Gotowa bibliografia na temat „Privicy protection”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Privicy protection”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Privicy protection"
Xie, Guangxu, Gaopan Hou, Qingqi Pei i Haibo Huang. "Lightweight Privacy Protection via Adversarial Sample". Electronics 13, nr 7 (26.03.2024): 1230. http://dx.doi.org/10.3390/electronics13071230.
Pełny tekst źródłaBonomi, Luca, Xiaoqian Jiang i Lucila Ohno-Machado. "Protecting patient privacy in survival analyses". Journal of the American Medical Informatics Association 27, nr 3 (21.11.2019): 366–75. http://dx.doi.org/10.1093/jamia/ocz195.
Pełny tekst źródłaZhenjiang Zhang, Zhenjiang Zhang, i Xiaohua Liu Zhenjiang Zhang. "Cloud-side Collaborative Privacy Protection Based on Differential Privacy". 電腦學刊 32, nr 4 (sierpień 2021): 239–51. http://dx.doi.org/10.53106/199115992021083204019.
Pełny tekst źródłaMeier, Yannic, Johanna Schäwel i Nicole C. Krämer. "Between protection and disclosure: applying the privacy calculus to investigate the intended use of privacy-protecting tools and self-disclosure on different websites". Studies in Communication and Media 10, nr 3 (2021): 283–306. http://dx.doi.org/10.5771/2192-4007-2021-3-283.
Pełny tekst źródłaNussy, Jennifer Ingelyne. "Mekanisme Komisi Pemberantasan Korupsi dalam Proses Penyadapan dilihat dari Perspektif Hak Asasi Manusia (HAM)". JURNAL BELO 5, nr 2 (19.05.2020): 74–85. http://dx.doi.org/10.30598/belobelovol5issue2page74-85.
Pełny tekst źródłaNussy, Jennifer Ingelyne. "Mekanisme Komisi Pemberantasan Korupsi dalam Proses Penyadapan dilihat dari Perspektif Hak Asasi Manusia (HAM)". JURNAL BELO 5, nr 2 (19.05.2020): 74–85. http://dx.doi.org/10.30598/belovol5issue2page74-85.
Pełny tekst źródłaCorones, Stephen, i Juliet Davis. "Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions". Federal Law Review 45, nr 1 (marzec 2017): 65–95. http://dx.doi.org/10.1177/0067205x1704500104.
Pełny tekst źródłaSingla, Arun. "The Evolving Landscape of Privacy Law: Balancing Digital Innovation and Individual Rights". Indian Journal of Law 2, nr 1 (2024): 1–6. http://dx.doi.org/10.36676/ijl.v2.i1.01.
Pełny tekst źródłaChen, Zhixuan, Yixiang Zhang i Zhiyu Zhang. "Research on Privacy Protection Willingness of New Media Platform Users Based on Theory of Planned Behavior". Communications in Humanities Research 16, nr 1 (28.11.2023): 264–71. http://dx.doi.org/10.54254/2753-7064/16/20230726.
Pełny tekst źródłaNahra, Kirk J. "Remarks by Kirk J. Nahra". Proceedings of the ASIL Annual Meeting 116 (2022): 127–29. http://dx.doi.org/10.1017/amp.2023.65.
Pełny tekst źródłaRozprawy doktorskie na temat "Privicy protection"
Maifada, Magoudani Mahamadou. "Construire et mettre en œuvre un droit des données personnelles dans l’espace UEMOA : étude comparée à partir des cas du Burkina Faso, de la Côte d’Ivoire, du Niger et du Sénégal à la lumière du droit français et européen". Electronic Thesis or Diss., Paris 12, 2023. http://www.theses.fr/2023PA120073.
