نتایج جستجو برای: act misuse

تعداد نتایج: 189847  

Journal: :Journal Of Media Law 2022

This commentary examines the Supreme Court’s decision in Lloyd v Google LLC. It outlines background to claim and legal ruling case. considers implications of for claims relating loss control over personal data, potential relevance compensation under UK General Data Protection Regulation Act 2018. also highlights some significant remarks made by Court tort misuse private information.

2006
Nicholas Seivewright Charles McMahon

This article discusses the misuse of drugs which act as stimulants, an effect mainly produced by enhancement of the central transmission of catecholamines, particularly dopamine. Stimulant misuse is extremely widespread in the UK and elsewhere, but primary users of such drugs present relatively rarely for treatment at drug services. At present such services mainly see heroin users, not only bec...

Journal: :FORUM: University of Edinburgh Postgraduate Journal of Culture & the Arts 2020

2012

The aim of this article is to explain how features of attacks could be extracted from the packets. It also explains how vectors could be built and then applied to the input of any analysis stage. For analyzing, the work deploys the Feedforward-Back propagation neural network to act as misuse intrusion detection system. It uses ten types if attacks as example for training and testing the neural ...

2012
Abdulrahman M. Al-senaidy Tauseef Ahmad Mohd Mudasir Shafi

Social networking sites and applications are the major phenomenon all over the world and are constantly on a rise. As the users share their information and data on these sites, these sites can act as major source for misuse of information. So these SNS take steps stop this misuse of information and allows users to choose what information to share and to with whom. This study is aimed to measure...

Journal: :Science 2005
Margaret A Somerville Ronald M Atlas

Advances in the life sciences, especially in molecular biology and informatics, and the potential for misuse of scientific research (the "dual-use" dilemma) raise the possibility that an act of terrorism could involve biological agents. International consensus is crucial on the steps needed to reduce this grave threat to humanity. One such step is to ensure that all people and institutions invo...

2007
Richard E. Overill Steven Lipner

SCOPE AND DEFINITIONS It is convenient to define computer crime as any criminal act which involves one or more computers either as the object of the crime or as accessories in its commission. Computer crime may then be subdivided into computer related crime (CRC) and computer assisted crime (CAC). In the former, the computer or its contents is the subject of the criminal act (eg hacking or deni...

2006
Jinho Lee Clark Thomborson Gary Guest

This paper reports on the results of a survey-based investigation into the perceived security requirements held by the U.S. dental schools for their enterprise dental information systems. The U.S. dental schools are faced with the legal requirement to comply with HIPAA which contains provisions that are intended to protect electronic patient information. However it is proving to be a challenge ...

Journal: :Computers in Human Behavior 2016
Aiman El Asam Muthanna Samara

Cyberbullying, in its different forms, is common among children and adolescents and is facilitated by the increased use of technology. The consequences of cyberbullying could be severe, especially on mental health, potentially leading to suicide in extreme cases. Although parents, schools and online social networking sites are encouraged to provide a safe online environment, little is known abo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید