Auswahl der wissenschaftlichen Literatur zum Thema „Privicy protection“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Privicy protection" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Privicy protection"
Xie, Guangxu, Gaopan Hou, Qingqi Pei und Haibo Huang. „Lightweight Privacy Protection via Adversarial Sample“. Electronics 13, Nr. 7 (26.03.2024): 1230. http://dx.doi.org/10.3390/electronics13071230.
Der volle Inhalt der QuelleBonomi, Luca, Xiaoqian Jiang und Lucila Ohno-Machado. „Protecting patient privacy in survival analyses“. Journal of the American Medical Informatics Association 27, Nr. 3 (21.11.2019): 366–75. http://dx.doi.org/10.1093/jamia/ocz195.
Der volle Inhalt der QuelleZhenjiang Zhang, Zhenjiang Zhang, und Xiaohua Liu Zhenjiang Zhang. „Cloud-side Collaborative Privacy Protection Based on Differential Privacy“. 電腦學刊 32, Nr. 4 (August 2021): 239–51. http://dx.doi.org/10.53106/199115992021083204019.
Der volle Inhalt der QuelleMeier, Yannic, Johanna Schäwel und Nicole C. Krämer. „Between protection and disclosure: applying the privacy calculus to investigate the intended use of privacy-protecting tools and self-disclosure on different websites“. Studies in Communication and Media 10, Nr. 3 (2021): 283–306. http://dx.doi.org/10.5771/2192-4007-2021-3-283.
Der volle Inhalt der QuelleNussy, Jennifer Ingelyne. „Mekanisme Komisi Pemberantasan Korupsi dalam Proses Penyadapan dilihat dari Perspektif Hak Asasi Manusia (HAM)“. JURNAL BELO 5, Nr. 2 (19.05.2020): 74–85. http://dx.doi.org/10.30598/belobelovol5issue2page74-85.
Der volle Inhalt der QuelleNussy, Jennifer Ingelyne. „Mekanisme Komisi Pemberantasan Korupsi dalam Proses Penyadapan dilihat dari Perspektif Hak Asasi Manusia (HAM)“. JURNAL BELO 5, Nr. 2 (19.05.2020): 74–85. http://dx.doi.org/10.30598/belovol5issue2page74-85.
Der volle Inhalt der QuelleCorones, Stephen, und Juliet Davis. „Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions“. Federal Law Review 45, Nr. 1 (März 2017): 65–95. http://dx.doi.org/10.1177/0067205x1704500104.
Der volle Inhalt der QuelleSingla, Arun. „The Evolving Landscape of Privacy Law: Balancing Digital Innovation and Individual Rights“. Indian Journal of Law 2, Nr. 1 (2024): 1–6. http://dx.doi.org/10.36676/ijl.v2.i1.01.
Der volle Inhalt der QuelleChen, Zhixuan, Yixiang Zhang und Zhiyu Zhang. „Research on Privacy Protection Willingness of New Media Platform Users Based on Theory of Planned Behavior“. Communications in Humanities Research 16, Nr. 1 (28.11.2023): 264–71. http://dx.doi.org/10.54254/2753-7064/16/20230726.
Der volle Inhalt der QuelleNahra, Kirk J. „Remarks by Kirk J. Nahra“. Proceedings of the ASIL Annual Meeting 116 (2022): 127–29. http://dx.doi.org/10.1017/amp.2023.65.
Der volle Inhalt der QuelleDissertationen zum Thema "Privicy protection"
Maifada, Magoudani Mahamadou. „Construire et mettre en œuvre un droit des données personnelles dans l’espace UEMOA : étude comparée à partir des cas du Burkina Faso, de la Côte d’Ivoire, du Niger et du Sénégal à la lumière du droit français et européen“. Electronic Thesis or Diss., Paris 12, 2023. http://www.theses.fr/2023PA120073.
Der volle Inhalt der QuelleThis thesis provides an in-depth analysis of the legal framework surrounding the protection of personal data within the West African Economic and Monetary Union (WAEMU), specifically focusing on Burkina Faso, Côte d'Ivoire, Niger, and Senegal – the areas under study. It delves into the motivations that led these states to adopt specific legislations influenced by foreign models, notably the French model of the "Loi Informatique et Libertés," rather than relying on national or community references.This analysis explores the development process of these regulations, from legislative evolution to international institutions' initiatives. Special attention is given to the influence of the International Organization of La Francophonie (IOF) and the French Commission for Data Protection (Commission de l'Informatique et des Libertés) in promoting the initial national legislations within this region.Furthermore, the thesis conducts a detailed comparison between the existing regulations within WAEMU and the European Union's General Data Protection Regulation (GDPR). This comparison highlights significant similarities and differences, particularly concerning the scope of application, stakeholders' responsibilities, and the rights of the individuals concerned.Moreover, the study examines the practical implementation of these regulations, focusing on key actors, including regulatory authorities, data controllers, Civil Society Organizations (CSOs), and data subjects in each state. It analyzes the challenges faced by regulatory authorities and cooperation policies aimed at enhancing the effectiveness of personal data rights.Finally, the thesis explores the limitations of personal data rights, particularly in their interaction with public policies in the telecommunications sector and the issues related to cybercrime.Overall, this work offers a comprehensive and nuanced perspective on personal data rights within WAEMU, shedding light on the motivations, achievements, challenges, and prospects in the ever-evolving African legal context. It constitutes a significant contribution to the understanding of personal data protection in the African legal context
Sallaku, Redlon <1994>. „Privacy and Protecting Privacy: Using Static Analysis for legal compliance. General Data Protection Regulation“. Master's Degree Thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/14682.
Der volle Inhalt der QuelleLi, Min. „Privacy Protection on Cloud Computing“. VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3844.
Der volle Inhalt der QuelleXu, Wanxin. „AFFECT-PRESERVING VISUAL PRIVACY PROTECTION“. UKnowledge, 2018. https://uknowledge.uky.edu/ece_etds/122.
Der volle Inhalt der QuelleWinkler, Stephanie D. „Protecting Online Privacy“. UKnowledge, 2016. http://uknowledge.uky.edu/comm_etds/47.
Der volle Inhalt der QuelleGunnarsson, Annicka, und Siri Ekberg. „Invasion of Privacy : Spam - one result of bad privacy protection“. Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5393.
Der volle Inhalt der QuelleMatusek, F. (Florian). „Selective privacy protection for video surveillance“. Doctoral thesis, Oulun yliopisto, 2014. http://urn.fi/urn:isbn:9789526204154.
Der volle Inhalt der QuelleTiivistelmä Videovalvonnassa on tapahtunut viime vuosina merkittävää kasvua johtuen järkyttävistä tapahtumista kuten terrori-iskut, pankkiryöstöt ja järjestäytyneen rikollisuuden toimet. Videovalvontateknologia on kehittynyt merkittävästi mahdollistaen jopa yksittäisten ihmisten automaattisen seurannan. Turvallisuuden lisääntymisen katsotaan kuitenkin vähentäneen yksityisyyttä. Videovalvonnan avulla ihmisiä pystytään seuraamaan helpommin kuin koskaan aikaisemmin tunkeutuen täten heidän yksityisyytensä alueelle. On oletettu, että turvallisuus ja yksityisyys videovalvonnassa on nollasummapeliä, jossa kansalaisten on valittava yksityisyyden ja turvallisuuden välillä. Tämä tutkimus perustuu olettamukseen, että edellä esitetty ei pidä paikkaansa, vaan että on mahdollista suojata yksityisyys samalla taaten täysi turvallisuus. Ratkaisua tähän ongelmaan etsittiin suunnittelutieteellisen tutkimuksen avulla. Työssä suunniteltiin ja toteutettiin videovalvontajärjestelmä PEVS (Privacy Enhancing Video Surveillance system), joka suojaa valvonnanalaisten sivullisten yksityisyyttä