Letteratura scientifica selezionata sul tema "Privacy practices"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Privacy practices".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Privacy practices"
Smith, H. Jeff. "Privacy policies and practices". Communications of the ACM 36, n. 12 (dicembre 1993): 104–22. http://dx.doi.org/10.1145/163298.163349.
Testo completoPaasche-Orlow, Michael K., Dan M. Jacob e Joshua N. Powell. "Notices of Privacy Practices". Medical Care 43, n. 6 (giugno 2005): 558–64. http://dx.doi.org/10.1097/01.mlr.0000163646.90393.e4.
Testo completoSchlueter, John P. "Private Practices". Nineteenth-Century Literature 66, n. 3 (1 dicembre 2011): 283–306. http://dx.doi.org/10.1525/ncl.2011.66.3.283.
Testo completoHsu, Chiung‐wen (Julia). "Privacy concerns, privacy practices and web site categories". Online Information Review 30, n. 5 (settembre 2006): 569–86. http://dx.doi.org/10.1108/14684520610706433.
Testo completoToy, Alan, David Lau, David Hay e Gehan Gunasekara. "The views of privacy auditors regarding standards and methodologies". Meditari Accountancy Research 27, n. 3 (3 giugno 2019): 366–98. http://dx.doi.org/10.1108/medar-07-2018-0367.
Testo completoMensch, Scott E., e LeAnn Wilkie. "Smart Phone Security Practices". International Journal of Cyber Behavior, Psychology and Learning 9, n. 3 (luglio 2019): 1–14. http://dx.doi.org/10.4018/ijcbpl.2019070101.
Testo completoHan, Ye, e T. Selwyn Ellis. "A Study of User Continuance Behavioral Intentions Toward Privacy-Protection Practices". Information Resources Management Journal 31, n. 2 (aprile 2018): 24–46. http://dx.doi.org/10.4018/irmj.2018040102.
Testo completoHope, Joan. "Follow best practices for transparency about student privacy practices". Disability Compliance for Higher Education 20, n. 9 (17 marzo 2015): 9. http://dx.doi.org/10.1002/dhe.30049.
Testo completoCohen, Julie E. "Turning Privacy Inside Out". Theoretical Inquiries in Law 20, n. 1 (16 marzo 2019): 1–31. http://dx.doi.org/10.1515/til-2019-0002.
Testo completoCulnan, Mary J., e Thomas J. Carlin. "Online privacy practices in higher education". Communications of the ACM 52, n. 3 (marzo 2009): 126–30. http://dx.doi.org/10.1145/1467247.1467277.
Testo completoTesi sul tema "Privacy practices"
Lee, Songho. "Current practices for DNS Privacy : Protection towards pervasive surveillance". Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-85621.
Testo completoDen nuvarande användningen av DNS-systemet är ett signifikant kryphål för internetanvändares integritet, eftersom alla frågor och svar som krävs för att konvertera en webbadress till IP-adress inte skyddas i de flesta fall. Rapporten identifierar internetanvändarnas integritetsintressen och presenterar den nuvarande tekniken som syftar till att förbättra DNS-sekretessen genom en systematisk litteraturgranskning. Rapporten undersöker också begränsningarna i den nuvarande praxis och redovisar flera förslag såsom DNS-över-Tor och metoder som möjliggör periodiskt ändring av rekursiva resolvrar, och de metoderna förväntas att minimera integritetsläckor.
Andersen, Adelina. "Exploring Security and Privacy Practices of Home IoT Users". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-303002.
Testo completoInternet of Things (IoT) enheter har blivit vanligt förekommande i hem vilket gör deras säkerhet och integritet allt viktigare. Det har tidigare visats att användare av IoT i hemmet kan utgöra ett hot mot sig själva om de saknar kunskap om enheterna och kännedom om potentiella hot. För att undersöka hur användarnas vanor kring säkerhet och integitet kan förbättras är det först nödvändigt att utforska de nuvarande vanorna och vad som påverkar dessa. Detta undersöks i tio intervjuer som visar att vanorna främst påverkas av bekvämlighet, motivation och ansträngningen som krävs av användaren. Utifrån dessa insikter föreslås det att fysisk interaktion används som ett komplement till digitala lösningar för att förbättra vanorna kring säkerhet och integritet. Genom att ha ett fysiskt objekt som på ett enkelt sätt kan förmedla enheternas nuvarande status och är lika tillgängligt för alla medlemmar i ett hushåll kan säkerhet och integritet bli mer uppnåeligt för alla användare, oavsett deras nivå av kunskap och erfarenhet.
Lysyk, Mary C. "Practices for Protecting Privacy in Health Research: Perspectives of the Public, Privacy Guidance Documents and REBs". Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31093.
Testo completoGhiami-Mirhosaini, Roozbeh. "Information privacy, an exploratory survey of concerns about organisational practices". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape2/PQDD_0016/MQ48484.pdf.
Testo completoGhiami-Mirhosaini, Roozbeh Carleton University Dissertation Management Studies. "Information privacy: an exploratory survey of concerns about organizational practices". Ottawa, 2000.
Cerca il testo completoGandarillas, Carlos. "The impact of web site design and privacy practices on trust". FIU Digital Commons, 2002. http://digitalcommons.fiu.edu/etd/3448.
Testo completoVisser, Diane. "A study on database marketing practices that raise consumer privacy concern : a proposed model for regulating database marketing practices in South Africa". Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52711.
Testo completoENGLISH ABSTRACT: One of the phenomena's in the marketing industry of the past decade is the increased use of database marketing. Database marketing involves the collection, processing and dissemination of vast amounts of consumer information in order to compile detailed consumer databases. The increasing popularity of database marketing can be attributed to various factors. Consumer information can now be obtained easier, cheaper and faster due to the availability of information technology. It has become easier to segment consumer markets and it is possible to identify consumer trends. It is possible to make predictions of consumer behaviour or buying patterns because consumer databases provide a more complete consumer profile with information ranging from demographics, psycho graphics to life-style information. Database technology improves the efficiency and effectiveness of marketing campaigns because marketers can analyse the available information and select the most appropriate marketing strategies and tactics, while concentrating efforts on the most profitable consumer. Marketers therefore waste less effort, money, and other resources by not promoting to individuals who are unlikely to react upon such offers. Widespread databases assist marketers in offering products that are more reasonably priced and more precisely tailored for smaller, more homogeneous market segments. Improved product and service offerings as well as the availability of a wider variety of products and services will likely result in higher consumer satisfaction and could build consumer loyalty. Therefore, marketers use consumer information to improve the overall marketing strategy and individual customer service. Consumers are concerned about database marketing practices because consumers believe some data practices invade personal privacy. The need for privacy has always been inherent to human nature and the concept of privacy dates back to early mankind. One should however differentiate between an individual's basic need for privacy from a general perspective and privacy within a consumer-marketer context. Privacy from a general perspective refers to one's territoriality and need for physical seclusion, whereas consumer privacy mainly relate to the privacy of personal information. Bennett, as well as Stone and Stone proposed that a state of privacy exist when a consumer can control social interaction, unwanted external stimuli, and the dissemination of personal information as well as being able to make independent decisions without outside interference. Consumers' need for privacy is however, in conflict with the need for social interaction and the need to participate in commercial exchange relationships. The more a person interacts with other members of society, the more the person could expect to compromise some privacy. This implies that when consumers participate in a business transaction, or where an exchange relationship exists between the database marketer and consumer, consumers could expect that a degree of privacy will be lost. Consumer groups however, argue that some marketing practices invade the reasonable amount of privacy consumers should be able to expect. The raising consumer concern for privacy is attributable to several reasons. The primary driver of consumer concern is the general lack of knowledge on data collection and use. Other reasons for the raising privacy concern include the type of information collected and the amount of control consumers have over subsequent use of data; the use of personal information to identify specific individuals; collection and use of sensitive information, such as medical and financial data; the volume of information collected and used; secondary information use; the use and