Journal articles on the topic 'Data privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Data privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yerbulatov, Sultan. "Data Security and Privacy in Data Engineering." International Journal of Science and Research (IJSR) 13, no. 4 (April 5, 2024): 232–36. http://dx.doi.org/10.21275/es24318121241.
Full textTorra, Vicenç, and Guillermo Navarro-Arribas. "Data privacy." Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 4, no. 4 (June 2, 2014): 269–80. http://dx.doi.org/10.1002/widm.1129.
Full textBasha, M. John, T. Satyanarayana Murthy, A. S. Valarmathy, Ahmed Radie Abbas, Djuraeva Gavhar, R. Rajavarman, and N. Parkunam. "Privacy-Preserving Data Mining and Analytics in Big Data." E3S Web of Conferences 399 (2023): 04033. http://dx.doi.org/10.1051/e3sconf/202339904033.
Full textCOSTEA, Ioan. "Data Privacy Assurance in Virtual Private Networks." International Journal of Information Security and Cybercrime 1, no. 2 (December 21, 2012): 40–47. http://dx.doi.org/10.19107/ijisc.2012.02.05.
Full textMohapatra, Shubhankar, Jianqiao Zong, Florian Kerschbaum, and Xi He. "Differentially Private Data Generation with Missing Data." Proceedings of the VLDB Endowment 17, no. 8 (April 2024): 2022–35. http://dx.doi.org/10.14778/3659437.3659455.
Full textSramka, Michal. "Data mining as a tool in privacy-preserving data publishing." Tatra Mountains Mathematical Publications 45, no. 1 (December 1, 2010): 151–59. http://dx.doi.org/10.2478/v10127-010-0011-z.
Full textHeubl, B. "News - Briefing. Data privacy: Data privacy group found to have breached online privacy rules." Engineering & Technology 15, no. 3 (April 1, 2020): 9. http://dx.doi.org/10.1049/et.2020.0317.
Full textJAKŠIĆ, SVETLANA, JOVANKA PANTOVIĆ, and SILVIA GHILEZAN. "Linked data privacy." Mathematical Structures in Computer Science 27, no. 1 (March 18, 2015): 33–53. http://dx.doi.org/10.1017/s096012951500002x.
Full textWinarsih, Winarsih, and Irwansyah Irwansyah. "PROTEKSI PRIVASI BIG DATA DALAM MEDIA SOSIAL." Jurnal Audience 3, no. 1 (October 19, 2020): 1–33. http://dx.doi.org/10.33633/ja.v3i1.3722.
Full textSmith, J. H., and JS Horne. "Data privacy and DNA data." IASSIST Quarterly 47, no. 3-4 (December 14, 2023): 1–3. http://dx.doi.org/10.29173/iq1094.
Full textAbdul Manap, Nazura, Mohamad Rizal Abd Rahman, and Siti Nur Farah Atiqah Salleh. "HEALTH DATA OWNERSHIP IN MALAYSIA PUBLIC AND PRIVATE HEALTHCARE: A LEGAL ANALYSIS OF HEALTH DATA PRIVACY IN THE AGE OF BIG DATA." International Journal of Law, Government and Communication 7, no. 30 (December 31, 2022): 33–41. http://dx.doi.org/10.35631/ijlgc.730004.
Full textDE CAPITANI DI VIMERCATI, SABRINA, SARA FORESTI, GIOVANNI LIVRAGA, and PIERANGELA SAMARATI. "DATA PRIVACY: DEFINITIONS AND TECHNIQUES." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 20, no. 06 (December 2012): 793–817. http://dx.doi.org/10.1142/s0218488512400247.
Full textGayathri, Tata, and N. Durga. "Privacy Preserving Approaches for High Dimensional Data." International Journal of Trend in Scientific Research and Development Volume-1, Issue-5 (August 31, 2017): 1120–25. http://dx.doi.org/10.31142/ijtsrd2430.
Full textQamar, T., N. Z. Bawany, and N. A. Khan. "EDAMS: Efficient Data Anonymization Model Selector for Privacy-Preserving Data Publishing." Engineering, Technology & Applied Science Research 10, no. 2 (April 4, 2020): 5423–27. http://dx.doi.org/10.48084/etasr.3374.
Full textLobo-Vesga, Elisabet, Alejandro Russo, and Marco Gaboardi. "A Programming Language for Data Privacy with Accuracy Estimations." ACM Transactions on Programming Languages and Systems 43, no. 2 (July 2021): 1–42. http://dx.doi.org/10.1145/3452096.
