KVMod—A Novel Approach to Design Key-Value NoSQL Databases

A Dourhri, M Hanine, H Ouahmane - Information, 2023 - mdpi.com
The growth of structured, semi-structured, and unstructured data produced by the new
applications is a result of the development and expansion of social networks, the Internet of …

[PDF][PDF] Big data management: Security and privacy concerns

IA Atoum, IM Keshta - International Journal of Advanced …, 2021 - pdfs.semanticscholar.org
Big data has been used by different companies to deliver simple products and provide
enhanced customer insights through predictive technology such as artificial intelligence. Big …

Method for Implementation of Preventive Technological Tools for Control and Monitoring of Fraud and Corruption

TCM Jácome, RFC Andagoya… - … and Systems: ICITS …, 2021 - books.google.com
The purpose of this work is to present a method for the implementation of preventive
technological tools like “The Fraud Explorer” for control and monitoring of fraud and …

Method for Implementation of Preventive Technological Tools for Control and Monitoring of Fraud and Corruption

TC Mayorga Jácome, RF Coloma Andagoya… - … Technology & Systems, 2021 - Springer
The purpose of this work is to present a method for the implementation of preventive
technological tools like “The Fraud Explorer” for control and monitoring of fraud and …

[PDF][PDF] ANÁLISIS DE RIESGOS DE SEGURIDAD DE LA INFORMACIÓN CON LA NORMA ISO 27005-ESTUDIO DE CASO

CWC Oviedo, TCM Jácome - … Y USO EDIFICADOR DEL CONOCIMIENTO DE … - redipe.org
Hoy en día todas las empresas cuentan con un activo intangible llamado “Información”
mismo que es importante para la continuidad de los negocios. El presente documento …