Articoli di riviste sul tema "Privicy protection"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Privicy protection".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Xie, Guangxu, Gaopan Hou, Qingqi Pei e Haibo Huang. "Lightweight Privacy Protection via Adversarial Sample". Electronics 13, n. 7 (26 marzo 2024): 1230. http://dx.doi.org/10.3390/electronics13071230.
Bonomi, Luca, Xiaoqian Jiang e Lucila Ohno-Machado. "Protecting patient privacy in survival analyses". Journal of the American Medical Informatics Association 27, n. 3 (21 novembre 2019): 366–75. http://dx.doi.org/10.1093/jamia/ocz195.
Zhenjiang Zhang, Zhenjiang Zhang, e Xiaohua Liu Zhenjiang Zhang. "Cloud-side Collaborative Privacy Protection Based on Differential Privacy". 電腦學刊 32, n. 4 (agosto 2021): 239–51. http://dx.doi.org/10.53106/199115992021083204019.
Meier, Yannic, Johanna Schäwel e Nicole C. Krämer. "Between protection and disclosure: applying the privacy calculus to investigate the intended use of privacy-protecting tools and self-disclosure on different websites". Studies in Communication and Media 10, n. 3 (2021): 283–306. http://dx.doi.org/10.5771/2192-4007-2021-3-283.
Nussy, Jennifer Ingelyne. "Mekanisme Komisi Pemberantasan Korupsi dalam Proses Penyadapan dilihat dari Perspektif Hak Asasi Manusia (HAM)". JURNAL BELO 5, n. 2 (19 maggio 2020): 74–85. http://dx.doi.org/10.30598/belobelovol5issue2page74-85.
Nussy, Jennifer Ingelyne. "Mekanisme Komisi Pemberantasan Korupsi dalam Proses Penyadapan dilihat dari Perspektif Hak Asasi Manusia (HAM)". JURNAL BELO 5, n. 2 (19 maggio 2020): 74–85. http://dx.doi.org/10.30598/belovol5issue2page74-85.
Corones, Stephen, e Juliet Davis. "Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions". Federal Law Review 45, n. 1 (marzo 2017): 65–95. http://dx.doi.org/10.1177/0067205x1704500104.
Singla, Arun. "The Evolving Landscape of Privacy Law: Balancing Digital Innovation and Individual Rights". Indian Journal of Law 2, n. 1 (2024): 1–6. http://dx.doi.org/10.36676/ijl.v2.i1.01.
Chen, Zhixuan, Yixiang Zhang e Zhiyu Zhang. "Research on Privacy Protection Willingness of New Media Platform Users Based on Theory of Planned Behavior". Communications in Humanities Research 16, n. 1 (28 novembre 2023): 264–71. http://dx.doi.org/10.54254/2753-7064/16/20230726.
Nahra, Kirk J. "Remarks by Kirk J. Nahra". Proceedings of the ASIL Annual Meeting 116 (2022): 127–29. http://dx.doi.org/10.1017/amp.2023.65.
Nissim, Kobbi, e Alexandra Wood. "Is privacy privacy ?" Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 376, n. 2128 (6 agosto 2018): 20170358. http://dx.doi.org/10.1098/rsta.2017.0358.
Colangelo, Giuseppe, e Mariateresa Maggiolino. "Data Protection in Attention Markets: Protecting Privacy through Competition?" Journal of European Competition Law & Practice 8, n. 6 (10 maggio 2017): 363–69. http://dx.doi.org/10.1093/jeclap/lpx037.
Cui, Mingwu, Fangfang Ding e Kun Cai. "The Influence of Self-Efficacy of College Students in Privacy Protection and Behavior in Social Networking Context". Scientific and Social Research 6, n. 3 (29 marzo 2024): 126–43. http://dx.doi.org/10.26689/ssr.v6i3.6445.
Dales, Loring. "Privacy Protection". Pediatrics 107, n. 6 (1 giugno 2001): 1495.2–1495. http://dx.doi.org/10.1542/peds.107.6.1495b.
Bransfield, Robert. "Privacy ‘Protection’". Psychiatric News 37, n. 17 (6 settembre 2002): 32. http://dx.doi.org/10.1176/pn.37.17.0032.
Rotenberg, Marc. "Privacy protection". Government Information Quarterly 11, n. 3 (gennaio 1994): 253–54. http://dx.doi.org/10.1016/0740-624x(94)90045-0.
Qin, Peng, e Lina Wang. "PPVC: Towards a Personalized Local Differential Privacy-Preserving Scheme for V2G Charging Networks". Mathematics 11, n. 20 (12 ottobre 2023): 4257. http://dx.doi.org/10.3390/math11204257.
