Artigos de revistas sobre o tema "Privicy protection"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Privicy protection".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Xie, Guangxu, Gaopan Hou, Qingqi Pei e Haibo Huang. "Lightweight Privacy Protection via Adversarial Sample". Electronics 13, n.º 7 (26 de março de 2024): 1230. http://dx.doi.org/10.3390/electronics13071230.
Texto completo da fonteBonomi, Luca, Xiaoqian Jiang e Lucila Ohno-Machado. "Protecting patient privacy in survival analyses". Journal of the American Medical Informatics Association 27, n.º 3 (21 de novembro de 2019): 366–75. http://dx.doi.org/10.1093/jamia/ocz195.
Texto completo da fonteZhenjiang Zhang, Zhenjiang Zhang, e Xiaohua Liu Zhenjiang Zhang. "Cloud-side Collaborative Privacy Protection Based on Differential Privacy". 電腦學刊 32, n.º 4 (agosto de 2021): 239–51. http://dx.doi.org/10.53106/199115992021083204019.
Texto completo da fonteMeier, Yannic, Johanna Schäwel e Nicole C. Krämer. "Between protection and disclosure: applying the privacy calculus to investigate the intended use of privacy-protecting tools and self-disclosure on different websites". Studies in Communication and Media 10, n.º 3 (2021): 283–306. http://dx.doi.org/10.5771/2192-4007-2021-3-283.
Texto completo da fonteNussy, Jennifer Ingelyne. "Mekanisme Komisi Pemberantasan Korupsi dalam Proses Penyadapan dilihat dari Perspektif Hak Asasi Manusia (HAM)". JURNAL BELO 5, n.º 2 (19 de maio de 2020): 74–85. http://dx.doi.org/10.30598/belobelovol5issue2page74-85.
Texto completo da fonteNussy, Jennifer Ingelyne. "Mekanisme Komisi Pemberantasan Korupsi dalam Proses Penyadapan dilihat dari Perspektif Hak Asasi Manusia (HAM)". JURNAL BELO 5, n.º 2 (19 de maio de 2020): 74–85. http://dx.doi.org/10.30598/belovol5issue2page74-85.
Texto completo da fonteCorones, Stephen, e Juliet Davis. "Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions". Federal Law Review 45, n.º 1 (março de 2017): 65–95. http://dx.doi.org/10.1177/0067205x1704500104.
Texto completo da fonteSingla, Arun. "The Evolving Landscape of Privacy Law: Balancing Digital Innovation and Individual Rights". Indian Journal of Law 2, n.º 1 (2024): 1–6. http://dx.doi.org/10.36676/ijl.v2.i1.01.
Texto completo da fonteChen, Zhixuan, Yixiang Zhang e Zhiyu Zhang. "Research on Privacy Protection Willingness of New Media Platform Users Based on Theory of Planned Behavior". Communications in Humanities Research 16, n.º 1 (28 de novembro de 2023): 264–71. http://dx.doi.org/10.54254/2753-7064/16/20230726.
Texto completo da fonteNahra, Kirk J. "Remarks by Kirk J. Nahra". Proceedings of the ASIL Annual Meeting 116 (2022): 127–29. http://dx.doi.org/10.1017/amp.2023.65.
Texto completo da fonteNissim, Kobbi, e Alexandra Wood. "Is privacy privacy ?" Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 376, n.º 2128 (6 de agosto de 2018): 20170358. http://dx.doi.org/10.1098/rsta.2017.0358.
Texto completo da fonteColangelo, Giuseppe, e Mariateresa Maggiolino. "Data Protection in Attention Markets: Protecting Privacy through Competition?" Journal of European Competition Law & Practice 8, n.º 6 (10 de maio de 2017): 363–69. http://dx.doi.org/10.1093/jeclap/lpx037.
Texto completo da fonteCui, Mingwu, Fangfang Ding e Kun Cai. "The Influence of Self-Efficacy of College Students in Privacy Protection and Behavior in Social Networking Context". Scientific and Social Research 6, n.º 3 (29 de março de 2024): 126–43. http://dx.doi.org/10.26689/ssr.v6i3.6445.
Texto completo da fonteDales, Loring. "Privacy Protection". Pediatrics 107, n.º 6 (1 de junho de 2001): 1495.2–1495. http://dx.doi.org/10.1542/peds.107.6.1495b.
Texto completo da fonteBransfield, Robert. "Privacy ‘Protection’". Psychiatric News 37, n.º 17 (6 de setembro de 2002): 32. http://dx.doi.org/10.1176/pn.37.17.0032.
Texto completo da fonteRotenberg, Marc. "Privacy protection". Government Information Quarterly 11, n.º 3 (janeiro de 1994): 253–54. http://dx.doi.org/10.1016/0740-624x(94)90045-0.
Texto completo da fonteQin, Peng, e Lina Wang. "PPVC: Towards a Personalized Local Differential Privacy-Preserving Scheme for V2G Charging Networks". Mathematics 11, n.º 20 (12 de outubro de 2023): 4257. http://dx.doi.org/10.3390/math11204257.
