ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Computing
Technology
Computing
Education
Research
Architecture and Urbanism
Economy
Social Sciences
Pure sciences
Communication
all records (75)

Languages
English
Spanish
Portuguese
German

Countries
Indonesia
USA
Brazil
Ukraine
South Africa
Canada
Austria
Italy
Spain
Romania
all records (76)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
246.433  Articles
1 of 24.644 pages  |  10  records  |  more records»
While community infrastructure initiatives work to make it easier for researchers to manage and share their data, two cultural and social factors require our attention. Just 9% of researchers feel they get sufficient credit for data sharing, according to ... see more

While community infrastructure initiatives work to make it easier for researchers to manage and share their data, two cultural and social factors require our attention. Just 9% of researchers feel they get sufficient credit for data sharing, according to ... see more

Incorrectly designed login forms can result in malicious credentials being exploited to gain unauthorized access. Designing the appearance of the form is enough to have a role so as not to make the user confused when faced with the login form page. In ord... see more

This research focuses on legal certainty regarding the formulation of children's personal data in the PDP Law and legal protection efforts for children's personal data on social media. This research is a normative legal research with a concept and statuto... see more

The Information Technology-Based Mutual Funding Service Industry (LPBBTI) or known as Fintech P2P Lending is in great demand by the unbanked, this has attracted many illegal P2P lending platforms to also enliven this industry. One of the legal problems th... see more

Unlike Law Number 27 of 2022 Concerning Personal Data Protection, the ITE Law does not stipulate criminal penalties for people who distribute personal data without the consent of the owner of the personal data. Misuse of personal data is an act that fulfi... see more

Artikel ini ingin menjawab pentingnya penetapan aturan hukum yang tegas dan kompre-hensif yang dapat memberikan perlindungan terhadap data pribadi yang berlangsung melalui media elektronik di Indonesia. Permasalahan ini muncul dengan perkembangan teknolog... see more

This study discusses the effectiveness of using AES (Advanced Encryption Standard) and RC4 (Rivest Chipper 4) as digital data security algorithms to prevent and protect transaction data from irresponsible parties. This needs to be done because the develop... see more

The personal data of the Jaya Krama Beringin Private High School students is required in the administrative data collection by the school. Personal data includes student identification such as student name, family identification number (NIK), gender, addr... see more

1 of 24.644 pages  |  10  records  |  more records»