A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is application/pdf
.
Filters
Human Models and Data in the Ubiquitous Information Infrastructure
[chapter]
2002
Lecture Notes in Computer Science
It offers a solution to information modelling problems that originate from the current shift in the scope of information systems, from the enterprise to the enterprise network in the market. ...
In this paper we address the modelling of humans in a context of ubiquitous information services. ...
In the domain of enterprises and persons interacting with computers, data protection rules will limit the flow of data between the contexts pertaining to the individuals. ...
doi:10.1007/3-540-46140-x_8
fatcat:lictcfu3lbbkxkmp52vpr4nbg4
Analysis on the Judicial Interpretation of the Crawler Technology Infringing on the Intellectual Property Rights of Enterprise Data
2021
E3S Web of Conferences
This is also the basic method for the subsequent identification of infringement in the commercial application of enterprise data through crawler technology. ...
In the actual process of web crawler infringement and criminal identification, there is a theory of "weakening the infringement typology and strengthening the presumption of legal interest". ...
Among them, in the research of "personally identifiable information", the data set does not need to involve the names and detailed information of natural persons, which can also ensure that the application ...
doi:10.1051/e3sconf/202125101038
fatcat:2culjxomdzcc7baru7vstk2xby
Study on Classification of Data in Power Industry
2018
DEStech Transactions on Computer Science and Engineering
In the protection of enterprise information, on April 27, 2010, the SASAC website promulgated the Interim Provisions on the Protection of Trade Secrets of State-owned-enterprises(SOEs) [9] , requiring ...
Confidentiality refers to preventing information leakage and illegal access to protect personal and enterprise data. ...
doi:10.12783/dtcse/wcne2017/19825
fatcat:e5rwas4wyfdubehwg6geseysci
The EU General Data Protection Regulation Implications for Romanian Small and Medium-Sized Entreprises
2018
Ovidius University Annals: Economic Sciences Series
In this light, the present paper analyzes the impact of the new regulation and the stage ofimplementation of the necessary measures for compliance at the level of the Romanian small andmedium sized enterprises ...
Starting on 25 May 2018, all Member States, including Romania, must apply the new GeneralData Protection Regulation 2016/679. ...
In the light of the new European Union data protection rules, entered into force in May 2018, which strengthen citizens' rights and simplify the rules applicable to businesses in the digital age, the present ...
doaj:1cdcb89613a042cb9264a3dfb87ff1aa
fatcat:q373aczw65gadf56behmm5eb6m
Owner-managed closed it companies in croatia
2019
Zbornik Pravnog Fakulteta Sveučilišta u Rijeci
Intellectual property protection is an important ingredient in the market success of knowledge-intensive enterprises operating in the information technology industry. ...
This would suggest that most software enterprises in Croatia are passive when it comes to their intellectual property. ...
persons, women held shares in 81 enterprises. ...
doi:10.30925/zpfsr.39.4.9
fatcat:qq4uaxu27bgpte2onycxsr44ya
Corresponding Security Level with the Risk Factors of Personally Identifiable Information through the Analytic Hierarchy Process
2016
Journal of Computers
In order to cope with the requirements of the new law, BS10012 specification can help enterprises to reduce impact of personal data protection law. ...
Keywords: BS10012, personally information, new version of personal information protection act. . ...
With the evolution of the times, many of the provisions already not applicable to the protection of personal information privacy and interest, and people are growing emphasis on their personal information ...
doi:10.17706/jcp.11.2.124-131
fatcat:ob67shqv5bfelluo3wlqg6ix4a
Personal data protection as an element of management security of information
2019
Multidisciplinary Aspects of Production Engineering
The results of research on information security management in the field of personal data protection have been presented. The research was carried out on a sample of 110 enterprises. ...
In the following, the case study regarding the production enterprise was also presented. ...
