Journal articles on the topic 'Information privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Information privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
White, Garry L., Francis A. Méndez Mediavilla, and Jaymeen R. Shah. "Information Privacy." International Journal of Information Security and Privacy 5, no. 1 (January 2011): 50–66. http://dx.doi.org/10.4018/jisp.2011010104.
Full textCollier, Graham. "Information privacy." Information Management & Computer Security 3, no. 1 (March 1995): 41–45. http://dx.doi.org/10.1108/09685229510792979.
Full textCamenisch, Jan. "Information privacy?!" Computer Networks 56, no. 18 (December 2012): 3834–48. http://dx.doi.org/10.1016/j.comnet.2012.10.012.
Full textLitman, Jessica. "Information Privacy/Information Property." Stanford Law Review 52, no. 5 (May 2000): 1283. http://dx.doi.org/10.2307/1229515.
Full textCharlesworth, Andrew J. "Privacy, Personal Information and Employment." Surveillance & Society 1, no. 2 (September 1, 2002): 217–22. http://dx.doi.org/10.24908/ss.v1i2.3355.
Full textLai, Jianchang, Yi Mu, Fuchun Guo, Peng Jiang, and Willy Susilo. "Privacy-enhanced attribute-based private information retrieval." Information Sciences 454-455 (July 2018): 275–91. http://dx.doi.org/10.1016/j.ins.2018.04.084.
Full textConger, Sue. "Personal Information Privacy." Journal of Electronic Commerce in Organizations 7, no. 1 (January 2009): 71–82. http://dx.doi.org/10.4018/jeco.2009010106.
Full textMancilla, Desla, and Sue Biedermann. "Health Information Privacy." Health Care Manager 28, no. 1 (January 2009): 71–74. http://dx.doi.org/10.1097/hcm.0b013e318196de6c.
Full textMuenchinger, Nancy E. "INFORMATION PRIVACY REGULATION:." Computer Law & Security Review 17, no. 6 (November 2001): 390–94. http://dx.doi.org/10.1016/s0267-3649(01)01107-4.
Full textLow, John. "Information and Privacy." Australian Journal of Hospital Pharmacy 28, no. 1 (February 1998): 2–3. http://dx.doi.org/10.1002/jppr19982812.
Full textHalder, Suhasish, V. S. Prakash Attili, and Vivek Gupta. "Information Privacy Assimilation." International Journal of Digital Strategy, Governance, and Business Transformation 12, no. 1 (January 1, 2022): 1–17. http://dx.doi.org/10.4018/ijdsgbt.313954.
Full textCiocchetti, Corey A. "E-Commerce and Information Privacy: Privacy Policies as Personal Information Protectors." American Business Law Journal 44, no. 1 (March 2007): 55–126. http://dx.doi.org/10.1111/j.1744-1714.2007.00031.x.
Full textJanger, Edward J. "Genetic Information, Privacy and Insolvency." Journal of Law, Medicine & Ethics 33, no. 1 (2005): 79–88. http://dx.doi.org/10.1111/j.1748-720x.2005.tb00212.x.
Full textO’Callaghan, Patrick. "False Privacy and Information Games." Journal of European Tort Law 4, no. 3 (November 1, 2013): 282–305. http://dx.doi.org/10.1515/jetl-2013-0019.
Full textGertner, Yael, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. "Protecting Data Privacy in Private Information Retrieval Schemes." Journal of Computer and System Sciences 60, no. 3 (June 2000): 592–629. http://dx.doi.org/10.1006/jcss.1999.1689.
Full textMoreham, N. A. "BEYOND INFORMATION: PHYSICAL PRIVACY IN ENGLISH LAW." Cambridge Law Journal 73, no. 2 (July 2014): 350–77. http://dx.doi.org/10.1017/s0008197314000427.
Full textFletcher, Sam, and Md Zahidul Islam. "Measuring Information Quality for Privacy Preserving Data Mining." International Journal of Computer Theory and Engineering 7, no. 1 (February 2014): 21–28. http://dx.doi.org/10.7763/ijcte.2015.v7.924.
Full textMondal, Sutapa, Mangesh S. Gharote, and Sachin P. Lodha. "Privacy of Personal Information." Queue 20, no. 3 (June 30, 2022): 41–87. http://dx.doi.org/10.1145/3546934.
Full textMachamer, Peter, and Barbara Boylan. "Freedom, Information and Privacy." Business and Professional Ethics Journal 12, no. 3 (1993): 47–68. http://dx.doi.org/10.5840/bpej19931237.
Full textScoma, Louis. "Protecting Privacy of Information." Journal of Information Systems Management 3, no. 3 (January 1986): 79–80. http://dx.doi.org/10.1080/07399018608965265.
Full textAhmad, Aftab, Preeti Misra, Frank Ono, Cody Priest, Jessica Suarez, and Alexander Urcioli. "The information privacy domain." International Journal of Information Privacy, Security and Integrity 2, no. 4 (2016): 307. http://dx.doi.org/10.1504/ijipsi.2016.082124.
Full textSuarez, Jessica, Frank Ono, Aftab Ahmad, Preeti Misra, Alexander Urcioli, and Cody Priest. "The information privacy domain." International Journal of Information Privacy, Security and Integrity 2, no. 4 (2016): 307. http://dx.doi.org/10.1504/ijipsi.2016.10003023.
Full textCassidy, Susan O., and Martin J. Sepulveda. "Health Information Privacy Reform." Journal of Occupational and Environmental Medicine 37, no. 5 (May 1995): 605–14. http://dx.doi.org/10.1097/00043764-199505000-00010.
Full textRomanow, Kate. "Patient Information Privacy Basics." ASHA Leader 16, no. 9 (September 2011): 3–46. http://dx.doi.org/10.1044/leader.bml1.16092011.3.
Full textSharts-Hopko, Nancy C. "Health Information Privacy Reconsidered." Nurse Leader 12, no. 4 (August 2014): 58–61. http://dx.doi.org/10.1016/j.mnl.2013.10.004.
Full textConrad, Deborah. "Consciousness, privacy, and information." Biosystems 38, no. 2-3 (January 1996): 207–10. http://dx.doi.org/10.1016/0303-2647(95)01592-2.
Full textIsmail Al-, Adel, and Eman Ali Hafedh . "Auditing of Information Privacy." Information Technology Journal 5, no. 1 (December 15, 2005): 177–82. http://dx.doi.org/10.3923/itj.2006.177.182.
Full textCaloyannides, M. "Privacy vs. information technology." IEEE Security & Privacy 1, no. 1 (January 2003): 100–103. http://dx.doi.org/10.1109/msecp.2003.1177005.
Full textGostin, Lawrence O. "National Health Information Privacy." JAMA 285, no. 23 (June 20, 2001): 3015. http://dx.doi.org/10.1001/jama.285.23.3015.
Full textLucky Stephen, Godwin, and Nwabugwu Mgbodichima Jummai. "Information Ownership and Privacy Control in Information Society." International Journal of Scientific Research and Management 10, no. 06 (June 24, 2022): 25–33. http://dx.doi.org/10.18535/ijsrm/v10i6.lis01.
Full textSanfilippo, Madelyn R., Yan Shvartzshnaider, Irwin Reyes, Helen Nissenbaum, and Serge Egelman. "Disaster privacy/privacy disaster." Journal of the Association for Information Science and Technology 71, no. 9 (March 13, 2020): 1002–14. http://dx.doi.org/10.1002/asi.24353.
Full textWang, Qiaozhi, Hao Xue, Fengjun Li, Dongwon Lee, and Bo Luo. "#DontTweetThis: Scoring Private Information in Social Networks." Proceedings on Privacy Enhancing Technologies 2019, no. 4 (October 1, 2019): 72–92. http://dx.doi.org/10.2478/popets-2019-0059.
Full textKemp, Randy, and Adam D. Moore. "Privacy." Library Hi Tech 25, no. 1 (March 13, 2007): 58–78. http://dx.doi.org/10.1108/07378830710735867.
Full textPawestri, Firamia Dyah, and Jumino Jumino. "Analisis Hubungan Information Privacy Concern dan Perilaku Perlindungan Privasi Pengguna Twitter di Indonesia." Anuva: Jurnal Kajian Budaya, Perpustakaan, dan Informasi 5, no. 2 (June 6, 2021): 221–36. http://dx.doi.org/10.14710/anuva.5.2.221-236.
