Статті в журналах з теми "Data Privacy and Security Policies"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Data Privacy and Security Policies".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Rosenfeld, Lisa, John Torous, and Ipsit V. Vahia. "Data Security and Privacy in Apps for Dementia: An Analysis of Existing Privacy Policies." American Journal of Geriatric Psychiatry 25, no. 8 (August 2017): 873–77. http://dx.doi.org/10.1016/j.jagp.2017.04.009.
Повний текст джерелаSipes, Elizabeth Kemery, Joshua James, and David Zetoony. "Current data security issues for financial services firms." Journal of Investment Compliance 17, no. 3 (September 5, 2016): 55–59. http://dx.doi.org/10.1108/joic-07-2016-0034.
Повний текст джерелаChigona, W. "Synchronised smart phones: The collision of personal privacy and organisational data security." South African Journal of Business Management 43, no. 2 (June 29, 2012): 31–40. http://dx.doi.org/10.4102/sajbm.v43i2.181.
Повний текст джерелаGao, Lei, and Alisa G. Brink. "A Content Analysis of the Privacy Policies of Cloud Computing Services." Journal of Information Systems 33, no. 3 (July 1, 2018): 93–115. http://dx.doi.org/10.2308/isys-52188.
Повний текст джерелаO'Loughlin, Kristen, Martha Neary, Elizabeth C. Adkins, and Stephen M. Schueller. "Reviewing the data security and privacy policies of mobile apps for depression." Internet Interventions 15 (March 2019): 110–15. http://dx.doi.org/10.1016/j.invent.2018.12.001.
Повний текст джерелаJoshi, Anupam, Tim Finin, Lalana Kagal, Jim Parker, and Anand Patwardhan. "Security policies and trust in ubiquitous computing." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 366, no. 1881 (July 31, 2008): 3769–80. http://dx.doi.org/10.1098/rsta.2008.0142.
Повний текст джерелаShetty, Nisha P., Balachandra Muniyal, and Saleh Mowla. "Policy resolution of shared data in online social networks." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 4 (August 1, 2020): 3767. http://dx.doi.org/10.11591/ijece.v10i4.pp3767-3776.
Повний текст джерелаShahid, Arsalan, Thien-An Ngoc Nguyen, and M.-Tahar Kechadi. "Big Data Warehouse for Healthcare-Sensitive Data Applications." Sensors 21, no. 7 (March 28, 2021): 2353. http://dx.doi.org/10.3390/s21072353.
Повний текст джерелаFu, Tao. "China’s personal information protection in a data-driven economy: A privacy policy study of Alibaba, Baidu and Tencent." Global Media and Communication 15, no. 2 (May 27, 2019): 195–213. http://dx.doi.org/10.1177/1742766519846644.
Повний текст джерелаDean, Matthew D., Dinah M. Payne, and Brett J. L. Landry. "Data mining: an ethical baseline for online privacy policies." Journal of Enterprise Information Management 29, no. 4 (July 11, 2016): 482–504. http://dx.doi.org/10.1108/jeim-04-2014-0040.
Повний текст джерелаAlsulbi, Khalil Ahmad, Maher Ali Khemakhem, Abdullah Ahamd Basuhail, Fathy Eassa Eassa, Kamal Mansur Jambi, and Khalid Ali Almarhabi. "A Proposed Framework for Secure Data Storage in a Big Data Environment Based on Blockchain and Mobile Agent." Symmetry 13, no. 11 (October 21, 2021): 1990. http://dx.doi.org/10.3390/sym13111990.
Повний текст джерелаSharma, Gaurav, Urvashi Garg, A.P, Arun Jain, A.P, and Loveleena Mukhija, A.P. "Cloud Computing : Security Issues And Resource Allocation Policies." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (July 30, 2017): 176. http://dx.doi.org/10.23956/ijarcsse/v7i7/0116.
Повний текст джерелаLiu, Kaijun, Guoai Xu, Xiaomei Zhang, Guosheng Xu, and Zhangjie Zhao. "Evaluating the Privacy Policy of Android Apps: A Privacy Policy Compliance Study for Popular Apps in China and Europe." Scientific Programming 2022 (August 23, 2022): 1–15. http://dx.doi.org/10.1155/2022/2508690.
