Artículos de revistas sobre el tema "Sensitive information"

Siga este enlace para ver otros tipos de publicaciones sobre el tema: Sensitive information.

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Sensitive information".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

SIVÁK, Jaroslav. "SENSITIVE INFORMATION". Krízový Manažment 14, n.º 1 (30 de marzo de 2015): 23–29. http://dx.doi.org/10.26552/krm.c.2015.1.23-29.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Nicklisch, Andreas, Kristoffel Grechenig y Christian Thöni. "Information-sensitive Leviathans". Journal of Public Economics 144 (diciembre de 2016): 1–13. http://dx.doi.org/10.1016/j.jpubeco.2016.09.008.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

PRICE, LINDA L., LAWRENCE F. FEICK y ROBIN A. HIGIE. "Information Sensitive Consumers and Market Information". Journal of Consumer Affairs 21, n.º 2 (diciembre de 1987): 328–41. http://dx.doi.org/10.1111/j.1745-6606.1987.tb00206.x.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

NAWA, Kotaro. "Sensitive, but unclassified information". Journal of Information Processing and Management 48, n.º 4 (2005): 243–44. http://dx.doi.org/10.1241/johokanri.48.243.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Vernon;, D. P. "Sensitive Versus Classified Information". Science 306, n.º 5697 (29 de octubre de 2004): 811e—812e. http://dx.doi.org/10.1126/science.306.5697.811e.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Conley, Sharon. "Keeping Sensitive Information Private". NASNewsletter 22, n.º 4 (julio de 2007): 21. http://dx.doi.org/10.1177/104747570702200407.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Jaswal, S. K. y T. Harpham. "Getting Sensitive Information on Sensitive Issues: Gynaecological Morbidity". Health Policy and Planning 12, n.º 2 (1 de enero de 1997): 173–78. http://dx.doi.org/10.1093/heapol/12.2.173.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Besorai, Ahal. "Tentative Information, Inside Information, Price‐sensitive Information and Materiality". Journal of Financial Crime 3, n.º 3 (enero de 1996): 268–71. http://dx.doi.org/10.1108/eb025719.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

INAMURA, Tomoaki y Haruki MADARAME. "ICONE15-10612 Control of Information Relating to Sensitive Nuclear Technology (DRAFT^*)". Proceedings of the International Conference on Nuclear Engineering (ICONE) 2007.15 (2007): _ICONE1510. http://dx.doi.org/10.1299/jsmeicone.2007.15._icone1510_334.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Su, Linping y Zhipeng Liu. "A T-similarity Sensitive Information Protection Method Based on Sensitive Information Gradient Partition". Journal of Physics: Conference Series 2030, n.º 1 (1 de septiembre de 2021): 012059. http://dx.doi.org/10.1088/1742-6596/2030/1/012059.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Song, D. y P. D. Bruza. "Towards context sensitive information inference". Journal of the American Society for Information Science and Technology 54, n.º 4 (2003): 321–34. http://dx.doi.org/10.1002/asi.10213.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Bernstein, Adam. "Keeping business-sensitive information safe". Nursing and Residential Care 25, n.º 1 (2 de enero de 2023): 1–3. http://dx.doi.org/10.12968/nrec.2022.0061.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Rajamäki, Jyri, Ilkka Tikanmäki y Jari Räsänen. "CISE as a Tool for Sharing Sensitive Cyber Information in Maritime Domain". Information & Security: An International Journal 43, n.º 2 (2019): 215–35. http://dx.doi.org/10.11610/isij.4317.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Martínez, V. Gayoso, L. Hernández Encinas, A. Queiruga Dios, A. Hernández Encinas y J. Martín Vaquero. "Avoiding Sensitive Information Leakage in Moodle". Literacy Information and Computer Education Journal Special 2, n.º 2 (1 de septiembre de 2013): 1422–32. http://dx.doi.org/10.20533/licej.2040.2589.2013.0190.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

WALTER, CATHY M. "How biometrics keep sensitive information secure". Nursing 35, n.º 5 (mayo de 2005): 76. http://dx.doi.org/10.1097/00152193-200505000-00058.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Chou, Winston, Kosuke Imai y Bryn Rosenfeld. "Sensitive Survey Questions with Auxiliary Information". Sociological Methods & Research 49, n.º 2 (11 de diciembre de 2017): 418–54. http://dx.doi.org/10.1177/0049124117729711.

