Journal articles on the topic 'Privacy policy compliance'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Privacy policy compliance.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mazmudar, Miti, and Ian Goldberg. "Mitigator: Privacy policy compliance using trusted hardware." Proceedings on Privacy Enhancing Technologies 2020, no. 3 (July 1, 2020): 204–21. http://dx.doi.org/10.2478/popets-2020-0049.
Full textJaved, Yousra, Elham Al Qahtani, and Mohamed Shehab. "Privacy Policy Analysis of Banks and Mobile Money Services in the Middle East." Future Internet 13, no. 1 (January 3, 2021): 10. http://dx.doi.org/10.3390/fi13010010.
Full textJoshi, Karuna Pande, and Agniva Banerjee. "Automating Privacy Compliance Using Policy Integrated Blockchain." Cryptography 3, no. 1 (February 5, 2019): 7. http://dx.doi.org/10.3390/cryptography3010007.
Full textFernald, Frances R. "HIPAA Patient Privacy Compliance Guide." Journal For Healthcare Quality 24, no. 6 (November 2002): 52. http://dx.doi.org/10.1097/01445442-200211000-00017.
Full textLiu, Kaijun, Guoai Xu, Xiaomei Zhang, Guosheng Xu, and Zhangjie Zhao. "Evaluating the Privacy Policy of Android Apps: A Privacy Policy Compliance Study for Popular Apps in China and Europe." Scientific Programming 2022 (August 23, 2022): 1–15. http://dx.doi.org/10.1155/2022/2508690.
Full textValentine, Greta, and Kate Barron. "An Examination of Academic Library Privacy Policy Compliance with Professional Guidelines." Evidence Based Library and Information Practice 17, no. 3 (September 19, 2022): 77–96. http://dx.doi.org/10.18438/eblip30122.
Full textLinden, Thomas, Rishabh Khandelwal, Hamza Harkous, and Kassem Fawaz. "The Privacy Policy Landscape After the GDPR." Proceedings on Privacy Enhancing Technologies 2020, no. 1 (January 1, 2020): 47–64. http://dx.doi.org/10.2478/popets-2020-0004.
Full textHalder, Suhasish, V. S. Prakash Attili, and Vivek Gupta. "Information Privacy Assimilation." International Journal of Digital Strategy, Governance, and Business Transformation 12, no. 1 (January 1, 2022): 1–17. http://dx.doi.org/10.4018/ijdsgbt.313954.
Full textCostante, Elisa, Federica Paci, and Nicola Zannone. "Privacy-Aware Web Service Composition and Ranking." International Journal of Web Services Research 10, no. 3 (July 2013): 1–23. http://dx.doi.org/10.4018/ijwsr.2013070101.
Full textBrothers, Kyle Bertram, and Ellen Wright Clayton. "“Human Non-Subjects Research”: Privacy and Compliance." American Journal of Bioethics 10, no. 9 (September 9, 2010): 15–17. http://dx.doi.org/10.1080/15265161.2010.492891.
Full textGrandison, Tyrone, and Rafae Bhatti. "Regulatory Compliance and the Correlation to Privacy Protection in Healthcare." International Journal of Computational Models and Algorithms in Medicine 1, no. 2 (April 2010): 37–52. http://dx.doi.org/10.4018/jcmam.2010040103.
Full textChoi, Youngkeun. "Human Resource Management and Security Policy Compliance." International Journal of Human Capital and Information Technology Professionals 8, no. 3 (July 2017): 68–81. http://dx.doi.org/10.4018/ijhcitp.2017070105.
Full textZimmeck, Sebastian, Peter Story, Daniel Smullen, Abhilasha Ravichander, Ziqi Wang, Joel Reidenberg, N. Cameron Russell, and Norman Sadeh. "MAPS: Scaling Privacy Compliance Analysis to a Million Apps." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (July 1, 2019): 66–86. http://dx.doi.org/10.2478/popets-2019-0037.
Full textLePar, Kathleen. "Quality Consciousness … Auditing for HIPAA Privacy Compliance." Lippincott's Case Management 9, no. 6 (November 2004): 257–64. http://dx.doi.org/10.1097/00129234-200411000-00004.
Full text&NA;. "Quality Consciousness … Auditing for HIPAA Privacy Compliance." Lippincott's Case Management 9, no. 6 (November 2004): 265–66. http://dx.doi.org/10.1097/00129234-200411000-00005.
Full textSher, Ming-Ling, Paul C. Talley, Ching-Wen Yang, and Kuang-Ming Kuo. "Compliance With Electronic Medical Records Privacy Policy: An Empirical Investigation of Hospital Information Technology Staff." INQUIRY: The Journal of Health Care Organization, Provision, and Financing 54 (January 1, 2017): 004695801771175. http://dx.doi.org/10.1177/0046958017711759.
Full textO’Neill, Allen. "An action framework for compliance and governance." Clinical Governance: An International Journal 19, no. 4 (September 30, 2014): 342–59. http://dx.doi.org/10.1108/cgij-07-2014-0022.
Full textRothstein, Mark A. "HIPAA Privacy Rule 2.0." Journal of Law, Medicine & Ethics 41, no. 2 (2013): 525–28. http://dx.doi.org/10.1111/jlme.12060.
