Browse Definitions :
  • August 31, 2017 31 Aug'17

    weaponized information

    Weaponized information is a message or content piece that is designed to affect the recipient's perception about something or someone in a way that is not warranted.  Continue Reading

  • August 31, 2017 31 Aug'17

    cognitive hacking

    Cognitive hacking is a cyberattack that seeks to manipulate the perception of people by exploiting their psychological vulnerabilities. The purpose of the attack is changes in behavior, usually resulting from exposure to misinformation.  Continue Reading

  • August 31, 2017 31 Aug'17

    cognitive security

    Cognitive security is the application of AI technologies patterned on human thought processes to detect threats and protect physical and digital systems.  Continue Reading

  • August 31, 2017 31 Aug'17

    body cam (bodycam)

    A body cam (bodycam) is an audio/video recording device that is clipped to one’s clothing, on the torso.  Continue Reading

  • August 31, 2017 31 Aug'17

    legal analytics

    Legal analytics is the application of data analysis methods and technologies within the field of law to improve efficiency, gain insight and realize greater value from available data.  Continue Reading

  • August 30, 2017 30 Aug'17

    forensic image

    A forensic image (forensic copy) is a bit-by-bit, sector-by-sector direct copy of a physical storage device, including all files, folders and unallocated, free and slack space.  Continue Reading

  • August 30, 2017 30 Aug'17

    digital profiling

    Digital profiling is the process of gathering and analyzing information about an individual that exists online. A digital profile can include information about personal characteristics, behaviors, affiliations, connections and interactions.  Continue Reading

  • August 30, 2017 30 Aug'17

    digital identity

    A digital identity is the body of information about an individual, organization or electronic device that exists online. Unique identifiers and use patterns make it possible to detect individuals or their devices.  Continue Reading

  • August 30, 2017 30 Aug'17

    digital evidence presentation system (DEPS)

    A digital evidence presentation system (DEPS) is a system with an overhead camera and a liquid crystal display (LCD) used in courts to present and record evidence digitally.  Continue Reading

  • August 30, 2017 30 Aug'17

    computational economics

    Computational economics is a field of economic study at the intersection of computer science, economics and management science.  Continue Reading

  • August 30, 2017 30 Aug'17

    digital preservation

    As a part of the formalized efforts of library and archival sciences, digital preservation includes the practices required to ensure that information is safe from medium failures as well as software and hardware obsolescence.  Continue Reading

  • August 30, 2017 30 Aug'17

    content as a service (CaaS)

    Content as a service (CaaS) is a web-based service for the creation, storage, management and delivery of content such as text, audio, video or images.  Continue Reading

  • August 30, 2017 30 Aug'17

    Unfreeze, Change, Refreeze (Kurt Lewin Change Management Model)

    Unfreeze, Change, Refreeze, also known as the Kurt Lewin Change Management Model, is a method for managing change within an organization.  Continue Reading

  • August 30, 2017 30 Aug'17

    computational law

    Computational law is the area of legal informatics focusing on the automation of formerly manual processes and the integration of legal information with other applications and systems.  Continue Reading

  • August 29, 2017 29 Aug'17

    Melbourne shuffle algorithm

    The Melbourne shuffle algorithm is a sequence of actions intended to obscure the patterns by which cloud-based data is accessed.  Continue Reading

  • August 29, 2017 29 Aug'17

    consignment inventory

    Consignment inventory is a supply chain model in which a product is sold by a retailer, but ownership is retained by the supplier until the product has been sold.  Continue Reading

  • August 29, 2017 29 Aug'17

    internet shaming (online shaming)

    Internet shaming is the use of social media, blogs and other online communication channels to attack a target individual or organization. The purpose of the attack is often to publicly embarrass the target, often as retribution for some behavior.  Continue Reading

  • August 29, 2017 29 Aug'17

    FPV drone (first-person view drone)

    An FPV drone is an unmanned aerial vehicle (UAV) with a camera that wirelessly transmits video feed to goggles, a headset, a mobile device or another display.  Continue Reading

  • August 23, 2017 23 Aug'17

    fulfillment center

    A fulfillment center is a warehouse where incoming orders are received, processed and filled.  Continue Reading

  • August 23, 2017 23 Aug'17

    cycle counting

    Cycle counting is an inventory-control method that lets businesses conduct a regular count of several items in different areas in a warehouse, without constantly adding up the entire inventory.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close