Pełny tekst źródłaThis thesis provides an in-depth analysis of the legal framework surrounding the protection of personal data within the West African Economic and Monetary Union (WAEMU), specifically focusing on Burkina Faso, Côte d'Ivoire, Niger, and Senegal – the areas under study. It delves into the motivations that led these states to adopt specific legislations influenced by foreign models, notably the French model of the "Loi Informatique et Libertés," rather than relying on national or community references.This analysis explores the development process of these regulations, from legislative evolution to international institutions' initiatives. Special attention is given to the influence of the International Organization of La Francophonie (IOF) and the French Commission for Data Protection (Commission de l'Informatique et des Libertés) in promoting the initial national legislations within this region.Furthermore, the thesis conducts a detailed comparison between the existing regulations within WAEMU and the European Union's General Data Protection Regulation (GDPR). This comparison highlights significant similarities and differences, particularly concerning the scope of application, stakeholders' responsibilities, and the rights of the individuals concerned.Moreover, the study examines the practical implementation of these regulations, focusing on key actors, including regulatory authorities, data controllers, Civil Society Organizations (CSOs), and data subjects in each state. It analyzes the challenges faced by regulatory authorities and cooperation policies aimed at enhancing the effectiveness of personal data rights.Finally, the thesis explores the limitations of personal data rights, particularly in their interaction with public policies in the telecommunications sector and the issues related to cybercrime.Overall, this work offers a comprehensive and nuanced perspective on personal data rights within WAEMU, shedding light on the motivations, achievements, challenges, and prospects in the ever-evolving African legal context. It constitutes a significant contribution to the understanding of personal data protection in the African legal context
Sallaku, Redlon <1994>. "Privacy and Protecting Privacy: Using Static Analysis for legal compliance. General Data Protection Regulation". Master's Degree Thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/14682.
Pełny tekst źródłaLi, Min. "Privacy Protection on Cloud Computing". VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3844.
Pełny tekst źródłaXu, Wanxin. "AFFECT-PRESERVING VISUAL PRIVACY PROTECTION". UKnowledge, 2018. https://uknowledge.uky.edu/ece_etds/122.
Pełny tekst źródłaWinkler, Stephanie D. "Protecting Online Privacy". UKnowledge, 2016. http://uknowledge.uky.edu/comm_etds/47.
Pełny tekst źródłaGunnarsson, Annicka, i Siri Ekberg. "Invasion of Privacy : Spam - one result of bad privacy protection". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5393.
Pełny tekst źródłaMatusek, F. (Florian). "Selective privacy protection for video surveillance". Doctoral thesis, Oulun yliopisto, 2014. http://urn.fi/urn:isbn:9789526204154.
Pełny tekst źródłaTiivistelmä Videovalvonnassa on tapahtunut viime vuosina merkittävää kasvua johtuen järkyttävistä tapahtumista kuten terrori-iskut, pankkiryöstöt ja järjestäytyneen rikollisuuden toimet. Videovalvontateknologia on kehittynyt merkittävästi mahdollistaen jopa yksittäisten ihmisten automaattisen seurannan. Turvallisuuden lisääntymisen katsotaan kuitenkin vähentäneen yksityisyyttä. Videovalvonnan avulla ihmisiä pystytään seuraamaan helpommin kuin koskaan aikaisemmin tunkeutuen täten heidän yksityisyytensä alueelle. On oletettu, että turvallisuus ja yksityisyys videovalvonnassa on nollasummapeliä, jossa kansalaisten on valittava yksityisyyden ja turvallisuuden välillä. Tämä tutkimus perustuu olettamukseen, että edellä esitetty ei pidä paikkaansa, vaan että on mahdollista suojata yksityisyys samalla taaten täysi turvallisuus. Ratkaisua tähän ongelmaan etsittiin suunnittelutieteellisen tutkimuksen avulla. Työssä suunniteltiin ja toteutettiin videovalvontajärjestelmä PEVS (Privacy Enhancing Video Surveillance system), joka suojaa valvonnanalaisten sivullisten yksityisyyttä ja siitä huolimatta tuottaa korkean turvallisuustason.. PEVS suojaa henkilöiden yksityisyyttä salaamalla automaattisesti videoaineistosta ne kuva-alat, joissa esiintyy ihmisiä. Mikäli laitonta toimintaa havaittaisiin, olisi riittävillä käyttöoikeuksilla mahdollista purkaa salaus mielenkiinnon kohteena olevien henkilöiden kohdalta tilanteen analysoimiseksi. Tämä mahdollisti yhtäältä puuttumattomuuden sivullisten yksityisyyteen ja toisaalta tiedon käyttämisen todistusaineistona mahdollisen rikoksen tutkimisessa. Tällä järjestelmällä yksityisyys oli mahdollista suojata samanaikaisesti, kun turvallisuudesta huolehdittiin. PEVS mahdollisti ensimmäistä kertaa maailmassa videovalvonnan, joka näyttää vain relevantit henkilöt jättäen muiden henkilöllisyyden paljastamatta. Sen takia tämän tutkimuksen merkittävin kontribuutio oli uudenlaisen lähestymistavan kehittäminen videovalvontaan, joka kykenee valikoivasti suojelemaan ihmisten yksityisyyttä. Tämä ratkaisu sisältää yksityisyyden suojaavan, useita rakenneosia sisältävän videovalvontajärjestelmäarkkitehtuurin esittelyn. Rakenneosiin kuuluu yksityisen tiedon tallennusmenetelmiä ja varjontunnistus- ja segmentointimetodeja, jotka paransivat aiemmin käytettyjen metodien tarkkuutta ja nopeutta. Lisäksi esiteltiin uudenlainen turvallisuus- ja yksityisyysmetriikka videovalvonnalle. Toteutettu järjestelmä on huomattava lisäys nykytietämykseen, jossa yksityisyyden suojan osalta on otettu vasta ensiaskelia ja joka ei mahdollista kattavaa järjestelmää
Chaudhari, Jayashri S. "Privacy Protection for Life-log System". UKnowledge, 2007. http://uknowledge.uky.edu/gradschool_theses/491.
Pełny tekst źródłaAjam, Nabil. "Privacy protection for location-based services". Télécom Bretagne, 2010. http://www.theses.fr/2010TELB0124.
Pełny tekst źródłaIn this dissertation, we propose the expression and the modelling of the most important principles of privacy. We deduce the relevant privacy requirements that should be integrated in existing security policy models, such as RBAC models. We suggest the application of a unique model for both access control and privacy requirements. Thus, an access control model is to be enriched with new access constraints and parameters, namely the privacy contexts, which should implement the consent and the notification concepts. For this purpose, we introduce the privacy-aware Organisation role Based Access Control (OrBAC) model. The administration of this new model is significantly different from previous models. Three cases are identified. First, the privacy policy may be defined by the data collector but data owners have the possibility to set their preferences through a contracted Service Level Agreement (SLA). Second, the administration model allows legal organisations, for legal purposes, to impose their needs by bypassing user's preferences. Third, we present the case of a privacy policy which is negotiated between the data collector and the requestor based on user's preferences, defined in the SLA. Overall, our proposal is a distributed administration of privacy policies. Focusing on Location Based Services (LBSs), we finally propose a complete privacy framework ready to be deployed in information systems. We use the model prototype to adapt our solution to cellular networks when the requesters are the service providers. This prototype uses parlay gateways with web services. We also extend the set of Parlay X gateway standardised web services by proposing a dedicated privacy web service to enforce privacy protection
Du, Jing. "Privacy protection in location-based applications". HKBU Institutional Repository, 2007. http://repository.hkbu.edu.hk/etd_ra/816.
Pełny tekst źródłaKsiążki na temat "Privicy protection"
Blume, Peter. Protection of informational privacy. Copenhagen: DJØF Pub., 2002.
Znajdź pełny tekst źródłaSouth African Law Reform Commission. Privacy and data protection. [Pretoria: South African Law Reform Commission], 2003.
Znajdź pełny tekst źródłaSouth African Law Reform Commission. Privacy and data protection. Pretoria: South African Law Reform Commission, 2005.
Znajdź pełny tekst źródłaSaad, Abdul Raman. Personal data & privacy protection. Kelana Jaya, Selangor, Malaysia: Malayan Law Journal Sdn. Bhd., 2005.
Znajdź pełny tekst źródłaSmiley, Sophie. Protecting our privacy. Cambridge: Independence, 2004.
Znajdź pełny tekst źródłaRodrigues, Rowena, i Vagelis Papakonstantinou, red. Privacy and Data Protection Seals. The Hague: T.M.C. Asser Press, 2018. http://dx.doi.org/10.1007/978-94-6265-228-6.
Pełny tekst źródłaA, Caloyannides Michael, red. Privacy protection and computer forensics. Wyd. 2. Boston: Artech House, 2004.
Znajdź pełny tekst źródłaKuschewsky, Monika. Data protection & privacy: Jurisdictional comparisons. London: Thomson Reuters, 2014.
Znajdź pełny tekst źródłaGeorge, Yee, red. Privacy protection for e-services. Hershey PA: Idea Group Pub., 2006.
Znajdź pełny tekst źródłaBainbridge, David I. Data protection. Welwvyn Garden City: CLT Professional Pub., 2000.
Znajdź pełny tekst źródłaCzęści książek na temat "Privicy protection"
Weik, Martin H. "privacy protection". W Computer Science and Communications Dictionary, 1334. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_14678.
Pełny tekst źródłaHallinan, Dara, i Paul de Hert. "Genetic Classes and Genetic Categories: Protecting Genetic Groups Through Data Protection Law". W Group Privacy, 175–96. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46608-8_10.
Pełny tekst źródłaChaudhuri, Arijit, i Tasos C. Christofides. "Protection of Privacy". W Indirect Questioning in Sample Surveys, 151–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36276-7_7.
Pełny tekst źródłaGulzar, Nikki, Basra Abbasi, Eddie Wu, Anil Ozbal i WeiQi Yan. "Surveillance Privacy Protection". W Intelligent Multimedia Surveillance, 83–105. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41512-8_5.
Pełny tekst źródłaHung, Patrick C. K., Marcelo Fantinato i Jorge Roa. "Children Privacy Protection". W Encyclopedia of Computer Graphics and Games, 1–3. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-08234-9_198-1.
Pełny tekst źródłaHung, Patrick C. K., Marcelo Fantinato i Jorge Roa. "Children Privacy Protection". W Encyclopedia of Computer Graphics and Games, 293–95. Cham: Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-23161-2_198.
Pełny tekst źródłaPoikela, Maija Elina. "Privacy Protection Behaviour". W T-Labs Series in Telecommunication Services, 109–29. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34171-8_7.
Pełny tekst źródłaChaudhuri, Arijit, Sanghamitra Pal i Dipika Patra. "Protection of Privacy". W Randomized Response Techniques, 119–38. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9669-8_7.
Pełny tekst źródłaTang, Alan. "Workforce Data Protection". W Privacy in Practice, 329–61. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003225089-29.
Pełny tekst źródłaStahl, Bernd Carsten, Doris Schroeder i Rowena Rodrigues. "Privacy". W Ethics of Artificial Intelligence, 25–37. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17040-9_3.
Pełny tekst źródłaStreszczenia konferencji na temat "Privicy protection"
Rezer, Tatiana. "Privacy Right as A Personal Value in an Information Society". W The Public/Private in Modern Civilization, the 22nd Russian Scientific-Practical Conference (with international participation) (Yekaterinburg, April 16-17, 2020). Liberal Arts University – University for Humanities, Yekaterinburg, 2020. http://dx.doi.org/10.35853/ufh-public/private-2020-76.
Pełny tekst źródłaYe, Mengmei, Zhongze Tang, Huy Phan, Yi Xie, Bo Yuan i Sheng Wei. "Visual privacy protection in mobile image recognition using protective perturbation". W MMSys '22: 13th ACM Multimedia Systems Conference. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3524273.3528189.
Pełny tekst źródłaSrinivasan, S. "Privacy Protection and Data Breaches". W InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2261.
