![]() Using the comparative law method, a comparison was made between the current laws of nine EU Member States to create a map of protection for victims of revenge porn. “Revenge porn” and “deepfake porn” illustrate the inadequacy of legal systems vis a vis the fast-changing reality. Unlawful activities carried out with the use of generated images and artificial intelligence are a variant of this phenomenon. The use of images of persons in a pornographic context (without the prior consent of the person concerned) on the internet is an increasingly widespread infringement. The proposed scheme complies with the privacy principles of HIPAA and GDPR. ![]() The proposed scheme overcomes the limitations of alternative schemes, is computationally more efficient, and provides more functionality. Therefore, this investigation develops a secure and efficient non-certificate-based authenticated key agreement scheme that uses lightweight operations, including Chebyshev chaotic maps and hash operations. Recent studies have shown that cryptosystems that use modular exponential computation and scalar multiplication on elliptic curves are less efficient than those based on Chebyshev chaotic maps. Most recently developed authenticated key agreement schemes for HIPAA and GDPR privacy/security involve modular exponential computations or scalar multiplications on elliptic curves to provide higher security, but they are computationally heavy and therefore costly to implement. These are set, for example, by the Health Insurance Portability and Accountability Act (HIPAA) in the United States and the General Data Protection Regulation (GDPR) in Europe. To protect the privacy of patients, various regions of the world maintain privacy standards. The two most important concerns regarding their use involve the security of the Internet and the privacy of patients. This research forms the basis for renewal of the current generation of ERP systems and proposes to ERP vendors to use different database concepts in the future.Įlectronically protected health information is held in computerized healthcare records that contain complete healthcare information and are easily shareable or retrieved by various health care providers via the Internet. From a conceptual point of view, this paper supports the idea of federated databases which are interoperable to fulfill future requirements and support business operation. To this end, the results highlight the demand to combine multiple database approaches to fulfill recent business requirements. The results reveal the strengths and weaknesses of recent database approaches. ![]() Prominent database approaches were assessed against the 23 requirements identified. Using a systematic literature approach, recent requirements for ERP systems were identified. So far, relational databases are widely used. Since database serve as the foundation for data storage and retrieval, they limit the flexibility of enterprise systems and the chance to adapt to new requirements accordingly. Given that many restrictions ERP pose on their adaptability are related to the standardization of data, the database layer of ERP systems is addressed. Therefore, there is an urgent need to reconsider the overall architecture of the systems and address the root of the related issues. ERP systems in particular, which represent the dominant class of enterprise systems, are struggling to meet the new requirements at all levels of the architecture. ![]() The digital transformation sets new requirements to all classes of enterprise systems in companies. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |