Research on Security Governance of Data Elements in the Context of Digitization
This paper presents a multi-subject collaborative data security governance system architecture that caters to various aspects of data security governance. It also introduces an attribute-based encryption technology that utilizes multi-subject data, specifically a multi-subject access control policy...
Saved in:
| Published in | Applied mathematics and nonlinear sciences Vol. 9; no. 1 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
Beirut
Sciendo
01.01.2024
De Gruyter Brill Sp. z o.o., Paradigm Publishing Services |
| Subjects | |
| Online Access | Get full text |
| ISSN | 2444-8656 2444-8656 |
| DOI | 10.2478/amns-2024-3119 |
Cover
| Abstract | This paper presents a multi-subject collaborative data security governance system architecture that caters to various aspects of data security governance. It also introduces an attribute-based encryption technology that utilizes multi-subject data, specifically a multi-subject access control policy fusion algorithm scheme from a technical perspective. The neural network is chosen to build the prediction model. The particle speed is changed using the linear decreasing weight strategy. The improved particle swarm algorithm is used to set the initial weight coefficients and bias variables of the BP neural network. This creates the shared information security risk prediction model. In order to derive the maximum number of iterations of the data security risk prediction model, analyze the encryption and decryption overhead of the multi-owner access control strategy. Additionally, analyze the fluctuation amplitude of MAE and MRE that meets the error threshold range, selecting the virus attack industry for analysis. The probability of occurrence of information data risk points is assessed by analyzing the frequency of coding structure for data technology risk, data management risk, and data legal risk, which is combined with the interview data. The statistics show that the data management risk category, with a standard deviation of 32.64, is more volatile than the two core categories of data technology risk and data legal risk. The lack of stability exposes the data security of e-commerce platforms to risky turbulence. |
|---|---|
| AbstractList | This paper presents a multi-subject collaborative data security governance system architecture that caters to various aspects of data security governance. It also introduces an attribute-based encryption technology that utilizes multi-subject data, specifically a multi-subject access control policy fusion algorithm scheme from a technical perspective. The neural network is chosen to build the prediction model. The particle speed is changed using the linear decreasing weight strategy. The improved particle swarm algorithm is used to set the initial weight coefficients and bias variables of the BP neural network. This creates the shared information security risk prediction model. In order to derive the maximum number of iterations of the data security risk prediction model, analyze the