Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Data Security

Handbook of Research on Financial Management During Economic Downturn and Recovery
Data Security is a process of protecting files, databases, and accounts on a network by adopting a set of controls, applications, and techniques that identify the relative importance of different datasets, their sensitivity, regulatory compliance requirements and then applying appropriate protections to secure those resources.
Published in Chapter:
Blockchain Technology in Securitization in India
Anirudh Menon (Center for Management Studies, Jain University (Deemed), India), Dikshant Khandelwal (Center for Management Studies, Jain University (Deemed), India), Kailash Multanmal Suthar (Center for Management Studies, Jain University (Deemed), India), and Sunitha B. K. (Center for Management Studies, Jain University (Deemed), India)
DOI: 10.4018/978-1-7998-6643-5.ch019
Abstract
Blockchain and securitization's benefits go beyond the benefits of loan originating, underwriting, rating assignment and reviews, loan servicing, smart contracts, secondary market trading. This research is based on the qualitative data collected from external sources. The focus is on using secondary data from over 30 research papers, articles, and professional experiments that have been taken into account, and the formulas and conditions gathered from them have been experimented with the Indian economic scenario. The understanding is that securitization has always been a challenge in a country like India, but with the wide range of benefits from the ‘blockchain', it can help improve the challenges and ensure a wider scope of securitization in a country like India, emphasizing that blockchain gives an elevated level of information security which brings about lower ingenuity trouble and disposes of administrative failures from the cycle of securitization.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Using Data Masking for Balancing Security and Performance in Data Warehousing
Information technology expert field involving the protection of any form of data.
Full Text Chapter Download: US $37.50 Add to Cart
Tech-Savvy Is the New Street Smart: Balancing Protection and Awareness
Linked to data privacy rights, the term refers to the IT mechanisms to protect data through defined processes, filters, fire walls, encryption-in-transit, etc.
Full Text Chapter Download: US $37.50 Add to Cart
Impact of Big Data on Security
Data insurance, in like manner called information security, is the piece of information advancement (IT) that game plans with the limit an affiliation or individual needs to make sense of what data in a PC system can be bestowed to outsiders.
Full Text Chapter Download: US $37.50 Add to Cart
With the Head in the Cloud
Protecting data from destructive and intruding forces and from the unwanted actions of unauthorized users.
Full Text Chapter Download: US $37.50 Add to Cart
Right to Correct Information in the Cyber World
Data security refers to protecting digital data from an attacker.
Full Text Chapter Download: US $37.50 Add to Cart
Monitoring Environmental Performance of Agricultural Supply Chains Using Internet of Things
Data Security encompasses the deployment of safeguards and procedures aimed at safeguarding digital data against unauthorized access, utilization, disclosure, interference, alteration, or destruction, thereby preserving its confidentiality, integrity, and accessibility.
Full Text Chapter Download: US $37.50 Add to Cart
Automated Detection of SQL Injection Attack on Blockchain-Based Database
Protection of digital content in online/offline mode by any kind of attack which is performed by the adversary.
Full Text Chapter Download: US $37.50 Add to Cart
Data Security in Clinical Trials Using Blockchain Technology
The process of protecting data from unauthorized access and data corruption throughout all lifecycle.
Full Text Chapter Download: US $37.50 Add to Cart
The Detection of SQL Injection on Blockchain-Based Database
Protection of digital content in online/offline mode by any kind of attack which is performed by the adversary.
Full Text Chapter Download: US $37.50 Add to Cart
Key Challenges Faced When Preserving Records in Traditional Councils During the 4th Industrial Revolution
Data security refers to the practice of protecting digital information, such as files, databases, and systems, from unauthorised access, alteration, or destruction.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain-Based Health Information Systems to Improve Data Security
Refers to all the processes employed to protect digital information and ensure Confidentiality, Integrity, and Availability of such information is guaranteed to authorized users only.
Full Text Chapter Download: US $37.50 Add to Cart
Secure Collaborative Learning Practices and Mobile Technology
Technical means of ensuring that data is kept safe from corruption and that access to it can be suitably controlled. Data security helps to protect personal data.
