• Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
  • Login
  • Register
logo
  • Login
  • Register
Skip to main content Skip to main navigation menu Skip to site footer
logo
  • Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
ISSN : 2321-3418
  1. Home /
  2. Search

Search

Advanced filters
1 - 25 of 74 items 1 2 3 > >> 

AI-Driven Data Governance Frameworks for Enhanced Privacy and Compliance

DOI:https://doi.org/10.18535/ijsrm/v11i02.ec4
Narendra Devarasetty (1)
983-1006
Abstract : 258
PDF : 197
DOI:https://doi.org/10.18535/ijsrm/v11i02.ec4

DATA PRIVACY AND REGULATORY COMPLIANCE IN THE USA: A CALL FOR A CENTRALIZED REGULATORY FRAMEWORK

DOI:https://doi.org/10.18535/ijsrm/v12i12.lla01
Olumide Ajayi (1)
573-584
Abstract : 751
PDF : 152
DOI:https://doi.org/10.18535/ijsrm/v12i12.lla01

Information Ownership and Privacy Control in Information Society

DOI:https://doi.org/10.18535/ijsrm/v10i6.lis01
Godwin Lucky Stephen (1), Nwabugwu Mgbodichima Jummai (2)
25-33
Abstract : 164
PDF : 227
DOI:https://doi.org/10.18535/ijsrm/v10i6.lis01

Data privacy in cloud computing: A comparative study of privacy preserving techniques

DOI:https://doi.org/10.18535/
Gireesh Kambala (1)
1299-1316
Abstract : 418
PDF : 163
DOI:https://doi.org/10.18535/

Privacy Preservation of Social Network Data

Miss. Srushti. N. Patil Prof. Priti. A. Khodke (1)
3252-3258
Abstract : 63
PDF : 45
DOI:

Integrity and Confidentiality of Data Protection on Consumers' Privacy in Tanzania: A Case Study of TCRA

DOI:https://doi.org/10.18535/ijsrm/v11i03.em11
Mishael Abduel (1), Kulwa Magingila (2)
4770-4775
Abstract : 213
PDF : 198
DOI:https://doi.org/10.18535/ijsrm/v11i03.em11

Efficient Customer Data Privacy Management in Hadoop Ecosystems: A Scalable Query Engine Approach

DOI:https://doi.org/10.18535/ijsrm/v8i11.ec01
Sai Kiran Reddy Malikireddy (1)
446-457
Abstract : 127
PDF : 40
DOI:https://doi.org/10.18535/ijsrm/v8i11.ec01

Advanced Database Strategies for Multi-Location Environments: Privacy, Security, and AI Integration

DOI:https://doi.org/0.18535/ijsrm/v13i07.ec02
Karthick Ramachandran (1)
2377-2385
Abstract : 401
PDF : 104
DOI:https://doi.org/0.18535/ijsrm/v13i07.ec02

Ethical Considerations in AI-Powered Work Environments: A Literature Review and Theoretical Framework for Ensuring Human Dignity and Fairness

DOI:https://doi.org/10.18535/ijsrm/v12i03.em18
David Oyekunle (1), David Boohene (2), David Preston (3)
6166-6178
Abstract : 1511
PDF : 656
DOI:https://doi.org/10.18535/ijsrm/v12i03.em18

Protection on Social Network Data Using Sensitive and NonSensitive Labels

Prabhanjana Konni Balaka Ramesh Naidu (1)
Abstract : 49
PDF : 30
DOI:

Customers Adaptation of E-banking services; extending TAM through Anthpmorphism in Saudi Arabia

DOI:https://doi.org/10.18535/ijsrm/v11i10.em07
Kholoud Alqutub (1)
5249-5262
Abstract : 242
PDF : 141
DOI:https://doi.org/10.18535/ijsrm/v11i10.em07

Fuzzy Based Implementation of Multi - Keyword Ranked Search over Encrypted Cloud Data in Secure Cloud Environment

DOI:https://doi.org/10.18535/ijsrm/v5i12.06
Gladiss Merlin. N (1)
7610-7617
Abstract : 86
PDF : 57
DOI:https://doi.org/10.18535/ijsrm/v5i12.06

Graph-Based Models for Multi-Tenant Security in Cloud Computing

DOI:https://doi.org/10.18535/ijsrm/v9i08.ec02
Sai Dikshit Pasham (1)
611-633
Abstract : 149
PDF : 66
DOI:https://doi.org/10.18535/ijsrm/v9i08.ec02

Optimizing Edge AI for Real-Time Data Processing in IoT Devices: Challenges and Solutions

DOI:https://doi.org/10.18535/ijsrm/v11i06.ec2
Gopalakrishnan Arjunan (1)
944-953
Abstract : 516
PDF : 138
DOI:https://doi.org/10.18535/ijsrm/v11i06.ec2