dissemination of inaccurate databases; the collection and use of children's data; the lack of tangible benefits received in exchange for information provided; and the use of consumer information for financial gain. Consumers have also expressed concern about electronic database marketing practices because of the secrecy in data collection and use. However, privacy concerns may vary depending on consumers' cultural orientation, age, perception on what constitutes good marketing ethics or the specific methods employed to obtain consumer data. One could distinguish between several consumer clusters when considering consumers" attitudes on database marketing practices and personal privacy. In this regard the typical South African consumer is classified as a "pragmatist". Pragmatists are concerned with privacy to the extent they are exposed to database marketing activities. The South African database marketing industry is still in its infancy phase and as the industry progress, and consumers become more knowledgeable, privacy concerns are likely to increase. It is important to address the issues that raise consumer privacy concerns and to find solutions for ensuring sustainable database marketing practice in future. Marketers' information needs and consumers' privacy needs should somehow be balanced in order to withhold government intervention. Compromises from both sides are necessary to reach a more balanced relationship between the two parties. The successful outcome of the privacy debate will depend on marketers' understanding of consumer privacy issues and by addressing these accordingly.Several approaches exist for regulating database marketing practices that invade consumer privacy: the implementation of information technology, self-regulation and government intervention. Self-regulation is preferred for regulating database marketing practices, whereas privacy-enhancing information technology is recommended as a supplemental tool for protecting consumer privacy. Government regulating seems to be the last resort because of unnecessary restrictions that might be imposed on database marketing activities. Recommended models for regulating database marketing activities and for protecting consumer privacy in South Africa are the Registration Model, together with elements of the Data Commissioner Model. These models were proposed after careful consideration of characteristics, unique to the South African database marketing industry. The models place the responsibility for data protection with the database marketer and the South African government, rather than with the consumer. The Registration Model and the Data Commissioner Model seems a viable combination for implementation in South Africa because these models acknowledge the fact that South African pragmatic consumers are not well educated and informed enough on privacy invading database marketing practices. This combination rarely involves any consumer participation and therefore suits the typical apathetic nature of South African consumers. The Registration Model acts like a notice system where an agency, currently the Direct Marketing Association of South Africa, develops principles of fair information practices to which registered marketers need to comply with. A commission, an element of the Data Commissioner Model, has power to investigate consumer complaints, constrain development of databases, review data practices and advise on improvements on data collectors' systems. The commission could also monitor advancements in information technology that may enhance consumer privacy. The only problem with these models seems to be that the agency and or the commission have no authoritative power to enforce compliance with principles and codes of conduct. Industry self-regulation in conjunction with some governmental control and the application of information technology seems to be useful in providing adequate levels of consumer privacy and data protection. Such a combination might strike a balance between South African consumers' need for privacy and South African marketers' need for consumer information.