Full Text Chapter Download: US $37.50 Add to Cart
Big Data Governance in Agile and Data-Driven Software Development: A Market Entry Case in the Educational Game Industry
The processes and technologies that ensure that sensitive and confidential data about an organization are kept secure according to the organization’s policies.
Full Text Chapter Download: US $37.50 Add to Cart
Business Transaction Privacy and Security Issues in Near Field Communication
Data security provides storage and transmits security by using encryption algorithm.
Full Text Chapter Download: US $37.50 Add to Cart
Fortifying Data Security in the Evolving Digital Landscape: Challenges and Solutions
Full Text Chapter Download: US $37.50 Add to Cart
Voice-Based Speaker Identification and Verification
It is used to protect digital data, such as those in a database, from destructive forces and the unwanted actions of unauthorized users.
Full Text Chapter Download: US $37.50 Add to Cart
Adoption of Blockchain to Support the National Health Insurance Implementation in South Africa: An Integrative Review
Data such as patient’s medical records possess confidential information and thus requires protection in form of system security to ensure that only authorized personnel (such as doctors) may be granted access to such information.
Full Text Chapter Download: US $37.50 Add to Cart
Data Privacy and Security Safeguarding Customer Information in ChatGPT Systems
Embraces the strategies and procedures put in place to safeguard digital data from unauthorized entry, disclosure, modification, destruction, and other types of data breaches or cyber risks.
Full Text Chapter Download: US $37.50 Add to Cart
Examining User Understanding and Perceptions of E-Commerce Data Privacy, Security, and Protection
Data security refers to the protection of digital data from unauthorized access, use, disclosure, alteration, or destruction. It involves the implementation of measures and protocols to safeguard data integrity, confidentiality, and availability.
Full Text Chapter Download: US $37.50 Add to Cart
The Empirical Analysis of Cloud Computing Services among the Hungarian Enterprises
Protection against illegal or wrongful intrusion. In the IT world, intrusion concerns mostly deal with gaining access to user and company data.
Full Text Chapter Download: US $37.50 Add to Cart
Medical Data Security Tools and Techniques in E-Health Applications
It is the combination of procedure, processes, and systems used to attain the fulfilment of data confidentiality, accountability, integrity, and availability as needed.
Full Text Chapter Download: US $37.50 Add to Cart
Intelligent Assistance Systems for Marketing Decisions
Data security is provide storage and transmit security by using encryption algorithm.
Full Text Chapter Download: US $37.50 Add to Cart
How Do Mobile Applications for Cancer Communicate About Their Privacy Practices?: An Analysis of Privacy Policies
The process of protecting the availability, integrity, and privacy of information from undesired actions.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Telework and Data Privacy and Security
Data files are not subject to unauthorized access, change or destruction
Full Text Chapter Download: US $37.50 Add to Cart
Revolutionizing Health Data Management With Blockchain Technology: Enhancing Security and Efficiency in a Digital Era
Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases, and websites. It also protects data from corruption.
Full Text Chapter Download: US $37.50 Add to Cart
Global Wannacrypt Ransomware Attack: Tackling the Threat of Virtual Marauders
The practice of keeping data protected from corruption and unauthorized access.
Full Text Chapter Download: US $37.50 Add to Cart
Essential Characteristics of Health Information Systems
The process of protecting data from unauthorized access, disclosure, alteration, or destruction to ensure its confidentiality, integrity, and availability.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain Technology: Concepts, Components, and Cases
Data security is keeping any digital database out of the reach of unauthorised entities and attacks. It involves ensuring the privacy for the miner, giving authentication for sender and receiver, securing the transactions in the process and minimizing the noise errors.
Full Text Chapter Download: US $37.50 Add to Cart
Taxonomy of Ethical Dilemmas in Artificial Intelligence
Data security is the practice of protecting digital information from unauthorized access, corruption, or theft throughout its entire lifecycle.
Full Text Chapter Download: US $37.50 Add to Cart
Security Issues of Cloud Migration and Optical Networking in Future Internet
Issues related to physical and application security comprising authentication, authorization, availability, confidentiality, integrity, incident response, security monitoring and security policy management.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy in the Digital World
The protection of data from disclosure, alteration, destruction, or loss that either is accidental or intentional but unauthorized.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR