Literatura científica selecionada sobre o tema "Privicy protection"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Índice
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Privicy protection".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Privicy protection"
Xie, Guangxu, Gaopan Hou, Qingqi Pei e Haibo Huang. "Lightweight Privacy Protection via Adversarial Sample". Electronics 13, n.º 7 (26 de março de 2024): 1230. http://dx.doi.org/10.3390/electronics13071230.
Texto completo da fonteBonomi, Luca, Xiaoqian Jiang e Lucila Ohno-Machado. "Protecting patient privacy in survival analyses". Journal of the American Medical Informatics Association 27, n.º 3 (21 de novembro de 2019): 366–75. http://dx.doi.org/10.1093/jamia/ocz195.
Texto completo da fonteZhenjiang Zhang, Zhenjiang Zhang, e Xiaohua Liu Zhenjiang Zhang. "Cloud-side Collaborative Privacy Protection Based on Differential Privacy". 電腦學刊 32, n.º 4 (agosto de 2021): 239–51. http://dx.doi.org/10.53106/199115992021083204019.
Texto completo da fonteMeier, Yannic, Johanna Schäwel e Nicole C. Krämer. "Between protection and disclosure: applying the privacy calculus to investigate the intended use of privacy-protecting tools and self-disclosure on different websites". Studies in Communication and Media 10, n.º 3 (2021): 283–306. http://dx.doi.org/10.5771/2192-4007-2021-3-283.
Texto completo da fonteNussy, Jennifer Ingelyne. "Mekanisme Komisi Pemberantasan Korupsi dalam Proses Penyadapan dilihat dari Perspektif Hak Asasi Manusia (HAM)". JURNAL BELO 5, n.º 2 (19 de maio de 2020): 74–85. http://dx.doi.org/10.30598/belobelovol5issue2page74-85.
Texto completo da fonteNussy, Jennifer Ingelyne. "Mekanisme Komisi Pemberantasan Korupsi dalam Proses Penyadapan dilihat dari Perspektif Hak Asasi Manusia (HAM)". JURNAL BELO 5, n.º 2 (19 de maio de 2020): 74–85. http://dx.doi.org/10.30598/belovol5issue2page74-85.
Texto completo da fonteCorones, Stephen, e Juliet Davis. "Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions". Federal Law Review 45, n.º 1 (março de 2017): 65–95. http://dx.doi.org/10.1177/0067205x1704500104.
Texto completo da fonteSingla, Arun. "The Evolving Landscape of Privacy Law: Balancing Digital Innovation and Individual Rights". Indian Journal of Law 2, n.º 1 (2024): 1–6. http://dx.doi.org/10.36676/ijl.v2.i1.01.
Texto completo da fonteChen, Zhixuan, Yixiang Zhang e Zhiyu Zhang. "Research on Privacy Protection Willingness of New Media Platform Users Based on Theory of Planned Behavior". Communications in Humanities Research 16, n.º 1 (28 de novembro de 2023): 264–71. http://dx.doi.org/10.54254/2753-7064/16/20230726.
Texto completo da fonteNahra, Kirk J. "Remarks by Kirk J. Nahra". Proceedings of the ASIL Annual Meeting 116 (2022): 127–29. http://dx.doi.org/10.1017/amp.2023.65.
Texto completo da fonteTeses / dissertações sobre o assunto "Privicy protection"
Maifada, Magoudani Mahamadou. "Construire et mettre en œuvre un droit des données personnelles dans l’espace UEMOA : étude comparée à partir des cas du Burkina Faso, de la Côte d’Ivoire, du Niger et du Sénégal à la lumière du droit français et européen". Electronic Thesis or Diss., Paris 12, 2023. http://www.theses.fr/2023PA120073.