Повний текст джерелаRomero Torres, Alberto de Jesús. "Challenges in security and privacy in wireless communications." Revista de Jóvenes Investigadores Ad Valorem 4, no. 2 (December 15, 2021): 74–81. http://dx.doi.org/10.32997/rjia-vol.4-num.2-2021-3701.
Повний текст джерелаFaraz, Syed Hassan, Syed Hassan Tanvir, and Saqib Saeed. "A Study on Privacy and Security Aspects of Facebook." International Journal of Technology Diffusion 3, no. 4 (October 2012): 48–55. http://dx.doi.org/10.4018/jtd.2012100105.
Повний текст джерелаGoreva, Natalya, Sushma Mishra, Peter Draus, George Bromall, and Don Caputo. "A Study Of The Security Of Electronic Medical Records Utilizing Six Knowledge Categories And Subjects Demographics." International Journal of Management & Information Systems (IJMIS) 20, no. 3 (June 30, 2016): 51–58. http://dx.doi.org/10.19030/ijmis.v20i3.9738.
Повний текст джерелаȘandor, Andrei. "Virtualization Solutions Supporting Privacy and Data Protection in Online Activities." International conference KNOWLEDGE-BASED ORGANIZATION 25, no. 3 (June 1, 2019): 168–73. http://dx.doi.org/10.2478/kbo-2019-0133.
Повний текст джерелаBrewster, Christopher, Barry Nouwt, Stephan Raaijmakers, and Jack Verhoosel. "Ontology-based Access Control for FAIR Data." Data Intelligence 2, no. 1-2 (January 2020): 66–77. http://dx.doi.org/10.1162/dint_a_00029.
Повний текст джерелаAmato, Flora, Valentina Casola, Giovanni Cozzolino, Alessandra De Benedictis, Nicola Mazzocca, and Francesco Moscato. "A Security and Privacy Validation Methodology for e-Health Systems." ACM Transactions on Multimedia Computing, Communications, and Applications 17, no. 2s (May 17, 2021): 1–22. http://dx.doi.org/10.1145/3412373.
Повний текст джерелаSchafer, Burkhard. "D-waste: Data disposal as challenge for waste management in the Internet of Things." International Review of Information Ethics 22 (December 1, 2014): 101–7. http://dx.doi.org/10.29173/irie122.
Повний текст джерелаSchafer, Burkhard. "D-waste: Data disposal as challenge for waste management in the Internet of Things." International Review of Information Ethics 22 (December 1, 2014): 101–7. http://dx.doi.org/10.29173/irie131.
Повний текст джерелаSuwandi, Syifa Ilma Nabila, Xavier Wahyuadi Seloatmodjo, Alexandra Situmorang, and Nur Aini Rakhmawati. "Analisis privasi data pengguna contact tracing application pengendalian COVID-19 di Indonesia berdasarkan PERPRES RI No. 95 tahun 2018 tentang sistem pemerintahan berbasis elektronik." Teknologi 11, no. 1 (January 1, 2021): 46–58. http://dx.doi.org/10.26594/teknologi.v11i1.2174.
Повний текст джерелаSaeed, Saqib. "A Customer-Centric View of E-Commerce Security and Privacy." Applied Sciences 13, no. 2 (January 11, 2023): 1020. http://dx.doi.org/10.3390/app13021020.
Повний текст джерелаUllah, Salim, Muhammad Sohail Khan, Choonhwa Lee, and Muhammad Hanif. "Understanding Users’ Behavior towards Applications Privacy Policies." Electronics 11, no. 2 (January 13, 2022): 246. http://dx.doi.org/10.3390/electronics11020246.
Повний текст джерелаShen, Xieyang, Chuanhe Huang, Danxin Wang, and Jiaoli Shi. "A Privacy-Preserving Attribute-Based Encryption System for Data Sharing in Smart Cities." Wireless Communications and Mobile Computing 2021 (October 8, 2021): 1–15. http://dx.doi.org/10.1155/2021/6686675.