encryption and decryption overhead of the multi-owner access control strategy. Additionally, analyze the fluctuation amplitude of MAE and MRE that meets the error threshold range, selecting the virus attack industry for analysis. The probability of occurrence of information data risk points is assessed by analyzing the frequency of coding structure for data technology risk, data management risk, and data legal risk, which is combined with the interview data. The statistics show that the data management risk category, with a standard deviation of 32.64, is more volatile than the two core categories of data technology risk and data legal risk. The lack of stability exposes the data security of e-commerce platforms to risky turbulence. |
| Author | Xu, Jiang Li, Tao |
| Author_xml | – sequence: 1 givenname: Tao surname: Li fullname: Li, Tao organization: Informationize Construction and Management Office, Jiangsu University of Science and Technology, Zhenjiang, Jiangsu, 212100, China – sequence: 2 givenname: Jiang surname: Xu fullname: Xu, Jiang email: xujiang8626@126.com organization: College of Science, Jiangsu University of Science and Technology, Zhenjiang, Jiangsu, 212100, China |
| BookMark | eNqFkN1LwzAUxYNMcM69-hzwuVuSJmn7KHNOYTDw47lk6e3W0SUzSdX619s6QR8En-6Be87h3t85GhhrAKFLSiaMJ-lU7Y2PGGE8iinNTtCQcc6jVAo5-KXP0Nj7HSGExTSWkg3R6gE8KKe32Br8CLpxVWjxwr6CM8powLbENyooPK9hDyZ4XBkctoBn1gR4D1_7alOF6kOFypoLdFqq2sP4e47Q8-38aXYXLVeL-9n1MtKMSRolSqRr0DHL0kQzKrXO1kqUIHRBheC8SDlTGeMyKTVNCBFAtCg50HVSiKKk8QhNj72NOaj2TdV1fnDVXrk2pyTvkeQ9krxHkvdIusTVMXFw9qUBH_Kdbbona9_tM8o6SJJ1rsnRpZ313kH5f216DHQ3BHAFbFzTduKn_e9gRuNPjUOEmg |
| Cites_doi | 10.1007/978-3-319-54380-2_11 10.1016/j.techfore.2017.09.040 10.1108/ICS-06-2017-0039 10.3390/mti8070055 10.1136/bmjhci-2023-100953 10.26689/jera.v8i3.7194 10.1093/ppmgov/gvx017 10.14763/2019.2.1413 10.1177/2053951716682537 10.1002/9781119491422 10.1016/j.techfore.2021.120743 10.3390/informatics4040041 10.3145/epi.2021.jul.02 10.1177/0275074017724225 10.1007/s10796-019-09923-z 10.1007/s10639-021-10817-4 10.1111/poms.12838 10.1007/978-3-030-92385-3_11 10.1007/s42979-022-01020-4 10.1016/j.eswa.2020.114060 10.2105/AJPH.2016.303512 10.1163/22134514-00502001 10.9734/ajeba/2023/v23i181055 10.4324/9781315199269 10.1109/ACCESS.2019.2961404 10.1016/j.ijinfomgt.2019.07.008 10.1016/j.cose.2019.02.009 10.1016/j.compbiomed.2020.104130 10.1038/s41746-024-01070-3 |
| ContentType | Journal Article |
| Copyright | 2024. This work is published under http://creativecommons.org/licenses/by/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: 2024. This work is published under http://creativecommons.org/licenses/by/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | AAYXX CITATION ABUWG AFKRA AZQEC BENPR CCPQU DWQXO PHGZM PHGZT PIMPY PKEHL PQEST PQQKQ PQUKI PRINS ADTOC UNPAY |
| DOI | 10.2478/amns-2024-3119 |
| DatabaseName | CrossRef ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central ProQuest One Community College ProQuest Central ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | CrossRef Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 2 dbid: BENPR name: ProQuest Central url: http://www.proquest.com/pqcentral?accountid=15518 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Applied Sciences |
