Biomedical big data technologies, applications, and challenges for precision medicine: a review

X Yang, K Huang, D Yang, W Zhao… - Global Challenges, 2024 - Wiley Online Library
The explosive growth of biomedical Big Data presents both significant opportunities and
challenges in the realm of knowledge discovery and translational applications within …

Defining security requirements with the common criteria: Applications, adoptions, and challenges

N Sun, CT Li, H Chan, BD Le, MZ Islam… - IEEE …, 2022 - ieeexplore.ieee.org
Advances in emerging Information and Communications Technology (ICT) technologies
push the boundaries of what is possible and open up new markets for innovative ICT …

Blockchain application for Internet of Things and future prospect—A survey

I Khan, Y Majib, R Ullah, O Rana - Internet of Things, 2024 - Elsevier
In recent years, the Internet of Things (IoT) has been sha** our lives through billions of
internet based interconnected devices. However, due to the decentralized nature of these …

Effectiveness of banking card security in the Ethiopian financial sector: PCI-DSS security standard as a lens

L Lessa, D Gebrehawariat - International Journal of Industrial …, 2023 - emerald.com
Purpose This study is aimed at assessing the information security management practice with
a focus on banking card security in selected financial institutions in Ethiopia, using an …

Towards Secure IoT‐Based Payments by Extension of Payment Card Industry Data Security Standard (PCI DSS)

MNM Bhutta, S Bhattia, MA Alojail… - Wireless …, 2022 - Wiley Online Library
IoT emergence has given rise to a new digital experience of payment transactions where
physical objects like refrigerators, cars, and wearables will make payments. These physical …

User interfaces for managing an account

M Van Os, JW Chang, T Connor, J Fisher… - US Patent …, 2023 - Google Patents
G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY
ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR …

Computer operating system logging and security issues: a survey

L Zeng, Y **ao, H Chen, B Sun… - Security and …, 2016 - Wiley Online Library
Logging has become a fundamental feature within the modern computer operating systems
because of the fact that logging may be used through a variety of applications and fashion …

Investigating identity fraud management practices in e-tail sector: a systematic review

ZA Soomro, J Ahmed, MH Shah… - Journal of Enterprise …, 2019 - emerald.com
Purpose Identity fraud is a growing issue for online retail organisations. The literature on this
issue is scattered, and none of the studies presents a holistic view of identity fraud …