AFRIKAANSE OPSOMMING: Een van die verskynsels in die bemarkingsindustrie oor die afgelope dekade is die toenemende gebruik van databasisbemarking. Databasisbemarking behels die insameling, prosessering en verspreiding van groot hoeveelhede verbruikersinligting met die doelom gedetailleerde verbruikersdatabasisse saam te stel. Die toenemende gewildheid van databasisbemarking kan toegeskryf word aan verskeie faktore. Inligtingstegnologie maak dit baie makliker, goedkoper en vinniger om verbruikersinligting te bekom. Dit raak al hoe makliker om verbruikersmarkte te segmenteer en dit is moontlik om verbruikers tendense te identifiseer. Voorspellings kan ook gemaak word ten opsigte van verbruikersgedrag en aankooppatrone omdat die omvang van inligting in verbruikersdatabasisse strek vanaf demografiese, psigografiese tot lewenstylinligting en daarom 'n baie meer volledige verbruikersprofiel bied. Databasistegnologie verbeter die doeltreffendheid en effektiwiteit van bemarkingsveldtogte omdat bemarkers beskikbare inligting kan analiseer en die mees gepaste bemarkingstrategieë en taktieke kan selekteer, terwyl programme gerig kan word op die mees winsgewinde verbruiker. Bemarkers sal dus minder moeite, geld en ander hulpbronne vermors deurdat bemarkingsprogramme nie gerig word op individue wat heel waarskynlik nie op sulke aanbiedinge sal reageer nie. Omvangryke databasisse help bemarkers om goedkoper produkte te bied wat meer presies ontwerp is op kleiner, meer homogene marksegmente te dien. Verbeterde produk en diens aanbiedinge tesame met die beskikbaarheid van 'n wyer verskeidenheid van produkte en dienste, sal heel waarskynlik hoër verbruikersatisfaksie tot gevolg hê en kan verbruikerslojaliteit bewerkstellig. Dus, bemarkers gebruik verbruikersinligting om die algehele bemarkingstrategie en individuele diens aan verbruikers te verbeter. Verbruikers het belang by databasis bemarkingspraktyke omdat verbruikers glo dat sommige data praktyke inbreuk maak op persoonlike privaatheid. Die behoefte aan privaatheid was nog altyd inherent aan die menslike natuur en die konsep van privaatheid dateer terug tot vroeë beskawings. Daar behoort egter 'n onderskeid getref te word tussen 'n individu se basiese behoefte aan privaatheid vanuit 'n algemene perspektief en privaatheid vanaf 'n verbruiker-bemarker konteks. Privaatheid, vanaf 'n algemene perspektief, verwys na 'n individu se persoonlike ruimte en die behoefte aan fisiese afsondering, teenoor verbruikersprivaatheid wat hoofsaaklik verband hou met die privaatheid van persoonlike inligting. Bennett, sowel as Stone en Stone het voorgestel dat 'n mate van privaatheid heers wanneer 'n verbruiker beheer het oor sosiale interaksies, ongewenste eksterne prikkels, die verspreiding van persoonlike inligting, sowel as om in staat te wees om onafhanklike besluite te neem sonder invloed van buite. Verbruikers se behoefte aan privaatheid is egter in konflik met die behoefte aan sosiale interaksie en die behoefte om deel te neem aan kommersiële transaksies. Hoe meer 'n persoon in wisselwerking tree met ander lede van die gemeenskap, hoe meer kan die persoon verwag om 'n mate van privaatheid op te offer. Dit impliseer dat wanneer verbruikers deelneem in 'n besigheidstransaksie of waar 'n ruilverhouding bestaan tussen die databasisbemarker en verbruiker, kan verbruikers verwag dat 'n mate van privaatheid verlore sal gaan. Verbruikers kan 'n redelike mate van privaatheid verwag, maar verbruikersgroepe argumenteer dat sommige bemarkingspraktyke inbreuk maak op hierdie redelike verwagting van privaatheid. Die toenemende verbruikersbelang by privaatheid is toeskryfbaar aan verskeie redes. Die primêre dryfkrag agter verbruikers se belang is die algemene gebrek aan kennis oor data insameling en gebruik. Ander redes wat bydrae tot die toenemende belang by privaatheid sluit in die tipe inligting ingesamel en die hoeveelheid beheer verbruikers het oor die daaropeenvolgende gebruik van data; die gebruik van persoonlike inligting om spesifieke individue te identifiseer; die insameling en gebruik van sensitiewe inligting, soos byvoorbeeld mediese en finansiële data; die hoeveelheid inligting wat ingesamel en gebruik word; sekondêre gebruik van inligting; die gebruik en verspreiding van onakkurate databasisse; en die insameling en gebruik van verbruikersinligting om finansieël voordeel daaruit te trek. Verbruikers het ook belang getoon teenoor elektroniese databasis bemarkingspraktyke as gevolg van die geheimhouding oor data insameling en gebruik. Die belang by privaatheid mag egter varieër afhangende van verbruikers se kulturele oriëntasie, ouderdom, persepsie van wat goeie bemarkingsetiek behels of die spesifieke metodes gebruik om data aangaande verbruikers te bekom. Daar kan onderskei word tussen verskeie verbruikersgroepe wanneer verbruikershoudings teenoor databasis bemarkingspraktyke en persoonlike privaatheid oorweeg word. In hierdie verband kan die tipiese Suid-Afrikaanse verbruiker geklassifiseer word as 'n pragmatis. Pragmatiste is besorg oor privaatheid tot die mate waartoe hulle blootgestel is aan databasisbemarkingsaktiwiteite. Die Suid-Afrikaanse databasis industrie is nog in die beginfase en soos die industrie groei en verbruikers meer ingelig raak, sal besorgdheid oor privaatheid heelwaarskynlik ook toeneem. Dit is belangrik om die kwessies wat besorgdheid oor verbruikersprivaatheid veroorsaak aan te spreek en om oplossings te vind om volhoubare databasisbemarkingspraktyke in die toekoms te verseker. Daar moet gepoog word om bemarkers se behoefte aan inligting en verbruikers se behoefte aan privaatheid in ewewig te bring om sodoende owerheidsinmenging te voorkom. Opofferings van beide partye is nodig om 'n meer gebalanseerde verhouding tussen die twee partye te bewerkstellig. Die suksesvolle uitkoms van die privaatheidsdebat sal afhang van bemarkers se begrip vir verbruikersprivaatheidskwessies en om dit dienooreenkomstig aan te spreek. Die regulering van databasisbemarkingspraktyke wat inbreuk maak op verbruikersprivaatheid kan verskillend benader word: die implementering van inligtingstegnologie, self-regulering en owerheids-inmenging. Self-regulering word verkies as basis om databasisbemarkingspraktyke te reguleer, terwyl privaatheids-bevorderende inligtingstegnologie aanbeveel word as bykomende gereedskap om verbruikersprivaatheid te beskerm. Owerheidsregulering word gesien as die laaste uitweg as gevolg van onnodige beperkinge wat dit mag plaas op databasisbemarkingsaktiwitei te. Die voorgestelde modelle vir die regulering van databasis bemarkingsaktiwiteite en vir die beskerming van verbruikersprivaatheid in Suid Afrika, is die Registrasie Model, tesame met elemente van die Data Kommissaris Model. Hierdie modelle is voorgestel nadat eienskappe, uniek aan die Suid Afrikaanse databasisbemarkingsindustrie, deeglik oorweeg IS. Die modelle plaas die verantwoordelikheid van data beskerming in die hande van die databasisbemarker en die Suid-Afrikaanse owerheid, eerder as by die verbruiker. Die Registrasie Model en die Data Kommissaris Model blyk 'n uitvoerbare kombinasie vir implementering in Suid Afrika te wees, omdat hierdie modelle die feit inagneem dat Suid Afrikaanse pragmatiese verbruikers nie goed genoeg opgevoed en ingelig is oor die databasisbemarkingsaktiwiteite wat inbreuk maak op privaatheid nie. Hierdie kombinasie behels selde verbruikersdeelname en is daarom gepas by die tipiese apatiese aard van Suid Afrikaanse verbruikers. Die Registrasie Model dien as 'n kennisgee-stelsel waar 'n agentskap, tans die Direkte Bemarkings Assosiasie van Suid Afrika, beginsels vir regverdige inligtingspraktyke ontwikkel waaraan geregistreerde databasisbemarkers moet voldoen. 'n Kommissie, 'n element van die Data Kommissaris Model, het mag om verbruikersklagtes te ondersoek, die ontwikkelling van databasisse aan bande te lê en om datapraktyke te hersien en advies te gee oor verbeteringe in die stelsels van data-insamelaars. Die kommissie kan ook ontwikkelinge in inligtingstegnologie wat verbruikersprivaatheid bevorder, monitor. Die enigste probleem met hierdie modelle blyk te wees dat die agenstkap en die kommissie geen gesag het om te verseker dat beginsels en kodes van goeie gedrag afgedwing word nie. Industrie self-regulering, tesame met 'n mate van owerheidsbeheer en die implementering van inligtingstegnologie blyk nuttig te wees om voldoende vlakke van verbruikers-privaatheid en data beskerming te verseker. Dié kombinasie kan moontlik 'n balans vind tussen Suid Afrikaanse verbruikers se behoefte aan privaatheid en Suid Afrikaanse bemarkers se behoefte aan verbruikersinligting.
Papoutsi, Chrysanthi. "Reconfiguring privacy and confidentiality practices : a case study of technological integration in HIV health services". Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:265ff900-72cd-4ec7-bc95-8717d9640240.
Testo completoSeveri, Claudia. "Privacy e protezione dei dati personali: il nuovo regolamento europeo e best practices per un sito web". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019.
Cerca il testo completoBrown, Shonda Dellena. "An Information Privacy Examination of the Practices of Pharmaceutical Companies Regarding Use of Information Collected Through Their Websites". NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/47.
Testo completoLibri sul tema "Privacy practices"
Data Security Council of India. DSCI privacy framework: Best practices. New Delhi: Data Security Council of India, 2010.
Cerca il testo completoGrumbling, Emily, a cura di. Privacy Research and Best Practices. Washington, D.C.: National Academies Press, 2016. http://dx.doi.org/10.17226/21879.
Testo completoProtecting patron privacy: Safe practices for public computers. Santa Barbara, California: Libraries Unlimited, An Imprint of ABC-CLIO, LLC, 2015.
Cerca il testo completoR, Elden Charles, a cura di. Wireless security and privacy: Best practices and design techniques. Boston: Addison-Wesley, 2003.
Cerca il testo completoWakulowsky, Lydia. Personal Health Information Protection Act: Implementing best privacy practices. 2a ed. Markham, Ont: LexisNexis Canada, 2011.
Cerca il testo completoEzor, Jonathan. Privacy and data protection in business: Laws and practices. New Providence, NJ: LexisNexis, 2012.
Cerca il testo completoMilne, George R. A business perspective on database marketing and consumer privacy practices. Cambridge, Mass: Marketing Science Institute, 1998.
Cerca il testo completoGauthronet, Serge. Practices to implement the OECD privacy guidelines on global networks. Paris, France: OECD, 1998.
Cerca il testo completoMilne, George R. A business perspective on database marketing and consumer privacy practices. Cambridge, Mass: Marketing Science Institute, 1998.
Cerca il testo completoInternet and wireless privacy: A legal guide to global business practices. Toronto: CCH Canada, 2003.
Cerca il testo completoCapitoli di libri sul tema "Privacy practices"
Schmidt, Jan-Hinrik. "(Micro)blogs: Practices of Privacy Management". In Privacy Online, 159–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21521-6_12.
Testo completoRaul, Alan Charles. "“Best Practices,” Findings and Recommendations". In Privacy and the Digital State: Balancing Public Information and Personal Privacy, 73–82. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-0889-2_6.
Testo completoDeckter, David, e Jeffrey Fisher. "Security, Controls, and Privacy". In IT Best Practices for Financial Managers, 127–38. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119198819.ch9.
Testo completoKarjoth, Günter, Matthias Schunter e Michael Waidner. "Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data". In Privacy Enhancing Technologies, 69–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36467-6_6.
Testo completoKalantari, Shirin, Andreas Put e Bart De Decker. "Trackers in Your Inbox: Criticizing Current Email Tracking Practices". In Privacy Technologies and Policy, 156–67. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-76663-4_9.
Testo completoCavoukian, Ann. "Privacy by Design: Best Practices for Privacy and the Smart Grid". In ISSE 2010 Securing Electronic Business Processes, 260–70. Wiesbaden: Vieweg+Teubner, 2011. http://dx.doi.org/10.1007/978-3-8348-9788-6_25.
Testo completoCoudert, Fanny. "Accountable Surveillance Practices: Is the EU Moving in the Right Direction?" In Privacy Technologies and Policy, 70–85. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-06749-0_5.
Testo completoKobsa, Alfred, e Maximilian Teltzrow. "Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users’ Data Sharing and Purchase Behavior". In Privacy Enhancing Technologies, 329–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11423409_21.
Testo completoDooly, Zeta, Kenny Doyle e Jamie Power. "Uncovering Innovation Practices and Requirements in Privacy and Cyber Security Organisations: Insights from IPACSO". In Cyber Security and Privacy, 140–50. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25360-2_12.
Testo completoWanka, Anna. "Spaces and practices of privacy in older age". In Räume und Kulturen des Privaten, 85–107. Wiesbaden: Springer Fachmedien Wiesbaden, 2017. http://dx.doi.org/10.1007/978-3-658-14632-0_4.
Testo completoAtti di convegni sul tema "Privacy practices"
Coles-Kemp, Lizzie, e Elahe Kani-Zabihi. "Practice Makes Perfect: Motivating Confident Privacy Protection Practices". In 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom). IEEE, 2011. http://dx.doi.org/10.1109/passat/socialcom.2011.51.
Testo completoMurphy, Alison R., Madhu C. Reddy e Heng Xu. "Privacy practices in collaborative environments". In CSCW'14: Computer Supported Cooperative Work. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2531602.2531643.
Testo completoNotario, Nicolas, Alberto Crespo, Yod-Samuel Martin, Jose M. Del Alamo, Daniel Le Metayer, Thibaud Antignac, Antonio Kung, Inga Kroener e David Wright. "PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering Methodology". In 2015 IEEE Security and Privacy Workshops (SPW). IEEE, 2015. http://dx.doi.org/10.1109/spw.2015.22.
Testo completoPrasad, Aarathi, Matthew Clark, Ha Nguyen, Ruben Ruiz e Emily Xiao. "Analyzing Privacy Practices of Existing mHealth Apps". In 13th International Conference on Health Informatics. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009059605630570.
Testo completoAsiri, Fatima, e David Millard. "Unpacking Privacy Practices in SNSs: Users’ Protection Strategies to Enforce Privacy Boundaries". In 2018 21st Saudi Computer Society National Computer Conference (NCC). IEEE, 2018. http://dx.doi.org/10.1109/ncg.2018.8593046.
