Articoli di riviste sul tema "Sensitive information"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Sensitive information".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
SIVÁK, Jaroslav. "SENSITIVE INFORMATION". Krízový Manažment 14, n. 1 (30 marzo 2015): 23–29. http://dx.doi.org/10.26552/krm.c.2015.1.23-29.
Testo completoNicklisch, Andreas, Kristoffel Grechenig e Christian Thöni. "Information-sensitive Leviathans". Journal of Public Economics 144 (dicembre 2016): 1–13. http://dx.doi.org/10.1016/j.jpubeco.2016.09.008.
Testo completoPRICE, LINDA L., LAWRENCE F. FEICK e ROBIN A. HIGIE. "Information Sensitive Consumers and Market Information". Journal of Consumer Affairs 21, n. 2 (dicembre 1987): 328–41. http://dx.doi.org/10.1111/j.1745-6606.1987.tb00206.x.
Testo completoNAWA, Kotaro. "Sensitive, but unclassified information". Journal of Information Processing and Management 48, n. 4 (2005): 243–44. http://dx.doi.org/10.1241/johokanri.48.243.
Testo completoVernon;, D. P. "Sensitive Versus Classified Information". Science 306, n. 5697 (29 ottobre 2004): 811e—812e. http://dx.doi.org/10.1126/science.306.5697.811e.
Testo completoConley, Sharon. "Keeping Sensitive Information Private". NASNewsletter 22, n. 4 (luglio 2007): 21. http://dx.doi.org/10.1177/104747570702200407.
Testo completoJaswal, S. K., e T. Harpham. "Getting Sensitive Information on Sensitive Issues: Gynaecological Morbidity". Health Policy and Planning 12, n. 2 (1 gennaio 1997): 173–78. http://dx.doi.org/10.1093/heapol/12.2.173.
Testo completoBesorai, Ahal. "Tentative Information, Inside Information, Price‐sensitive Information and Materiality". Journal of Financial Crime 3, n. 3 (gennaio 1996): 268–71. http://dx.doi.org/10.1108/eb025719.
Testo completoINAMURA, Tomoaki, e Haruki MADARAME. "ICONE15-10612 Control of Information Relating to Sensitive Nuclear Technology (DRAFT^*)". Proceedings of the International Conference on Nuclear Engineering (ICONE) 2007.15 (2007): _ICONE1510. http://dx.doi.org/10.1299/jsmeicone.2007.15._icone1510_334.
Testo completoSu, Linping, e Zhipeng Liu. "A T-similarity Sensitive Information Protection Method Based on Sensitive Information Gradient Partition". Journal of Physics: Conference Series 2030, n. 1 (1 settembre 2021): 012059. http://dx.doi.org/10.1088/1742-6596/2030/1/012059.
Testo completoSong, D., e P. D. Bruza. "Towards context sensitive information inference". Journal of the American Society for Information Science and Technology 54, n. 4 (2003): 321–34. http://dx.doi.org/10.1002/asi.10213.
Testo completoBernstein, Adam. "Keeping business-sensitive information safe". Nursing and Residential Care 25, n. 1 (2 gennaio 2023): 1–3. http://dx.doi.org/10.12968/nrec.2022.0061.
Testo completoRajamäki, Jyri, Ilkka Tikanmäki e Jari Räsänen. "CISE as a Tool for Sharing Sensitive Cyber Information in Maritime Domain". Information & Security: An International Journal 43, n. 2 (2019): 215–35. http://dx.doi.org/10.11610/isij.4317.
Testo completoMartínez, V. Gayoso, L. Hernández Encinas, A. Queiruga Dios, A. Hernández Encinas e J. Martín Vaquero. "Avoiding Sensitive Information Leakage in Moodle". Literacy Information and Computer Education Journal Special 2, n. 2 (1 settembre 2013): 1422–32. http://dx.doi.org/10.20533/licej.2040.2589.2013.0190.
Testo completoWALTER, CATHY M. "How biometrics keep sensitive information secure". Nursing 35, n. 5 (maggio 2005): 76. http://dx.doi.org/10.1097/00152193-200505000-00058.
Testo completoChou, Winston, Kosuke Imai e Bryn Rosenfeld. "Sensitive Survey Questions with Auxiliary Information". Sociological Methods & Research 49, n. 2 (11 dicembre 2017): 418–54. http://dx.doi.org/10.1177/0049124117729711.
Testo completoWu, Jimmy Ming-Tai, Gautam Srivastava, Alireza Jolfaei, Philippe Fournier-Viger e Jerry Chun-Wei Lin. "Hiding sensitive information in eHealth datasets". Future Generation Computer Systems 117 (aprile 2021): 169–80. http://dx.doi.org/10.1016/j.future.2020.11.026.
Testo completoLamming, Richard, Nigel Caldwell, Wendy Phillips e Deborah Harrison. "Sharing Sensitive Information in Supply Relationships:". European Management Journal 23, n. 5 (ottobre 2005): 554–63. http://dx.doi.org/10.1016/j.emj.2005.09.010.
Testo completoStolfo, Salvatore J., e Gene Tsudik. "Privacy-Preserving Sharing of Sensitive Information". IEEE Security & Privacy Magazine 8, n. 4 (luglio 2010): 16–17. http://dx.doi.org/10.1109/msp.2010.135.
Testo completoMurphy, Daniel. "Disclosure and sharing of sensitive information". Journal of Financial Crime 13, n. 4 (ottobre 2006): 420–41. http://dx.doi.org/10.1108/13590790610707555.
Testo completoLarson, David K., e Keith W. Miller. "When Sensitive IT Information Crosses Borders". IT Professional 11, n. 4 (luglio 2009): 56–59. http://dx.doi.org/10.1109/mitp.2009.85.
Testo completoBeneš, Vaclav E., e Robert J. Elliott. "Finite Dimensional Risk Sensitive Information States". IFAC Proceedings Volumes 28, n. 14 (giugno 1995): 429–34. http://dx.doi.org/10.1016/s1474-6670(17)46867-4.
Testo completoTilling, Simon. "Access to commercially sensitive environmental information". ERA Forum 14, n. 4 (29 novembre 2013): 493–506. http://dx.doi.org/10.1007/s12027-013-0329-5.
Testo completoAthitsos, Vassilis, Marios Hadjieleftheriou, George Kollios e Stan Sclaroff. "Query-sensitive embeddings". ACM Transactions on Database Systems 32, n. 2 (giugno 2007): 8. http://dx.doi.org/10.1145/1242524.1242525.
Testo completoHammer, Christian, e Gregor Snelting. "Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs". International Journal of Information Security 8, n. 6 (27 giugno 2009): 399–422. http://dx.doi.org/10.1007/s10207-009-0086-1.
Testo completoBedford, Andrew, Stephen Chong, Josée Desharnais, Elisavet Kozyri e Nadia Tawbi. "A progress-sensitive flow-sensitive inlined information-flow control monitor (extended version)". Computers & Security 71 (novembre 2017): 114–31. http://dx.doi.org/10.1016/j.cose.2017.04.001.
Testo completoTsuchiya, Ryuji, Akihiko Matsuoka, Takahiko Ogino, Kouich Goto, Toshiro Nakao e Hajime Takebayashi. "Location-sensitive Itinerary-based Passenger Information System". IEEJ Transactions on Industry Applications 125, n. 4 (2005): 338–47. http://dx.doi.org/10.1541/ieejias.125.338.
Testo completoBarachevsky, Valery A., Yury P. Strokach, Yury A. Puankov, Olga I. Kobeleva, Tatyana M. Valova, Konstantin S. Levchenko, Vladimir N. Yaroshenko e Michail M. Krayushkin. "Light-sensitive heterocyclic compounds for information nanotechnologies". Arkivoc 2009, n. 9 (21 giugno 2008): 70–95. http://dx.doi.org/10.3998/ark.5550190.0010.906.
Testo completoSridhar, Aparna, Rosibel Hernandez e Erin Duffy. "Primary Sources of Sensitive Reproductive Health Information". Obstetrics & Gynecology 127 (maggio 2016): 115S. http://dx.doi.org/10.1097/01.aog.0000483473.31199.7a.
Testo completoFord, Carol A., Susan G. Millstein, Bonnie Halpern-Felsher e Charles E. Irwin. "Confidentiality and adolescents' disclosure of sensitive information". Journal of Adolescent Health 18, n. 2 (febbraio 1996): 111. http://dx.doi.org/10.1016/1054-139x(96)00011-0.
Testo completoGuo, Yongyan, Jiayong Liu, Wenwu Tang e Cheng Huang. "Exsense: Extract sensitive information from unstructured data". Computers & Security 102 (marzo 2021): 102156. http://dx.doi.org/10.1016/j.cose.2020.102156.
Testo completoKim, Sung-Hwan, Nam-Uk Kim e Tai-Myoung Chung. "Study on sensitive information leakage vulnerability modeling". Kybernetes 44, n. 1 (12 gennaio 2015): 77–88. http://dx.doi.org/10.1108/k-05-2014-0106.
Testo completoGalobardes, Bruna, e Stefaan Demarest. "Asking sensitive information: an example with income". Sozial- und Pr�ventivmedizin/Social and Preventive Medicine 48, n. 1 (1 marzo 2003): 70–72. http://dx.doi.org/10.1007/s000380300008.