Повний текст джерелаZamfiroiu, Alin, Bogdan Iancu, Catalin Boja, Tiberiu-Marian Georgescu, Cosmin Cartas, Marius Popa, and Cristian Valeriu Toma. "IoT Communication Security Issues for Companies: Challenges, Protocols and The Web of Data." Proceedings of the International Conference on Business Excellence 14, no. 1 (July 1, 2020): 1109–20. http://dx.doi.org/10.2478/picbe-2020-0104.
Повний текст джерелаMagalhaes, MarcusAbreu de. "Data protection regulation: a comparative law approach." International Journal of Digital Law 2, no. 2 (August 15, 2021): 33–53. http://dx.doi.org/10.47975/ijdl.magalhaes.v.2.n.2.
Повний текст джерелаTrojer, Thomas, Basel Katt, Ruth Breu, Thomas Schabetsberger, and Richard Mair. "Managing Privacy and Effectiveness of Patient-Administered Authorization Policies." International Journal of Computational Models and Algorithms in Medicine 3, no. 2 (April 2012): 43–62. http://dx.doi.org/10.4018/jcmam.2012040103.
Повний текст джерелаAlmubarak, Hameed, Mohamed Khairallah Khouja, and Ahmed Jedidi. "Security and privacy recommendation of mobile app for Arabic speaking." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (October 1, 2022): 5191. http://dx.doi.org/10.11591/ijece.v12i5.pp5191-5203.
Повний текст джерелаSeyedmostafa, Safavi, and Shukur Zarina. "CenterYou: Android privacy made easier the Cloud Way." Trends in Computer Science and Information Technology 7, no. 3 (September 2, 2022): 057–73. http://dx.doi.org/10.17352/tcsit.000052.
Повний текст джерелаLi, Teng, Jiawei Zhang, Yanbo Yang, Wei Qiao, and Yangxu Lin. "Auditable and Times limitable Secure Data Access Control for Cloud-based Industrial Internet of Things." Journal of Networking and Network Applications 1, no. 3 (2021): 129–38. http://dx.doi.org/10.33969/j-nana.2021.010306.
Повний текст джерелаHuang, Chanying, Songjie Wei, and Anmin Fu. "An Efficient Privacy-Preserving Attribute-Based Encryption with Hidden Policy for Cloud Storage." Journal of Circuits, Systems and Computers 28, no. 11 (October 2019): 1950186. http://dx.doi.org/10.1142/s021812661950186x.
Повний текст джерелаZhang, Kai, Yanping Li, and Laifeng Lu. "Privacy-Preserving Attribute-Based Keyword Search with Traceability and Revocation for Cloud-Assisted IoT." Security and Communication Networks 2021 (May 29, 2021): 1–13. http://dx.doi.org/10.1155/2021/9929663.
Повний текст джерелаDi Sia, Paolo. "About privacy and phishing on social networks and the case of Facebook." E-methodology 5, no. 5 (April 23, 2019): 100–112. http://dx.doi.org/10.15503/emet.v5i5.429.
Повний текст джерелаAthanere, Smita, and Ramesh Thakur. "A Hierarchical Multi-Authority Access Control Scheme for Secure and Efficient Data Sharing in Cloud Storage." Journal of Strategic Security 15, no. 1 (April 2022): 126–47. http://dx.doi.org/10.5038/1944-0472.15.1.1970.
Повний текст джерелаKaupins, Gundars. "Laws Associated with Mobile Computing in the Cloud." International Journal of Wireless Networks and Broadband Technologies 2, no. 3 (July 2012): 1–9. http://dx.doi.org/10.4018/ijwnbt.2012070101.
Повний текст джерелаZhonghua, Chen, and S. B. Goyal. "Block chain Technology to Handle Security and Privacy for IoT Systems: Analytical Review." International Journal of Electrical and Electronics Research 10, no. 2 (June 30, 2022): 74–79. http://dx.doi.org/10.37391/ijeer.100204.