The key documents regarding the protection of personal data are primarily recalled (Kępa, 2015) : − declaration of the application, which defines all the safeguards applied in the organization, including ...
doi:10.2478/mape-2019-0052
fatcat:po6w3ltwdzeqrfiu5exiojg6hy
Legislation Research on Personal Information Protection in Internet Credit Investigation
2022
Learning & Education
the Internet credit investigation.Based on this, gradually improving the legislation of personal information protection in Internet credit investigation will help to solve the problems existing in Internet ...
mainly manifested as, the coverage is also expanding, and the number of credit investigation is also increasing.However, due to the lack of relevant institutional guarantee, there are many shortcomings in ...
how personal information should be protected judicially.At the same time, the content of the protection of personal information is scattered in the civil law, criminal law, administrative law and other ...
doi:10.18282/l-e.v10i5.2684
fatcat:3ezx4fztdvg5tmwqu65djv2jxu
Research on Legal Protection of Consumers' Personal Information From the Perspective of Public Interest Litigation
2022
Asian Journal of Social Science Studies
However, there are still many problems in public interest litigation of consumers' personal information protection. ...
Therefore, it is urgent and important to strengthen the protection of consumers' personal information. ...
Clarify the Scope and Order of Legal Application in the Field of Public Interest Litigation of Personal Information At present, there are many laws to protect consumers' personal information in China, ...
doi:10.20849/ajsss.v7i4.1088
fatcat:n762qsy4snecjjctiis2i2r2tq
BYOD and the Mobile Enterprise - Organisational challenges and solutions to adopt BYOD
[article]
2015
arXiv
pre-print
to access information. ...
With the rapid development in computing technology in smartphones and tablet computers and innovations in mobile software and applications, mobile devices are becoming ever more powerful tools for consumers ...
In the future enterprise systems could harness information from the physical, socio and cyber space becoming more intelligent in identifying users, providing right access to organizational information, ...
arXiv:1512.03911v1
fatcat:fy5vn6xlkra4nncgy6r4kctzyu
Privacy Protection Method in the Era of Cloud Computing and Big Data
2015
MATEC Web of Conferences
As a result, an increasing number of enterprises have engaged in the development and application of Cloud Computing Industry. ...
After AIS, the Cloud Computing Company will become the development trend in the next generation of enterprise accounting information, and it may help promote the enterprise accounting information construction ...
doi:10.1051/matecconf/20152201041
fatcat:5443hqrlnfce3c4sxvq4tqey5i
Based on the Role of Internet of Things Security in the Management of Enterprise Human Resource Information Leakage
2021
Wireless Communications and Mobile Computing
of information leakage and play the role of efficient and safe management of enterprise human resource information. ...
This article studies the role of Internet of Things security in the management of enterprise human resource information leakage, in order to use Internet of Things security technology to reduce the possibility ...
Conflicts of Interest The authors declare that there is no conflict of interest with any financial organizations regarding the material reported in this manuscript. ...
doi:10.1155/2021/5936390
fatcat:v3ub6lkvhbdy5ichkc7sn4oibi
Telecom Namibia Enterprise Mobile Architecture (TNEMA): Bring Your Own Devices
2014
Internet of Things and Cloud Computing
In addition, TNEMA adequately protects sensitive data using Internet Protocol Security (IPsec) and Virtual Private Network (VPN) that established a secured path between the mobile devices and the Enterprise ...
and from any-device for personal and business purposes. ...
All data between employees' mobile device and the Enterprise Mobility Infrastructure is protected in an IPsec VPN tunnel. ...
doi:10.11648/j.iotcc.20140204.12
fatcat:pqdpp7sy7nhgbexo4qeswapm3u
Trends of Privacy and Surveillance in the Information Society
[chapter]
2010
IFIP Advances in Information and Communication Technology
As data and processes will also be sensitive for enterprises, there is some hope that their interest and request for data protection will also help users and customers to protect sensitive personal information ...
In the late 1980s, when large computers still dominated the application of Information Technologies to enterprise, industrial development and university research, and when small computers and networks ...
doi:10.1007/978-3-642-15479-9_17
fatcat:j2npx3hpafedbbuyszae53y7ay
Research on mobile application support system based on internal and external network
2019
MATEC Web of Conferences
speed up the construction of enterprise mobile applications, and help "Internet +" management innovation and business innovation. ...
Since 13th Five-Year, great changes have taken place in the situation at home and abroad. ...
Acknowledgement Note: This paper is supported by the project of "Research on Improving Technological Innovation Ability and Mass Innovation -Information Communication Branch of State Grid Liaoning Electric ...
doi:10.1051/matecconf/201927201052
fatcat:cixeah3do5agvn6vnrdjx4m64y
« Previous
Showing results 1 — 15 out of 222,821 results