Journal articles on the topic 'Privacy practices'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Privacy practices.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Smith, H. Jeff. "Privacy policies and practices." Communications of the ACM 36, no. 12 (December 1993): 104–22. http://dx.doi.org/10.1145/163298.163349.
Full textPaasche-Orlow, Michael K., Dan M. Jacob, and Joshua N. Powell. "Notices of Privacy Practices." Medical Care 43, no. 6 (June 2005): 558–64. http://dx.doi.org/10.1097/01.mlr.0000163646.90393.e4.
Full textSchlueter, John P. "Private Practices." Nineteenth-Century Literature 66, no. 3 (December 1, 2011): 283–306. http://dx.doi.org/10.1525/ncl.2011.66.3.283.
Full textHsu, Chiung‐wen (Julia). "Privacy concerns, privacy practices and web site categories." Online Information Review 30, no. 5 (September 2006): 569–86. http://dx.doi.org/10.1108/14684520610706433.
Full textToy, Alan, David Lau, David Hay, and Gehan Gunasekara. "The views of privacy auditors regarding standards and methodologies." Meditari Accountancy Research 27, no. 3 (June 3, 2019): 366–98. http://dx.doi.org/10.1108/medar-07-2018-0367.
Full textMensch, Scott E., and LeAnn Wilkie. "Smart Phone Security Practices." International Journal of Cyber Behavior, Psychology and Learning 9, no. 3 (July 2019): 1–14. http://dx.doi.org/10.4018/ijcbpl.2019070101.
Full textHan, Ye, and T. Selwyn Ellis. "A Study of User Continuance Behavioral Intentions Toward Privacy-Protection Practices." Information Resources Management Journal 31, no. 2 (April 2018): 24–46. http://dx.doi.org/10.4018/irmj.2018040102.
Full textHope, Joan. "Follow best practices for transparency about student privacy practices." Disability Compliance for Higher Education 20, no. 9 (March 17, 2015): 9. http://dx.doi.org/10.1002/dhe.30049.
Full textCohen, Julie E. "Turning Privacy Inside Out." Theoretical Inquiries in Law 20, no. 1 (March 16, 2019): 1–31. http://dx.doi.org/10.1515/til-2019-0002.
Full textCulnan, Mary J., and Thomas J. Carlin. "Online privacy practices in higher education." Communications of the ACM 52, no. 3 (March 2009): 126–30. http://dx.doi.org/10.1145/1467247.1467277.
Full textLauer, Thomas W., and Xiaodong Deng. "Building online trust through privacy practices." International Journal of Information Security 6, no. 5 (July 3, 2007): 323–31. http://dx.doi.org/10.1007/s10207-007-0028-8.
Full textNORD, CATHARINA. "Architectural space as a moulding factor of care practices and resident privacy in assisted living." Ageing and Society 31, no. 6 (March 14, 2011): 934–52. http://dx.doi.org/10.1017/s0144686x10001248.
Full textCharlesworth, Andrew J. "Privacy, Personal Information and Employment." Surveillance & Society 1, no. 2 (September 1, 2002): 217–22. http://dx.doi.org/10.24908/ss.v1i2.3355.
Full textCoppens, Paulien, Carina Veeckman, and Laurence Claeys. "Privacy in location-based social networks: privacy scripts & user practices." Journal of Location Based Services 9, no. 1 (January 2, 2015): 1–15. http://dx.doi.org/10.1080/17489725.2015.1017015.
Full textBurton, Julian. "Privacy on their terms." Canadian Journal of Children's Rights / Revue canadienne des droits des enfants 5, no. 1 (November 9, 2018): 150–72. http://dx.doi.org/10.22215/cjcr.v5i1.1256.
Full textCharbonneau, Deborah H. "Privacy Practices of Health Social Networking Sites." CIN: Computers, Informatics, Nursing 34, no. 8 (August 2016): 355–59. http://dx.doi.org/10.1097/cin.0000000000000249.
Full textPfleeger, S. L., and C. P. Pfleeger. "Harmonizing privacy with security principles and practices." IBM Journal of Research and Development 53, no. 2 (March 2009): 6:1–6:12. http://dx.doi.org/10.1147/jrd.2009.5429048.
Full textMartin, David M., Richard M. Smith, Michael Brittain, Ivan Fetch, and Hailin Wu. "The privacy practices of Web browser extensions." Communications of the ACM 44, no. 2 (February 2001): 45–50. http://dx.doi.org/10.1145/359205.359226.
Full textJin, Haojian, Hong Shen, Mayank Jain, Swarun Kumar, and Jason I. Hong. "Lean Privacy Review: Collecting Users’ Privacy Concerns of Data Practices at a Low Cost." ACM Transactions on Computer-Human Interaction 28, no. 5 (October 31, 2021): 1–55. http://dx.doi.org/10.1145/3463910.
Full textHartman-Caverly, Sarah, and Alexandria Chisholm. "Privacy literacy instruction practices in academic libraries: Past, present, and possibilities." IFLA Journal 46, no. 4 (August 28, 2020): 305–27. http://dx.doi.org/10.1177/0340035220956804.
Full textChen, Wenhong, Gejun Huang, Joshua Miller, Kye-Hyoung Lee, Daniel Mauro, Bryan Stephens, and Xiaoqian Li. "“As We Grow, It Will Become a Priority”: American Mobile Start-Ups’ Privacy Practices." American Behavioral Scientist 62, no. 10 (July 12, 2018): 1338–55. http://dx.doi.org/10.1177/0002764218787867.
Full textCulnan, Mary J. "Protecting Privacy Online: Is Self-Regulation Working?" Journal of Public Policy & Marketing 19, no. 1 (April 2000): 20–26. http://dx.doi.org/10.1509/jppm.19.1.20.16944.
Full textMcQuay, Terry, and Ann Cavoukian. "A pragmatic approach to privacy risk optimization: privacy by design for business practices." Identity in the Information Society 3, no. 2 (July 11, 2010): 379–96. http://dx.doi.org/10.1007/s12394-010-0067-6.
Full textParsons, Christopher. "Beyond Privacy: Articulating the Broader Harms of Pervasive Mass Surveillance." Media and Communication 3, no. 3 (October 20, 2015): 1–11. http://dx.doi.org/10.17645/mac.v3i3.263.
Full textHosseini, Henry, Martin Degeling, Christine Utz, and Thomas Hupperich. "Unifying Privacy Policy Detection." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (July 23, 2021): 480–99. http://dx.doi.org/10.2478/popets-2021-0081.
Full textBarbosa, Natã M., Joon S. Park, Yaxing Yao, and Yang Wang. "“What if?” Predicting Individual Users’ Smart Home Privacy Preferences and Their Changes." Proceedings on Privacy Enhancing Technologies 2019, no. 4 (October 1, 2019): 211–31. http://dx.doi.org/10.2478/popets-2019-0066.
Full textOdella, Francesca. "Privacy Awareness and the Networking Generation." International Journal of Technoethics 9, no. 1 (January 2018): 51–70. http://dx.doi.org/10.4018/ijt.2018010105.
Full textSheehan, Kim Bartel, and Timothy W. Gleason. "Online Privacy: Internet Advertising Practitioners' Knowledge and Practices." Journal of Current Issues & Research in Advertising 23, no. 1 (March 2001): 31–41. http://dx.doi.org/10.1080/10641734.2001.10505112.
Full textDowling, Thomas. "Protecting patron privacy: Safe practices for public computers." Technical Services Quarterly 33, no. 2 (March 21, 2016): 214–15. http://dx.doi.org/10.1080/07317131.2016.1135018.
Full textDewi, Sinta. "Balancing privacy rights and legal enforcement: Indonesian practices." International Journal of Liability and Scientific Enquiry 5, no. 3/4 (2012): 232. http://dx.doi.org/10.1504/ijlse.2012.051961.
Full textWeber, R. H. "Privacy management practices in the proposed EU regulation." International Data Privacy Law 4, no. 4 (September 4, 2014): 290–97. http://dx.doi.org/10.1093/idpl/ipu018.
Full textSmith, H. Jeff, Sandra J. Milberg, and Sandra J. Burke. "Information Privacy: Measuring Individuals' Concerns about Organizational Practices." MIS Quarterly 20, no. 2 (June 1996): 167. http://dx.doi.org/10.2307/249477.
Full textSchellenberg, Kathryn. "Police Information Systems, Information Practices and Individual Privacy." Canadian Public Policy / Analyse de Politiques 23, no. 1 (March 1997): 23. http://dx.doi.org/10.2307/3552129.
Full textMillar, Sheila A. "Privacy and security: Best practices for global security." Journal of International Trade Law and Policy 5, no. 1 (May 31, 2006): 36–49. http://dx.doi.org/10.1108/14770020680000539.
Full textROTFELD, HERBERT JACK. "Privacy Crimes, Annoyances and Self-Defeating Business Practices." Journal of Consumer Affairs 43, no. 3 (September 2009): 538–42. http://dx.doi.org/10.1111/j.1745-6606.2009.01154.x.
Full textWang, Shu-Ching, and Jen-Her Wu. "Proactive privacy practices in transition: Toward ubiquitous services." Information & Management 51, no. 1 (January 2014): 93–103. http://dx.doi.org/10.1016/j.im.2013.09.005.
Full textKaryda, Maria, Stefanos Gritzalis, Jong Hyuk Park, and Spyros Kokolakis. "Privacy and fair information practices in ubiquitous environments." Internet Research 19, no. 2 (April 3, 2009): 194–208. http://dx.doi.org/10.1108/10662240910952346.
Full textSchwaig, Kathy Stewart, Gerald C. Kane, and Veda C. Storey. "Privacy, fair information practices and the fortune 500." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 36, no. 1 (February 7, 2005): 49–63. http://dx.doi.org/10.1145/1047070.1047075.
Full textBui, Duc, Kang G. Shin, Jong-Min Choi, and Junbum Shin. "Automated Extraction and Presentation of Data Practices in Privacy Policies." Proceedings on Privacy Enhancing Technologies 2021, no. 2 (January 29, 2021): 88–110. http://dx.doi.org/10.2478/popets-2021-0019.
Full textLaMonica, Haley M., Anna E. Roberts, Grace Yeeun Lee, Tracey A. Davenport, and Ian B. Hickie. "Privacy Practices of Health Information Technologies: Privacy Policy Risk Assessment Study and Proposed Guidelines." Journal of Medical Internet Research 23, no. 9 (September 16, 2021): e26317. http://dx.doi.org/10.2196/26317.
Full textShipp, Laura, and Jorge Blasco. "How private is your period?: A systematic analysis of menstrual app privacy policies." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (October 1, 2020): 491–510. http://dx.doi.org/10.2478/popets-2020-0083.
Full textHollenbaugh, Erin E. "Privacy Management Among Social Media Natives: An Exploratory Study of Facebook and Snapchat." Social Media + Society 5, no. 3 (April 2019): 205630511985514. http://dx.doi.org/10.1177/2056305119855144.
Full textKönig, Katharina, and Florence Oloff. "Mobile Medienpraktiken im Spannungsfeld von Öffentlichkeit, Privatheit und Anonymität." Journal für Medienlinguistik 2, no. 2 (September 27, 2019): 1–27. http://dx.doi.org/10.21248/jfml.2019.9.
Full textKönig, Katharina, and Florence Oloff. "Mobile Medienpraktiken im Spannungsfeld von Öffentlichkeit, Privatheit und Anonymität." Journal für Medienlinguistik 2, no. 2 (September 27, 2019): 1–27. http://dx.doi.org/10.21248/jfml.2019.9.
Full textKitsos, Panagiotis, and Aikaterini Yannoukakou. "Privacy in the 21st Century." International Journal of E-Politics 4, no. 3 (July 2013): 15–29. http://dx.doi.org/10.4018/jep.2013070102.
Full textAdorjan, Michael, and Rosemary Ricciardelli. "A New Privacy Paradox? Youth Agentic Practices of Privacy Management Despite “Nothing to Hide” Online." Canadian Review of Sociology/Revue canadienne de sociologie 56, no. 1 (January 15, 2019): 8–29. http://dx.doi.org/10.1111/cars.12227.
Full textBarhamgi, Mahmoud, Arosha K. Bandara, Yijun Yu, Khalid Belhajjame, and Bashar Nuseibeh. "Protecting Privacy in the Cloud: Current Practices, Future Directions." Computer 49, no. 2 (February 2016): 68–72. http://dx.doi.org/10.1109/mc.2016.59.
Full textDias, Gonçalo Paiva, Hélder Gomes, and André Zúquete. "Privacy policies and practices in Portuguese local e-government." Electronic Government, an International Journal 12, no. 4 (2016): 301. http://dx.doi.org/10.1504/eg.2016.080430.
Full textZúquete, André, Gonçalo Paiva Dias, and Hélder Gomes. "Privacy policies and practices in Portuguese local e-government." Electronic Government, an International Journal 12, no. 4 (2016): 301. http://dx.doi.org/10.1504/eg.2016.10001404.
Full textKemp, Katharine. "Concealed data practices and competition law: why privacy matters." European Competition Journal 16, no. 2-3 (September 1, 2020): 628–72. http://dx.doi.org/10.1080/17441056.2020.1839228.
Full text