Full textCrossler, Robert E., James H. Long, Tina M. Loraas, and Brad S. Trinkle. "The Impact of Moral Intensity and Ethical Tone Consistency on Policy Compliance." Journal of Information Systems 31, no. 2 (October 1, 2016): 49–64. http://dx.doi.org/10.2308/isys-51623.
Full textDiamantopoulou, Vasiliki, Aggeliki Androutsopoulou, Stefanos Gritzalis, and Yannis Charalabidis. "Preserving Digital Privacy in e-Participation Environments: Towards GDPR Compliance." Information 11, no. 2 (February 20, 2020): 117. http://dx.doi.org/10.3390/info11020117.
Full textPasquier, Thomas, Jatinder Singh, Julia Powles, David Eyers, Margo Seltzer, and Jean Bacon. "Data provenance to audit compliance with privacy policy in the Internet of Things." Personal and Ubiquitous Computing 22, no. 2 (August 15, 2017): 333–44. http://dx.doi.org/10.1007/s00779-017-1067-4.
Full textAlshare, Khaled A., Peggy L. Lane, and Michael R. Lane. "Information security policy compliance: a higher education case study." Information & Computer Security 26, no. 1 (March 12, 2018): 91–108. http://dx.doi.org/10.1108/ics-09-2016-0073.
Full textChimakurthi, VNS Surendra. "Cloud Security - A Semantic Approach in End to End Security Compliance." Engineering International 5, no. 2 (December 31, 2017): 97–106. http://dx.doi.org/10.18034/ei.v5i2.586.
Full textKelly, Curly. "HIPAA Compliance: Lessons from the Repeal of Hawaii's Patient Privacy Law." Journal of Law, Medicine & Ethics 30, no. 2 (2002): 309–12. http://dx.doi.org/10.1111/j.1748-720x.2002.tb00399.x.
Full textChua, Hui Na, Anthony Herbland, Siew Fan Wong, and Younghoon Chang. "Compliance to personal data protection principles: A study of how organizations frame privacy policy notices." Telematics and Informatics 34, no. 4 (July 2017): 157–70. http://dx.doi.org/10.1016/j.tele.2017.01.008.
Full textAgris, Julie L., and John M. Spandorfer. "HIPAA Compliance and Training: A Perfect Storm for Professionalism Education?" Journal of Law, Medicine & Ethics 44, no. 4 (2016): 652–56. http://dx.doi.org/10.1177/1073110516684812.
Full textSánchez, David, Alexandre Viejo, and Montserrat Batet. "Automatic Assessment of Privacy Policies under the GDPR." Applied Sciences 11, no. 4 (February 17, 2021): 1762. http://dx.doi.org/10.3390/app11041762.
Full textAl-Abdullah, Muhammad, Izzat Alsmadi, Ruwaida AlAbdullah, and Bernie Farkas. "Designing privacy-friendly data repositories: a framework for a blockchain that follows the GDPR." Digital Policy, Regulation and Governance 22, no. 5/6 (November 26, 2020): 389–411. http://dx.doi.org/10.1108/dprg-04-2020-0050.
Full textMurray, Suellen. "Compassion and Compliance: Releasing Records to Care-Leavers under Privacy and Freedom of Information Legislation." Social Policy and Society 13, no. 4 (July 22, 2013): 493–503. http://dx.doi.org/10.1017/s1474746413000328.
Full textChoi, Youngkeun, and Taejong Yoo. "Influence of HRM Practices on Privacy Policy Compliance Intention: A Study among Bank Employees in Korea." International Journal of Security and Its Applications 8, no. 1 (January 31, 2014): 9–18. http://dx.doi.org/10.14257/ijsia.2014.8.1.02.
Full textWarkentin, Merrill, Allen C. Johnston, and Jordan Shropshire. "The influence of the informal social learning environment on information privacy policy compliance efficacy and intention." European Journal of Information Systems 20, no. 3 (May 2011): 267–84. http://dx.doi.org/10.1057/ejis.2010.72.
Full textKotut, Lindah, and D. Scott McCrickard. "The TL;DR Charter: Speculatively Demystifying Privacy Policy Documents and Terms Agreements." Proceedings of the ACM on Human-Computer Interaction 6, GROUP (January 14, 2022): 1–14. http://dx.doi.org/10.1145/3492842.
Full textYang, Lu, Xingshu Chen, Yonggang Luo, Xiao Lan, and Li Chen. "PurExt: Automated Extraction of the Purpose-Aware Rule from the Natural Language Privacy Policy in IoT." Security and Communication Networks 2021 (May 7, 2021): 1–11. http://dx.doi.org/10.1155/2021/5552501.
Full textRothstein, Mark A. "Currents in Contemporary Ethics." Journal of Law, Medicine & Ethics 33, no. 1 (2005): 154–59. http://dx.doi.org/10.1111/j.1748-720x.2005.tb00217.x.
Full textSheehan, Kim Bartel. "In Poor Health: An Assessment of Privacy Policies at Direct-to-Consumer Web Sites." Journal of Public Policy & Marketing 24, no. 2 (September 2005): 273–83. http://dx.doi.org/10.1509/jppm.2005.24.2.273.
Full textFu, Yang, Weihong Ma, and Jinjin Wu. "Fostering Voluntary Compliance in the COVID-19 Pandemic: An Analytical Framework of Information Disclosure." American Review of Public Administration 50, no. 6-7 (July 17, 2020): 685–91. http://dx.doi.org/10.1177/0275074020942102.
Full textNuradiansyah, Adrian. "Reasoning in Description Logic Ontologies for Privacy Management." KI - Künstliche Intelligenz 34, no. 3 (July 4, 2020): 411–15. http://dx.doi.org/10.1007/s13218-020-00681-8.
Full textKutkat, Lora, James G. Hodge, Thomas Jeffry, and Diana M. Bontá. "The HIPAA Privacy Rule: Reviewing the Post-Compliance Impact on Public Health Practice and Research." Journal of Law, Medicine & Ethics 31, S4 (2003): 70–72. http://dx.doi.org/10.1111/j.1748-720x.2003.tb00758.x.
Full textChang, Shuchih Ernest, Anne Yenching Liu, and Sungmin Lin. "Exploring privacy and trust for employee monitoring." Industrial Management & Data Systems 115, no. 1 (February 2, 2015): 88–106. http://dx.doi.org/10.1108/imds-07-2014-0197.
Full textMulgund, Pavankumar, Banashri Pavankumar Mulgund, Raj Sharman, and Raghvendra Singh. "The implications of the California Consumer Privacy Act (CCPA) on healthcare organizations: Lessons learned from early compliance experiences." Health Policy and Technology 10, no. 3 (September 2021): 100543. http://dx.doi.org/10.1016/j.hlpt.2021.100543.
Full textGarrett, Paul M., Yu-Wen Wang, Joshua P. White, Yoshihsa Kashima, Simon Dennis, and Cheng-Ta Yang. "High Acceptance of COVID-19 Tracing Technologies in Taiwan: A Nationally Representative Survey Analysis." International Journal of Environmental Research and Public Health 19, no. 6 (March 11, 2022): 3323. http://dx.doi.org/10.3390/ijerph19063323.
Full textWorobiec, Michele, and Kelly C. Firesheets. "Compliance Is Doable! A Framework for Navigating Privacy Regulations in Public Health and Public Safety Partnerships." Journal of Public Health Management and Practice 28, Supplement 6 (November 2022): S367—S371. http://dx.doi.org/10.1097/phh.0000000000001572.
Full textVerhage, Antoinette. "Great expectations but little evidence: policing money laundering." International Journal of Sociology and Social Policy 37, no. 7/8 (July 11, 2017): 477–90. http://dx.doi.org/10.1108/ijssp-06-2016-0076.
Full textAnthony, Denise L., and Timothy Stablein. "Privacy in practice: professional discourse about information control in health care." Journal of Health Organization and Management 30, no. 2 (April 11, 2016): 207–26. http://dx.doi.org/10.1108/jhom-12-2014-0220.
Full textAbdul Halim, Noursilawati, Zawiyah M.Yusof, and Nor Azan M. Zin. "The Requirement for Information Governance Policy Framework in Malaysian Public Sector." International Journal of Engineering & Technology 7, no. 4.15 (October 7, 2018): 235. http://dx.doi.org/10.14419/ijet.v7i4.15.22996.
Full textLi, Szu-Chuang, Yi-Wen Chen, and Yennun Huang. "Examining Compliance with Personal Data Protection Regulations in Interorganizational Data Analysis." Sustainability 13, no. 20 (October 16, 2021): 11459. http://dx.doi.org/10.3390/su132011459.
Full textKornhauser, Marjorie E. "Doing the Full Monty: Will Publicizing Tax Information Increase Compliance?" Canadian Journal of Law & Jurisprudence 18, no. 1 (January 2005): 95–117. http://dx.doi.org/10.1017/s0841820900005518.
Full textYaakov, Raphael A., Özgür Güler, Tim Mayhugh, and Thomas E. Serena. "Enhancing Patient Centricity and Advancing Innovation in Clinical Research with Virtual Randomized Clinical Trials (vRCTs)." Diagnostics 11, no. 2 (January 21, 2021): 151. http://dx.doi.org/10.3390/diagnostics11020151.
Full textKo, Hoon, Libor Mesicek, Jongsun Choi, Junho Choi, and Seogchan Hwang. "A Study on Secure Contents Strategies for Applications With DRM on Cloud Computing." International Journal of Cloud Applications and Computing 8, no. 1 (January 2018): 143–53. http://dx.doi.org/10.4018/ijcac.2018010107.
Full textChiu, Dickson K. W., Yuexuan Wang, Patrick Hung, Vivying S. Y. Cheng, Kai-Kin Chan, Eleanna Kafeza, and Tung. "Governance of Cross-Organizational Healthcare Document Exchange through Watermarking Services and Alerts." International Journal of Systems and Service-Oriented Engineering 2, no. 4 (October 2011): 83–108. http://dx.doi.org/10.4018/jssoe.2011100105.
Full text