Filters








222,821 Hits in 6.3 sec

Human Models and Data in the Ubiquitous Information Infrastructure [chapter]

Frank Berkers, Jan Goossenaerts, Dieter Hammer, Hans Wortmann
2002 Lecture Notes in Computer Science  
It offers a solution to information modelling problems that originate from the current shift in the scope of information systems, from the enterprise to the enterprise network in the market.  ...  In this paper we address the modelling of humans in a context of ubiquitous information services.  ...  In the domain of enterprises and persons interacting with computers, data protection rules will limit the flow of data between the contexts pertaining to the individuals.  ... 
doi:10.1007/3-540-46140-x_8 fatcat:lictcfu3lbbkxkmp52vpr4nbg4

Analysis on the Judicial Interpretation of the Crawler Technology Infringing on the Intellectual Property Rights of Enterprise Data

Juan Yang, K.H.M. Mansur, Y. Fu
2021 E3S Web of Conferences  
This is also the basic method for the subsequent identification of infringement in the commercial application of enterprise data through crawler technology.  ...  In the actual process of web crawler infringement and criminal identification, there is a theory of "weakening the infringement typology and strengthening the presumption of legal interest".  ...  Among them, in the research of "personally identifiable information", the data set does not need to involve the names and detailed information of natural persons, which can also ensure that the application  ... 
doi:10.1051/e3sconf/202125101038 fatcat:2culjxomdzcc7baru7vstk2xby

Study on Classification of Data in Power Industry

Qin-yuan LI, Jing LI
2018 DEStech Transactions on Computer Science and Engineering  
In the protection of enterprise information, on April 27, 2010, the SASAC website promulgated the Interim Provisions on the Protection of Trade Secrets of State-owned-enterprises(SOEs) [9] , requiring  ...  Confidentiality refers to preventing information leakage and illegal access to protect personal and enterprise data.  ... 
doi:10.12783/dtcse/wcne2017/19825 fatcat:e5rwas4wyfdubehwg6geseysci

The EU General Data Protection Regulation Implications for Romanian Small and Medium-Sized Entreprises

Gheorghiu Gabriela, Spătariu Elena Cerasela, Carataș Maria Alina
2018 Ovidius University Annals: Economic Sciences Series  
In this light, the present paper analyzes the impact of the new regulation and the stage ofimplementation of the necessary measures for compliance at the level of the Romanian small andmedium sized enterprises  ...  Starting on 25 May 2018, all Member States, including Romania, must apply the new GeneralData Protection Regulation 2016/679.  ...  In the light of the new European Union data protection rules, entered into force in May 2018, which strengthen citizens' rights and simplify the rules applicable to businesses in the digital age, the present  ... 
doaj:1cdcb89613a042cb9264a3dfb87ff1aa fatcat:q373aczw65gadf56behmm5eb6m

Owner-managed closed it companies in croatia

Jasmina Mutabžija
2019 Zbornik Pravnog Fakulteta Sveučilišta u Rijeci  
Intellectual property protection is an important ingredient in the market success of knowledge-intensive enterprises operating in the information technology industry.  ...  This would suggest that most software enterprises in Croatia are passive when it comes to their intellectual property.  ...  persons, women held shares in 81 enterprises.  ... 
doi:10.30925/zpfsr.39.4.9 fatcat:qq4uaxu27bgpte2onycxsr44ya

Corresponding Security Level with the Risk Factors of Personally Identifiable Information through the Analytic Hierarchy Process

Iuon-Chang Lin, Yung-Wang Lin, Yu-Syuan Wu
2016 Journal of Computers  
In order to cope with the requirements of the new law, BS10012 specification can help enterprises to reduce impact of personal data protection law.  ...  Keywords: BS10012, personally information, new version of personal information protection act. .  ...  With the evolution of the times, many of the provisions already not applicable to the protection of personal information privacy and interest, and people are growing emphasis on their personal information  ... 
doi:10.17706/jcp.11.2.124-131 fatcat:ob67shqv5bfelluo3wlqg6ix4a

Personal data protection as an element of management security of information

Justyna Żywiołek
2019 Multidisciplinary Aspects of Production Engineering  
The results of research on information security management in the field of personal data protection have been presented. The research was carried out on a sample of 110 enterprises.  ...  In the following, the case study regarding the production enterprise was also presented.  ...  The key documents regarding the protection of personal data are primarily recalled (Kępa, 2015) : − declaration of the application, which defines all the safeguards applied in the organization, including  ... 
doi:10.2478/mape-2019-0052 fatcat:po6w3ltwdzeqrfiu5exiojg6hy

Legislation Research on Personal Information Protection in Internet Credit Investigation