Texto completo da fonteThis thesis provides an in-depth analysis of the legal framework surrounding the protection of personal data within the West African Economic and Monetary Union (WAEMU), specifically focusing on Burkina Faso, Côte d'Ivoire, Niger, and Senegal – the areas under study. It delves into the motivations that led these states to adopt specific legislations influenced by foreign models, notably the French model of the "Loi Informatique et Libertés," rather than relying on national or community references.This analysis explores the development process of these regulations, from legislative evolution to international institutions' initiatives. Special attention is given to the influence of the International Organization of La Francophonie (IOF) and the French Commission for Data Protection (Commission de l'Informatique et des Libertés) in promoting the initial national legislations within this region.Furthermore, the thesis conducts a detailed comparison between the existing regulations within WAEMU and the European Union's General Data Protection Regulation (GDPR). This comparison highlights significant similarities and differences, particularly concerning the scope of application, stakeholders' responsibilities, and the rights of the individuals concerned.Moreover, the study examines the practical implementation of these regulations, focusing on key actors, including regulatory authorities, data controllers, Civil Society Organizations (CSOs), and data subjects in each state. It analyzes the challenges faced by regulatory authorities and cooperation policies aimed at enhancing the effectiveness of personal data rights.Finally, the thesis explores the limitations of personal data rights, particularly in their interaction with public policies in the telecommunications sector and the issues related to cybercrime.Overall, this work offers a comprehensive and nuanced perspective on personal data rights within WAEMU, shedding light on the motivations, achievements, challenges, and prospects in the ever-evolving African legal context. It constitutes a significant contribution to the understanding of personal data protection in the African legal context
Sallaku, Redlon <1994>. "Privacy and Protecting Privacy: Using Static Analysis for legal compliance. General Data Protection Regulation". Master's Degree Thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/14682.
Texto completo da fonteLi, Min. "Privacy Protection on Cloud Computing". VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3844.
Texto completo da fonteXu, Wanxin. "AFFECT-PRESERVING VISUAL PRIVACY PROTECTION". UKnowledge, 2018. https://uknowledge.uky.edu/ece_etds/122.
Texto completo da fonteWinkler, Stephanie D. "Protecting Online Privacy". UKnowledge, 2016. http://uknowledge.uky.edu/comm_etds/47.
Texto completo da fonteGunnarsson, Annicka, e Siri Ekberg. "Invasion of Privacy : Spam - one result of bad privacy protection". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5393.
Texto completo da fonteMatusek, F. (Florian). "Selective privacy protection for video surveillance". Doctoral thesis, Oulun yliopisto, 2014. http://urn.fi/urn:isbn:9789526204154.
Texto completo da fonteTiivistelmä Videovalvonnassa on tapahtunut viime vuosina merkittävää kasvua johtuen järkyttävistä tapahtumista kuten terrori-iskut, pankkiryöstöt ja järjestäytyneen rikollisuuden toimet. Videovalvontateknologia on kehittynyt merkittävästi mahdollistaen jopa yksittäisten ihmisten automaattisen seurannan. Turvallisuuden lisääntymisen katsotaan kuitenkin vähentäneen yksityisyyttä. Videovalvonnan avulla ihmisiä pystytään seuraamaan helpommin kuin koskaan aikaisemmin tunkeutuen täten heidän yksityisyytensä alueelle. On oletettu, että turvallisuus ja yksityisyys videovalvonnassa on nollasummapeliä, jossa kansalaisten on valittava yksityisyyden ja turvallisuuden välillä. Tämä tutkimus perustuu olettamukseen, että edellä esitetty ei pidä paikkaansa, vaan että on mahdollista suojata yksityisyys samalla taaten täysi turvallisuus. Ratkaisua tähän ongelmaan etsittiin suunnittelutieteellisen tutkimuksen avulla. Työssä suunniteltiin ja toteutettiin videovalvontajärjestelmä PEVS (Privacy Enhancing Video