Software

New method enables automated protections for sensitive data

Just as people need to protect their sensitive data, such as social security numbers, manufacturing companies need to protect their sensitive corporate data. There are currently fewer protections for proprietary manufacturing ...

Machine learning & AI

Opinion mining

Public opinion on microblogging sites, such as Twitter, is randomly distributed, so data mining such information offers many technical challenges. Writing in the International Journal of Autonomous and Adaptive Communications ...

Computer Sciences

Cleaning up money laundering

Money laundering is big business but wholly illegal big business. It has an enormously negative impact on local, national, and international economies as well as providing the financial means to fund other criminal activities ...

Security

Crawling the invisible web genetically

The world-wide web has grown immensely since its academic and research inception in 1991, and its subsequent expansion into the public and commercial domains. Initially, it was a network of hyperlinked pages and other digital ...

Machine learning & AI

How to make the dreaded task of data entry less despised

A recent study showing that data entry is one the most redundant and hated workplace tasks raises questions about why, in the age of artificial intelligence, data mining and smart technologies, this task is still being done ...

Internet

A new battleground in the web browser wars: Privacy

Google announced a massive shift last week in how it handles cookies, those pesky digital trackers that chase us around the internet and serve up targeted ads that are both creepy yet eerily precise reflections of our wants. ...

Internet

Can anyone be completely anonymous?

Research published in the International Journal of Electronic Governance has investigated whether any of five "anonymous" social media applications are secure in that they do not allow a third party to see personal data or ...

page 1 from 2