Texto completo
Resumen
Scholars increasingly rely on indirect questioning techniques to reduce social desirability bias and item nonresponse for sensitive survey questions. The major drawback of these approaches, however, is their inefficiency relative to direct questioning. We show how to improve the statistical analysis of the list experiment, randomized response technique, and endorsement experiment by exploiting auxiliary information on the sensitive trait. We apply the proposed methodology to survey experiments conducted among voters in a controversial antiabortion referendum held during the 2011 Mississippi General Election. By incorporating the official county-level election results, we obtain precinct- and individual-level estimates that are more accurate than standard indirect questioning estimates and occasionally even more efficient than direct questioning. Our simulation studies shed light on the conditions under which our approach can improve the efficiency and robustness of estimates based on indirect questioning techniques. Open-source software is available for implementing the proposed methodology.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Wu, Jimmy Ming-Tai, Gautam Srivastava, Alireza Jolfaei, Philippe Fournier-Viger y Jerry Chun-Wei Lin. "Hiding sensitive information in eHealth datasets". Future Generation Computer Systems 117 (abril de 2021): 169–80. http://dx.doi.org/10.1016/j.future.2020.11.026.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Lamming, Richard, Nigel Caldwell, Wendy Phillips y Deborah Harrison. "Sharing Sensitive Information in Supply Relationships:". European Management Journal 23, n.º 5 (octubre de 2005): 554–63. http://dx.doi.org/10.1016/j.emj.2005.09.010.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Stolfo, Salvatore J. y Gene Tsudik. "Privacy-Preserving Sharing of Sensitive Information". IEEE Security & Privacy Magazine 8, n.º 4 (julio de 2010): 16–17. http://dx.doi.org/10.1109/msp.2010.135.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Murphy, Daniel. "Disclosure and sharing of sensitive information". Journal of Financial Crime 13, n.º 4 (octubre de 2006): 420–41. http://dx.doi.org/10.1108/13590790610707555.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Larson, David K. y Keith W. Miller. "When Sensitive IT Information Crosses Borders". IT Professional 11, n.º 4 (julio de 2009): 56–59. http://dx.doi.org/10.1109/mitp.2009.85.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Beneš, Vaclav E. y Robert J. Elliott. "Finite Dimensional Risk Sensitive Information States". IFAC Proceedings Volumes 28, n.º 14 (junio de 1995): 429–34. http://dx.doi.org/10.1016/s1474-6670(17)46867-4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Tilling, Simon. "Access to commercially sensitive environmental information". ERA Forum 14, n.º 4 (29 de noviembre de 2013): 493–506. http://dx.doi.org/10.1007/s12027-013-0329-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Athitsos, Vassilis, Marios Hadjieleftheriou, George Kollios y Stan Sclaroff. "Query-sensitive embeddings". ACM Transactions on Database Systems 32, n.º 2 (junio de 2007): 8. http://dx.doi.org/10.1145/1242524.1242525.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Hammer, Christian y Gregor Snelting. "Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs". International Journal of Information Security 8, n.º 6 (27 de junio de 2009): 399–422. http://dx.doi.org/10.1007/s10207-009-0086-1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Bedford, Andrew, Stephen Chong, Josée Desharnais, Elisavet Kozyri y Nadia Tawbi. "A progress-sensitive flow-sensitive inlined information-flow control monitor (extended version)". Computers & Security 71 (noviembre de 2017): 114–31. http://dx.doi.org/10.1016/j.cose.2017.04.001.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Tsuchiya, Ryuji, Akihiko Matsuoka, Takahiko Ogino, Kouich Goto, Toshiro Nakao y Hajime Takebayashi. "Location-sensitive Itinerary-based Passenger Information System". IEEJ Transactions on Industry Applications 125, n.º 4 (2005): 338–47. http://dx.doi.org/10.1541/ieejias.125.338.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Barachevsky, Valery A., Yury P. Strokach, Yury A. Puankov, Olga I. Kobeleva, Tatyana M. Valova, Konstantin S. Levchenko, Vladimir N. Yaroshenko y Michail M. Krayushkin. "Light-sensitive heterocyclic compounds for information nanotechnologies". Arkivoc 2009, n.º 9 (21 de junio de 2008): 70–95. http://dx.doi.org/10.3998/ark.5550190.0010.906.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Sridhar, Aparna, Rosibel Hernandez y Erin Duffy. "Primary Sources of Sensitive Reproductive Health Information". Obstetrics & Gynecology 127 (mayo de 2016): 115S. http://dx.doi.org/10.1097/01.aog.0000483473.31199.7a.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Ford, Carol A., Susan G. Millstein, Bonnie Halpern-Felsher y Charles E. Irwin. "Confidentiality and adolescents' disclosure of sensitive information". Journal of Adolescent Health 18, n.º 2 (febrero de 1996): 111. http://dx.doi.org/10.1016/1054-139x(96)00011-0.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Guo, Yongyan, Jiayong Liu, Wenwu Tang y Cheng Huang. "Exsense: Extract sensitive information from unstructured data". Computers & Security 102 (marzo de 2021): 102156. http://dx.doi.org/10.1016/j.cose.2020.102156.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Kim, Sung-Hwan, Nam-Uk Kim y Tai-Myoung Chung. "Study on sensitive information leakage vulnerability modeling". Kybernetes 44, n.º 1 (12 de enero de 2015): 77–88. http://dx.doi.org/10.1108/k-05-2014-0106.