Surveillance system), joka suojaa valvonnanalaisten sivullisten yksityisyyttä ja siitä huolimatta tuottaa korkean turvallisuustason.. PEVS suojaa henkilöiden yksityisyyttä salaamalla automaattisesti videoaineistosta ne kuva-alat, joissa esiintyy ihmisiä. Mikäli laitonta toimintaa havaittaisiin, olisi riittävillä käyttöoikeuksilla mahdollista purkaa salaus mielenkiinnon kohteena olevien henkilöiden kohdalta tilanteen analysoimiseksi. Tämä mahdollisti yhtäältä puuttumattomuuden sivullisten yksityisyyteen ja toisaalta tiedon käyttämisen todistusaineistona mahdollisen rikoksen tutkimisessa. Tällä järjestelmällä yksityisyys oli mahdollista suojata samanaikaisesti, kun turvallisuudesta huolehdittiin. PEVS mahdollisti ensimmäistä kertaa maailmassa videovalvonnan, joka näyttää vain relevantit henkilöt jättäen muiden henkilöllisyyden paljastamatta. Sen takia tämän tutkimuksen merkittävin kontribuutio oli uudenlaisen lähestymistavan kehittäminen videovalvontaan, joka kykenee valikoivasti suojelemaan ihmisten yksityisyyttä. Tämä ratkaisu sisältää yksityisyyden suojaavan, useita rakenneosia sisältävän videovalvontajärjestelmäarkkitehtuurin esittelyn. Rakenneosiin kuuluu yksityisen tiedon tallennusmenetelmiä ja varjontunnistus- ja segmentointimetodeja, jotka paransivat aiemmin käytettyjen metodien tarkkuutta ja nopeutta. Lisäksi esiteltiin uudenlainen turvallisuus- ja yksityisyysmetriikka videovalvonnalle. Toteutettu järjestelmä on huomattava lisäys nykytietämykseen, jossa yksityisyyden suojan osalta on otettu vasta ensiaskelia ja joka ei mahdollista kattavaa järjestelmää
Chaudhari, Jayashri S. "Privacy Protection for Life-log System". UKnowledge, 2007. http://uknowledge.uky.edu/gradschool_theses/491.
Texto completo da fonteAjam, Nabil. "Privacy protection for location-based services". Télécom Bretagne, 2010. http://www.theses.fr/2010TELB0124.
Texto completo da fonteIn this dissertation, we propose the expression and the modelling of the most important principles of privacy. We deduce the relevant privacy requirements that should be integrated in existing security policy models, such as RBAC models. We suggest the application of a unique model for both access control and privacy requirements. Thus, an access control model is to be enriched with new access constraints and parameters, namely the privacy contexts, which should implement the consent and the notification concepts. For this purpose, we introduce the privacy-aware Organisation role Based Access Control (OrBAC) model. The administration of this new model is significantly different from previous models. Three cases are identified. First, the privacy policy may be defined by the data collector but data owners have the possibility to set their preferences through a contracted Service Level Agreement (SLA). Second, the administration model allows legal organisations, for legal purposes, to impose their needs by bypassing user's preferences. Third, we present the case of a privacy policy which is negotiated between the data collector and the requestor based on user's preferences, defined in the SLA. Overall, our proposal is a distributed administration of privacy policies. Focusing on Location Based Services (LBSs), we finally propose a complete privacy framework ready to be deployed in information systems. We use the model prototype to adapt our solution to cellular networks when the requesters are the service providers. This prototype uses parlay gateways with web services. We also extend the set of Parlay X gateway standardised web services by proposing a dedicated privacy web service to enforce privacy protection
Du, Jing. "Privacy protection in location-based applications". HKBU Institutional Repository, 2007. http://repository.hkbu.edu.hk/etd_ra/816.
Texto completo da fonteLivros sobre o assunto "Privicy protection"
Blume, Peter. Protection of informational privacy. Copenhagen: DJØF Pub., 2002.
Encontre o texto completo da fonteSouth African Law Reform Commission. Privacy and data protection. [Pretoria: South African Law Reform Commission], 2003.
Encontre o texto completo da fonteSouth African Law Reform Commission. Privacy and data protection. Pretoria: South African Law Reform Commission, 2005.