| EISSN | 2444-8656 |
| ExternalDocumentID | 10.2478/amns-2024-3119 10_2478_amns_2024_3119 10_2478_amns_2024_311991 |
| GroupedDBID | 9WM AATOW ABFKT ADBLJ AFKRA AHGSO ALMA_UNASSIGNED_HOLDINGS AMVHM ARCSS BENPR CCPQU EBS M~E OK1 PHGZM PHGZT PIMPY QD8 SLJYH AAYXX CITATION PUEGO ABUWG AZQEC DWQXO PKEHL PQEST PQQKQ PQUKI PRINS ADTOC AIKXB EJD UNPAY |
| ID | FETCH-LOGICAL-c2261-7a58bec32987c216cc9ba5fe5cd15544d842a92467fc17005e0c5f4e1b7d5df13 |
| IEDL.DBID | UNPAY |
| ISSN | 2444-8656 |
| IngestDate | Sun Sep 07 11:25:00 EDT 2025 Sun Oct 19 01:25:22 EDT 2025 Wed Oct 01 03:55:49 EDT 2025 Tue Oct 21 12:48:43 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Language | English |
| License | This work is licensed under the Creative Commons Attribution 4.0 International License. http://creativecommons.org/licenses/by/4.0 cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c2261-7a58bec32987c216cc9ba5fe5cd15544d842a92467fc17005e0c5f4e1b7d5df13 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://doi.org/10.2478/amns-2024-3119 |
| PQID | 3191224462 |
| PQPubID | 6761185 |
| PageCount | 21 |
| ParticipantIDs | unpaywall_primary_10_2478_amns_2024_3119 proquest_journals_3191224462 crossref_primary_10_2478_amns_2024_3119 walterdegruyter_journals_10_2478_amns_2024_311991 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2024-01-01 20240101 |
| PublicationDateYYYYMMDD | 2024-01-01 |
| PublicationDate_xml | – month: 01 year: 2024 text: 2024-01-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Beirut |
| PublicationPlace_xml | – name: Beirut |
| PublicationTitle | Applied mathematics and nonlinear sciences |
| PublicationYear | 2024 |
| Publisher | Sciendo De Gruyter Brill Sp. z o.o., Paradigm Publishing Services |
| Publisher_xml | – name: Sciendo – name: De Gruyter Brill Sp. z o.o., Paradigm Publishing Services |
| References | 2025012920123290198_j_amns-2024-3119_ref_010 2025012920123290198_j_amns-2024-3119_ref_031 2025012920123290198_j_amns-2024-3119_ref_012 2025012920123290198_j_amns-2024-3119_ref_011 2025012920123290198_j_amns-2024-3119_ref_030 2025012920123290198_j_amns-2024-3119_ref_007 2025012920123290198_j_amns-2024-3119_ref_029 2025012920123290198_j_amns-2024-3119_ref_006 2025012920123290198_j_amns-2024-3119_ref_028 2025012920123290198_j_amns-2024-3119_ref_009 2025012920123290198_j_amns-2024-3119_ref_008 2025012920123290198_j_amns-2024-3119_ref_003 2025012920123290198_j_amns-2024-3119_ref_025 2025012920123290198_j_amns-2024-3119_ref_002 2025012920123290198_j_amns-2024-3119_ref_024 2025012920123290198_j_amns-2024-3119_ref_005 2025012920123290198_j_amns-2024-3119_ref_027 2025012920123290198_j_amns-2024-3119_ref_004 2025012920123290198_j_amns-2024-3119_ref_026 2025012920123290198_j_amns-2024-3119_ref_021 2025012920123290198_j_amns-2024-3119_ref_020 2025012920123290198_j_amns-2024-3119_ref_001 2025012920123290198_j_amns-2024-3119_ref_023 2025012920123290198_j_amns-2024-3119_ref_022 2025012920123290198_j_amns-2024-3119_ref_018 2025012920123290198_j_amns-2024-3119_ref_017 2025012920123290198_j_amns-2024-3119_ref_019 2025012920123290198_j_amns-2024-3119_ref_014 2025012920123290198_j_amns-2024-3119_ref_013 2025012920123290198_j_amns-2024-3119_ref_016 2025012920123290198_j_amns-2024-3119_ref_015 |