Full textGertner, Yael, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. "Protecting Data Privacy in Private Information Retrieval Schemes." Journal of Computer and System Sciences 60, no. 3 (June 2000): 592–629. http://dx.doi.org/10.1006/jcss.1999.1689.
Full textLuo, Xiaohui. "A Method for Privacy-Safe Synthetic Health Data." Academic Journal of Science and Technology 10, no. 1 (March 27, 2024): 445–50. http://dx.doi.org/10.54097/f7fjss40.
Full textRiyana, Surapon, Nobutaka Ito, Tatsanee Chaiya, Uthaiwan Sriwichai, Natthawud Dussadee, Tanate Chaichana, Rittichai Assawarachan, Thongchai Maneechukate, Samerkhwan Tantikul, and Noppamas Riyana. "Privacy Threats and Privacy Preservation Techniques for Farmer Data Collections Based on Data Shuffling." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 16, no. 3 (June 25, 2022): 289–301. http://dx.doi.org/10.37936/ecti-cit.2022163.246469.
Full textYang, Qing, Cheng Wang, Teng Hu, Xue Chen, and Changjun Jiang. "Implicit privacy preservation: a framework based on data generation." Security and Safety 1 (2022): 2022008. http://dx.doi.org/10.1051/sands/2022008.
Full textJain, Pinkal, Vikas Thada, and Deepak Motwani. "Providing Highest Privacy Preservation Scenario for Achieving Privacy in Confidential Data." International Journal of Experimental Research and Review 39, Spl Volume (May 30, 2024): 190–99. http://dx.doi.org/10.52756/ijerr.2024.v39spl.015.
Full textEkta, Mrinal. "Secured Cloud Data Sharing: Privacy-Preserving Storage Optimization with Data Confidentiality." International Journal of Research Publication and Reviews 4, no. 8 (August 2023): 2957–66. http://dx.doi.org/10.55248/gengpi.4.823.51935.
Full textZhu, Xiao Ming. "Research on Privacy Preserving Data Mining Association Rules Protocol." Advanced Materials Research 756-759 (September 2013): 1661–64. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1661.
Full textBRYZHKO, V. "Data privacy in cloud technologies." INFORMATION AND LAW, no. 4(19) (December 15, 2016): 47–59. http://dx.doi.org/10.37750/2616-6798.2016.4(19).272976.
Full textDuan, Huabin, Jie Yang, and Huanjun Yang. "A Blockchain-Based Privacy Protection Application for Logistics Big Data." Journal of Cases on Information Technology 24, no. 5 (February 21, 2022): 1–12. http://dx.doi.org/10.4018/jcit.295249.
Full textDu, Jiawen, and Yong Pi. "Research on Privacy Protection Technology of Mobile Social Network Based on Data Mining under Big Data." Security and Communication Networks 2022 (January 13, 2022): 1–9. http://dx.doi.org/10.1155/2022/3826126.
Full textSilva, Paulo, Carolina Gonçalves, Nuno Antunes, Marilia Curado, and Bogdan Walek. "Privacy risk assessment and privacy-preserving data monitoring." Expert Systems with Applications 200 (August 2022): 116867. http://dx.doi.org/10.1016/j.eswa.2022.116867.
Full textYao-Huai, Lü. "Privacy and Data Privacy Issues in Contemporary China." Ethics and Information Technology 7, no. 1 (March 2005): 7–15. http://dx.doi.org/10.1007/s10676-005-0456-y.
Full textIngale, Indrajeet. "Privacy Preserving of Collaborative Data Publishing WithM-Privacy." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 2 (2015): 845–47. http://dx.doi.org/10.17762/ijritcc2321-8169.150290.
Full textAppenzeller, Arno, Moritz Leitner, Patrick Philipp, Erik Krempel, and Jürgen Beyerer. "Privacy and Utility of Private Synthetic Data for Medical Data Analyses." Applied Sciences 12, no. 23 (December 1, 2022): 12320. http://dx.doi.org/10.3390/app122312320.
Full textVishnoi, Meenakshi, and Seeja K. R. "Privacy Preserving Data Mining using Attribute Encryption and Data Perturbation." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 6, no. 3 (May 25, 2013): 370–78. http://dx.doi.org/10.24297/ijct.v6i3.4461.
Full textWang, Yi-Ren, and Yun-Cheng Tsai. "The Protection of Data Sharing for Privacy in Financial Vision." Applied Sciences 12, no. 15 (July 23, 2022): 7408. http://dx.doi.org/10.3390/app12157408.