The end of all taxation and censorship using blockchain technology

DOI:https://doi.org/10.18535/ijsrm/v9i08.ec01
Tanmay Munjal (1)
604-610
Abstract : 95
PDF : 52
DOI:https://doi.org/10.18535/ijsrm/v9i08.ec01

Face Recognition Technology: Benefits, Applications, and Challenges

DOI:https://doi.org/10.18535/ijsrm/v13i03.ec05
Zulhadi Zakaria (1)
2096-2102
Abstract : 399
PDF : 112
DOI:https://doi.org/10.18535/ijsrm/v13i03.ec05

Superiority of Twofish over Blowfish

Deepali D. Rane (1)
Abstract : 61
PDF : 106
DOI:

Architecting Cloud Database Solutions with Embedded AI for Real-Time Analytics

DOI:https://doi.org/10.18535/ijsrm/v13i06.ec01
Padma Rama Divya Achanta (1)
2208-2219
Abstract : 544
PDF : 82
DOI:https://doi.org/10.18535/ijsrm/v13i06.ec01

Towards Secure Top-k Multi keyword Retrieval over encrypted cloud data

Lekshmi k pillai, P.Saranya, (1)
Abstract : 60
PDF : 40
DOI:

Smart Defense: How Self-Learning AI Can Shield Bangladeshi Medical Records

DOI:https://doi.org/10.18535/ijsrm/v12i05.ec02
Engr. Rajib Mazumder (1), Muhammad Anwar Hossain (2), Dr. Aparna Chakraborty (3)
1174-1180
Abstract : 220
PDF : 96
DOI:https://doi.org/10.18535/ijsrm/v12i05.ec02

Economic Impacts of AI-Driven Automation in Financial Services

DOI:https://doi.org/10.18535/ijsrm/v12i07.em07
Toluwani Babatunde Adeyeri (1)
6779-6791
Abstract : 1204
PDF : 644
DOI:https://doi.org/10.18535/ijsrm/v12i07.em07

Scalable AI: Leveraging Cloud and Edge Computing for Real-Time Analytics

DOI:https://doi.org/10.18535/
Vinay Chowdary Manduva (1)
1788-1813
Abstract : 125
PDF : 93
DOI:https://doi.org/10.18535/

Influence of Organizational Security Learning Practices on Insider Security Threats in SoCs in Kenya

DOI:https://doi.org/10.18535/ijsrm/v12i08.em04
Charles Mwenda Ikiara (1), Dr. Boniface Ratemo (2), Dr. George Musumba (3)
7027-7035
Abstract : 286
PDF : 96
DOI:https://doi.org/10.18535/ijsrm/v12i08.em04

The Role of Memory in LLMs: Persistent Context for Smarter Conversations

DOI:https://doi.org/10.18535/ijsrm/v12i11.ec04
Valentina Porcu (1)
1673-1691
Abstract : 381
PDF : 2432
DOI:https://doi.org/10.18535/ijsrm/v12i11.ec04

Effect of Cashless Financial Services on Economic Growth in Kigali, Rwanda

DOI:https://doi.org/10.18535/ijsrm/v12i01.em03
Mupenzi Esperance (1)
5743-5755
Abstract : 917
PDF : 607
DOI:https://doi.org/10.18535/ijsrm/v12i01.em03
1 - 25 of 74 items 1 2 3 > >> 

Metrics

Citations 3245
2yr mean_citedness 0.323
h index 21
i10 index 67
ICV 2024 88.02

Whatsapp

Join IJSRM.NET Channel

Make a Submission

Make a Submission

Author Desk

Author Guidelines Call for paper Publication fee Mode of Payment Indexing Publication Ethics Review Process Right and License Digital Archiving

Download

Manuscript Template Copyright form Journal Cover Page

i

Impact Factor : 6.997

Indexig

Indexing

  • WorldCat
  • Ivy Science
  • Google Schloar
  • OpenAlex.
  • ResearchGate
  • LivRe
  • Index Copernicus
  • ROAD
  • CrossRef Member
  • ScienceGate
  • Scite_ Index
  • Academia.Edu
  • Exaly
  • Advanced Sciences Index

Information

  • For Readers
  • For Authors
  • For Librarians

ABOUT US
IJSRM, the premier online destination for researchers, scholars, and innovators. Our platform provides a global network of professionals and experts....

HEAD OFFICE
24 Kialash Vihar
Mandsaur Near R.T.O. Office Mandsaur (M.P.) 458001 India
 
 
 

Quick Menu

  • Home
  • About Us
  • Current Issue
  • Archive
  • Open Access
  • Support & FAQs

Information for

  • Authors
  • Editors
  • Reviewers
  • Librarians
  • Researchers
  • Societies

Journal & Policies

  • Publication Ethics
  • Review Policy
  • Publication Ethics
  • Licensing and Copyright
  • Open Access Policy
  • Plagiarism Policy

Copyright © International Journal of Scientific Research and Management (IJSRM) - All Rights Reserved