| References_xml | – ident: 2025012920123290198_j_amns-2024-3119_ref_018 doi: 10.1007/978-3-319-54380-2_11 – ident: 2025012920123290198_j_amns-2024-3119_ref_015 doi: 10.1016/j.techfore.2017.09.040 – ident: 2025012920123290198_j_amns-2024-3119_ref_027 doi: 10.1108/ICS-06-2017-0039 – ident: 2025012920123290198_j_amns-2024-3119_ref_029 doi: 10.3390/mti8070055 – ident: 2025012920123290198_j_amns-2024-3119_ref_024 doi: 10.1136/bmjhci-2023-100953 – ident: 2025012920123290198_j_amns-2024-3119_ref_030 doi: 10.26689/jera.v8i3.7194 – ident: 2025012920123290198_j_amns-2024-3119_ref_021 doi: 10.1093/ppmgov/gvx017 – ident: 2025012920123290198_j_amns-2024-3119_ref_025 doi: 10.14763/2019.2.1413 – ident: 2025012920123290198_j_amns-2024-3119_ref_005 doi: 10.1177/2053951716682537 – ident: 2025012920123290198_j_amns-2024-3119_ref_006 doi: 10.1002/9781119491422 – ident: 2025012920123290198_j_amns-2024-3119_ref_009 doi: 10.1016/j.techfore.2021.120743 – ident: 2025012920123290198_j_amns-2024-3119_ref_017 doi: 10.3390/informatics4040041 – ident: 2025012920123290198_j_amns-2024-3119_ref_012 – ident: 2025012920123290198_j_amns-2024-3119_ref_022 doi: 10.3145/epi.2021.jul.02 – ident: 2025012920123290198_j_amns-2024-3119_ref_003 doi: 10.1177/0275074017724225 – ident: 2025012920123290198_j_amns-2024-3119_ref_019 doi: 10.1007/s10796-019-09923-z – ident: 2025012920123290198_j_amns-2024-3119_ref_023 doi: 10.1007/s10639-021-10817-4 – ident: 2025012920123290198_j_amns-2024-3119_ref_014 doi: 10.1111/poms.12838 – ident: 2025012920123290198_j_amns-2024-3119_ref_026 – ident: 2025012920123290198_j_amns-2024-3119_ref_028 doi: 10.1007/978-3-030-92385-3_11 – ident: 2025012920123290198_j_amns-2024-3119_ref_001 doi: 10.1007/s42979-022-01020-4 – ident: 2025012920123290198_j_amns-2024-3119_ref_010 doi: 10.1016/j.eswa.2020.114060 – ident: 2025012920123290198_j_amns-2024-3119_ref_008 doi: 10.2105/AJPH.2016.303512 – ident: 2025012920123290198_j_amns-2024-3119_ref_002 doi: 10.1163/22134514-00502001 – ident: 2025012920123290198_j_amns-2024-3119_ref_004 doi: 10.9734/ajeba/2023/v23i181055 – ident: 2025012920123290198_j_amns-2024-3119_ref_007 doi: 10.4324/9781315199269 – ident: 2025012920123290198_j_amns-2024-3119_ref_020 doi: 10.1109/ACCESS.2019.2961404 – ident: 2025012920123290198_j_amns-2024-3119_ref_016 doi: 10.1016/j.ijinfomgt.2019.07.008 – ident: 2025012920123290198_j_amns-2024-3119_ref_011 doi: 10.1016/j.cose.2019.02.009 – ident: 2025012920123290198_j_amns-2024-3119_ref_013 doi: 10.1016/j.compbiomed.2020.104130 – ident: 2025012920123290198_j_amns-2024-3119_ref_031 doi: 10.1038/s41746-024-01070-3 |
| SSID | ssj0002313662 |
| Score | 2.2448678 |
| Snippet | This paper presents a multi-subject collaborative data security governance system architecture that caters to various aspects of data security governance. It... |