Full textKapil, Gayatri, Alka Agrawal, and R. A. Khan. "Big Data Security and Privacy Issues." Asian Journal of Computer Science and Technology 7, no. 2 (August 5, 2018): 128–32. http://dx.doi.org/10.51983/ajcst-2018.7.2.1861.
Full textXu, Xiaolong, Xuan Zhao, Feng Ruan, Jie Zhang, Wei Tian, Wanchun Dou, and Alex X. Liu. "Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/2376484.
Full textLi, Zhiping, Jiagui Xie, Likun Gao, and Fanjie Nie. "Data Privacy Protection in Data Fusion." Journal of Physics: Conference Series 2033, no. 1 (September 1, 2021): 012179. http://dx.doi.org/10.1088/1742-6596/2033/1/012179.
Full textHabegger, Benjamin. "Big Data vs. Privacy Big Data." Services Transactions on Big Data 1, no. 1 (January 2014): 25–35. http://dx.doi.org/10.29268/stbd.2014.1.1.3.
Full textThuraisingham, Bhavani. "Privacy-Preserving Data Mining." Journal of Database Management 16, no. 1 (January 2005): 75–87. http://dx.doi.org/10.4018/jdm.2005010106.
Full textDetermann, L. "Privacy and Data Protection." Moscow Journal of International Law 2019, no. 1 (March 30, 2019): 18–26. http://dx.doi.org/10.24833/0869-0049-2019-1-18-26.
Full textLabrinidis, Alexandros. "Privacy-Preserving Data Publishing." Foundations and Trends® in Databases 2, no. 3 (2009): 169–266. http://dx.doi.org/10.1561/1900000005.
Full textChen, Bee-Chung, Daniel Kifer, Kristen LeFevre, and Ashwin Machanavajjhala. "Privacy-Preserving Data Publishing." Foundations and Trends® in Databases 2, no. 1-2 (2009): 1–167. http://dx.doi.org/10.1561/1900000008.
Full textRavi, A. T., and S. Chitra. "Privacy Preserving Data Mining." Research Journal of Applied Sciences, Engineering and Technology 9, no. 8 (March 15, 2015): 616–21. http://dx.doi.org/10.19026/rjaset.9.1445.
Full textWang, Shengling, Lina Shi, Qin Hu, Junshan Zhang, Xiuzhen Cheng, and Jiguo Yu. "Privacy-Aware Data Trading." IEEE Transactions on Information Forensics and Security 16 (2021): 3916–27. http://dx.doi.org/10.1109/tifs.2021.3099699.
Full textSuleiman, James, and Terry Huston. "Data Privacy and Security." International Journal of Information Security and Privacy 3, no. 2 (April 2009): 42–53. http://dx.doi.org/10.4018/jisp.2009040103.
Full textTotterdale, Robert L. "Globalization and Data Privacy." International Journal of Information Security and Privacy 4, no. 2 (April 2010): 19–35. http://dx.doi.org/10.4018/jisp.2010040102.
Full textButler, Declan. "Data sharing threatens privacy." Nature 449, no. 7163 (October 2007): 644. http://dx.doi.org/10.1038/449644a.
Full textJasny, Barbara R. "Sharing data, protecting privacy." Science 357, no. 6352 (August 17, 2017): 656.9–657. http://dx.doi.org/10.1126/science.357.6352.656-i.
Full textSouthey, Hugh, and Adam Straw. "Surveillance, Data and Privacy." Judicial Review 18, no. 4 (December 20, 2013): 440–45. http://dx.doi.org/10.1080/10854681.2013.11426812.
Full textGaff, Brian M., Thomas J. Smedinghoff, and Socheth Sor. "Privacy and Data Security." Computer 45, no. 3 (March 2012): 8–10. http://dx.doi.org/10.1109/mc.2012.102.
Full textGaff, Brian M., Heather Egan Sussman, and Jennifer Geetter. "Privacy and Big Data." Computer 47, no. 6 (June 2014): 7–9. http://dx.doi.org/10.1109/mc.2014.161.
Full textMcGraw, Deven. "Data Identifiability and Privacy." American Journal of Bioethics 10, no. 9 (September 9, 2010): 30–31. http://dx.doi.org/10.1080/15265161.2010.494224.
Full textMartin, Kelly D., Jisu J. Kim, Robert W. Palmatier, Lena Steinhoff, David W. Stewart, Beth A. Walker, Yonggui Wang, and Scott K. Weaven. "Data Privacy in Retail." Journal of Retailing 96, no. 4 (December 2020): 474–89. http://dx.doi.org/10.1016/j.jretai.2020.08.003.
Full text