Xinru Zhang
2022 Learning & Education  
the Internet credit investigation.Based on this, gradually improving the legislation of personal information protection in Internet credit investigation will help to solve the problems existing in Internet  ...  mainly manifested as, the coverage is also expanding, and the number of credit investigation is also increasing.However, due to the lack of relevant institutional guarantee, there are many shortcomings in  ...  how personal information should be protected judicially.At the same time, the content of the protection of personal information is scattered in the civil law, criminal law, administrative law and other  ... 
doi:10.18282/l-e.v10i5.2684 fatcat:3ezx4fztdvg5tmwqu65djv2jxu

Research on Legal Protection of Consumers' Personal Information From the Perspective of Public Interest Litigation

Yi Wang, Rui Ji, Yang Peng
2022 Asian Journal of Social Science Studies  
However, there are still many problems in public interest litigation of consumers' personal information protection.  ...  Therefore, it is urgent and important to strengthen the protection of consumers' personal information.  ...  Clarify the Scope and Order of Legal Application in the Field of Public Interest Litigation of Personal Information At present, there are many laws to protect consumers' personal information in China,  ... 
doi:10.20849/ajsss.v7i4.1088 fatcat:n762qsy4snecjjctiis2i2r2tq

BYOD and the Mobile Enterprise - Organisational challenges and solutions to adopt BYOD [article]

Andre Sobers
2015 arXiv   pre-print
to access information.  ...  With the rapid development in computing technology in smartphones and tablet computers and innovations in mobile software and applications, mobile devices are becoming ever more powerful tools for consumers  ...  In the future enterprise systems could harness information from the physical, socio and cyber space becoming more intelligent in identifying users, providing right access to organizational information,  ... 
arXiv:1512.03911v1 fatcat:fy5vn6xlkra4nncgy6r4kctzyu

Privacy Protection Method in the Era of Cloud Computing and Big Data

Ying Liu, J.Y. Li, T.Y. Liu, T. Deng, M. Tian
2015 MATEC Web of Conferences  
As a result, an increasing number of enterprises have engaged in the development and application of Cloud Computing Industry.  ...  After AIS, the Cloud Computing Company will become the development trend in the next generation of enterprise accounting information, and it may help promote the enterprise accounting information construction  ... 
doi:10.1051/matecconf/20152201041 fatcat:5443hqrlnfce3c4sxvq4tqey5i

Based on the Role of Internet of Things Security in the Management of Enterprise Human Resource Information Leakage

Zhen Zeng, Jiajia Zhang, Zhihan Lv
2021 Wireless Communications and Mobile Computing  
of information leakage and play the role of efficient and safe management of enterprise human resource information.  ...  This article studies the role of Internet of Things security in the management of enterprise human resource information leakage, in order to use Internet of Things security technology to reduce the possibility  ...  Conflicts of Interest The authors declare that there is no conflict of interest with any financial organizations regarding the material reported in this manuscript.  ... 
doi:10.1155/2021/5936390 fatcat:v3ub6lkvhbdy5ichkc7sn4oibi

Telecom Namibia Enterprise Mobile Architecture (TNEMA): Bring Your Own Devices

Valerie Garises
2014 Internet of Things and Cloud Computing  
In addition, TNEMA adequately protects sensitive data using Internet Protocol Security (IPsec) and Virtual Private Network (VPN) that established a secured path between the mobile devices and the Enterprise  ...  and from any-device for personal and business purposes.  ...  All data between employees' mobile device and the Enterprise Mobility Infrastructure is protected in an IPsec VPN tunnel.  ... 
doi:10.11648/j.iotcc.20140204.12 fatcat:pqdpp7sy7nhgbexo4qeswapm3u

Trends of Privacy and Surveillance in the Information Society [chapter]

Klaus Brunnstein
2010 IFIP Advances in Information and Communication Technology  
As data and processes will also be sensitive for enterprises, there is some hope that their interest and request for data protection will also help users and customers to protect sensitive personal information  ...  In the late 1980s, when large computers still dominated the application of Information Technologies to enterprise, industrial development and university research, and when small computers and networks  ... 
doi:10.1007/978-3-642-15479-9_17 fatcat:j2npx3hpafedbbuyszae53y7ay

Research on mobile application support system based on internal and external network

He Wu, Lin Qiao, Shuo Chen, Wei Liu, Feng Li, A. Elkamel
2019 MATEC Web of Conferences  
speed up the construction of enterprise mobile applications, and help "Internet +" management innovation and business innovation.  ...  Since 13th Five-Year, great changes have taken place in the situation at home and abroad.  ...  Acknowledgement Note: This paper is supported by the project of "Research on Improving Technological Innovation Ability and Mass Innovation -Information Communication Branch of State Grid Liaoning Electric  ... 
doi:10.1051/matecconf/201927201052 fatcat:cixeah3do5agvn6vnrdjx4m64y
« Previous Showing results 1 — 15 out of 222,821 results