• Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
  • Login
  • Register
logo
  • Login
  • Register
Skip to main content Skip to main navigation menu Skip to site footer
logo
  • Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
ISSN : 2321-3418
  1. Home /
  2. Search

Search

Advanced filters
1 - 25 of 74 items 1 2 3 > >> 

AI-Driven Data Governance Frameworks for Enhanced Privacy and Compliance

DOI:https://doi.org/10.18535/ijsrm/v11i02.ec4
Narendra Devarasetty (1)
983-1006
Abstract : 285
PDF : 222
DOI:https://doi.org/10.18535/ijsrm/v11i02.ec4

DATA PRIVACY AND REGULATORY COMPLIANCE IN THE USA: A CALL FOR A CENTRALIZED REGULATORY FRAMEWORK

DOI:https://doi.org/10.18535/ijsrm/v12i12.lla01
Olumide Ajayi (1)
573-584
Abstract : 778
PDF : 164
DOI:https://doi.org/10.18535/ijsrm/v12i12.lla01

Information Ownership and Privacy Control in Information Society

DOI:https://doi.org/10.18535/ijsrm/v10i6.lis01
Godwin Lucky Stephen (1), Nwabugwu Mgbodichima Jummai (2)
25-33
Abstract : 179
PDF : 240
DOI:https://doi.org/10.18535/ijsrm/v10i6.lis01

Data privacy in cloud computing: A comparative study of privacy preserving techniques

DOI:https://doi.org/10.18535/
Gireesh Kambala (1)
1299-1316
Abstract : 447
PDF : 266
DOI:https://doi.org/10.18535/

Privacy Preservation of Social Network Data

Miss. Srushti. N. Patil Prof. Priti. A. Khodke (1)
3252-3258
Abstract : 73
PDF : 47
DOI:

Integrity and Confidentiality of Data Protection on Consumers' Privacy in Tanzania: A Case Study of TCRA

DOI:https://doi.org/10.18535/ijsrm/v11i03.em11
Mishael Abduel (1), Kulwa Magingila (2)
4770-4775
Abstract : 226
PDF : 216
DOI:https://doi.org/10.18535/ijsrm/v11i03.em11

Efficient Customer Data Privacy Management in Hadoop Ecosystems: A Scalable Query Engine Approach

DOI:https://doi.org/10.18535/ijsrm/v8i11.ec01
Sai Kiran Reddy Malikireddy (1)
446-457
Abstract : 133
PDF : 45
DOI:https://doi.org/10.18535/ijsrm/v8i11.ec01

Advanced Database Strategies for Multi-Location Environments: Privacy, Security, and AI Integration

DOI:https://doi.org/0.18535/ijsrm/v13i07.ec02
Karthick Ramachandran (1)
2377-2385
Abstract : 418
PDF : 113
DOI:https://doi.org/0.18535/ijsrm/v13i07.ec02

Ethical Considerations in AI-Powered Work Environments: A Literature Review and Theoretical Framework for Ensuring Human Dignity and Fairness

DOI:https://doi.org/10.18535/ijsrm/v12i03.em18
David Oyekunle (1), David Boohene (2), David Preston (3)
6166-6178
Abstract : 1673
PDF : 731
DOI:https://doi.org/10.18535/ijsrm/v12i03.em18

Protection on Social Network Data Using Sensitive and NonSensitive Labels

Prabhanjana Konni Balaka Ramesh Naidu (1)
Abstract : 55
PDF : 35
DOI:

Customers Adaptation of E-banking services; extending TAM through Anthpmorphism in Saudi Arabia

DOI:https://doi.org/10.18535/ijsrm/v11i10.em07
Kholoud Alqutub (1)
5249-5262
Abstract : 259
PDF : 151
DOI:https://doi.org/10.18535/ijsrm/v11i10.em07

Fuzzy Based Implementation of Multi - Keyword Ranked Search over Encrypted Cloud Data in Secure Cloud Environment

DOI:https://doi.org/10.18535/ijsrm/v5i12.06
Gladiss Merlin. N (1)
7610-7617
Abstract : 94
PDF : 63
DOI:https://doi.org/10.18535/ijsrm/v5i12.06

Graph-Based Models for Multi-Tenant Security in Cloud Computing

DOI:https://doi.org/10.18535/ijsrm/v9i08.ec02
Sai Dikshit Pasham (1)
611-633
Abstract : 161
PDF : 79
DOI:https://doi.org/10.18535/ijsrm/v9i08.ec02

Optimizing Edge AI for Real-Time Data Processing in IoT Devices: Challenges and Solutions

DOI:https://doi.org/10.18535/ijsrm/v11i06.ec2
Gopalakrishnan Arjunan (1)
944-953
Abstract : 549
PDF : 147
DOI:https://doi.org/10.18535/ijsrm/v11i06.ec2