Pełny tekst źródła"Place Determinants for the Personalization-Privacy Tradeoff among Students". W InSITE 2018: Informing Science + IT Education Conferences: La Verne California. Informing Science Institute, 2018. http://dx.doi.org/10.28945/4069.
Pełny tekst źródłaChhetri, Chola, i Vivian Genaro Motti. "Privacy Concerns about Smart Home Devices: A Comparative Analysis between Non-Users and Users". W 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002207.
Pełny tekst źródłaBennett, Colin, i Smith Oduro-Marfo. "GLOBAL Privacy Protection". W UbiComp '18: The 2018 ACM International Joint Conference on Pervasive and Ubiquitous Computing. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3267305.3274149.
Pełny tekst źródłaKarunagaran, Surya, Saji K. Mathew i Franz Lehner. "Privacy Protection Dashboard". W SIGMIS-CPR '17: Computers and People Research Conference. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3084381.3084424.
Pełny tekst źródłaLi, Chau Yi, Ali Shahin Shamsabadi, Ricardo Sanchez-Matilla, Riccardo Mazzon i Andrea Cavallaro. "Scene Privacy Protection". W ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2019. http://dx.doi.org/10.1109/icassp.2019.8682225.
Pełny tekst źródłaZhao, Fangyuan, Xuebin Ren, Shusen Yang i Xinyu Yang. "On Privacy Protection of Latent Dirichlet Allocation Model Training". W Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/675.
Pełny tekst źródłaMatveev, Artem. "Cost-Efficient Data Privacy Protection in Multi Cloud Storage". W 3rd International Conference on Data Mining and Machine Learning (DMML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120706.
Pełny tekst źródłaRaporty organizacyjne na temat "Privicy protection"
Plesser, Ronald L., i Emilio W. Cividanes. Privacy protection in the United States:. Gaithersburg, MD: National Institute of Standards and Technology, 1992. http://dx.doi.org/10.6028/nist.ir.4781.
Pełny tekst źródłaChang, LiWu, i Ira A. Moskowitz. An Integrated Framework for Database Privacy Protection. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2001. http://dx.doi.org/10.21236/ada465125.
Pełny tekst źródłaRiyadi, Gliddheo. Data Privacy in the Indonesian Personal Data Protection Legislation. Jakarta, Indonesia: Center for Indonesian Policy Studies, 2021. http://dx.doi.org/10.35497/341482.
Pełny tekst źródłaHasty, III, i Thomas J. Protection of Personal Privacy Interests under the Freedom of Information Act. Fort Belvoir, VA: Defense Technical Information Center, czerwiec 1991. http://dx.doi.org/10.21236/ada242183.
Pełny tekst źródłaLunt, Teresa, Paul Aoki, Dirk Balfanz, Glenn Durfee, Philippe Golle, Diana Smetters, Jessica Staddon, Jim Thornton i Tomas Uribe. Protecting the Privacy of Individuals in Terrorist Tracking Applications. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 2005. http://dx.doi.org/10.21236/ada433707.
Pełny tekst źródłaBuillamon, Bernardo. Risk Mitigation as a Cost-Effective Microfinance Strategy: Case Study IDB-Peru Global Micro-Enterprise Credit Program. Inter-American Development Bank, marzec 2000. http://dx.doi.org/10.18235/0008670.
Pełny tekst źródłaRothstein, M. A. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Office of Scientific and Technical Information (OSTI), lipiec 1998. http://dx.doi.org/10.2172/656488.
Pełny tekst źródłaVaz, Maria João, i Helena Machado. A systematic literature review of Big Data in tourism industry: a state of the art and future directions. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, maj 2022. http://dx.doi.org/10.37766/inplasy2022.5.0012.
Pełny tekst źródłaAbdul Hamid, Umar Zakir. Privacy for Software-defined Battery Electric Vehicles. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, czerwiec 2024. http://dx.doi.org/10.4271/epr2024012.
Pełny tekst źródłaRothstein, M. A. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report. Office of Scientific and Technical Information (OSTI), wrzesień 1998. http://dx.doi.org/10.2172/656499.
Pełny tekst źródła