Research trends, challenges, and emerging topics in digital forensics: A review of reviews

F Casino, TK Dasaklis, GP Spathoulas… - IEEE …, 2022 - ieeexplore.ieee.org
Due to its critical role in cybersecurity, digital forensics has received significant attention from
researchers and practitioners alike. The ever increasing sophistication of modern …

[HTML][HTML] Towards a GDPR compliant way to secure European cross border Healthcare Industry 4.0

X Larrucea, M Moffie, S Asaf, I Santamaria - Computer Standards & …, 2020 - Elsevier
The Health sector is gaining momentum within the Industry 4.0. National Health Systems are
tightly connected to different complex systems, and a wide set of devices. NHSs are …

Analysis of the adoption of security headers in HTTP

WJ Buchanan, S Helme… - IET Information Security, 2018 - Wiley Online Library
With the increase in the number of threats within web‐based systems, a more integrated
approach is required to ensure the enforcement of security policies from the server to the …

The meaning of Freedom after Covid-19

M Farina, A Lavazza - History and Philosophy of the Life Sciences, 2021 - Springer
Many governments have seen digital health technologies as promising tools to tackle the
current COVID-19 pandemic. A much-talked example in this context involves the recent …

[PDF][PDF] Ensuring the information security of information communication technology users in Russia

A Zharova - International Journal of Cyber Criminology, 2019 - cybercrimejournal.com
This paper studies information security for information communication technology (ICT)
users in Russia. The study used dialectic, metaphysical and tabular methods. An analysis of …

[图书][B] The handbook of privacy studies

B Van der Sloot, A De Groot - 2018 - degruyter.com
It was the beginning of 2010 when I (Bart) first joined the University of Amsterdam as a
privacy researcher. What struck me immediately were two things: how interdisciplinary the …

A large-scale analysis of HTTPS deployments: Challenges, solutions, and recommendations

Q Hu, MR Asghar, N Brownlee - Journal of Computer Security, 2021 - content.iospress.com
HTTPS refers to an application-specific implementation that runs HyperText Transfer
Protocol (HTTP) on top of Secure Socket Layer (SSL) or Transport Layer Security (TLS) …

Public attitudes towards surveillance and privacy of personal communications in 34 African countries

AO Adeyeye - Telematics and Informatics, 2024 - Elsevier
This paper examines public attitudes regarding the privacy of personal communications
across several African countries. The study additionally investigates factors influencing an …

Privacy attitudes and behaviors in the age of post-privacy: An empirical approach

N Demertzis, K Mandenaki, C Tsekeris - Journal of Digital Social Research, 2021 - jdsr.se
The digital world is a field of information and entertainment for users and a field of extraction
of the most valuable good of recent years: personal data. How much of a threat to privacy is …

[PDF][PDF] The protect mobile user data in Russia

A Zharova - International Journal of Electrical and Computer …, 2020 - core.ac.uk
This paper studies the issue the information security for smartphone users in Russia. The
report analyses the regulations the state uses to prevent undeclared functionality and …