ja siitä huolimatta tuottaa korkean turvallisuustason.. PEVS suojaa henkilöiden yksityisyyttä salaamalla automaattisesti videoaineistosta ne kuva-alat, joissa esiintyy ihmisiä. Mikäli laitonta toimintaa havaittaisiin, olisi riittävillä käyttöoikeuksilla mahdollista purkaa salaus mielenkiinnon kohteena olevien henkilöiden kohdalta tilanteen analysoimiseksi. Tämä mahdollisti yhtäältä puuttumattomuuden sivullisten yksityisyyteen ja toisaalta tiedon käyttämisen todistusaineistona mahdollisen rikoksen tutkimisessa. Tällä järjestelmällä yksityisyys oli mahdollista suojata samanaikaisesti, kun turvallisuudesta huolehdittiin. PEVS mahdollisti ensimmäistä kertaa maailmassa videovalvonnan, joka näyttää vain relevantit henkilöt jättäen muiden henkilöllisyyden paljastamatta. Sen takia tämän tutkimuksen merkittävin kontribuutio oli uudenlaisen lähestymistavan kehittäminen videovalvontaan, joka kykenee valikoivasti suojelemaan ihmisten yksityisyyttä. Tämä ratkaisu sisältää yksityisyyden suojaavan, useita rakenneosia sisältävän videovalvontajärjestelmäarkkitehtuurin esittelyn. Rakenneosiin kuuluu yksityisen tiedon tallennusmenetelmiä ja varjontunnistus- ja segmentointimetodeja, jotka paransivat aiemmin käytettyjen metodien tarkkuutta ja nopeutta. Lisäksi esiteltiin uudenlainen turvallisuus- ja yksityisyysmetriikka videovalvonnalle. Toteutettu järjestelmä on huomattava lisäys nykytietämykseen, jossa yksityisyyden suojan osalta on otettu vasta ensiaskelia ja joka ei mahdollista kattavaa järjestelmää
Chaudhari, Jayashri S. „Privacy Protection for Life-log System“. UKnowledge, 2007. http://uknowledge.uky.edu/gradschool_theses/491.
Der volle Inhalt der QuelleAjam, Nabil. „Privacy protection for location-based services“. Télécom Bretagne, 2010. http://www.theses.fr/2010TELB0124.
Der volle Inhalt der QuelleIn this dissertation, we propose the expression and the modelling of the most important principles of privacy. We deduce the relevant privacy requirements that should be integrated in existing security policy models, such as RBAC models. We suggest the application of a unique model for both access control and privacy requirements. Thus, an access control model is to be enriched with new access constraints and parameters, namely the privacy contexts, which should implement the consent and the notification concepts. For this purpose, we introduce the privacy-aware Organisation role Based Access Control (OrBAC) model. The administration of this new model is significantly different from previous models. Three cases are identified. First, the privacy policy may be defined by the data collector but data owners have the possibility to set their preferences through a contracted Service Level Agreement (SLA). Second, the administration model allows legal organisations, for legal purposes, to impose their needs by bypassing user's preferences. Third, we present the case of a privacy policy which is negotiated between the data collector and the requestor based on user's preferences, defined in the SLA. Overall, our proposal is a distributed administration of privacy policies. Focusing on Location Based Services (LBSs), we finally propose a complete privacy framework ready to be deployed in information systems. We use the model prototype to adapt our solution to cellular networks when the requesters are the service providers. This prototype uses parlay gateways with web services. We also extend the set of Parlay X gateway standardised web services by proposing a dedicated privacy web service to enforce privacy protection
Du, Jing. „Privacy protection in location-based applications“. HKBU Institutional Repository, 2007. http://repository.hkbu.edu.hk/etd_ra/816.
Der volle Inhalt der QuelleBücher zum Thema "Privicy protection"
Blume, Peter. Protection of informational privacy. Copenhagen: DJØF Pub., 2002.
Den vollen Inhalt der Quelle findenSouth African Law Reform Commission. Privacy and data protection. [Pretoria: South African Law Reform Commission], 2003.
Den vollen Inhalt der Quelle findenSouth African Law Reform Commission. Privacy and data protection. Pretoria: South African Law Reform Commission, 2005.
Den vollen Inhalt der Quelle findenSaad, Abdul Raman. Personal data & privacy protection. Kelana Jaya, Selangor, Malaysia: Malayan Law Journal Sdn. Bhd., 2005.
