Статті в журналах з теми "Data and information privacy"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Data and information privacy".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Fletcher, Sam, and Md Zahidul Islam. "Measuring Information Quality for Privacy Preserving Data Mining." International Journal of Computer Theory and Engineering 7, no. 1 (February 2014): 21–28. http://dx.doi.org/10.7763/ijcte.2015.v7.924.
Повний текст джерелаGertner, Yael, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. "Protecting Data Privacy in Private Information Retrieval Schemes." Journal of Computer and System Sciences 60, no. 3 (June 2000): 592–629. http://dx.doi.org/10.1006/jcss.1999.1689.
Повний текст джерелаMihai Yiannaki, Simona, Lucia Gibilaro, and Gianluca Mattarocci. "Big data firms and information privacy." Global Business and Economics Review 25, no. 3/4 (2021): 355. http://dx.doi.org/10.1504/gber.2021.10042256.
Повний текст джерелаYiannaki, Simona Mihai, Lucia Gibilaro, and Gianluca Mattarocci. "Big data firms and information privacy." Global Business and Economics Review 25, no. 3/4 (2021): 355. http://dx.doi.org/10.1504/gber.2021.118713.
Повний текст джерелаAnderson, R. "Undermining data privacy in health information." BMJ 322, no. 7284 (February 24, 2001): 442–43. http://dx.doi.org/10.1136/bmj.322.7284.442.
Повний текст джерелаSuleiman, James, and Terry Huston. "Data Privacy and Security." International Journal of Information Security and Privacy 3, no. 2 (April 2009): 42–53. http://dx.doi.org/10.4018/jisp.2009040103.
Повний текст джерелаWhite, Garry L., Francis A. Méndez Mediavilla, and Jaymeen R. Shah. "Information Privacy." International Journal of Information Security and Privacy 5, no. 1 (January 2011): 50–66. http://dx.doi.org/10.4018/jisp.2011010104.
Повний текст джерелаAgrawal, Rakesh, and Ramakrishnan Srikant. "Privacy-preserving data mining." ACM SIGMOD Record 29, no. 2 (June 2000): 439–50. http://dx.doi.org/10.1145/335191.335438.
Повний текст джерелаWang, Ting, and Ling Liu. "Output privacy in data mining." ACM Transactions on Database Systems 36, no. 1 (March 2011): 1–34. http://dx.doi.org/10.1145/1929934.1929935.
Повний текст джерелаHu, Haibo, Jianliang Xu, Sai Tung On, Jing Du, and Joseph Kee-Yin Ng. "Privacy-aware location data publishing." ACM Transactions on Database Systems 35, no. 3 (July 2010): 1–42. http://dx.doi.org/10.1145/1806907.1806910.
Повний текст джерелаDu, Jiawen, and Yong Pi. "Research on Privacy Protection Technology of Mobile Social Network Based on Data Mining under Big Data." Security and Communication Networks 2022 (January 13, 2022): 1–9. http://dx.doi.org/10.1155/2022/3826126.
Повний текст джерелаMondal, Sutapa, Mangesh S. Gharote, and Sachin P. Lodha. "Privacy of Personal Information." Queue 20, no. 3 (June 30, 2022): 41–87. http://dx.doi.org/10.1145/3546934.
Повний текст джерелаVishnoi, Meenakshi, and Seeja K. R. "Privacy Preserving Data Mining using Attribute Encryption and Data Perturbation." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 6, no. 3 (May 25, 2013): 370–78. http://dx.doi.org/10.24297/ijct.v6i3.4461.
Повний текст джерелаLei Xu, Chunxiao Jiang, Jian Wang, Jian Yuan, and Yong Ren. "Information Security in Big Data: Privacy and Data Mining." IEEE Access 2 (2014): 1149–76. http://dx.doi.org/10.1109/access.2014.2362522.
Повний текст джерелаWin, Khin Than, and Willy Susilo. "Information security and privacy of health data." International Journal of Healthcare Technology and Management 7, no. 6 (2006): 492. http://dx.doi.org/10.1504/ijhtm.2006.010413.
Повний текст джерелаNavarro-Arribas, Guillermo, and Vicenç Torra. "Information fusion in data privacy: A survey." Information Fusion 13, no. 4 (October 2012): 235–44. http://dx.doi.org/10.1016/j.inffus.2012.01.001.
Повний текст джерелаYang, Kwangmo. "Big Technology and Data Privacy." Healthcare Informatics Research 26, no. 3 (July 31, 2020): 163–65. http://dx.doi.org/10.4258/hir.2020.26.3.163.