Encontre o texto completo da fonteSaad, Abdul Raman. Personal data & privacy protection. Kelana Jaya, Selangor, Malaysia: Malayan Law Journal Sdn. Bhd., 2005.
Encontre o texto completo da fonteSmiley, Sophie. Protecting our privacy. Cambridge: Independence, 2004.
Encontre o texto completo da fonteRodrigues, Rowena, e Vagelis Papakonstantinou, eds. Privacy and Data Protection Seals. The Hague: T.M.C. Asser Press, 2018. http://dx.doi.org/10.1007/978-94-6265-228-6.
Texto completo da fonteA, Caloyannides Michael, ed. Privacy protection and computer forensics. 2a ed. Boston: Artech House, 2004.
Encontre o texto completo da fonteKuschewsky, Monika. Data protection & privacy: Jurisdictional comparisons. London: Thomson Reuters, 2014.
Encontre o texto completo da fonteGeorge, Yee, ed. Privacy protection for e-services. Hershey PA: Idea Group Pub., 2006.
Encontre o texto completo da fonteBainbridge, David I. Data protection. Welwvyn Garden City: CLT Professional Pub., 2000.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Privicy protection"
Weik, Martin H. "privacy protection". In Computer Science and Communications Dictionary, 1334. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_14678.
Texto completo da fonteHallinan, Dara, e Paul de Hert. "Genetic Classes and Genetic Categories: Protecting Genetic Groups Through Data Protection Law". In Group Privacy, 175–96. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46608-8_10.
Texto completo da fonteChaudhuri, Arijit, e Tasos C. Christofides. "Protection of Privacy". In Indirect Questioning in Sample Surveys, 151–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36276-7_7.
Texto completo da fonteGulzar, Nikki, Basra Abbasi, Eddie Wu, Anil Ozbal e WeiQi Yan. "Surveillance Privacy Protection". In Intelligent Multimedia Surveillance, 83–105. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41512-8_5.
Texto completo da fonteHung, Patrick C. K., Marcelo Fantinato e Jorge Roa. "Children Privacy Protection". In Encyclopedia of Computer Graphics and Games, 1–3. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-08234-9_198-1.
Texto completo da fonteHung, Patrick C. K., Marcelo Fantinato e Jorge Roa. "Children Privacy Protection". In Encyclopedia of Computer Graphics and Games, 293–95. Cham: Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-23161-2_198.
Texto completo da fontePoikela, Maija Elina. "Privacy Protection Behaviour". In T-Labs Series in Telecommunication Services, 109–29. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34171-8_7.
Texto completo da fonteChaudhuri, Arijit, Sanghamitra Pal e Dipika Patra. "Protection of Privacy". In Randomized Response Techniques, 119–38. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9669-8_7.
Texto completo da fonteTang, Alan. "Workforce Data Protection". In Privacy in Practice, 329–61. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003225089-29.
Texto completo da fonteStahl, Bernd Carsten, Doris Schroeder e Rowena Rodrigues. "Privacy". In Ethics of Artificial Intelligence, 25–37. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17040-9_3.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Privicy protection"
Rezer, Tatiana. "Privacy Right as A Personal Value in an Information Society". In The Public/Private in Modern Civilization, the 22nd Russian Scientific-Practical Conference (with international participation) (Yekaterinburg, April 16-17, 2020). Liberal Arts University – University for Humanities, Yekaterinburg, 2020. http://dx.doi.org/10.35853/ufh-public/private-2020-76.
Texto completo da fonteYe, Mengmei, Zhongze Tang, Huy Phan, Yi Xie, Bo Yuan e Sheng Wei. "Visual privacy protection in mobile image recognition using protective perturbation". In MMSys '22: 13th ACM Multimedia Systems Conference. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3524273.3528189.
Texto completo da fonteSrinivasan, S. "Privacy Protection and Data Breaches". In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2261.
Texto completo da fonte"Place Determinants for the Personalization-Privacy Tradeoff among Students". In InSITE 2018: Informing Science + IT Education Conferences: La Verne California. Informing Science Institute, 2018. http://dx.doi.org/10.28945/4069.