Testo completoBrandt, Galina. "Interpenetration Phenomenon of Public & Private Aspects in Contemporary Theatrical Practices". In The Public/Private in Modern Civilization, the 22nd Russian Scientific-Practical Conference (with international participation) (Yekaterinburg, April 16-17, 2020). Liberal Arts University – University for Humanities, Yekaterinburg, 2020. http://dx.doi.org/10.35853/ufh-public/private-2020-12.
Testo completoAlqhatani, Abdulmajeed, e Heather Lipford. "Exploring Parents’ Security and Privacy Concerns and Practices". In Workshop on Usable Security. Reston, VA: Internet Society, 2018. http://dx.doi.org/10.14722/usec.2018.23019.
Testo completoPatil, Sameer, e Alfred Kobsa. "Uncovering privacy attitudes and practices in instant messaging". In the 2005 international ACM SIGGROUP conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1099203.1099220.
Testo completoAleyasen, Amirhossein, Oleksii Starov, Alyssa Phung Au, Allan Schiffman e Jeff Shrager. "On the Privacy Practices of Just Plain Sites". In CCS'15: The 22nd ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2808138.2808140.
Testo completoSharma, Tanusree, Md Mirajul Islam, Anupam Das, S. M. Taiabul Haque e Syed Ishtiaque Ahmed. "Privacy during Pandemic: A Global View of Privacy Practices around COVID-19 Apps". In COMPASS '21: ACM SIGCAS Conference on Computing and Sustainable Societies. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3460112.3471958.
Testo completoRapporti di organizzazioni sul tema "Privacy practices"
Youpa, Daniel G., Ralph M. Carney, Martin F. Wiskoff e John D. Tippit. Review of Private Sector Personnel Screening Practices. Fort Belvoir, VA: Defense Technical Information Center, ottobre 2000. http://dx.doi.org/10.21236/ada384046.
Testo completoBrophy, Daniel. Evaluative styles of clinicians in private practice. Portland State University Library, gennaio 2000. http://dx.doi.org/10.15760/etd.5340.
Testo completoBarnett, Michael, Andrew Olenski e Adam Sacarny. Common Practice: Spillovers from Medicare on Private Health Care. Cambridge, MA: National Bureau of Economic Research, maggio 2020. http://dx.doi.org/10.3386/w27270.
Testo completoIllman, Julia, Mikko Halonen, Shelagh Whitley e Nella Canales Trujillo. Practical Methods for Assessing Private Climate Finance Flows. Nordic Council of Ministers, febbraio 2014. http://dx.doi.org/10.6027/tn2014-506.
Testo completoFrakes, Michael, Jonathan Gruber e Timothy Justicz. Public and Private Options in Practice: The Military Health System. Cambridge, MA: National Bureau of Economic Research, dicembre 2020. http://dx.doi.org/10.3386/w28256.
Testo completoChetty, Raj, e John Friedman. A Practical Method to Reduce Privacy Loss when Disclosing Statistics Based on Small Samples. Cambridge, MA: National Bureau of Economic Research, marzo 2019. http://dx.doi.org/10.3386/w25626.
Testo completoKreighbaum, Jay M. Busting DoD Bureaucracy: Creating Fundamental Change by Leveraging Concepts and Practices from the Private Sectors. Fort Belvoir, VA: Defense Technical Information Center, aprile 2002. http://dx.doi.org/10.21236/ada401901.
Testo completoReynolds, Julie C., Susan C. McKernan, Jennifer Michelle Cecelia Sukalski, Brooke McInroy, Peter Damiano e Raymond Kuthy. Evaluation of the Dental Wellness Plan. Experiences of Private Practice Dentists after Two Years. Iowa City, Iowa: University of Iowa Public Policy Center, luglio 2017. http://dx.doi.org/10.17077/4u27-r72m.
Testo completoHertz, Jana C., Derick W. Brinkerhoff, Robin Bush e Petrarca Karetji. Knowledge Systems: Evidence to Policy Concepts in Practice. RTI Press, giugno 2020. http://dx.doi.org/10.3768/rtipress.2020.pb.0024.2006.
Testo completoOsidoma, Japhet, e Ashiru Mohammed Kinkwa. Creatively Improving Agricultural Practices and Productivity: Pro Resilience Action (PROACT) project, Nigeria. Oxfam, febbraio 2021. http://dx.doi.org/10.21201/2021.7260.
Testo completo