Testo completoGuo, Dongdan, Hao Sun, Tao Zhu e Chang Cai. "An Automated Recognition Model for Sensitive Information". Journal of Physics: Conference Series 1575 (giugno 2020): 012043. http://dx.doi.org/10.1088/1742-6596/1575/1/012043.
Testo completoReeser, Linda Cherrey, e Robert A. Wertkin. "Sharing Sensitive Student Information With Field Instructors". Journal of Social Work Education 33, n. 2 (aprile 1997): 347–62. http://dx.doi.org/10.1080/10437797.1997.10778875.
Testo completoRollestone, Giles. "Networked information services in context-sensitive environments". Interactions 11, n. 2 (marzo 2004): 67–69. http://dx.doi.org/10.1145/971258.971282.
Testo completoTombros, Anastasios, e C. J. van Rijsbergen. "Query-Sensitive Similarity Measures for Information Retrieval". Knowledge and Information Systems 6, n. 5 (15 gennaio 2004): 617–42. http://dx.doi.org/10.1007/s10115-003-0115-8.
Testo completoThompson, E. Dale, e Michelle L. Kaarst-Brown. "Sensitive information: A review and research agenda". Journal of the American Society for Information Science and Technology 56, n. 3 (2005): 245–57. http://dx.doi.org/10.1002/asi.20121.
Testo completoBast, Holger, Christian W. Mortensen e Ingmar Weber. "Output-sensitive autocompletion search". Information Retrieval 11, n. 4 (4 marzo 2008): 269–86. http://dx.doi.org/10.1007/s10791-008-9048-x.
Testo completoMary A, Geetha, D. P. Acharjya e N. Ch S. N. Iyengar. "Improved Anonymization Algorithms for Hiding Sensitive Information in Hybrid Information System". International Journal of Computer Network and Information Security 6, n. 6 (8 maggio 2014): 9–17. http://dx.doi.org/10.5815/ijcnis.2014.06.02.
Testo completoMaviglia, Saverio M., Catherine S. Yoon, David W. Bates e Gilad Kuperman. "KnowledgeLink: Impact of Context-Sensitive Information Retrieval on Clinicians' Information Needs". Journal of the American Medical Informatics Association 13, n. 1 (gennaio 2006): 67–73. http://dx.doi.org/10.1197/jamia.m1861.
Testo completoDueck, Gunter. "Highly Sensitive!" Informatik-Spektrum 28, n. 2 (aprile 2005): 151–57. http://dx.doi.org/10.1007/s00287-005-00475-4.
Testo completoKim, Jeongeun, Howard Dubowitz, Elizabeth Hudson-Martin e Wendy Lane. "Comparison of 3 Data Collection Methods for Gathering Sensitive and Less Sensitive Information". Ambulatory Pediatrics 8, n. 4 (luglio 2008): 255–60. http://dx.doi.org/10.1016/j.ambp.2008.03.033.
Testo completoTsai, Cheng-Jung, Chien-I. Lee e Wei-Pang Yang. "An Efficient and Sensitive Decision Tree Approach to Mining Concept-Drifting Data Streams". Informatica 19, n. 1 (1 gennaio 2008): 135–56. http://dx.doi.org/10.15388/informatica.2008.206.
Testo completoCollins, Maria D. D., e Christine L. Ferguson. "Context-Sensitive Linking". Serials Review 28, n. 4 (dicembre 2002): 267–82. http://dx.doi.org/10.1080/00987913.2002.10764759.
Testo completoCondliffe, Anna. "Freedom of Information: Exemptions for Confidential Information". Business Law Review 28, Issue 7 (1 luglio 2007): 206–8. http://dx.doi.org/10.54648/bula2007034.
Testo completoCheng, Xian Yi, Wei Kang e Yu Guo. "An Algorithm of Network Sensitive Information Features Extracting". Applied Mechanics and Materials 556-562 (maggio 2014): 3558–61. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.3558.
Testo completoOh, Jin-Kwan, Seh-La Oh, Kwang-Hoon Choi e Jin-Hee Yim. "A Study on Sensitive Information Filtering Requirements for Supporting Original Information Disclosure". Journal of Records Management & Archives Society of Korea 17, n. 1 (28 febbraio 2017): 51–71. http://dx.doi.org/10.14404/jksarm.2017.17.1.051.
Testo completoJiang, Ying, Ming Jing, Jie Zeng, Feng Qi Shen, Du Lan Qi e Li Hua Wang. "LanguageTool Based Proofreading of Sensitive Chinese Political Information". Applied Mechanics and Materials 687-691 (novembre 2014): 2644–47. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2644.
Testo completoKiran, Asha, Manimala Puri e S. Srinivasa. "Preserving Sensitive Information using Fuzzy C-Means Approach". International Journal of Computer Applications 181, n. 10 (14 agosto 2018): 40–46. http://dx.doi.org/10.5120/ijca2018917656.
Testo completo