Texto completo
Resumen
Purpose – The purpose of this paper is to provide a model for quantitatively analyzing the security profile of an organization’s IT environment. The model considers the security risks associated with stored data, as well as services and devices that can act as channels for data leakages. The authors propose a sensitive information (SI) leakage vulnerability model. Design/methodology/approach – Factors identified as having an impact on the security profile are identified, and scores are assigned based on detailed criteria. These scores are utilized by mathematical models that produce a vulnerability index, which indicates the overall security vulnerability of the organization. In this chapter, the authors verify the model result extracted from SI leakage vulnerability weak index by applying the proposed model to an actual incident that occurred in South Korea in January 2014. Findings – The paper provides vulnerability result and vulnerability index. They are depends on SI state in information systems. Originality/value – The authors identify and define four core variables related to SI leakage: SI, security policy, and leakage channel and value of SI. The authors simplify the SI leakage problem. The authors propose a SI leakage vulnerability model.
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Galobardes, Bruna y Stefaan Demarest. "Asking sensitive information: an example with income". Sozial- und Pr�ventivmedizin/Social and Preventive Medicine 48, n.º 1 (1 de marzo de 2003): 70–72. http://dx.doi.org/10.1007/s000380300008.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Guo, Dongdan, Hao Sun, Tao Zhu y Chang Cai. "An Automated Recognition Model for Sensitive Information". Journal of Physics: Conference Series 1575 (junio de 2020): 012043. http://dx.doi.org/10.1088/1742-6596/1575/1/012043.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Reeser, Linda Cherrey y Robert A. Wertkin. "Sharing Sensitive Student Information With Field Instructors". Journal of Social Work Education 33, n.º 2 (abril de 1997): 347–62. http://dx.doi.org/10.1080/10437797.1997.10778875.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Rollestone, Giles. "Networked information services in context-sensitive environments". Interactions 11, n.º 2 (marzo de 2004): 67–69. http://dx.doi.org/10.1145/971258.971282.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Tombros, Anastasios y C. J. van Rijsbergen. "Query-Sensitive Similarity Measures for Information Retrieval". Knowledge and Information Systems 6, n.º 5 (15 de enero de 2004): 617–42. http://dx.doi.org/10.1007/s10115-003-0115-8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Thompson, E. Dale y Michelle L. Kaarst-Brown. "Sensitive information: A review and research agenda". Journal of the American Society for Information Science and Technology 56, n.º 3 (2005): 245–57. http://dx.doi.org/10.1002/asi.20121.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Bast, Holger, Christian W. Mortensen y Ingmar Weber. "Output-sensitive autocompletion search". Information Retrieval 11, n.º 4 (4 de marzo de 2008): 269–86. http://dx.doi.org/10.1007/s10791-008-9048-x.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Mary A, Geetha, D. P. Acharjya y N. Ch S. N. Iyengar. "Improved Anonymization Algorithms for Hiding Sensitive Information in Hybrid Information System". International Journal of Computer Network and Information Security 6, n.º 6 (8 de mayo de 2014): 9–17. http://dx.doi.org/10.5815/ijcnis.2014.06.02.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Maviglia, Saverio M., Catherine S. Yoon, David W. Bates y Gilad Kuperman. "KnowledgeLink: Impact of Context-Sensitive Information Retrieval on Clinicians' Information Needs". Journal of the American Medical Informatics Association 13, n.º 1 (enero de 2006): 67–73. http://dx.doi.org/10.1197/jamia.m1861.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Dueck, Gunter. "Highly Sensitive!" Informatik-Spektrum 28, n.º 2 (abril de 2005): 151–57. http://dx.doi.org/10.1007/s00287-005-00475-4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Kim, Jeongeun, Howard Dubowitz, Elizabeth Hudson-Martin y Wendy Lane. "Comparison of 3 Data Collection Methods for Gathering Sensitive and Less Sensitive Information". Ambulatory Pediatrics 8, n.º 4 (julio de 2008): 255–60. http://dx.doi.org/10.1016/j.ambp.2008.03.033.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Tsai, Cheng-Jung, Chien-I. Lee y Wei-Pang Yang. "An Efficient and Sensitive Decision Tree Approach to Mining Concept-Drifting Data Streams". Informatica 19, n.º 1 (1 de enero de 2008): 135–56. http://dx.doi.org/10.15388/informatica.2008.206.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Collins, Maria D. D. y Christine L. Ferguson. "Context-Sensitive Linking". Serials Review 28, n.º 4 (diciembre de 2002): 267–82. http://dx.doi.org/10.1080/00987913.2002.10764759.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Condliffe, Anna. "Freedom of Information: Exemptions for Confidential Information". Business Law Review 28, Issue 7 (1 de julio de 2007): 206–8. http://dx.doi.org/10.54648/bula2007034.

Texto completo
Resumen
The Information Tribunal has ruled in Derry City Council v The Information Commissioner that contracts are not protected by Freedom of Information Act exemption for confidential information. The case and this article provide important guidance on the scope of the exemptions for con.dential and commercially sensitive information.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Cheng, Xian Yi, Wei Kang y Yu Guo. "An Algorithm of Network Sensitive Information Features Extracting". Applied Mechanics and Materials 556-562 (mayo de 2014): 3558–61. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.3558.

Texto completo
Resumen
In the vast ocean of data, how people can learn from the best, to eliminate the dross, the Internet age has become a major issue, also facing great challenge for data processing, and it is the key to develop the national network economy. For sensitive information filtering time lag, low accuracy, poor self-adaptability to the Internet, Chinese text media (webpage, micro-blogging, forum, etc.) for the study, using the technology of the opinion mining and natural language processing, study of sensitive information feature extraction algorithm to reveal the interrelationship of sensitive information and sensitive dictionary, providing technical support for sensitive dictionary and sensitive information recognition.
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Oh, Jin-Kwan, Seh-La Oh, Kwang-Hoon Choi y Jin-Hee Yim. "A Study on Sensitive Information Filtering Requirements for Supporting Original Information Disclosure". Journal of Records Management & Archives Society of Korea 17, n.º 1 (28 de febrero de 2017): 51–71. http://dx.doi.org/10.14404/jksarm.2017.17.1.051.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Jiang, Ying, Ming Jing, Jie Zeng, Feng Qi Shen, Du Lan Qi y Li Hua Wang. "LanguageTool Based Proofreading of Sensitive Chinese Political Information". Applied Mechanics and Materials 687-691 (noviembre de 2014): 2644–47. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2644.

Texto completo
Resumen
Sensitive Chinese political information are partly monitored and controlled by Chinese mainstream media (newspaper, television, the Internet, etc.) and the National Security Agency as well as corresponding political authorities. However, Chinese media authorities still lack in a technology or some methods to detect and identify sensitive Chinese political information quickly and efficiently. Due to complexity of sensitive Chinese political information, it cannot be monitored by a list of keywords or a simple pattern matching. How to satisfy the demands of media institutions is one of the most important problems. The main purpose of this paper is to combine the redacting technology of Chinese grammar rules with sensitive Chinese political information in order to provide the LanguageTool XML rules suitable for monitoring sensitive Chinese political information.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Kiran, Asha, Manimala Puri y S. Srinivasa. "Preserving Sensitive Information using Fuzzy C-Means Approach". International Journal of Computer Applications 181, n.º 10 (14 de agosto de 2018): 40–46. http://dx.doi.org/10.5120/ijca2018917656.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía