Downloads provided by UsageCounts
In 21 st century the digitalization of the processes and information has taken place very rapidly. Every organization in the competitive era has the confidential information and processes. The success of every organization is based on the security of such secret data and information. Confidential data,information,processes plays a vital role in development of the enterprise,in order to withstand in this market with a huge business competitors . Security of such information is really a challenge and many researcher s have tried addressing this problem in last decade. Theft of such data may include the product development information,research data,business plans,financial details,list of the customers. It has been observed in the research that most of the times such data is stolen by insiders. Authors have tried to present the overview of various solutions proposed by researchers in past decade. https://www.ijiert.org/paper-details?paper_id=140880
Digital Rights Management,, Information Thef
Digital Rights Management,, Information Thef
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 2 | |
| downloads | 2 |

Views provided by UsageCounts
Downloads provided by UsageCounts