Data Protection Laws
Data protection, data privacy, and information privacy are all terms defined as the process of protecting important data/information from corruption, scam, fraud, loss, or compromise. This includes the relationship between the data collection and technology, the public perception and expectation of...
| Main Authors: | Alginahi, Hiba, Alginahi, Yasser M., Kabir, M. Nomani |
|---|---|
| Other Authors: | Yasser, M. Alginahi |
| Format: | Book Chapter |
| Language: | English English |
| Published: |
The Institution of Engineering and Technology (IET)
2019
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/26260/ http://umpir.ump.edu.my/id/eprint/26260/1/71.%20Data%20protection%20laws.pdf http://umpir.ump.edu.my/id/eprint/26260/12/Chapter%2012Data%20Protection%20Laws.pdf |
Similar Items
A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents
by: M. Nomani, Kabir, et al.
Published: (2014)
by: M. Nomani, Kabir, et al.
Published: (2014)
An Arabic Script Recognition System
by: Alginahi, Yasser M., et al.
Published: (2015)
by: Alginahi, Yasser M., et al.
Published: (2015)
Towards optimal search: a modified secant method for efficient search in a big database
by: M. Nomani, Kabir, et al.
Published: (2018)
by: M. Nomani, Kabir, et al.
Published: (2018)
Numerical solution of bio-nano-convection transport from a horizontal plate with blowing and multiple slip effects
by: Uddin, Md. Jashim, et al.
Published: (2019)
by: Uddin, Md. Jashim, et al.
Published: (2019)
On the development of a web extension for text authentication on google chrome
by: M. Nomani, Kabir, et al.
Published: (2019)
by: M. Nomani, Kabir, et al.
Published: (2019)
Introduction
by: Kabir, M. Nomani, et al.
Published: (2019)
by: Kabir, M. Nomani, et al.
Published: (2019)
Conclusion
by: Alginahi, Yasser M., et al.
Published: (2019)
by: Alginahi, Yasser M., et al.
Published: (2019)
Simulation of Building Evacuation: Performance Analysis and Simplified Model
by: Alginahi, Yasser M., et al.
Published: (2016)
by: Alginahi, Yasser M., et al.
Published: (2016)
An improved Watermarking Technique for Copyright Protection Based on Tchebichef Moments
by: Ernawan, Ferda, et al.
Published: (2019)
by: Ernawan, Ferda, et al.
Published: (2019)
A blind watermarking using redundant wavelet transform for copyright protection
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Simulation of Oxidation Catalyst Converter for After-Treatment in Diesel Engines
by: M. Nomani, Kabir, et al.
Published: (2015)
by: M. Nomani, Kabir, et al.
Published: (2015)
A blind watermarking technique using redundant wavelet transform for copyright protection
by: Ernawan, F., et al.
Published: (2018)
by: Ernawan, F., et al.
Published: (2018)
Availability Analysis of Shared Backup Path Protection
Under Multiple-link Failure Scenario in WDM Networks
by: M. Nomani, Kabir, et al.
Published: (2014)
by: M. Nomani, Kabir, et al.
Published: (2014)
Assessment of Wireless Technologies for deployment in Intelligent Transportation System based on Internet of Things
by: Ali, Jahan, et al.
Published: (2017)
by: Ali, Jahan, et al.
Published: (2017)
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al.
by: Esmeel, Thamer Khalil, et al.
Optimal search algorithm in a big database using interpolation–extrapolation method
by: Kabir, M. Nomani, et al.
Published: (2019)
by: Kabir, M. Nomani, et al.
Published: (2019)
A robust algorithm for solving nonlinear system of equations using trust-region and line-search techniques
by: Kabir, M. Nomani
Published: (2020)
by: Kabir, M. Nomani
Published: (2020)
Numerical investigation of Von Karman swirling bioconvective nanofluid transport from a rotating disk in a porous medium with Stefan blowing and anisotropic slip effects
by: Bég, O. Anwar, et al.
Published: (2021)
by: Bég, O. Anwar, et al.