Jia, Dongning, Bo Yin e Xianqing Huang. "Association Analysis of Private Information in Distributed Social Networks Based on Big Data". Wireless Communications and Mobile Computing 2021 (4 giugno 2021): 1–12. http://dx.doi.org/10.1155/2021/1181129.
Rothstein, Mark A. "Currents in Contemporary Ethics". Journal of Law, Medicine & Ethics 33, n. 1 (2005): 154–59. http://dx.doi.org/10.1111/j.1748-720x.2005.tb00217.x.
Bamberger, Kenneth A., e Ariel Evan Mayse. "PRE-MODERN INSIGHTS FOR POST-MODERN PRIVACY: JEWISH LAW LESSONS FOR THE BIG DATA AGE". Journal of Law and Religion 36, n. 3 (dicembre 2021): 495–532. http://dx.doi.org/10.1017/jlr.2021.90.
Baruh, Lemi, e Mihaela Popescu. "Big data analytics and the limits of privacy self-management". New Media & Society 19, n. 4 (2 novembre 2015): 579–96. http://dx.doi.org/10.1177/1461444815614001.
Zhang, Jing, Yanzi Li, Qian Ding, Liwei Lin e Xiucai Ye. "Successive Trajectory Privacy Protection with Semantics Prediction Differential Privacy". Entropy 24, n. 9 (23 agosto 2022): 1172. http://dx.doi.org/10.3390/e24091172.
Islam, Md Toriqul. "ADEQUACY OF PRIVACY REGIME IN BANGLADESH: KEY CHALLENGES AND POTENTIAL POLICY MEASURES". IIUM Law Journal 30, n. 1 (7 luglio 2022): 33–74. http://dx.doi.org/10.31436/iiumlj.v30i1.655.
Wang, Weiyuan. "Legal Effect of Internet Privacy Policy". Journal of Education, Humanities and Social Sciences 28 (1 aprile 2024): 126–33. http://dx.doi.org/10.54097/zjz34p19.
Kumar, Krishan, Mukesh Kumar Gupta, Nishant Saxena e Vivek Jaglan. "Homomorphic Encryption Based Privacy Protection for Personalised Web Search". Indian Journal of Science and Technology 15, n. 8 (27 febbraio 2022): 318–25. http://dx.doi.org/10.17485/ijst/v15i8.44.
Serwin, Andrew. "Privacy 3.0-The Principle of Proportionality". University of Michigan Journal of Law Reform, n. 42.4 (2009): 869. http://dx.doi.org/10.36646/mjlr.42.4.privacy.
Qiu, Ke. "A secure system for electric vehicle battery swap stations using blockchain". Applied and Computational Engineering 16, n. 1 (23 ottobre 2023): 13–26. http://dx.doi.org/10.54254/2755-2721/16/20230851.
Hao, Li Ping, e Yi Hui Chen. "Research on the Cloud Computing Storage Privacy Preserving Based on MB-Tree Dynamic Access Model". Applied Mechanics and Materials 513-517 (febbraio 2014): 2350–54. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2350.
Yan, Liang, Lei Li, Xuejiao Mu, Hao Wang, Xian Chen e Hyoseop Shin. "Differential Privacy Preservation for Location Semantics". Sensors 23, n. 4 (13 febbraio 2023): 2121. http://dx.doi.org/10.3390/s23042121.
Grandison, Tyrone, e Rafae Bhatti. "Regulatory Compliance and the Correlation to Privacy Protection in Healthcare". International Journal of Computational Models and Algorithms in Medicine 1, n. 2 (aprile 2010): 37–52. http://dx.doi.org/10.4018/jcmam.2010040103.
Wang, Yijing, Jingyi Zhang e Lupeng Zhang. "Analysis of Users Balance Between Private and Public -- One Case from the TikTok". Communications in Humanities Research 12, n. 1 (20 novembre 2023): 146–60. http://dx.doi.org/10.54254/2753-7064/12/20230070.
Wang, Pingshui, Jianwen Zhu e Qinjuan Ma. "Private Data Protection in Social Networks Based on Blockchain". International Journal of Advanced Networking and Applications 14, n. 04 (2023): 5549–55. http://dx.doi.org/10.35444/ijana.2023.14407.
Zostant, Maxwell, e Robin Chataut. "Privacy in computer ethics: Navigating the digital age". Computer Science and Information Technologies 4, n. 2 (1 luglio 2023): 183–90. http://dx.doi.org/10.11591/csit.v4i2.p183-190.
Zostant, Maxwell, e Robin Chataut. "Privacy in computer ethics: Navigating the digital age". Computer Science and Information Technologies 4, n. 2 (1 luglio 2023): 183–90. http://dx.doi.org/10.11591/csit.v4i2.pp183-190.