Повний текст джерелаMaqsood, Madiha, and Ayesha Ashfaq. "THE AUDIENCE IS THE KEY, DATA IS NOT: ANALYZING USERS’ CONCERNS AND EXPERTS’ REFLECTIONS REGARDING PRIVACY POLICIES OF SOCIAL NETWORKING SITES." Pakistan Journal of Social Research 04, no. 01 (March 31, 2022): 511–20. http://dx.doi.org/10.52567/pjsr.v4i1.675.
Повний текст джерелаGruber, Moritz, Christian Höfig, Maximilian Golla, Tobias Urban, and Matteo Große-Kampmann. "“We may share the number of diaper changes”: A Privacy and Security Analysis of Mobile Child Care Applications." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (July 2022): 394–414. http://dx.doi.org/10.56553/popets-2022-0078.
Повний текст джерелаChoi, Young B., and Christopher E. Williams. "A HIPAA Security and Privacy Compliance Audit and Risk Assessment Mitigation Approach." International Journal of Cyber Research and Education 3, no. 2 (July 2021): 28–45. http://dx.doi.org/10.4018/ijcre.2021070103.
Повний текст джерелаJaidi, Faouzi, Faten Ayachi, and Adel Bouhoula. "Advanced Analysis of the Integrity of Access Control Policies: the Specific Case of Databases." International Arab Journal of Information Technology 17, no. 5 (September 1, 2020): 808–15. http://dx.doi.org/10.34028/iajit/17/5/14.
Повний текст джерелаPrajapati, Y. N., and M. K. Srivastava. "Novel algorithms for protective digital privacy." IAES International Journal of Robotics and Automation (IJRA) 8, no. 3 (September 1, 2019): 184. http://dx.doi.org/10.11591/ijra.v8i3.pp184-188.
Повний текст джерелаAnnane, Boubakeur, and Alti Adel. "Proxy-3S." International Journal of Information Security and Privacy 16, no. 1 (January 2022): 1–38. http://dx.doi.org/10.4018/ijisp.2022010116.
Повний текст джерелаBecker, Jonathan D., and Douglas A. Levin. "Like Moths to a Flame: Unsecured Networks, Tech-Savvy Students, and District Policy." Journal of Cases in Educational Leadership 23, no. 2 (January 10, 2020): 47–59. http://dx.doi.org/10.1177/1555458919899458.
Повний текст джерелаKokas, Aynne. "Platform Patrol: China, the United States, and the Global Battle for Data Security." Journal of Asian Studies 77, no. 4 (November 2018): 923–33. http://dx.doi.org/10.1017/s0021911818002541.
Повний текст джерелаFadrique, Laura X., Dia Rahman, Hélène Vaillancourt, Paul Boissonneault, Tania Donovska, and Plinio P. Morita. "Overview of Policies, Guidelines, and Standards for Active Assisted Living Data Exchange: Thematic Analysis." JMIR mHealth and uHealth 8, no. 6 (June 22, 2020): e15923. http://dx.doi.org/10.2196/15923.
Повний текст джерелаKamoun, Faouzi, and Mathew Nicho. "Human and Organizational Factors of Healthcare Data Breaches." International Journal of Healthcare Information Systems and Informatics 9, no. 1 (January 2014): 42–60. http://dx.doi.org/10.4018/ijhisi.2014010103.
Повний текст джерелаTaschner, John B. "Data Profiteering: Corporate Social Responsibility and Privacy Law Lost in Data Monetization and National Security." American Journal of Trade and Policy 7, no. 1 (August 21, 2020): 37—xx. http://dx.doi.org/10.18034/ajtp.v7i1.484.
Повний текст джерелаNikolova, Evgeniya, Mariya Monova-Zheleva, and Yanislav Zhelev. "Personal Data Processing in a Digital Educational Environment." Mathematics and Informatics LXV, no. 4 (August 30, 2022): 365–78. http://dx.doi.org/10.53656/math2022-4-4-per.
Повний текст джерелаArellano, April Moreno, Wenrui Dai, Shuang Wang, Xiaoqian Jiang, and Lucila Ohno-Machado. "Privacy Policy and Technology in Biomedical Data Science." Annual Review of Biomedical Data Science 1, no. 1 (July 20, 2018): 115–29. http://dx.doi.org/10.1146/annurev-biodatasci-080917-013416.
Повний текст джерела