Texto completo da fonteChhetri, Chola, e Vivian Genaro Motti. "Privacy Concerns about Smart Home Devices: A Comparative Analysis between Non-Users and Users". In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002207.
Texto completo da fonteBennett, Colin, e Smith Oduro-Marfo. "GLOBAL Privacy Protection". In UbiComp '18: The 2018 ACM International Joint Conference on Pervasive and Ubiquitous Computing. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3267305.3274149.
Texto completo da fonteKarunagaran, Surya, Saji K. Mathew e Franz Lehner. "Privacy Protection Dashboard". In SIGMIS-CPR '17: Computers and People Research Conference. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3084381.3084424.
Texto completo da fonteLi, Chau Yi, Ali Shahin Shamsabadi, Ricardo Sanchez-Matilla, Riccardo Mazzon e Andrea Cavallaro. "Scene Privacy Protection". In ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2019. http://dx.doi.org/10.1109/icassp.2019.8682225.
Texto completo da fonteZhao, Fangyuan, Xuebin Ren, Shusen Yang e Xinyu Yang. "On Privacy Protection of Latent Dirichlet Allocation Model Training". In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/675.
Texto completo da fonteMatveev, Artem. "Cost-Efficient Data Privacy Protection in Multi Cloud Storage". In 3rd International Conference on Data Mining and Machine Learning (DMML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120706.
Texto completo da fonteRelatórios de organizações sobre o assunto "Privicy protection"
Plesser, Ronald L., e Emilio W. Cividanes. Privacy protection in the United States:. Gaithersburg, MD: National Institute of Standards and Technology, 1992. http://dx.doi.org/10.6028/nist.ir.4781.
Texto completo da fonteChang, LiWu, e Ira A. Moskowitz. An Integrated Framework for Database Privacy Protection. Fort Belvoir, VA: Defense Technical Information Center, janeiro de 2001. http://dx.doi.org/10.21236/ada465125.
Texto completo da fonteRiyadi, Gliddheo. Data Privacy in the Indonesian Personal Data Protection Legislation. Jakarta, Indonesia: Center for Indonesian Policy Studies, 2021. http://dx.doi.org/10.35497/341482.
Texto completo da fonteHasty, III, e Thomas J. Protection of Personal Privacy Interests under the Freedom of Information Act. Fort Belvoir, VA: Defense Technical Information Center, junho de 1991. http://dx.doi.org/10.21236/ada242183.
Texto completo da fonteLunt, Teresa, Paul Aoki, Dirk Balfanz, Glenn Durfee, Philippe Golle, Diana Smetters, Jessica Staddon, Jim Thornton e Tomas Uribe. Protecting the Privacy of Individuals in Terrorist Tracking Applications. Fort Belvoir, VA: Defense Technical Information Center, abril de 2005. http://dx.doi.org/10.21236/ada433707.
Texto completo da fonteBuillamon, Bernardo. Risk Mitigation as a Cost-Effective Microfinance Strategy: Case Study IDB-Peru Global Micro-Enterprise Credit Program. Inter-American Development Bank, março de 2000. http://dx.doi.org/10.18235/0008670.
Texto completo da fonteRothstein, M. A. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Office of Scientific and Technical Information (OSTI), julho de 1998. http://dx.doi.org/10.2172/656488.
Texto completo da fonteVaz, Maria João, e Helena Machado. A systematic literature review of Big Data in tourism industry: a state of the art and future directions. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, maio de 2022. http://dx.doi.org/10.37766/inplasy2022.5.0012.
Texto completo da fonteAbdul Hamid, Umar Zakir. Privacy for Software-defined Battery Electric Vehicles. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, junho de 2024. http://dx.doi.org/10.4271/epr2024012.
Texto completo da fonteRothstein, M. A. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report. Office of Scientific and Technical Information (OSTI), setembro de 1998. http://dx.doi.org/10.2172/656499.
Texto completo da fonte