Artículos de revistas sobre el tema "Privicy protection"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Privicy protection".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Xie, Guangxu, Gaopan Hou, Qingqi Pei y Haibo Huang. "Lightweight Privacy Protection via Adversarial Sample". Electronics 13, n.º 7 (26 de marzo de 2024): 1230. http://dx.doi.org/10.3390/electronics13071230.
Bonomi, Luca, Xiaoqian Jiang y Lucila Ohno-Machado. "Protecting patient privacy in survival analyses". Journal of the American Medical Informatics Association 27, n.º 3 (21 de noviembre de 2019): 366–75. http://dx.doi.org/10.1093/jamia/ocz195.
Zhenjiang Zhang, Zhenjiang Zhang y Xiaohua Liu Zhenjiang Zhang. "Cloud-side Collaborative Privacy Protection Based on Differential Privacy". 電腦學刊 32, n.º 4 (agosto de 2021): 239–51. http://dx.doi.org/10.53106/199115992021083204019.
Meier, Yannic, Johanna Schäwel y Nicole C. Krämer. "Between protection and disclosure: applying the privacy calculus to investigate the intended use of privacy-protecting tools and self-disclosure on different websites". Studies in Communication and Media 10, n.º 3 (2021): 283–306. http://dx.doi.org/10.5771/2192-4007-2021-3-283.
Nussy, Jennifer Ingelyne. "Mekanisme Komisi Pemberantasan Korupsi dalam Proses Penyadapan dilihat dari Perspektif Hak Asasi Manusia (HAM)". JURNAL BELO 5, n.º 2 (19 de mayo de 2020): 74–85. http://dx.doi.org/10.30598/belobelovol5issue2page74-85.
Nussy, Jennifer Ingelyne. "Mekanisme Komisi Pemberantasan Korupsi dalam Proses Penyadapan dilihat dari Perspektif Hak Asasi Manusia (HAM)". JURNAL BELO 5, n.º 2 (19 de mayo de 2020): 74–85. http://dx.doi.org/10.30598/belovol5issue2page74-85.
Corones, Stephen y Juliet Davis. "Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions". Federal Law Review 45, n.º 1 (marzo de 2017): 65–95. http://dx.doi.org/10.1177/0067205x1704500104.
Singla, Arun. "The Evolving Landscape of Privacy Law: Balancing Digital Innovation and Individual Rights". Indian Journal of Law 2, n.º 1 (2024): 1–6. http://dx.doi.org/10.36676/ijl.v2.i1.01.
Chen, Zhixuan, Yixiang Zhang y Zhiyu Zhang. "Research on Privacy Protection Willingness of New Media Platform Users Based on Theory of Planned Behavior". Communications in Humanities Research 16, n.º 1 (28 de noviembre de 2023): 264–71. http://dx.doi.org/10.54254/2753-7064/16/20230726.
Nahra, Kirk J. "Remarks by Kirk J. Nahra". Proceedings of the ASIL Annual Meeting 116 (2022): 127–29. http://dx.doi.org/10.1017/amp.2023.65.
Nissim, Kobbi y Alexandra Wood. "Is privacy privacy ?" Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 376, n.º 2128 (6 de agosto de 2018): 20170358. http://dx.doi.org/10.1098/rsta.2017.0358.
Colangelo, Giuseppe y Mariateresa Maggiolino. "Data Protection in Attention Markets: Protecting Privacy through Competition?" Journal of European Competition Law & Practice 8, n.º 6 (10 de mayo de 2017): 363–69. http://dx.doi.org/10.1093/jeclap/lpx037.
Cui, Mingwu, Fangfang Ding y Kun Cai. "The Influence of Self-Efficacy of College Students in Privacy Protection and Behavior in Social Networking Context". Scientific and Social Research 6, n.º 3 (29 de marzo de 2024): 126–43. http://dx.doi.org/10.26689/ssr.v6i3.6445.
Dales, Loring. "Privacy Protection". Pediatrics 107, n.º 6 (1 de junio de 2001): 1495.2–1495. http://dx.doi.org/10.1542/peds.107.6.1495b.
Bransfield, Robert. "Privacy ‘Protection’". Psychiatric News 37, n.º 17 (6 de septiembre de 2002): 32. http://dx.doi.org/10.1176/pn.37.17.0032.
Rotenberg, Marc. "Privacy protection". Government Information Quarterly 11, n.º 3 (enero de 1994): 253–54. http://dx.doi.org/10.1016/0740-624x(94)90045-0.
Qin, Peng y Lina Wang. "PPVC: Towards a Personalized Local Differential Privacy-Preserving Scheme for V2G Charging Networks". Mathematics 11, n.º 20 (12 de octubre de 2023): 4257. http://dx.doi.org/10.3390/math11204257.
Jia, Dongning, Bo Yin y Xianqing Huang. "Association Analysis of Private Information in Distributed Social Networks Based on Big Data". Wireless Communications and Mobile Computing 2021 (4 de junio de 2021): 1–12. http://dx.doi.org/10.1155/2021/1181129.
Rothstein, Mark A. "Currents in Contemporary Ethics". Journal of Law, Medicine & Ethics 33, n.º 1 (2005): 154–59. http://dx.doi.org/10.1111/j.1748-720x.2005.tb00217.x.
Bamberger, Kenneth A. y Ariel Evan Mayse. "PRE-MODERN INSIGHTS FOR POST-MODERN PRIVACY: JEWISH LAW LESSONS FOR THE BIG DATA AGE". Journal of Law and Religion 36, n.º 3 (diciembre de 2021): 495–532. http://dx.doi.org/10.1017/jlr.2021.90.
Baruh, Lemi y Mihaela Popescu. "Big data analytics and the limits of privacy self-management". New Media & Society 19, n.º 4 (2 de noviembre de 2015): 579–96. http://dx.doi.org/10.1177/1461444815614001.
Zhang, Jing, Yanzi Li, Qian Ding, Liwei Lin y Xiucai Ye. "Successive Trajectory Privacy Protection with Semantics Prediction Differential Privacy". Entropy 24, n.º 9 (23 de agosto de 2022): 1172. http://dx.doi.org/10.3390/e24091172.
Islam, Md Toriqul. "ADEQUACY OF PRIVACY REGIME IN BANGLADESH: KEY CHALLENGES AND POTENTIAL POLICY MEASURES". IIUM Law Journal 30, n.º 1 (7 de julio de 2022): 33–74. http://dx.doi.org/10.31436/iiumlj.v30i1.655.
Wang, Weiyuan. "Legal Effect of Internet Privacy Policy". Journal of Education, Humanities and Social Sciences 28 (1 de abril de 2024): 126–33. http://dx.doi.org/10.54097/zjz34p19.
Kumar, Krishan, Mukesh Kumar Gupta, Nishant Saxena y Vivek Jaglan. "Homomorphic Encryption Based Privacy Protection for Personalised Web Search". Indian Journal of Science and Technology 15, n.º 8 (27 de febrero de 2022): 318–25. http://dx.doi.org/10.17485/ijst/v15i8.44.
Serwin, Andrew. "Privacy 3.0-The Principle of Proportionality". University of Michigan Journal of Law Reform, n.º 42.4 (2009): 869. http://dx.doi.org/10.36646/mjlr.42.4.privacy.
Qiu, Ke. "A secure system for electric vehicle battery swap stations using blockchain". Applied and Computational Engineering 16, n.º 1 (23 de octubre de 2023): 13–26. http://dx.doi.org/10.54254/2755-2721/16/20230851.
Hao, Li Ping y Yi Hui Chen. "Research on the Cloud Computing Storage Privacy Preserving Based on MB-Tree Dynamic Access Model". Applied Mechanics and Materials 513-517 (febrero de 2014): 2350–54. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2350.
Yan, Liang, Lei Li, Xuejiao Mu, Hao Wang, Xian Chen y Hyoseop Shin. "Differential Privacy Preservation for Location Semantics". Sensors 23, n.º 4 (13 de febrero de 2023): 2121. http://dx.doi.org/10.3390/s23042121.
Grandison, Tyrone y Rafae Bhatti. "Regulatory Compliance and the Correlation to Privacy Protection in Healthcare". International Journal of Computational Models and Algorithms in Medicine 1, n.º 2 (abril de 2010): 37–52. http://dx.doi.org/10.4018/jcmam.2010040103.
Wang, Yijing, Jingyi Zhang y Lupeng Zhang. "Analysis of Users Balance Between Private and Public -- One Case from the TikTok". Communications in Humanities Research 12, n.º 1 (20 de noviembre de 2023): 146–60. http://dx.doi.org/10.54254/2753-7064/12/20230070.
Wang, Pingshui, Jianwen Zhu y Qinjuan Ma. "Private Data Protection in Social Networks Based on Blockchain". International Journal of Advanced Networking and Applications 14, n.º 04 (2023): 5549–55. http://dx.doi.org/10.35444/ijana.2023.14407.
Zostant, Maxwell y Robin Chataut. "Privacy in computer ethics: Navigating the digital age". Computer Science and Information Technologies 4, n.º 2 (1 de julio de 2023): 183–90. http://dx.doi.org/10.11591/csit.v4i2.p183-190.
Zostant, Maxwell y Robin Chataut. "Privacy in computer ethics: Navigating the digital age". Computer Science and Information Technologies 4, n.º 2 (1 de julio de 2023): 183–90. http://dx.doi.org/10.11591/csit.v4i2.pp183-190.
Ghorashi, Seyed Ramin, Tanveer Zia, Michael Bewong y Yinhao Jiang. "An Analytical Review of Industrial Privacy Frameworks and Regulations for Organisational Data Sharing". Applied Sciences 13, n.º 23 (27 de noviembre de 2023): 12727. http://dx.doi.org/10.3390/app132312727.
Altman, Micah y Aloni Cohen. "Natural differential privacy—a perspective on protection guarantees". PeerJ Computer Science 9 (28 de septiembre de 2023): e1576. http://dx.doi.org/10.7717/peerj-cs.1576.
Li, Yijing, Ran Bi, Nan Jiang, Fengqiu Li, Mingsi Wang y Xiangping Jing. "Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular Networks". Electronics 13, n.º 12 (17 de junio de 2024): 2372. http://dx.doi.org/10.3390/electronics13122372.
AllahRakha, Naeem. "Constitutional Safeguards for Digital Rights and Privacy". International Journal of Law and Policy 2, n.º 4 (30 de abril de 2024): 31–43. http://dx.doi.org/10.59022/ijlp.172.
Bhandari, Vrinda y Renuka Sane. "Protecting citizens from the state post Puttaswamy: Analysing the privacy implications of the Justice Shrikrishna Committee Report and the Data Protection Bill, 2018". Socio-Legal Review 14, n.º 2 (enero de 2018): 143. http://dx.doi.org/10.55496/uuiz9934.
Chukwunonso Aloamaka, Patrick. "Effective Data Protection in Nigeria: Challenges". Commonwealth Law Review Journal 08 (2022): 656–62. http://dx.doi.org/10.55662/clrj.2022.811.
A. Razon, Arvin Kristopher. "Are Narco-Lists Covered by the Philippine Law on Privacy?: Exploring the Limits of the ‘Classic’ Right to Privacy and Applying a Constitutionally Grounded Data Protection Right". Global Privacy Law Review 2, Issue 1 (1 de febrero de 2021): 44–58. http://dx.doi.org/10.54648/gplr2021006.
Yang, Xuechao, Xun Yi, Andrei Kelarev, Leanne Rylands, Yuqing Lin y Joe Ryan. "Protecting Private Information for Two Classes of Aggregated Database Queries". Informatics 9, n.º 3 (5 de septiembre de 2022): 66. http://dx.doi.org/10.3390/informatics9030066.
Krishnamurthy, Vivek. "A Tale of Two Privacy Laws: The GDPR and the International Right to Privacy". AJIL Unbound 114 (2020): 26–30. http://dx.doi.org/10.1017/aju.2019.79.
Panvelwala, Fatema y Archana G. "Data Protection Guidelines for Protecting Privacy of Users on Social Media". International Journal of Computer Applications 182, n.º 2 (16 de julio de 2018): 7–12. http://dx.doi.org/10.5120/ijca2018917449.
Kohl, Uta. "THE RIGHT TO BE FORGOTTEN IN DATA PROTECTION LAW AND TWO WESTERN CULTURES OF PRIVACY". International and Comparative Law Quarterly 72, n.º 3 (julio de 2023): 737–69. http://dx.doi.org/10.1017/s0020589323000258.
Zhang, Xiangfei, Feng Yang, Yu Guo, Hang Yu, Zhengxia Wang y Qingchen Zhang. "Adaptive Differential Privacy Mechanism Based on Entropy Theory for Preserving Deep Neural Networks". Mathematics 11, n.º 2 (8 de enero de 2023): 330. http://dx.doi.org/10.3390/math11020330.
Zhou, Leming y Bambang Parmanto. "User Preferences for Privacy Protection Methods in Mobile Health Apps: A Mixed-Methods Study". International Journal of Telerehabilitation 12, n.º 2 (8 de diciembre de 2020): 13–26. http://dx.doi.org/10.5195/ijt.2020.6319.
Sundaram, Ranjany y Snehal Shetty. "Privacy concerns and protection behavior during the Covid-19 pandemic". Problems and Perspectives in Management 20, n.º 2 (20 de abril de 2022): 57–70. http://dx.doi.org/10.21511/ppm.20(2).2022.06.
Kravchuk, V. "Foreign experience of personal data protection in social networks". Uzhhorod National University Herald. Series: Law 2, n.º 78 (31 de agosto de 2023): 49–53. http://dx.doi.org/10.24144/2307-3322.2023.78.2.7.
Wang, Yanbing. "Privacy Protection of Public Figures in China—The Case of Yundi Li’s Prostitution". Studies in Law and Justice 2, n.º 2 (junio de 2023): 109–17. http://dx.doi.org/10.56397/slj.2023.06.15.