Full textYe, Fangwei, and Salim El Rouayheb. "Intermittent Private Information Retrieval With Application to Location Privacy." IEEE Journal on Selected Areas in Communications 40, no. 3 (March 2022): 927–39. http://dx.doi.org/10.1109/jsac.2022.3142301.
Full textBernardini, Cesar, Samuel Marchal, Muhammad Rizwan Asghar, and Bruno Crispo. "PrivICN: Privacy-preserving content retrieval in information-centric networking." Computer Networks 149 (February 2019): 13–28. http://dx.doi.org/10.1016/j.comnet.2018.11.012.
Full textTavani, Herman T., and James H. Moor. "Privacy protection, control of information, and privacy-enhancing technologies." ACM SIGCAS Computers and Society 31, no. 1 (March 2001): 6–11. http://dx.doi.org/10.1145/572277.572278.
Full textMartin, Kirsten. "Information technology and privacy: conceptual muddles or privacy vacuums?" Ethics and Information Technology 14, no. 4 (September 15, 2012): 267–84. http://dx.doi.org/10.1007/s10676-012-9300-3.
Full textAbdulhameed, Islam Sami, Intisar Al-Mejibli, and Jolan Rokan Naif. "Improving Security and Privacy for Health Information and Images." Webology 19, no. 1 (January 20, 2022): 2435–57. http://dx.doi.org/10.14704/web/v19i1/web19164.
Full textWang, Le, Zao Sun, Xiaoyong Dai, Yixin Zhang, and Hai-hua Hu. "Retaining users after privacy invasions." Information Technology & People 32, no. 6 (December 2, 2019): 1679–703. http://dx.doi.org/10.1108/itp-01-2018-0020.
Full textChesnokova, Lesya. "Information privacy: protecting freedom and individual autonomy." Digital Scholar Philosopher s Lab 4, no. 2 (2021): 145–57. http://dx.doi.org/10.32326/2618-9267-2021-4-2-145-157.
Full textRegan, Priscilla M. "Privacy, Government Information, and Technology." Public Administration Review 46, no. 6 (November 1986): 629. http://dx.doi.org/10.2307/976229.
Full textKang, Jerry. "Information Privacy in Cyberspace Transactions." Stanford Law Review 50, no. 4 (April 1998): 1193. http://dx.doi.org/10.2307/1229286.
Full textJiang, Bo, Mohamed Seif, Ravi Tandon, and Ming Li. "Context-Aware Local Information Privacy." IEEE Transactions on Information Forensics and Security 16 (2021): 3694–708. http://dx.doi.org/10.1109/tifs.2021.3087350.
Full textSerohin, Vitalii. "INFORMATION PRIVACY: A CONCEPTUAL APPROACH." Constitutional and legal academic studies, no. 2 (July 16, 2021): 52–60. http://dx.doi.org/10.24144/2663-5399.2020.2.06.
Full textLANGENDERFER, JEFF, and ANTHONY D. MIYAZAKI. "Privacy in the Information Economy." Journal of Consumer Affairs 43, no. 3 (September 2009): 380–88. http://dx.doi.org/10.1111/j.1745-6606.2009.01152.x.
Full textAuerbach, Isaac L. "Professional Responsibility for Information Privacy." Journal of Information Systems Management 2, no. 1 (January 1985): 77–81. http://dx.doi.org/10.1080/07399018508967744.
Full textvan Harten, Dirk, and Rinie van Est. "Privacy in an Information Society." Journal of Contingencies and Crisis Management 11, no. 1 (March 2003): 1. http://dx.doi.org/10.1111/1468-5973.1101001.
Full textBar-Yehuda, R., B. Chor, E. Kushilevitz, and A. Orlitsky. "Privacy, additional information and communication." IEEE Transactions on Information Theory 39, no. 6 (1993): 1930–43. http://dx.doi.org/10.1109/18.265501.
Full textMcGraw, Deven. "Privacy and Health Information Technology." Journal of Law, Medicine & Ethics 37, S2 (2009): 121–49. http://dx.doi.org/10.1111/j.1748-720x.2009.00424.x.
Full text