Journal articles on the topic 'Privicy protection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Privicy protection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Xie, Guangxu, Gaopan Hou, Qingqi Pei, and Haibo Huang. "Lightweight Privacy Protection via Adversarial Sample." Electronics 13, no. 7 (March 26, 2024): 1230. http://dx.doi.org/10.3390/electronics13071230.
Bonomi, Luca, Xiaoqian Jiang, and Lucila Ohno-Machado. "Protecting patient privacy in survival analyses." Journal of the American Medical Informatics Association 27, no. 3 (November 21, 2019): 366–75. http://dx.doi.org/10.1093/jamia/ocz195.
Zhenjiang Zhang, Zhenjiang Zhang, and Xiaohua Liu Zhenjiang Zhang. "Cloud-side Collaborative Privacy Protection Based on Differential Privacy." 電腦學刊 32, no. 4 (August 2021): 239–51. http://dx.doi.org/10.53106/199115992021083204019.
Meier, Yannic, Johanna Schäwel, and Nicole C. Krämer. "Between protection and disclosure: applying the privacy calculus to investigate the intended use of privacy-protecting tools and self-disclosure on different websites." Studies in Communication and Media 10, no. 3 (2021): 283–306. http://dx.doi.org/10.5771/2192-4007-2021-3-283.
Nussy, Jennifer Ingelyne. "Mekanisme Komisi Pemberantasan Korupsi dalam Proses Penyadapan dilihat dari Perspektif Hak Asasi Manusia (HAM)." JURNAL BELO 5, no. 2 (May 19, 2020): 74–85. http://dx.doi.org/10.30598/belobelovol5issue2page74-85.
Nussy, Jennifer Ingelyne. "Mekanisme Komisi Pemberantasan Korupsi dalam Proses Penyadapan dilihat dari Perspektif Hak Asasi Manusia (HAM)." JURNAL BELO 5, no. 2 (May 19, 2020): 74–85. http://dx.doi.org/10.30598/belovol5issue2page74-85.
Corones, Stephen, and Juliet Davis. "Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions." Federal Law Review 45, no. 1 (March 2017): 65–95. http://dx.doi.org/10.1177/0067205x1704500104.
Singla, Arun. "The Evolving Landscape of Privacy Law: Balancing Digital Innovation and Individual Rights." Indian Journal of Law 2, no. 1 (2024): 1–6. http://dx.doi.org/10.36676/ijl.v2.i1.01.
Chen, Zhixuan, Yixiang Zhang, and Zhiyu Zhang. "Research on Privacy Protection Willingness of New Media Platform Users Based on Theory of Planned Behavior." Communications in Humanities Research 16, no. 1 (November 28, 2023): 264–71. http://dx.doi.org/10.54254/2753-7064/16/20230726.
Nahra, Kirk J. "Remarks by Kirk J. Nahra." Proceedings of the ASIL Annual Meeting 116 (2022): 127–29. http://dx.doi.org/10.1017/amp.2023.65.
Nissim, Kobbi, and Alexandra Wood. "Is privacy privacy ?" Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 376, no. 2128 (August 6, 2018): 20170358. http://dx.doi.org/10.1098/rsta.2017.0358.
Colangelo, Giuseppe, and Mariateresa Maggiolino. "Data Protection in Attention Markets: Protecting Privacy through Competition?" Journal of European Competition Law & Practice 8, no. 6 (May 10, 2017): 363–69. http://dx.doi.org/10.1093/jeclap/lpx037.
Cui, Mingwu, Fangfang Ding, and Kun Cai. "The Influence of Self-Efficacy of College Students in Privacy Protection and Behavior in Social Networking Context." Scientific and Social Research 6, no. 3 (March 29, 2024): 126–43. http://dx.doi.org/10.26689/ssr.v6i3.6445.
Dales, Loring. "Privacy Protection." Pediatrics 107, no. 6 (June 1, 2001): 1495.2–1495. http://dx.doi.org/10.1542/peds.107.6.1495b.
Bransfield, Robert. "Privacy ‘Protection’." Psychiatric News 37, no. 17 (September 6, 2002): 32. http://dx.doi.org/10.1176/pn.37.17.0032.
Rotenberg, Marc. "Privacy protection." Government Information Quarterly 11, no. 3 (January 1994): 253–54. http://dx.doi.org/10.1016/0740-624x(94)90045-0.
Qin, Peng, and Lina Wang. "PPVC: Towards a Personalized Local Differential Privacy-Preserving Scheme for V2G Charging Networks." Mathematics 11, no. 20 (October 12, 2023): 4257. http://dx.doi.org/10.3390/math11204257.
Jia, Dongning, Bo Yin, and Xianqing Huang. "Association Analysis of Private Information in Distributed Social Networks Based on Big Data." Wireless Communications and Mobile Computing 2021 (June 4, 2021): 1–12. http://dx.doi.org/10.1155/2021/1181129.
Rothstein, Mark A. "Currents in Contemporary Ethics." Journal of Law, Medicine & Ethics 33, no. 1 (2005): 154–59. http://dx.doi.org/10.1111/j.1748-720x.2005.tb00217.x.
Bamberger, Kenneth A., and Ariel Evan Mayse. "PRE-MODERN INSIGHTS FOR POST-MODERN PRIVACY: JEWISH LAW LESSONS FOR THE BIG DATA AGE." Journal of Law and Religion 36, no. 3 (December 2021): 495–532. http://dx.doi.org/10.1017/jlr.2021.90.
Baruh, Lemi, and Mihaela Popescu. "Big data analytics and the limits of privacy self-management." New Media & Society 19, no. 4 (November 2, 2015): 579–96. http://dx.doi.org/10.1177/1461444815614001.
Zhang, Jing, Yanzi Li, Qian Ding, Liwei Lin, and Xiucai Ye. "Successive Trajectory Privacy Protection with Semantics Prediction Differential Privacy." Entropy 24, no. 9 (August 23, 2022): 1172. http://dx.doi.org/10.3390/e24091172.
Islam, Md Toriqul. "ADEQUACY OF PRIVACY REGIME IN BANGLADESH: KEY CHALLENGES AND POTENTIAL POLICY MEASURES." IIUM Law Journal 30, no. 1 (July 7, 2022): 33–74. http://dx.doi.org/10.31436/iiumlj.v30i1.655.
Wang, Weiyuan. "Legal Effect of Internet Privacy Policy." Journal of Education, Humanities and Social Sciences 28 (April 1, 2024): 126–33. http://dx.doi.org/10.54097/zjz34p19.
Kumar, Krishan, Mukesh Kumar Gupta, Nishant Saxena, and Vivek Jaglan. "Homomorphic Encryption Based Privacy Protection for Personalised Web Search." Indian Journal of Science and Technology 15, no. 8 (February 27, 2022): 318–25. http://dx.doi.org/10.17485/ijst/v15i8.44.
Serwin, Andrew. "Privacy 3.0-The Principle of Proportionality." University of Michigan Journal of Law Reform, no. 42.4 (2009): 869. http://dx.doi.org/10.36646/mjlr.42.4.privacy.
Qiu, Ke. "A secure system for electric vehicle battery swap stations using blockchain." Applied and Computational Engineering 16, no. 1 (October 23, 2023): 13–26. http://dx.doi.org/10.54254/2755-2721/16/20230851.
Hao, Li Ping, and Yi Hui Chen. "Research on the Cloud Computing Storage Privacy Preserving Based on MB-Tree Dynamic Access Model." Applied Mechanics and Materials 513-517 (February 2014): 2350–54. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2350.
Yan, Liang, Lei Li, Xuejiao Mu, Hao Wang, Xian Chen, and Hyoseop Shin. "Differential Privacy Preservation for Location Semantics." Sensors 23, no. 4 (February 13, 2023): 2121. http://dx.doi.org/10.3390/s23042121.
Grandison, Tyrone, and Rafae Bhatti. "Regulatory Compliance and the Correlation to Privacy Protection in Healthcare." International Journal of Computational Models and Algorithms in Medicine 1, no. 2 (April 2010): 37–52. http://dx.doi.org/10.4018/jcmam.2010040103.
Wang, Yijing, Jingyi Zhang, and Lupeng Zhang. "Analysis of Users Balance Between Private and Public -- One Case from the TikTok." Communications in Humanities Research 12, no. 1 (November 20, 2023): 146–60. http://dx.doi.org/10.54254/2753-7064/12/20230070.
Wang, Pingshui, Jianwen Zhu, and Qinjuan Ma. "Private Data Protection in Social Networks Based on Blockchain." International Journal of Advanced Networking and Applications 14, no. 04 (2023): 5549–55. http://dx.doi.org/10.35444/ijana.2023.14407.
Zostant, Maxwell, and Robin Chataut. "Privacy in computer ethics: Navigating the digital age." Computer Science and Information Technologies 4, no. 2 (July 1, 2023): 183–90. http://dx.doi.org/10.11591/csit.v4i2.p183-190.
Zostant, Maxwell, and Robin Chataut. "Privacy in computer ethics: Navigating the digital age." Computer Science and Information Technologies 4, no. 2 (July 1, 2023): 183–90. http://dx.doi.org/10.11591/csit.v4i2.pp183-190.
Ghorashi, Seyed Ramin, Tanveer Zia, Michael Bewong, and Yinhao Jiang. "An Analytical Review of Industrial Privacy Frameworks and Regulations for Organisational Data Sharing." Applied Sciences 13, no. 23 (November 27, 2023): 12727. http://dx.doi.org/10.3390/app132312727.
Altman, Micah, and Aloni Cohen. "Natural differential privacy—a perspective on protection guarantees." PeerJ Computer Science 9 (September 28, 2023): e1576. http://dx.doi.org/10.7717/peerj-cs.1576.
Li, Yijing, Ran Bi, Nan Jiang, Fengqiu Li, Mingsi Wang, and Xiangping Jing. "Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular Networks." Electronics 13, no. 12 (June 17, 2024): 2372. http://dx.doi.org/10.3390/electronics13122372.
AllahRakha, Naeem. "Constitutional Safeguards for Digital Rights and Privacy." International Journal of Law and Policy 2, no. 4 (April 30, 2024): 31–43. http://dx.doi.org/10.59022/ijlp.172.
Bhandari, Vrinda, and Renuka Sane. "Protecting citizens from the state post Puttaswamy: Analysing the privacy implications of the Justice Shrikrishna Committee Report and the Data Protection Bill, 2018." Socio-Legal Review 14, no. 2 (January 2018): 143. http://dx.doi.org/10.55496/uuiz9934.
Chukwunonso Aloamaka, Patrick. "Effective Data Protection in Nigeria: Challenges." Commonwealth Law Review Journal 08 (2022): 656–62. http://dx.doi.org/10.55662/clrj.2022.811.
A. Razon, Arvin Kristopher. "Are Narco-Lists Covered by the Philippine Law on Privacy?: Exploring the Limits of the ‘Classic’ Right to Privacy and Applying a Constitutionally Grounded Data Protection Right." Global Privacy Law Review 2, Issue 1 (February 1, 2021): 44–58. http://dx.doi.org/10.54648/gplr2021006.
Yang, Xuechao, Xun Yi, Andrei Kelarev, Leanne Rylands, Yuqing Lin, and Joe Ryan. "Protecting Private Information for Two Classes of Aggregated Database Queries." Informatics 9, no. 3 (September 5, 2022): 66. http://dx.doi.org/10.3390/informatics9030066.
Krishnamurthy, Vivek. "A Tale of Two Privacy Laws: The GDPR and the International Right to Privacy." AJIL Unbound 114 (2020): 26–30. http://dx.doi.org/10.1017/aju.2019.79.
Panvelwala, Fatema, and Archana G. "Data Protection Guidelines for Protecting Privacy of Users on Social Media." International Journal of Computer Applications 182, no. 2 (July 16, 2018): 7–12. http://dx.doi.org/10.5120/ijca2018917449.
Kohl, Uta. "THE RIGHT TO BE FORGOTTEN IN DATA PROTECTION LAW AND TWO WESTERN CULTURES OF PRIVACY." International and Comparative Law Quarterly 72, no. 3 (July 2023): 737–69. http://dx.doi.org/10.1017/s0020589323000258.
Zhang, Xiangfei, Feng Yang, Yu Guo, Hang Yu, Zhengxia Wang, and Qingchen Zhang. "Adaptive Differential Privacy Mechanism Based on Entropy Theory for Preserving Deep Neural Networks." Mathematics 11, no. 2 (January 8, 2023): 330. http://dx.doi.org/10.3390/math11020330.
Zhou, Leming, and Bambang Parmanto. "User Preferences for Privacy Protection Methods in Mobile Health Apps: A Mixed-Methods Study." International Journal of Telerehabilitation 12, no. 2 (December 8, 2020): 13–26. http://dx.doi.org/10.5195/ijt.2020.6319.
Sundaram, Ranjany, and Snehal Shetty. "Privacy concerns and protection behavior during the Covid-19 pandemic." Problems and Perspectives in Management 20, no. 2 (April 20, 2022): 57–70. http://dx.doi.org/10.21511/ppm.20(2).2022.06.
Kravchuk, V. "Foreign experience of personal data protection in social networks." Uzhhorod National University Herald. Series: Law 2, no. 78 (August 31, 2023): 49–53. http://dx.doi.org/10.24144/2307-3322.2023.78.2.7.
Wang, Yanbing. "Privacy Protection of Public Figures in China—The Case of Yundi Li’s Prostitution." Studies in Law and Justice 2, no. 2 (June 2023): 109–17. http://dx.doi.org/10.56397/slj.2023.06.15.