Sökning: "data protection"
Visar resultat 11 - 15 av 575 avhandlingar innehållade orden data protection.
11. Engineering Privacy for Mobile Health Data Collection Systems in the Primary Care
Sammanfattning : Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning of Community-Based Primary Health Care (CBPHC) – primary care outside the health facility into people’s homes. In particular, Mobile Health Data Collection Systems (MDCSs) are used by CHWs to collect health-related data about the families that they treat, replacing paper-based approaches for health surveys. LÄS MER
12. On Adapting Data Collection to Intrusion Detection
Sammanfattning : Intrusion detection systems (IDSs) are capable of detecting both suspicious insider activity and attacks from external penetrators. They can also detect both known and previously unknown attacks. These capabilities make them valuableassets in the protection of computer systems and networks. LÄS MER
13. The Lord of Their Data Under the GDPR? : Empowering Users Through Usable Transparency, Intervenability, and Consent
Sammanfattning : The challenges imposed by the ever-growing online data processing make it difficult for people to control their data, which inevitably imperils the privacy of their personal information and making informed decisions. Thus, there is an increasing need for different societal, technological, and legal solutions that empower users to take control of their data. LÄS MER
14. Design and Analysis of Self-protection : Adaptive Security for Software Systems
Sammanfattning : Today's software landscape features a high degree of complexity, frequent changes in requirements and stakeholder goals, and uncertainty.Uncertainty and high complexity imply a threat landscape where cybersecurity attacks are a common occurrence while their consequences are often severe. LÄS MER
15. Design and Analysis of Self-protection : Adaptive Security for Software-Intensive Systems
Sammanfattning : Today’s software landscape features a high degree of complexity, frequent changes in requirements and stakeholder goals, and uncertainty. Uncertainty and high complexity imply a threat landscape where cybersecurity attacks are a common occurrence, while their consequences are often severe. LÄS MER