The end of all taxation and censorship using blockchain technology

DOI:https://doi.org/10.18535/ijsrm/v9i08.ec01
Tanmay Munjal (1)
604-610
Abstract : 100
PDF : 61
DOI:https://doi.org/10.18535/ijsrm/v9i08.ec01

Face Recognition Technology: Benefits, Applications, and Challenges

DOI:https://doi.org/10.18535/ijsrm/v13i03.ec05
Zulhadi Zakaria (1)
2096-2102
Abstract : 475
PDF : 140
DOI:https://doi.org/10.18535/ijsrm/v13i03.ec05

Superiority of Twofish over Blowfish

Deepali D. Rane (1)
Abstract : 67
PDF : 111
DOI:

Architecting Cloud Database Solutions with Embedded AI for Real-Time Analytics

DOI:https://doi.org/10.18535/ijsrm/v13i06.ec01
Padma Rama Divya Achanta (1)
2208-2219
Abstract : 561
PDF : 95
DOI:https://doi.org/10.18535/ijsrm/v13i06.ec01

Towards Secure Top-k Multi keyword Retrieval over encrypted cloud data

Lekshmi k pillai, P.Saranya, (1)
Abstract : 67
PDF : 40
DOI:

Smart Defense: How Self-Learning AI Can Shield Bangladeshi Medical Records

DOI:https://doi.org/10.18535/ijsrm/v12i05.ec02
Engr. Rajib Mazumder (1), Muhammad Anwar Hossain (2), Dr. Aparna Chakraborty (3)
1174-1180
Abstract : 226
PDF : 109
DOI:https://doi.org/10.18535/ijsrm/v12i05.ec02

Economic Impacts of AI-Driven Automation in Financial Services

DOI:https://doi.org/10.18535/ijsrm/v12i07.em07
Toluwani Babatunde Adeyeri (1)
6779-6791
Abstract : 1274
PDF : 657
DOI:https://doi.org/10.18535/ijsrm/v12i07.em07

Scalable AI: Leveraging Cloud and Edge Computing for Real-Time Analytics

DOI:https://doi.org/10.18535/
Vinay Chowdary Manduva (1)
1788-1813
Abstract : 148
PDF : 102
DOI:https://doi.org/10.18535/

Influence of Organizational Security Learning Practices on Insider Security Threats in SoCs in Kenya

DOI:https://doi.org/10.18535/ijsrm/v12i08.em04
Charles Mwenda Ikiara (1), Dr. Boniface Ratemo (2), Dr. George Musumba (3)
7027-7035
Abstract : 313
PDF : 107
DOI:https://doi.org/10.18535/ijsrm/v12i08.em04

The Role of Memory in LLMs: Persistent Context for Smarter Conversations

DOI:https://doi.org/10.18535/ijsrm/v12i11.ec04
Valentina Porcu (1)
1673-1691
Abstract : 416
PDF : 2543
DOI:https://doi.org/10.18535/ijsrm/v12i11.ec04

Effect of Cashless Financial Services on Economic Growth in Kigali, Rwanda

DOI:https://doi.org/10.18535/ijsrm/v12i01.em03
Mupenzi Esperance (1)
5743-5755
Abstract : 928
PDF : 633
DOI:https://doi.org/10.18535/ijsrm/v12i01.em03
1 - 25 of 74 items 1 2 3 > >> 

Metrics

Citations 3245
2yr mean_citedness 0.323
h index 21
i10 index 67
ICV 2024 88.02

Whatsapp

Join IJSRM.NET Channel

Make a Submission

Make a Submission

Author Desk

Author Guidelines Call for paper Publication fee Mode of Payment Indexing Publication Ethics Review Process Right and License Digital Archiving

Download

Manuscript Template Copyright form Journal Cover Page

i

Impact Factor : 6.997

Indexig

Indexing

  • WorldCat
  • Ivy Science
  • Google Schloar
  • OpenAlex.
  • ResearchGate
  • LivRe
  • Index Copernicus
  • ROAD
  • CrossRef Member
  • ScienceGate
  • Scite_ Index
  • Academia.Edu
  • Exaly
  • Advanced Sciences Index

Information

  • For Readers
  • For Authors
  • For Librarians

ABOUT US
IJSRM, the premier online destination for researchers, scholars, and innovators. Our platform provides a global network of professionals and experts....

HEAD OFFICE
24 Kialash Vihar
Mandsaur Near R.T.O. Office Mandsaur (M.P.) 458001 India
 
 
 

Quick Menu

  • Home
  • About Us
  • Current Issue
  • Archive
  • Open Access
  • Support & FAQs

Information for

  • Authors
  • Editors
  • Reviewers
  • Librarians
  • Researchers
  • Societies

Journal & Policies

  • Publication Ethics
  • Review Policy
  • Publication Ethics
  • Licensing and Copyright
  • Open Access Policy
  • Plagiarism Policy

Copyright © International Journal of Scientific Research and Management (IJSRM) - All Rights Reserved