Articoli di riviste sul tema "Privacy practices"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Privacy practices".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Smith, H. Jeff. "Privacy policies and practices". Communications of the ACM 36, n. 12 (dicembre 1993): 104–22. http://dx.doi.org/10.1145/163298.163349.
Testo completoPaasche-Orlow, Michael K., Dan M. Jacob e Joshua N. Powell. "Notices of Privacy Practices". Medical Care 43, n. 6 (giugno 2005): 558–64. http://dx.doi.org/10.1097/01.mlr.0000163646.90393.e4.
Testo completoSchlueter, John P. "Private Practices". Nineteenth-Century Literature 66, n. 3 (1 dicembre 2011): 283–306. http://dx.doi.org/10.1525/ncl.2011.66.3.283.
Testo completoHsu, Chiung‐wen (Julia). "Privacy concerns, privacy practices and web site categories". Online Information Review 30, n. 5 (settembre 2006): 569–86. http://dx.doi.org/10.1108/14684520610706433.
Testo completoToy, Alan, David Lau, David Hay e Gehan Gunasekara. "The views of privacy auditors regarding standards and methodologies". Meditari Accountancy Research 27, n. 3 (3 giugno 2019): 366–98. http://dx.doi.org/10.1108/medar-07-2018-0367.
Testo completoMensch, Scott E., e LeAnn Wilkie. "Smart Phone Security Practices". International Journal of Cyber Behavior, Psychology and Learning 9, n. 3 (luglio 2019): 1–14. http://dx.doi.org/10.4018/ijcbpl.2019070101.
Testo completoHan, Ye, e T. Selwyn Ellis. "A Study of User Continuance Behavioral Intentions Toward Privacy-Protection Practices". Information Resources Management Journal 31, n. 2 (aprile 2018): 24–46. http://dx.doi.org/10.4018/irmj.2018040102.
Testo completoHope, Joan. "Follow best practices for transparency about student privacy practices". Disability Compliance for Higher Education 20, n. 9 (17 marzo 2015): 9. http://dx.doi.org/10.1002/dhe.30049.
Testo completoCohen, Julie E. "Turning Privacy Inside Out". Theoretical Inquiries in Law 20, n. 1 (16 marzo 2019): 1–31. http://dx.doi.org/10.1515/til-2019-0002.
Testo completoCulnan, Mary J., e Thomas J. Carlin. "Online privacy practices in higher education". Communications of the ACM 52, n. 3 (marzo 2009): 126–30. http://dx.doi.org/10.1145/1467247.1467277.
Testo completoLauer, Thomas W., e Xiaodong Deng. "Building online trust through privacy practices". International Journal of Information Security 6, n. 5 (3 luglio 2007): 323–31. http://dx.doi.org/10.1007/s10207-007-0028-8.
Testo completoNORD, CATHARINA. "Architectural space as a moulding factor of care practices and resident privacy in assisted living". Ageing and Society 31, n. 6 (14 marzo 2011): 934–52. http://dx.doi.org/10.1017/s0144686x10001248.
Testo completoCharlesworth, Andrew J. "Privacy, Personal Information and Employment". Surveillance & Society 1, n. 2 (1 settembre 2002): 217–22. http://dx.doi.org/10.24908/ss.v1i2.3355.
Testo completoCoppens, Paulien, Carina Veeckman e Laurence Claeys. "Privacy in location-based social networks: privacy scripts & user practices". Journal of Location Based Services 9, n. 1 (2 gennaio 2015): 1–15. http://dx.doi.org/10.1080/17489725.2015.1017015.
Testo completoBurton, Julian. "Privacy on their terms". Canadian Journal of Children's Rights / Revue canadienne des droits des enfants 5, n. 1 (9 novembre 2018): 150–72. http://dx.doi.org/10.22215/cjcr.v5i1.1256.
Testo completoCharbonneau, Deborah H. "Privacy Practices of Health Social Networking Sites". CIN: Computers, Informatics, Nursing 34, n. 8 (agosto 2016): 355–59. http://dx.doi.org/10.1097/cin.0000000000000249.
Testo completoPfleeger, S. L., e C. P. Pfleeger. "Harmonizing privacy with security principles and practices". IBM Journal of Research and Development 53, n. 2 (marzo 2009): 6:1–6:12. http://dx.doi.org/10.1147/jrd.2009.5429048.
Testo completoMartin, David M., Richard M. Smith, Michael Brittain, Ivan Fetch e Hailin Wu. "The privacy practices of Web browser extensions". Communications of the ACM 44, n. 2 (febbraio 2001): 45–50. http://dx.doi.org/10.1145/359205.359226.
Testo completoJin, Haojian, Hong Shen, Mayank Jain, Swarun Kumar e Jason I. Hong. "Lean Privacy Review: Collecting Users’ Privacy Concerns of Data Practices at a Low Cost". ACM Transactions on Computer-Human Interaction 28, n. 5 (31 ottobre 2021): 1–55. http://dx.doi.org/10.1145/3463910.
Testo completoHartman-Caverly, Sarah, e Alexandria Chisholm. "Privacy literacy instruction practices in academic libraries: Past, present, and possibilities". IFLA Journal 46, n. 4 (28 agosto 2020): 305–27. http://dx.doi.org/10.1177/0340035220956804.
Testo completoChen, Wenhong, Gejun Huang, Joshua Miller, Kye-Hyoung Lee, Daniel Mauro, Bryan Stephens e Xiaoqian Li. "“As We Grow, It Will Become a Priority”: American Mobile Start-Ups’ Privacy Practices". American Behavioral Scientist 62, n. 10 (12 luglio 2018): 1338–55. http://dx.doi.org/10.1177/0002764218787867.
Testo completoCulnan, Mary J. "Protecting Privacy Online: Is Self-Regulation Working?" Journal of Public Policy & Marketing 19, n. 1 (aprile 2000): 20–26. http://dx.doi.org/10.1509/jppm.19.1.20.16944.
Testo completoMcQuay, Terry, e Ann Cavoukian. "A pragmatic approach to privacy risk optimization: privacy by design for business practices". Identity in the Information Society 3, n. 2 (11 luglio 2010): 379–96. http://dx.doi.org/10.1007/s12394-010-0067-6.
Testo completoParsons, Christopher. "Beyond Privacy: Articulating the Broader Harms of Pervasive Mass Surveillance". Media and Communication 3, n. 3 (20 ottobre 2015): 1–11. http://dx.doi.org/10.17645/mac.v3i3.263.
Testo completoHosseini, Henry, Martin Degeling, Christine Utz e Thomas Hupperich. "Unifying Privacy Policy Detection". Proceedings on Privacy Enhancing Technologies 2021, n. 4 (23 luglio 2021): 480–99. http://dx.doi.org/10.2478/popets-2021-0081.
Testo completoBarbosa, Natã M., Joon S. Park, Yaxing Yao e Yang Wang. "“What if?” Predicting Individual Users’ Smart Home Privacy Preferences and Their Changes". Proceedings on Privacy Enhancing Technologies 2019, n. 4 (1 ottobre 2019): 211–31. http://dx.doi.org/10.2478/popets-2019-0066.
Testo completoOdella, Francesca. "Privacy Awareness and the Networking Generation". International Journal of Technoethics 9, n. 1 (gennaio 2018): 51–70. http://dx.doi.org/10.4018/ijt.2018010105.
Testo completoSheehan, Kim Bartel, e Timothy W. Gleason. "Online Privacy: Internet Advertising Practitioners' Knowledge and Practices". Journal of Current Issues & Research in Advertising 23, n. 1 (marzo 2001): 31–41. http://dx.doi.org/10.1080/10641734.2001.10505112.
Testo completoDowling, Thomas. "Protecting patron privacy: Safe practices for public computers". Technical Services Quarterly 33, n. 2 (21 marzo 2016): 214–15. http://dx.doi.org/10.1080/07317131.2016.1135018.
Testo completoDewi, Sinta. "Balancing privacy rights and legal enforcement: Indonesian practices". International Journal of Liability and Scientific Enquiry 5, n. 3/4 (2012): 232. http://dx.doi.org/10.1504/ijlse.2012.051961.
Testo completoWeber, R. H. "Privacy management practices in the proposed EU regulation". International Data Privacy Law 4, n. 4 (4 settembre 2014): 290–97. http://dx.doi.org/10.1093/idpl/ipu018.
Testo completoSmith, H. Jeff, Sandra J. Milberg e Sandra J. Burke. "Information Privacy: Measuring Individuals' Concerns about Organizational Practices". MIS Quarterly 20, n. 2 (giugno 1996): 167. http://dx.doi.org/10.2307/249477.
Testo completoSchellenberg, Kathryn. "Police Information Systems, Information Practices and Individual Privacy". Canadian Public Policy / Analyse de Politiques 23, n. 1 (marzo 1997): 23. http://dx.doi.org/10.2307/3552129.
Testo completoMillar, Sheila A. "Privacy and security: Best practices for global security". Journal of International Trade Law and Policy 5, n. 1 (31 maggio 2006): 36–49. http://dx.doi.org/10.1108/14770020680000539.
Testo completoROTFELD, HERBERT JACK. "Privacy Crimes, Annoyances and Self-Defeating Business Practices". Journal of Consumer Affairs 43, n. 3 (settembre 2009): 538–42. http://dx.doi.org/10.1111/j.1745-6606.2009.01154.x.