Texto completo da fonteJia, Dongning, Bo Yin e Xianqing Huang. "Association Analysis of Private Information in Distributed Social Networks Based on Big Data". Wireless Communications and Mobile Computing 2021 (4 de junho de 2021): 1–12. http://dx.doi.org/10.1155/2021/1181129.
Texto completo da fonteRothstein, Mark A. "Currents in Contemporary Ethics". Journal of Law, Medicine & Ethics 33, n.º 1 (2005): 154–59. http://dx.doi.org/10.1111/j.1748-720x.2005.tb00217.x.
Texto completo da fonteBamberger, Kenneth A., e Ariel Evan Mayse. "PRE-MODERN INSIGHTS FOR POST-MODERN PRIVACY: JEWISH LAW LESSONS FOR THE BIG DATA AGE". Journal of Law and Religion 36, n.º 3 (dezembro de 2021): 495–532. http://dx.doi.org/10.1017/jlr.2021.90.
Texto completo da fonteBaruh, Lemi, e Mihaela Popescu. "Big data analytics and the limits of privacy self-management". New Media & Society 19, n.º 4 (2 de novembro de 2015): 579–96. http://dx.doi.org/10.1177/1461444815614001.
Texto completo da fonteZhang, Jing, Yanzi Li, Qian Ding, Liwei Lin e Xiucai Ye. "Successive Trajectory Privacy Protection with Semantics Prediction Differential Privacy". Entropy 24, n.º 9 (23 de agosto de 2022): 1172. http://dx.doi.org/10.3390/e24091172.
Texto completo da fonteIslam, Md Toriqul. "ADEQUACY OF PRIVACY REGIME IN BANGLADESH: KEY CHALLENGES AND POTENTIAL POLICY MEASURES". IIUM Law Journal 30, n.º 1 (7 de julho de 2022): 33–74. http://dx.doi.org/10.31436/iiumlj.v30i1.655.
Texto completo da fonteWang, Weiyuan. "Legal Effect of Internet Privacy Policy". Journal of Education, Humanities and Social Sciences 28 (1 de abril de 2024): 126–33. http://dx.doi.org/10.54097/zjz34p19.
Texto completo da fonteKumar, Krishan, Mukesh Kumar Gupta, Nishant Saxena e Vivek Jaglan. "Homomorphic Encryption Based Privacy Protection for Personalised Web Search". Indian Journal of Science and Technology 15, n.º 8 (27 de fevereiro de 2022): 318–25. http://dx.doi.org/10.17485/ijst/v15i8.44.
Texto completo da fonteSerwin, Andrew. "Privacy 3.0-The Principle of Proportionality". University of Michigan Journal of Law Reform, n.º 42.4 (2009): 869. http://dx.doi.org/10.36646/mjlr.42.4.privacy.
Texto completo da fonteQiu, Ke. "A secure system for electric vehicle battery swap stations using blockchain". Applied and Computational Engineering 16, n.º 1 (23 de outubro de 2023): 13–26. http://dx.doi.org/10.54254/2755-2721/16/20230851.
Texto completo da fonteHao, Li Ping, e Yi Hui Chen. "Research on the Cloud Computing Storage Privacy Preserving Based on MB-Tree Dynamic Access Model". Applied Mechanics and Materials 513-517 (fevereiro de 2014): 2350–54. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2350.
Texto completo da fonteYan, Liang, Lei Li, Xuejiao Mu, Hao Wang, Xian Chen e Hyoseop Shin. "Differential Privacy Preservation for Location Semantics". Sensors 23, n.º 4 (13 de fevereiro de 2023): 2121. http://dx.doi.org/10.3390/s23042121.
Texto completo da fonteGrandison, Tyrone, e Rafae Bhatti. "Regulatory Compliance and the Correlation to Privacy Protection in Healthcare". International Journal of Computational Models and Algorithms in Medicine 1, n.º 2 (abril de 2010): 37–52. http://dx.doi.org/10.4018/jcmam.2010040103.
Texto completo da fonteWang, Yijing, Jingyi Zhang e Lupeng Zhang. "Analysis of Users Balance Between Private and Public -- One Case from the TikTok". Communications in Humanities Research 12, n.º 1 (20 de novembro de 2023): 146–60. http://dx.doi.org/10.54254/2753-7064/12/20230070.
Texto completo da fonteWang, Pingshui, Jianwen Zhu e Qinjuan Ma. "Private Data Protection in Social Networks Based on Blockchain". International Journal of Advanced Networking and Applications 14, n.º 04 (2023): 5549–55. http://dx.doi.org/10.35444/ijana.2023.14407.
Texto completo da fonteZostant, Maxwell, e Robin Chataut. "Privacy in computer ethics: Navigating the digital age". Computer Science and Information Technologies 4, n.º 2 (1 de julho de 2023): 183–90. http://dx.doi.org/10.11591/csit.v4i2.p183-190.
Texto completo da fonteZostant, Maxwell, e Robin Chataut. "Privacy in computer ethics: Navigating the digital age". Computer Science and Information Technologies 4, n.º 2 (1 de julho de 2023): 183–90. http://dx.doi.org/10.11591/csit.v4i2.pp183-190.
