Security and Privacy in Information Processing
Gespeichert in:
| Veröffentlicht in: | PQDT - Global (2025) |
|---|---|
| 1. Verfasser: | |
| Veröffentlicht: |
ProQuest Dissertations & Theses
|
| Schlagworte: | |
| Online-Zugang: | Citation/Abstract Full Text - PDF Full text outside of ProQuest |
| Tags: |
Keine Tags, Fügen Sie das erste Tag hinzu!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3260484371 | ||
| 003 | UK-CbPIL | ||
| 020 | |a 9798291514764 | ||
| 035 | |a 3260484371 | ||
| 045 | 2 | |b d20250101 |b d20251231 | |
| 084 | |a 189128 |2 nlm | ||
| 100 | 1 | |a Rahimli Shirzad, Rahim | |
| 245 | 1 | |a Security and Privacy in Information Processing | |
| 260 | |b ProQuest Dissertations & Theses |c 2025 | ||
| 513 | |a Dissertation/Thesis | ||
| 520 | 3 | |a Relevance of the topic and degree of development is security and confidentiality of information during its processing is a very relevant and important topic, especially in the modern world, where information is a key resource. The relevance is due to the growing volume of information, its importance for various areas of activity, as well as the increasing number of threats and abuses in the digital space.The transfer of most information archives, funds and communications into electronic form has created an independent type of asset – information. Like any value, it is subject to attacks by various fraudsters. Significant risks also arise in the area of ensuring state security in the sphere of information; the main threats are named in the Doctrine of State Information Security. Ignoring emerging problems leads to a loss of competitiveness both at the state and corporate levels. Citizens also suffer from crimes committed in the information sphere. | |
| 653 | |a Freedoms | ||
| 653 | |a Data integrity | ||
| 653 | |a Personal information | ||
| 653 | |a Regulation | ||
| 653 | |a Disaster recovery | ||
| 653 | |a Employees | ||
| 653 | |a Confidentiality | ||
| 653 | |a Prejudice | ||
| 653 | |a Fines & penalties | ||
| 653 | |a Data processing | ||
| 653 | |a Responsibilities | ||
| 653 | |a Information systems | ||
| 653 | |a Third party | ||
| 653 | |a Privacy | ||
| 653 | |a Data transmission | ||
| 653 | |a Access control | ||
| 653 | |a Suppliers | ||
| 653 | |a Consent | ||
| 653 | |a Computer science | ||
| 653 | |a Information science | ||
| 773 | 0 | |t PQDT - Global |g (2025) | |
| 786 | 0 | |d ProQuest |t ProQuest Dissertations & Theses Global | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3260484371/abstract/embedded/75I98GEZK8WCJMPQ?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3260484371/fulltextPDF/embedded/75I98GEZK8WCJMPQ?source=fedsrch |
| 856 | 4 | 0 | |3 Full text outside of ProQuest |u http://hdl.handle.net/20.500.12323/8046 |