2020
DOI: 10.11591/ijece.v10i3.pp3184-3192
|View full text |Cite
|
Sign up to set email alerts
|

The protect mobile user data in Russia

Abstract: This paper studies the issue the information security for smartphone users in Russia. The report analyses the regulations the state uses to prevent undeclared functionality and malicious programs in mobile phones in Russia; the law enforcement practice in this area; the responsibility of legal entities, officials and persons for non-compliance with the requirements for standardization, ensuring information security and violation of declaration of conformity. The paper develops proposals to improve state regula… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 14 publications
(22 reference statements)
0
8
0
Order By: Relevance
“…The globalised world today demands speedy and efficient handling of every action [1]- [3]. The fastmoving actions are essential in ensuring that the services can be implemented in line with the rapid development of technology and information, including in the legal system [4]- [20]. Judges and lawyers generally handle legal cases, but the help of technology is critically essential due to the massive numbers of cases daily.…”
Section: Introductionmentioning
confidence: 99%
“…The globalised world today demands speedy and efficient handling of every action [1]- [3]. The fastmoving actions are essential in ensuring that the services can be implemented in line with the rapid development of technology and information, including in the legal system [4]- [20]. Judges and lawyers generally handle legal cases, but the help of technology is critically essential due to the massive numbers of cases daily.…”
Section: Introductionmentioning
confidence: 99%
“…To obtain a greater economic effect, it is necessary to take into account various socioeconomic and technological factors in a complex, among which the following can be distinguished: data protection of business process participants [23], the impact of end-to-end digital technologies, including artificial intelligence and robotics technologies [24,25], the significant impact of migration processes [26], effectiveness of state [27] and grant support [28], identification of competitive advantages [29], strengthening of investment attractiveness [30], introduction of intelligent technologies [31], the effectiveness of the use of money [32], solving issues of import substitution of goods and works [33], strengthening the effectiveness of various business institutions [34], the development of tourist areas [35] and solving environmental problems [36], the creation of effective economic mechanisms for innovative development [37] and the formation of competitive products [38].…”
Section: Discussionmentioning
confidence: 99%
“…Those methods are susceptive to a composition attack [6]. The IoT based approach proposed to maintain security in cloud environment [24], an association rule for hiding the sensitive knowledge as proposed the integer linear programming [25] and the paper [26] presents that how to protect the smartphone users. In order to identify a person's tuple in public information collections associated to their quasi-identifying attributes, the works [5], [27] use a complex linking procedure.…”
Section: Related Workmentioning
confidence: 99%