Published: (2021)
A blind watermarking technique based on DCT psychovisual threshold for a robust copyright protection
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Analysis of a Transportation System with Correlated Network Intersections: A Case Study for a Central Urban City With High Seasonal Fluctuation Trends
by: Tayan, Omar, et al.
Published: (2017)
by: Tayan, Omar, et al.
Published: (2017)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
An energy functional model by gradient vector-driven active contour for local fitted image segmentation
by: Wang, Jing, et al.
Published: (2019)
by: Wang, Jing, et al.
Published: (2019)
An enhanced model to increase awareness on phishing attacks for vocational students
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
Modeling lung functionality in volume-controlled ventilation for critical care patients
by: Al-Hetari, Husam Yousef, et al.
Published: (2020)
by: Al-Hetari, Husam Yousef, et al.
Published: (2020)
An Expanding Neighbourhood Search Technique for Avalanche Search-and-Rescue Operations using Air Ground Collaborative Wireless Networks
by: Azad, Saiful, et al.
Published: (2018)
by: Azad, Saiful, et al.
Published: (2018)
Economic perspective analysis of protecting big data security and privacy
by: Tao, Hai, et al.
Published: (2019)
by: Tao, Hai, et al.
Published: (2019)
An adaptive large DCT psychovisual threshold in image compression
by: Ernawan, Ferda, et al.
Published: (2019)
by: Ernawan, Ferda, et al.
Published: (2019)
Lie Group Analysis and Numerical Solution of Magnetohydrodynamic Free Convective Slip Flow of Micropolar Fluid Over a Moving Plate With Heat Transfer
by: Uddin, M. J., et al.
Published: (2015)
by: Uddin, M. J., et al.
Published: (2015)
Modeling and Simulation of Traffic flow: A Case Study - First Ring Road in Downtown Madinah
by: M. Nomani, Kabir, et al.
Published: (2016)
by: M. Nomani, Kabir, et al.
Published: (2016)
Computational Investigation of Hydromagnetic Thermo-Solutal Nanofluid Slip Flow in a Darcian Porous Medium With Zero Mass Flux Boundary Condition Using Stretching Group Transformations
by: Uddin, Md. Jashim, et al.
Published: (2015)
by: Uddin, Md. Jashim, et al.
Published: (2015)
A Robust Image Watermarking Technique With an Optimal DCT-Psychovisual Threshold
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
A block-based RDWT-SVD image watermarking method using human visual system characteristics
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Epilepsy detection using EEG signals
by: Amer, Salam, et al.
Published: (2018)
by: Amer, Salam, et al.
Published: (2018)
On mitigating hop-to-hop congestion problem in IoT enabled Intra-Vehicular communication
by: Rahman, Md. Arafatur, et al.
Published: (2015)
by: Rahman, Md. Arafatur, et al.
Published: (2015)
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
An Enhanced Model for Increasing Awareness of Vocational Students Against Phishing Attacks
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
Scalable MAC Strategy for Emergency Communication Networks
by: Abbas, Ali. M. H., et al.
Published: (2018)
by: Abbas, Ali. M. H., et al.
Published: (2018)
Online Homestay Reservation Application For Langkawi Homestay
by: Hiba, Hanan M.F.A.
Published: (2008)
by: Hiba, Hanan M.F.A.
Published: (2008)
Epilepsy detection from EEG signals using artificial neural network
by: Sallam, Amer A., et al.
Published: (2019)
by: Sallam, Amer A., et al.
Published: (2019)
Enhancing the Awareness Level on Phishing Attacks Among Malaysians: Analysis and Recommendations
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2018)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2018)
Similar Items
-
A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents
by: M. Nomani, Kabir, et al.
Published: (2014) -
An Arabic Script Recognition System
by: Alginahi, Yasser M., et al.
Published: (2015) -
Towards optimal search: a modified secant method for efficient search in a big database
by: M. Nomani, Kabir, et al.
Published: (2018) -
Numerical solution of bio-nano-convection transport from a horizontal plate with blowing and multiple slip effects
by: Uddin, Md. Jashim, et al.
Published: (2019) -
On the development of a web extension for text authentication on google chrome
by: M. Nomani, Kabir, et al.
Published: (2019)