Den vollen Inhalt der Quelle findenSmiley, Sophie. Protecting our privacy. Cambridge: Independence, 2004.
Den vollen Inhalt der Quelle findenRodrigues, Rowena, und Vagelis Papakonstantinou, Hrsg. Privacy and Data Protection Seals. The Hague: T.M.C. Asser Press, 2018. http://dx.doi.org/10.1007/978-94-6265-228-6.
Der volle Inhalt der QuelleA, Caloyannides Michael, Hrsg. Privacy protection and computer forensics. 2. Aufl. Boston: Artech House, 2004.
Den vollen Inhalt der Quelle findenKuschewsky, Monika. Data protection & privacy: Jurisdictional comparisons. London: Thomson Reuters, 2014.
Den vollen Inhalt der Quelle findenGeorge, Yee, Hrsg. Privacy protection for e-services. Hershey PA: Idea Group Pub., 2006.
Den vollen Inhalt der Quelle findenBainbridge, David I. Data protection. Welwvyn Garden City: CLT Professional Pub., 2000.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Privicy protection"
Weik, Martin H. „privacy protection“. In Computer Science and Communications Dictionary, 1334. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_14678.
Der volle Inhalt der QuelleHallinan, Dara, und Paul de Hert. „Genetic Classes and Genetic Categories: Protecting Genetic Groups Through Data Protection Law“. In Group Privacy, 175–96. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46608-8_10.
Der volle Inhalt der QuelleChaudhuri, Arijit, und Tasos C. Christofides. „Protection of Privacy“. In Indirect Questioning in Sample Surveys, 151–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36276-7_7.
Der volle Inhalt der QuelleGulzar, Nikki, Basra Abbasi, Eddie Wu, Anil Ozbal und WeiQi Yan. „Surveillance Privacy Protection“. In Intelligent Multimedia Surveillance, 83–105. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41512-8_5.
Der volle Inhalt der QuelleHung, Patrick C. K., Marcelo Fantinato und Jorge Roa. „Children Privacy Protection“. In Encyclopedia of Computer Graphics and Games, 1–3. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-08234-9_198-1.
Der volle Inhalt der QuelleHung, Patrick C. K., Marcelo Fantinato und Jorge Roa. „Children Privacy Protection“. In Encyclopedia of Computer Graphics and Games, 293–95. Cham: Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-23161-2_198.
Der volle Inhalt der QuellePoikela, Maija Elina. „Privacy Protection Behaviour“. In T-Labs Series in Telecommunication Services, 109–29. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34171-8_7.
Der volle Inhalt der QuelleChaudhuri, Arijit, Sanghamitra Pal und Dipika Patra. „Protection of Privacy“. In Randomized Response Techniques, 119–38. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9669-8_7.
Der volle Inhalt der QuelleTang, Alan. „Workforce Data Protection“. In Privacy in Practice, 329–61. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003225089-29.
Der volle Inhalt der QuelleStahl, Bernd Carsten, Doris Schroeder und Rowena Rodrigues. „Privacy“. In Ethics of Artificial Intelligence, 25–37. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17040-9_3.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Privicy protection"
Rezer, Tatiana. „Privacy Right as A Personal Value in an Information Society“. In The Public/Private in Modern Civilization, the 22nd Russian Scientific-Practical Conference (with international participation) (Yekaterinburg, April 16-17, 2020). Liberal Arts University – University for Humanities, Yekaterinburg, 2020. http://dx.doi.org/10.35853/ufh-public/private-2020-76.
Der volle Inhalt der QuelleYe, Mengmei, Zhongze Tang, Huy Phan, Yi Xie, Bo Yuan und Sheng Wei. „Visual privacy protection in mobile image recognition using protective perturbation“. In MMSys '22: 13th ACM Multimedia Systems Conference. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3524273.3528189.
Der volle Inhalt der QuelleSrinivasan, S. „Privacy Protection and Data Breaches“. In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2261.
Der volle Inhalt der Quelle„Place Determinants for the Personalization-Privacy Tradeoff among Students“. In InSITE 2018: Informing Science + IT Education Conferences: La Verne California. Informing Science Institute, 2018. http://dx.doi.org/10.28945/4069.