Повний текст джерелаShin, Soo-Yong. "Privacy Protection and Data Utilization." Healthcare Informatics Research 27, no. 1 (January 31, 2021): 1–2. http://dx.doi.org/10.4258/hir.2021.27.1.1.
Повний текст джерелаWang, Pingshui, Jianwen Zhu, and Qinjuan Ma. "Private Data Protection in Social Networks Based on Blockchain." International Journal of Advanced Networking and Applications 14, no. 04 (2023): 5549–55. http://dx.doi.org/10.35444/ijana.2023.14407.
Повний текст джерелаJia, Dongning, Bo Yin, and Xianqing Huang. "Association Analysis of Private Information in Distributed Social Networks Based on Big Data." Wireless Communications and Mobile Computing 2021 (June 4, 2021): 1–12. http://dx.doi.org/10.1155/2021/1181129.
Повний текст джерелаRiyana, Surapon, Nobutaka Ito, Tatsanee Chaiya, Uthaiwan Sriwichai, Natthawud Dussadee, Tanate Chaichana, Rittichai Assawarachan, Thongchai Maneechukate, Samerkhwan Tantikul, and Noppamas Riyana. "Privacy Threats and Privacy Preservation Techniques for Farmer Data Collections Based on Data Shuffling." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 16, no. 3 (June 25, 2022): 289–301. http://dx.doi.org/10.37936/ecti-cit.2022163.246469.
Повний текст джерелаGrosskreutz, Henrik, Benedikt Lemmen, and Stefan Rüping. "Privacy-Preserving Data-Mining." Informatik-Spektrum 33, no. 4 (May 28, 2010): 380–83. http://dx.doi.org/10.1007/s00287-010-0447-1.
Повний текст джерелаDuan, Huabin, Jie Yang, and Huanjun Yang. "A Blockchain-Based Privacy Protection Application for Logistics Big Data." Journal of Cases on Information Technology 24, no. 5 (February 21, 2022): 1–12. http://dx.doi.org/10.4018/jcit.295249.
Повний текст джерелаSramka, Michal. "Data mining as a tool in privacy-preserving data publishing." Tatra Mountains Mathematical Publications 45, no. 1 (December 1, 2010): 151–59. http://dx.doi.org/10.2478/v10127-010-0011-z.
Повний текст джерелаFalgoust, Michael. "Data Science and Designing for Privacy." Techné: Research in Philosophy and Technology 20, no. 1 (2016): 51–68. http://dx.doi.org/10.5840/techne201632446.
Повний текст джерелаHalder, Suhasish, V. S. Prakash Attili, and Vivek Gupta. "Information Privacy Assimilation." International Journal of Digital Strategy, Governance, and Business Transformation 12, no. 1 (January 1, 2022): 1–17. http://dx.doi.org/10.4018/ijdsgbt.313954.
Повний текст джерелаYang, Qing, Cheng Wang, Teng Hu, Xue Chen, and Changjun Jiang. "Implicit privacy preservation: a framework based on data generation." Security and Safety 1 (2022): 2022008. http://dx.doi.org/10.1051/sands/2022008.
Повний текст джерелаOthman, Nashwan Adnan, and Mustafa Zuhaer Nayef Al-Dabagh. "Privacy Preserving Data Mining Using Random Decision Tree Over Partition Data: Survey." ITM Web of Conferences 42 (2022): 01010. http://dx.doi.org/10.1051/itmconf/20224201010.
Повний текст джерелаChen, Z. F., J. J. Shuai, F. J. Tian, W. Y. Li, S. H. Zang, and X. Z. Zhang. "An Improved Privacy Protection Algorithm for Multimodal Data Fusion." Scientific Programming 2022 (August 23, 2022): 1–7. http://dx.doi.org/10.1155/2022/4189148.
Повний текст джерелаThuraisingham, Bhavani. "Privacy-Preserving Data Mining." Journal of Database Management 16, no. 1 (January 2005): 75–87. http://dx.doi.org/10.4018/jdm.2005010106.
Повний текст джерелаYao-Huai, Lü. "Privacy and Data Privacy Issues in Contemporary China." Ethics and Information Technology 7, no. 1 (March 2005): 7–15. http://dx.doi.org/10.1007/s10676-005-0456-y.
Повний текст джерелаXu, Xiaolong, Xuan Zhao, Feng Ruan, Jie Zhang, Wei Tian, Wanchun Dou, and Alex X. Liu. "Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/2376484.
Повний текст джерелаHendra, Hendra, Ravel Ravel, Novel Firdhaus, Michael Ari Kurniawan, and Gilbert Platina. "E-HEALTH PERSONAL DATA PROTECTION IN INDONESIA." JURNAL HUKUM KESEHATAN INDONESIA 1, no. 02 (April 13, 2022): 121–31. http://dx.doi.org/10.53337/jhki.v1i02.15.