Testo completoWang, Shu-Ching, e Jen-Her Wu. "Proactive privacy practices in transition: Toward ubiquitous services". Information & Management 51, n. 1 (gennaio 2014): 93–103. http://dx.doi.org/10.1016/j.im.2013.09.005.
Testo completoKaryda, Maria, Stefanos Gritzalis, Jong Hyuk Park e Spyros Kokolakis. "Privacy and fair information practices in ubiquitous environments". Internet Research 19, n. 2 (3 aprile 2009): 194–208. http://dx.doi.org/10.1108/10662240910952346.
Testo completoSchwaig, Kathy Stewart, Gerald C. Kane e Veda C. Storey. "Privacy, fair information practices and the fortune 500". ACM SIGMIS Database: the DATABASE for Advances in Information Systems 36, n. 1 (7 febbraio 2005): 49–63. http://dx.doi.org/10.1145/1047070.1047075.
Testo completoBui, Duc, Kang G. Shin, Jong-Min Choi e Junbum Shin. "Automated Extraction and Presentation of Data Practices in Privacy Policies". Proceedings on Privacy Enhancing Technologies 2021, n. 2 (29 gennaio 2021): 88–110. http://dx.doi.org/10.2478/popets-2021-0019.
Testo completoLaMonica, Haley M., Anna E. Roberts, Grace Yeeun Lee, Tracey A. Davenport e Ian B. Hickie. "Privacy Practices of Health Information Technologies: Privacy Policy Risk Assessment Study and Proposed Guidelines". Journal of Medical Internet Research 23, n. 9 (16 settembre 2021): e26317. http://dx.doi.org/10.2196/26317.
Testo completoShipp, Laura, e Jorge Blasco. "How private is your period?: A systematic analysis of menstrual app privacy policies". Proceedings on Privacy Enhancing Technologies 2020, n. 4 (1 ottobre 2020): 491–510. http://dx.doi.org/10.2478/popets-2020-0083.
Testo completoHollenbaugh, Erin E. "Privacy Management Among Social Media Natives: An Exploratory Study of Facebook and Snapchat". Social Media + Society 5, n. 3 (aprile 2019): 205630511985514. http://dx.doi.org/10.1177/2056305119855144.
Testo completoKönig, Katharina, e Florence Oloff. "Mobile Medienpraktiken im Spannungsfeld von Öffentlichkeit, Privatheit und Anonymität". Journal für Medienlinguistik 2, n. 2 (27 settembre 2019): 1–27. http://dx.doi.org/10.21248/jfml.2019.9.
Testo completoKönig, Katharina, e Florence Oloff. "Mobile Medienpraktiken im Spannungsfeld von Öffentlichkeit, Privatheit und Anonymität". Journal für Medienlinguistik 2, n. 2 (27 settembre 2019): 1–27. http://dx.doi.org/10.21248/jfml.2019.9.
Testo completoKitsos, Panagiotis, e Aikaterini Yannoukakou. "Privacy in the 21st Century". International Journal of E-Politics 4, n. 3 (luglio 2013): 15–29. http://dx.doi.org/10.4018/jep.2013070102.
Testo completoAdorjan, Michael, e Rosemary Ricciardelli. "A New Privacy Paradox? Youth Agentic Practices of Privacy Management Despite “Nothing to Hide” Online". Canadian Review of Sociology/Revue canadienne de sociologie 56, n. 1 (15 gennaio 2019): 8–29. http://dx.doi.org/10.1111/cars.12227.
Testo completoBarhamgi, Mahmoud, Arosha K. Bandara, Yijun Yu, Khalid Belhajjame e Bashar Nuseibeh. "Protecting Privacy in the Cloud: Current Practices, Future Directions". Computer 49, n. 2 (febbraio 2016): 68–72. http://dx.doi.org/10.1109/mc.2016.59.
Testo completoDias, Gonçalo Paiva, Hélder Gomes e André Zúquete. "Privacy policies and practices in Portuguese local e-government". Electronic Government, an International Journal 12, n. 4 (2016): 301. http://dx.doi.org/10.1504/eg.2016.080430.
Testo completoZúquete, André, Gonçalo Paiva Dias e Hélder Gomes. "Privacy policies and practices in Portuguese local e-government". Electronic Government, an International Journal 12, n. 4 (2016): 301. http://dx.doi.org/10.1504/eg.2016.10001404.
Testo completoKemp, Katharine. "Concealed data practices and competition law: why privacy matters". European Competition Journal 16, n. 2-3 (1 settembre 2020): 628–72. http://dx.doi.org/10.1080/17441056.2020.1839228.
Testo completo