Texto completo da fonteGhorashi, Seyed Ramin, Tanveer Zia, Michael Bewong e Yinhao Jiang. "An Analytical Review of Industrial Privacy Frameworks and Regulations for Organisational Data Sharing". Applied Sciences 13, n.º 23 (27 de novembro de 2023): 12727. http://dx.doi.org/10.3390/app132312727.
Texto completo da fonteAltman, Micah, e Aloni Cohen. "Natural differential privacy—a perspective on protection guarantees". PeerJ Computer Science 9 (28 de setembro de 2023): e1576. http://dx.doi.org/10.7717/peerj-cs.1576.
Texto completo da fonteLi, Yijing, Ran Bi, Nan Jiang, Fengqiu Li, Mingsi Wang e Xiangping Jing. "Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular Networks". Electronics 13, n.º 12 (17 de junho de 2024): 2372. http://dx.doi.org/10.3390/electronics13122372.
Texto completo da fonteAllahRakha, Naeem. "Constitutional Safeguards for Digital Rights and Privacy". International Journal of Law and Policy 2, n.º 4 (30 de abril de 2024): 31–43. http://dx.doi.org/10.59022/ijlp.172.
Texto completo da fonteBhandari, Vrinda, e Renuka Sane. "Protecting citizens from the state post Puttaswamy: Analysing the privacy implications of the Justice Shrikrishna Committee Report and the Data Protection Bill, 2018". Socio-Legal Review 14, n.º 2 (janeiro de 2018): 143. http://dx.doi.org/10.55496/uuiz9934.
Texto completo da fonteChukwunonso Aloamaka, Patrick. "Effective Data Protection in Nigeria: Challenges". Commonwealth Law Review Journal 08 (2022): 656–62. http://dx.doi.org/10.55662/clrj.2022.811.
Texto completo da fonteA. Razon, Arvin Kristopher. "Are Narco-Lists Covered by the Philippine Law on Privacy?: Exploring the Limits of the ‘Classic’ Right to Privacy and Applying a Constitutionally Grounded Data Protection Right". Global Privacy Law Review 2, Issue 1 (1 de fevereiro de 2021): 44–58. http://dx.doi.org/10.54648/gplr2021006.
Texto completo da fonteYang, Xuechao, Xun Yi, Andrei Kelarev, Leanne Rylands, Yuqing Lin e Joe Ryan. "Protecting Private Information for Two Classes of Aggregated Database Queries". Informatics 9, n.º 3 (5 de setembro de 2022): 66. http://dx.doi.org/10.3390/informatics9030066.
Texto completo da fonteKrishnamurthy, Vivek. "A Tale of Two Privacy Laws: The GDPR and the International Right to Privacy". AJIL Unbound 114 (2020): 26–30. http://dx.doi.org/10.1017/aju.2019.79.
Texto completo da fontePanvelwala, Fatema, e Archana G. "Data Protection Guidelines for Protecting Privacy of Users on Social Media". International Journal of Computer Applications 182, n.º 2 (16 de julho de 2018): 7–12. http://dx.doi.org/10.5120/ijca2018917449.
Texto completo da fonteKohl, Uta. "THE RIGHT TO BE FORGOTTEN IN DATA PROTECTION LAW AND TWO WESTERN CULTURES OF PRIVACY". International and Comparative Law Quarterly 72, n.º 3 (julho de 2023): 737–69. http://dx.doi.org/10.1017/s0020589323000258.
Texto completo da fonteZhang, Xiangfei, Feng Yang, Yu Guo, Hang Yu, Zhengxia Wang e Qingchen Zhang. "Adaptive Differential Privacy Mechanism Based on Entropy Theory for Preserving Deep Neural Networks". Mathematics 11, n.º 2 (8 de janeiro de 2023): 330. http://dx.doi.org/10.3390/math11020330.
Texto completo da fonteZhou, Leming, e Bambang Parmanto. "User Preferences for Privacy Protection Methods in Mobile Health Apps: A Mixed-Methods Study". International Journal of Telerehabilitation 12, n.º 2 (8 de dezembro de 2020): 13–26. http://dx.doi.org/10.5195/ijt.2020.6319.
Texto completo da fonteSundaram, Ranjany, e Snehal Shetty. "Privacy concerns and protection behavior during the Covid-19 pandemic". Problems and Perspectives in Management 20, n.º 2 (20 de abril de 2022): 57–70. http://dx.doi.org/10.21511/ppm.20(2).2022.06.
Texto completo da fonteKravchuk, V. "Foreign experience of personal data protection in social networks". Uzhhorod National University Herald. Series: Law 2, n.º 78 (31 de agosto de 2023): 49–53. http://dx.doi.org/10.24144/2307-3322.2023.78.2.7.
Texto completo da fonteWang, Yanbing. "Privacy Protection of Public Figures in China—The Case of Yundi Li’s Prostitution". Studies in Law and Justice 2, n.º 2 (junho de 2023): 109–17. http://dx.doi.org/10.56397/slj.2023.06.15.
Texto completo da fonte