Повний текст джерелаGruzd, Anatoliy, Jenna Jacobson, and Elizabeth Dubois. "Cybervetting and the Public Life of Social Media Data." Social Media + Society 6, no. 2 (April 2020): 205630512091561. http://dx.doi.org/10.1177/2056305120915618.
Повний текст джерелаBlume, Peter. "Danish Data Protection with Respect to Law Libraries." International Journal of Legal Information 31, no. 3 (2003): 452–61. http://dx.doi.org/10.1017/s0731126500003735.
Повний текст джерелаShankar, Adam Gowri. "Differential Privacy Preserving in Big data Analytics for Body Area Networks." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 514–18. http://dx.doi.org/10.22214/ijraset.2021.39336.
Повний текст джерелаZhu, Wei. "Personal Information Security Environment Monitoring and Law Protection Using Big Data Analysis." Journal of Environmental and Public Health 2022 (October 7, 2022): 1–12. http://dx.doi.org/10.1155/2022/1558161.
Повний текст джерелаliu, Qiang. "Privacy Protection Technology Based on Machine Learning and Intelligent Data Recognition." Security and Communication Networks 2022 (May 5, 2022): 1–9. http://dx.doi.org/10.1155/2022/1598826.
Повний текст джерелаHuerta, Esperanza, and Scott Jensen. "An Accounting Information Systems Perspective on Data Analytics and Big Data." Journal of Information Systems 31, no. 3 (May 1, 2017): 101–14. http://dx.doi.org/10.2308/isys-51799.
Повний текст джерелаOlusola Olajide, Ajayi,. "Application of Data Masking in Achieving Information Privacy." IOSR Journal of Engineering 4, no. 2 (February 2014): 13–21. http://dx.doi.org/10.9790/3021-04211321.
Повний текст джерелаMai, Jens-Erik. "Big data privacy: The datafication of personal information." Information Society 32, no. 3 (April 13, 2016): 192–99. http://dx.doi.org/10.1080/01972243.2016.1153010.
Повний текст джерелаChoi, Jay Pil, Doh-Shin Jeon, and Byung-Cheol Kim. "Privacy and personal data collection with information externalities." Journal of Public Economics 173 (May 2019): 113–24. http://dx.doi.org/10.1016/j.jpubeco.2019.02.001.
Повний текст джерелаNavarro-Arribas, Guillermo, and Vicenç Torra. "Information fusion in the context of data privacy." Information Fusion 13, no. 4 (October 2012): 234. http://dx.doi.org/10.1016/j.inffus.2012.01.002.
Повний текст джерелаSchroeder, Alan T. "Book review: Data privacy in the information age." Journal of the American Society for Information Science and Technology 53, no. 3 (2002): 251–53. http://dx.doi.org/10.1002/asi.10037.
Повний текст джерелаHe, Jianping, Lin Cai, and Xinping Guan. "Preserving Data-Privacy With Added Noises: Optimal Estimation and Privacy Analysis." IEEE Transactions on Information Theory 64, no. 8 (August 2018): 5677–90. http://dx.doi.org/10.1109/tit.2018.2842221.
Повний текст джерелаRajalakshmi, M., T. Purusothaman, and S. Pratheeba. "Collusion-Free Privacy Preserving Data Mining." International Journal of Intelligent Information Technologies 6, no. 4 (October 2010): 30–45. http://dx.doi.org/10.4018/jiit.2010100103.
Повний текст джерелаDomingo-Ferrer, Josep, and Vicenç Torra. "Privacy in Data Mining." Data Mining and Knowledge Discovery 11, no. 2 (August 17, 2005): 117–19. http://dx.doi.org/10.1007/s10618-005-0009-3.
Повний текст джерелаWang, Yi-Ren, and Yun-Cheng Tsai. "The Protection of Data Sharing for Privacy in Financial Vision." Applied Sciences 12, no. 15 (July 23, 2022): 7408. http://dx.doi.org/10.3390/app12157408.
Повний текст джерелаStoll, Margareth. "A Data Privacy Governance Model." International Journal of IT/Business Alignment and Governance 10, no. 1 (January 2019): 74–93. http://dx.doi.org/10.4018/ijitbag.2019010105.
Повний текст джерелаHodge, James G. "Health Information Privacy and Public Health." Journal of Law, Medicine & Ethics 31, no. 4 (2003): 663–71. http://dx.doi.org/10.1111/j.1748-720x.2003.tb00133.x.
Повний текст джерела