then to mitigation. In today's rapidly evolving digital landscape, the realm of …
Ad-blockers allow online consumers to focus more on website content without the distraction of ads; however, they ultimately reduce the viability of various forms of digital advertising …
Z Ismagambetov - The American Journal of Engineering and Technology, 2025 - inlibrary.uz
This article identifies the primary advantages of automating the testing processes of medical applications, significantly enhancing their reliability and safety. Special attention is given to …
Unmanned Aerial Vehicles (UAVs), or drones, were initially developed for military purposes, primarily for surveillance and military operations. Over time, their use expanded into various …
The thesis explores the multi-layered compliance landscape of the GDPR to address significant research gaps on its theoretical understanding and practical implementation. This …
A Kusumaputra, FM Sukarmi - Russian Journal of Agricultural …, 2023 - cyberleninka.ru
The world has been growing massively, giving rise to the presence of frequently used cyberspace in society. However, its presence triggers transnational criminal problems, which …