| SourceID | unpaywall proquest crossref walterdegruyter |
| SourceType | Open Access Repository Aggregation Database Index Database Publisher |
| SubjectTerms | 94A16 Access control Attribute-based encryption Data encryption Data security governance Neural network Neural networks Particle swarm algorithm Risk assessment |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV1LS8QwEB7W9aAe1jeuL3IQ9FLWpkkfBxEfKyK4ig_YW0mTdlnQdrVdVv-9mTbdFRE9lybwzST5MpP5BuAg4omikUMtJWPXYprBW5HvO5aQzFbHgdJHGBYn3_bc62d20-f9BvTqWhh8VlnvieVGrTKJMfKOdhVMAjGXno7eLOwahdnVuoWGMK0V1EkpMTYH8xSVsZowf97t3T9Moy6azTiuSyv1Rso8vyNe01y7CmV6N0K5ne-n04xyLozTkficiJeXJWhNykS2igfv48-iTpyW59HVCrQMkSRnleVXoRGna7BsSCUxSzZfh7v6bR3JUvJoutWRqsUuWpxkCbkUhSDd6iF5ToYp0ayQlLpVH0X5fTgYFqZgcwOer7pPF9eW6aJgSYrBJU9wXxvKoYHvSWq7UgaR4EnMJRqCMeUzKvQtzPUSiWJ9PD6WPGGxHXmKq8R2NqGZZmm8BYSjcg1yBBVJFkhfyEgFvnCErYlFQlkbDmv0wlEllhHqSwbiHCLOIeIcIs5t2K3BDc2iycOZidtwNAX835HsH_aYDfj7H4G9_ffsO7BYOkQZaNmFZvE-jvc09SiifeNPX5g52U0 priority: 102 providerName: ProQuest |
| Title | Research on Security Governance of Data Elements in the Context of Digitization |
| URI | https://www.degruyter.com/doi/10.2478/amns-2024-3119 https://www.proquest.com/docview/3191224462 https://doi.org/10.2478/amns-2024-3119 |
| UnpaywallVersion | publishedVersion |
| Volume | 9 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Mathematics Source customDbUrl: eissn: 2444-8656 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002313662 issn: 2444-8656 databaseCode: AMVHM dateStart: 20170701 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/mathematics-source providerName: EBSCOhost – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2444-8656 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002313662 issn: 2444-8656 databaseCode: M~E dateStart: 20160101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 2444-8656 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002313662 issn: 2444-8656 databaseCode: BENPR dateStart: 20160101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVJWN databaseName: Sciendo customDbUrl: eissn: 2444-8656 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002313662 issn: 2444-8656 databaseCode: 9WM dateStart: 20160630 isFulltext: true titleUrlDefault: https://content.sciendo.com/ providerName: Sciendo – providerCode: PRVJWN databaseName: Sciendo:Open Access customDbUrl: eissn: 2444-8656 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002313662 issn: 2444-8656 databaseCode: ADBLJ dateStart: 20180630 isFulltext: true titleUrlDefault: https://www.sciendo.com/ providerName: Sciendo – providerCode: PRVAZK databaseName: Walter De Gruyter: Open Access Journals customDbUrl: eissn: 2444-8656 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002313662 issn: 2444-8656 databaseCode: AHGSO dateStart: 20160630 isFulltext: true titleUrlDefault: https://www.degruyterbrill.com providerName: Walter de Gruyter |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwFD7I9iA-eBcnOvIg6EvVpkmbPk7dHIJzqEN9Krm0Y6jdcB1z_nqTNvUyBH0OCeF8uXzJOec7APuCJgoLDztKxr5DNIN3BGOewyVx1Umo9BVmkpOvOn67Ry4f6IMNkDW5MN_895gE7Ji_pGONJCb6sDDqnlWfas5dgWqv0208mspxhBCHaVZSKDL-0unnjfNFIxcn6YjPpvz5eQmWp7lzWsX918ksK52h-R3TWoGLcnZFaMnT0SQTR_J9Trjx7-mvwrKlmahRrIs1WIjTdVixlBPZDT3egOsy8g4NU3Rra9mhogCvWQ9omKBznnHULMLMx2iQIs0ZUa5q9Zbl7YP-ILPpnJvQazXvztqOrbHgSGy-ngJOmYbRwyELJHZ9KUPBaRJTaWAiRDGCuX6j-UEijZQfjU8kTUjsikBRlbjeFlTSYRpvA6JG18YwCCUkCSXjUqiQcY-7mnYkmNTgoMQhGhVSGpF-ghg7RcZOkbFTZOxUg90SpshuqbFuCI0XkPi4Boef0P05kjuH7NeAv_cI3Z3_D78Llex1Eu9pXpKJuj5e76_qUD1tdro3dbtEPwBeAeN0 |
| linkProvider | Unpaywall |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1NT9wwEB1ROFAOQD8Q29LiQ6v2ErFx7GxyQIiWRUuBLaIgcQuO7aCVILuQrLb75_rbmEkcFlWoPXGO4iTPL-M3Hs8MwKdUZoanAfeMtqEnUMF7aRQFntLCN-3Y4BJGycnH_bB3Ln5cyIs5-NPkwtCxysYmVobaDDXtkW8hVSgIJEK-M7r1qGsURVebFhrKtVYw21WJMZfYcWinE3Thiu2DPZzvz5zvd8--9zzXZcDTnDZfOkpG-CEBR-9bcz_UOk6VzKzU9KJCmEhwhV5K2Mk0FbOTtq1lJqyfdow0mR_guC9gQQQiRudv4Vu3f3L6sMuD6ikIQ15Xi-SiE22pm7xAanKB1o_K-zxeDWcSd3Gcj9R0oq6vl2B5UgXOjb26G0_LJlBbrX_7q7DshCvbrZn2CuZs_hpWnIhlzkQUb-Bnc5aPDXP2y3XHY3VLX2IYG2ZsT5WKdeuD6wUb5AxVKKvqZP0uq-uDq0HpEkTfwvmz4LkG8_kwt-vAJFXKIU1iUi1iHSmdmjhSgfJRyGRctOBLg14yqotzJOjUEM4J4ZwQzgnh3IKNBtzE_aRFMqNUC74-AP7fkfy_5mM24NN3xP67fz99ExZ7Z8dHydFB__A9vKzIUW3ybMB8eTe2H1D2lOlHxy0Gl89N53vpaBX2 |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1JTwIxFH4xkLgccI8oag8mepngdNpZjkRAXDFBEm6TTjtDSHAgMAT597adgtGQmHhuXg_f6_K9pV8BriKaCBw52BI8di0iGbwV-b5jMU5scRsIeYWpx8kvr26rSx57tGcCRfUWRp_7Qlcrq2OR6FZl4vlV9pFOpUcxkYeGUvksKh12WoBirXXfaa-yKpKtOK6Lc3XGNYY_b59vSrk1S8dsMWfD4Q6U5rpQLeL-ZLbIloVRfd8096BkiCKq5Z7dh404PYBdQxqR2ZLTQ2gve-fQKEUd8xsdyr_QVR5FowTVWcZQI28Un6JBiiTrQ1qX6jPT44P-IDMPMo-g22y837Us80uCxbFKHnmM-tIRDg58j2Pb5TyIGE1iyhXQhAifYCajLNdLuBLjo_EtpwmJ7cgTVCS2cwyFdJTGJ4CoUqZRHEBEnATcZzwSgc8cZkvikGBShusleuE4F8MIZRChcA4VzqHCOVQ4l6GyBDc0m2IqBwJVxyMuLsPNCvA_Z7J_-eN7wvUWgX36D5tL2HyrN8Pnh9enM9jWC0YnWipQyCaz-FxSjyy6MOvtC9q51b4 |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG4MHIwH8GfEoOnBRC9D1rVbdyQKEhPRREnwtPTHRog4CGxB_Ottt06UkOC56Uvzvtf1697r9wC45CSSiDvIkiJ0LawYvMUpdSwmsC2bvlRHmH6c_Nhzu338MCADUyCr38L8yt8j7NEb9hHPFZIIq4-FVvcsu0Rx7hIo93vPrTfdOQ5jbFHFSnJFxg2T_p44Kxq5m8ZTtlyw8XgPVBZZclqGw1m6TIpkaHbGdKrgvlhdXlry3kgT3hBfa8KN25e_DyqGZsJWHhcHYCeMD0HVUE5oNvT8CDwVlXdwEsMX08sO5g14dTzASQTvWMJgOy8zn8NRDBVnhJmq1WeSjY-Go8Q85zwG_U779bZrmR4LlkD615PHCFUwOsinnkC2K4TPGYlCIjRMGEuKEVN3NNeLhJbyI2FTkAiHNvckkZHtnIBSPInDUwCJ1rXRDEJygX1BmeDSp8xhtqIdEcI1cFXgEExzKY1AXUG0nwLtp0D7KdB-qoF6AVNgttRcDfg6C4hdVAPXP9BttWSvIbsyuHmGb5_933wdlJJZGp4rXpLwCxOU3wSH4Nw |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Research+on+Security+Governance+of+Data+Elements+in+the+Context+of+Digitization&rft.jtitle=Applied+mathematics+and+nonlinear+sciences&rft.au=Li%2C+Tao&rft.au=Xu%2C+Jiang&rft.date=2024-01-01&rft.issn=2444-8656&rft.eissn=2444-8656&rft.volume=9&rft.issue=1&rft_id=info:doi/10.2478%2Famns-2024-3119&rft.externalDBID=n%2Fa&rft.externalDocID=10_2478_amns_2024_3119 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2444-8656&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2444-8656&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2444-8656&client=summon |