Ghorashi, Seyed Ramin, Tanveer Zia, Michael Bewong e Yinhao Jiang. "An Analytical Review of Industrial Privacy Frameworks and Regulations for Organisational Data Sharing". Applied Sciences 13, n. 23 (27 novembre 2023): 12727. http://dx.doi.org/10.3390/app132312727.
Altman, Micah, e Aloni Cohen. "Natural differential privacy—a perspective on protection guarantees". PeerJ Computer Science 9 (28 settembre 2023): e1576. http://dx.doi.org/10.7717/peerj-cs.1576.
Li, Yijing, Ran Bi, Nan Jiang, Fengqiu Li, Mingsi Wang e Xiangping Jing. "Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular Networks". Electronics 13, n. 12 (17 giugno 2024): 2372. http://dx.doi.org/10.3390/electronics13122372.
AllahRakha, Naeem. "Constitutional Safeguards for Digital Rights and Privacy". International Journal of Law and Policy 2, n. 4 (30 aprile 2024): 31–43. http://dx.doi.org/10.59022/ijlp.172.
Bhandari, Vrinda, e Renuka Sane. "Protecting citizens from the state post Puttaswamy: Analysing the privacy implications of the Justice Shrikrishna Committee Report and the Data Protection Bill, 2018". Socio-Legal Review 14, n. 2 (gennaio 2018): 143. http://dx.doi.org/10.55496/uuiz9934.
Chukwunonso Aloamaka, Patrick. "Effective Data Protection in Nigeria: Challenges". Commonwealth Law Review Journal 08 (2022): 656–62. http://dx.doi.org/10.55662/clrj.2022.811.
A. Razon, Arvin Kristopher. "Are Narco-Lists Covered by the Philippine Law on Privacy?: Exploring the Limits of the ‘Classic’ Right to Privacy and Applying a Constitutionally Grounded Data Protection Right". Global Privacy Law Review 2, Issue 1 (1 febbraio 2021): 44–58. http://dx.doi.org/10.54648/gplr2021006.
Yang, Xuechao, Xun Yi, Andrei Kelarev, Leanne Rylands, Yuqing Lin e Joe Ryan. "Protecting Private Information for Two Classes of Aggregated Database Queries". Informatics 9, n. 3 (5 settembre 2022): 66. http://dx.doi.org/10.3390/informatics9030066.
Krishnamurthy, Vivek. "A Tale of Two Privacy Laws: The GDPR and the International Right to Privacy". AJIL Unbound 114 (2020): 26–30. http://dx.doi.org/10.1017/aju.2019.79.
Panvelwala, Fatema, e Archana G. "Data Protection Guidelines for Protecting Privacy of Users on Social Media". International Journal of Computer Applications 182, n. 2 (16 luglio 2018): 7–12. http://dx.doi.org/10.5120/ijca2018917449.
Kohl, Uta. "THE RIGHT TO BE FORGOTTEN IN DATA PROTECTION LAW AND TWO WESTERN CULTURES OF PRIVACY". International and Comparative Law Quarterly 72, n. 3 (luglio 2023): 737–69. http://dx.doi.org/10.1017/s0020589323000258.
Zhang, Xiangfei, Feng Yang, Yu Guo, Hang Yu, Zhengxia Wang e Qingchen Zhang. "Adaptive Differential Privacy Mechanism Based on Entropy Theory for Preserving Deep Neural Networks". Mathematics 11, n. 2 (8 gennaio 2023): 330. http://dx.doi.org/10.3390/math11020330.
Zhou, Leming, e Bambang Parmanto. "User Preferences for Privacy Protection Methods in Mobile Health Apps: A Mixed-Methods Study". International Journal of Telerehabilitation 12, n. 2 (8 dicembre 2020): 13–26. http://dx.doi.org/10.5195/ijt.2020.6319.
Sundaram, Ranjany, e Snehal Shetty. "Privacy concerns and protection behavior during the Covid-19 pandemic". Problems and Perspectives in Management 20, n. 2 (20 aprile 2022): 57–70. http://dx.doi.org/10.21511/ppm.20(2).2022.06.
Kravchuk, V. "Foreign experience of personal data protection in social networks". Uzhhorod National University Herald. Series: Law 2, n. 78 (31 agosto 2023): 49–53. http://dx.doi.org/10.24144/2307-3322.2023.78.2.7.
Wang, Yanbing. "Privacy Protection of Public Figures in China—The Case of Yundi Li’s Prostitution". Studies in Law and Justice 2, n. 2 (giugno 2023): 109–17. http://dx.doi.org/10.56397/slj.2023.06.15.