"data protection" - Selaus asiasanan mukaan Jyväskylän ammattikorkeakoulu
Viitteet 1-7 / 7
-
Countermeasures against digital forensics of handheld devices, computers and services
(2023)Digitaalinen forensiikka eli rikostutkinta on tieteenhaara, joka tutkii todisteiden keruuta rikostutkinnoissa, joissa todisteet ovat digitaalisia. Digitaalisen rikostutkinnan menetelmät soveltuvat myös vainoamiseen ja ... -
Evaluating security and privacy of SaaS service
(2023)Software as a Service (SaaS) -sovelluksista on tullut suosittu tapa IT-palveluiden käyttämiseen, erityisesti pienissä tai keskisuurissa organisaatioissa (pk-yritykset). SaaS-mallissa asiakas on riippuvainen palveluntarjoajasta ... -
Improving IT administration security by using security controls based on security frameworks
(2022)Cybercrime continues to grow, and more effort should be put into defending capabilities against crimi-nals. When an attacker breaks into an organization’s IT infrastructure, its primary goal is to reach the ad-ministrator’s ... -
Practices in Reinforcing Patient Privacy among Nursing Students
(2024)Information and telecommunication technology are widely used by a majority of nursing students nowadays, and the digitalisation process was further accelerated during the pandemic. However, technological advancement does ... -
Rise of the Canadian Network Society
(2021)Current protection acts and legislations set in place for Canadian residents regarding their privacy and securities online are not adequate and must be reviewed. It was investigated whether Canadian residents are aware of ... -
Security Analysis of Web Application for Industrial Internet of Things
(2022)With the technological advancement in Internet of Things (IoT), modern manufacturing and service indus-tries are massively shifting towards connected devices and creating a connected ecosystem by deploying third-party ... -
Uncovering privacy threats with Soft Systems Methodology: Development of a privacy threat modelling method for today’s needs
(2021)Uhkia tietosuojan vaatimustenmukaisuudelle osataan tunnistaa, mutta menetelmät puuttuvat sellaisten tietosuojan ja yksityisyyden uhkien tunnistamiseen, jotka nousevat järjestelmien toiminnasta kontekstissa ja henkilötietojen ...