Der volle Inhalt der QuelleChhetri, Chola, und Vivian Genaro Motti. „Privacy Concerns about Smart Home Devices: A Comparative Analysis between Non-Users and Users“. In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002207.
Der volle Inhalt der QuelleBennett, Colin, und Smith Oduro-Marfo. „GLOBAL Privacy Protection“. In UbiComp '18: The 2018 ACM International Joint Conference on Pervasive and Ubiquitous Computing. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3267305.3274149.
Der volle Inhalt der QuelleKarunagaran, Surya, Saji K. Mathew und Franz Lehner. „Privacy Protection Dashboard“. In SIGMIS-CPR '17: Computers and People Research Conference. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3084381.3084424.
Der volle Inhalt der QuelleLi, Chau Yi, Ali Shahin Shamsabadi, Ricardo Sanchez-Matilla, Riccardo Mazzon und Andrea Cavallaro. „Scene Privacy Protection“. In ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2019. http://dx.doi.org/10.1109/icassp.2019.8682225.
Der volle Inhalt der QuelleZhao, Fangyuan, Xuebin Ren, Shusen Yang und Xinyu Yang. „On Privacy Protection of Latent Dirichlet Allocation Model Training“. In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/675.
Der volle Inhalt der QuelleMatveev, Artem. „Cost-Efficient Data Privacy Protection in Multi Cloud Storage“. In 3rd International Conference on Data Mining and Machine Learning (DMML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120706.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Privicy protection"
Plesser, Ronald L., und Emilio W. Cividanes. Privacy protection in the United States:. Gaithersburg, MD: National Institute of Standards and Technology, 1992. http://dx.doi.org/10.6028/nist.ir.4781.
Der volle Inhalt der QuelleChang, LiWu, und Ira A. Moskowitz. An Integrated Framework for Database Privacy Protection. Fort Belvoir, VA: Defense Technical Information Center, Januar 2001. http://dx.doi.org/10.21236/ada465125.
Der volle Inhalt der QuelleRiyadi, Gliddheo. Data Privacy in the Indonesian Personal Data Protection Legislation. Jakarta, Indonesia: Center for Indonesian Policy Studies, 2021. http://dx.doi.org/10.35497/341482.
Der volle Inhalt der QuelleHasty, III, und Thomas J. Protection of Personal Privacy Interests under the Freedom of Information Act. Fort Belvoir, VA: Defense Technical Information Center, Juni 1991. http://dx.doi.org/10.21236/ada242183.
Der volle Inhalt der QuelleLunt, Teresa, Paul Aoki, Dirk Balfanz, Glenn Durfee, Philippe Golle, Diana Smetters, Jessica Staddon, Jim Thornton und Tomas Uribe. Protecting the Privacy of Individuals in Terrorist Tracking Applications. Fort Belvoir, VA: Defense Technical Information Center, April 2005. http://dx.doi.org/10.21236/ada433707.
Der volle Inhalt der QuelleBuillamon, Bernardo. Risk Mitigation as a Cost-Effective Microfinance Strategy: Case Study IDB-Peru Global Micro-Enterprise Credit Program. Inter-American Development Bank, März 2000. http://dx.doi.org/10.18235/0008670.
Der volle Inhalt der QuelleRothstein, M. A. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Office of Scientific and Technical Information (OSTI), Juli 1998. http://dx.doi.org/10.2172/656488.
Der volle Inhalt der QuelleVaz, Maria João, und Helena Machado. A systematic literature review of Big Data in tourism industry: a state of the art and future directions. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, Mai 2022. http://dx.doi.org/10.37766/inplasy2022.5.0012.
Der volle Inhalt der QuelleAbdul Hamid, Umar Zakir. Privacy for Software-defined Battery Electric Vehicles. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, Juni 2024. http://dx.doi.org/10.4271/epr2024012.
Der volle Inhalt der QuelleRothstein, M. A. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report. Office of Scientific and Technical Information (OSTI), September 1998. http://dx.doi.org/10.2172/656499.
Der volle Inhalt der Quelle