Добірка наукової літератури з теми "Privicy protection"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Privicy protection".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Privicy protection":
Xie, Guangxu, Gaopan Hou, Qingqi Pei, and Haibo Huang. "Lightweight Privacy Protection via Adversarial Sample." Electronics 13, no. 7 (March 26, 2024): 1230. http://dx.doi.org/10.3390/electronics13071230.
Bonomi, Luca, Xiaoqian Jiang, and Lucila Ohno-Machado. "Protecting patient privacy in survival analyses." Journal of the American Medical Informatics Association 27, no. 3 (November 21, 2019): 366–75. http://dx.doi.org/10.1093/jamia/ocz195.
Zhenjiang Zhang, Zhenjiang Zhang, and Xiaohua Liu Zhenjiang Zhang. "Cloud-side Collaborative Privacy Protection Based on Differential Privacy." 電腦學刊 32, no. 4 (August 2021): 239–51. http://dx.doi.org/10.53106/199115992021083204019.
Meier, Yannic, Johanna Schäwel, and Nicole C. Krämer. "Between protection and disclosure: applying the privacy calculus to investigate the intended use of privacy-protecting tools and self-disclosure on different websites." Studies in Communication and Media 10, no. 3 (2021): 283–306. http://dx.doi.org/10.5771/2192-4007-2021-3-283.
Nussy, Jennifer Ingelyne. "Mekanisme Komisi Pemberantasan Korupsi dalam Proses Penyadapan dilihat dari Perspektif Hak Asasi Manusia (HAM)." JURNAL BELO 5, no. 2 (May 19, 2020): 74–85. http://dx.doi.org/10.30598/belobelovol5issue2page74-85.
Nussy, Jennifer Ingelyne. "Mekanisme Komisi Pemberantasan Korupsi dalam Proses Penyadapan dilihat dari Perspektif Hak Asasi Manusia (HAM)." JURNAL BELO 5, no. 2 (May 19, 2020): 74–85. http://dx.doi.org/10.30598/belovol5issue2page74-85.
Corones, Stephen, and Juliet Davis. "Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions." Federal Law Review 45, no. 1 (March 2017): 65–95. http://dx.doi.org/10.1177/0067205x1704500104.
Singla, Arun. "The Evolving Landscape of Privacy Law: Balancing Digital Innovation and Individual Rights." Indian Journal of Law 2, no. 1 (2024): 1–6. http://dx.doi.org/10.36676/ijl.v2.i1.01.
Chen, Zhixuan, Yixiang Zhang, and Zhiyu Zhang. "Research on Privacy Protection Willingness of New Media Platform Users Based on Theory of Planned Behavior." Communications in Humanities Research 16, no. 1 (November 28, 2023): 264–71. http://dx.doi.org/10.54254/2753-7064/16/20230726.
Nahra, Kirk J. "Remarks by Kirk J. Nahra." Proceedings of the ASIL Annual Meeting 116 (2022): 127–29. http://dx.doi.org/10.1017/amp.2023.65.
Дисертації з теми "Privicy protection":
Maifada, Magoudani Mahamadou. "Construire et mettre en œuvre un droit des données personnelles dans l’espace UEMOA : étude comparée à partir des cas du Burkina Faso, de la Côte d’Ivoire, du Niger et du Sénégal à la lumière du droit français et européen." Electronic Thesis or Diss., Paris 12, 2023. http://www.theses.fr/2023PA120073.
This thesis provides an in-depth analysis of the legal framework surrounding the protection of personal data within the West African Economic and Monetary Union (WAEMU), specifically focusing on Burkina Faso, Côte d'Ivoire, Niger, and Senegal – the areas under study. It delves into the motivations that led these states to adopt specific legislations influenced by foreign models, notably the French model of the "Loi Informatique et Libertés," rather than relying on national or community references.This analysis explores the development process of these regulations, from legislative evolution to international institutions' initiatives. Special attention is given to the influence of the International Organization of La Francophonie (IOF) and the French Commission for Data Protection (Commission de l'Informatique et des Libertés) in promoting the initial national legislations within this region.Furthermore, the thesis conducts a detailed comparison between the existing regulations within WAEMU and the European Union's General Data Protection Regulation (GDPR). This comparison highlights significant similarities and differences, particularly concerning the scope of application, stakeholders' responsibilities, and the rights of the individuals concerned.Moreover, the study examines the practical implementation of these regulations, focusing on key actors, including regulatory authorities, data controllers, Civil Society Organizations (CSOs), and data subjects in each state. It analyzes the challenges faced by regulatory authorities and cooperation policies aimed at enhancing the effectiveness of personal data rights.Finally, the thesis explores the limitations of personal data rights, particularly in their interaction with public policies in the telecommunications sector and the issues related to cybercrime.Overall, this work offers a comprehensive and nuanced perspective on personal data rights within WAEMU, shedding light on the motivations, achievements, challenges, and prospects in the ever-evolving African legal context. It constitutes a significant contribution to the understanding of personal data protection in the African legal context
Sallaku, Redlon <1994>. "Privacy and Protecting Privacy: Using Static Analysis for legal compliance. General Data Protection Regulation." Master's Degree Thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/14682.
Li, Min. "Privacy Protection on Cloud Computing." VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3844.
Xu, Wanxin. "AFFECT-PRESERVING VISUAL PRIVACY PROTECTION." UKnowledge, 2018. https://uknowledge.uky.edu/ece_etds/122.
Winkler, Stephanie D. "Protecting Online Privacy." UKnowledge, 2016. http://uknowledge.uky.edu/comm_etds/47.
Gunnarsson, Annicka, and Siri Ekberg. "Invasion of Privacy : Spam - one result of bad privacy protection." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5393.
Matusek, F. (Florian). "Selective privacy protection for video surveillance." Doctoral thesis, Oulun yliopisto, 2014. http://urn.fi/urn:isbn:9789526204154.
Tiivistelmä Videovalvonnassa on tapahtunut viime vuosina merkittävää kasvua johtuen järkyttävistä tapahtumista kuten terrori-iskut, pankkiryöstöt ja järjestäytyneen rikollisuuden toimet. Videovalvontateknologia on kehittynyt merkittävästi mahdollistaen jopa yksittäisten ihmisten automaattisen seurannan. Turvallisuuden lisääntymisen katsotaan kuitenkin vähentäneen yksityisyyttä. Videovalvonnan avulla ihmisiä pystytään seuraamaan helpommin kuin koskaan aikaisemmin tunkeutuen täten heidän yksityisyytensä alueelle. On oletettu, että turvallisuus ja yksityisyys videovalvonnassa on nollasummapeliä, jossa kansalaisten on valittava yksityisyyden ja turvallisuuden välillä. Tämä tutkimus perustuu olettamukseen, että edellä esitetty ei pidä paikkaansa, vaan että on mahdollista suojata yksityisyys samalla taaten täysi turvallisuus. Ratkaisua tähän ongelmaan etsittiin suunnittelutieteellisen tutkimuksen avulla. Työssä suunniteltiin ja toteutettiin videovalvontajärjestelmä PEVS (Privacy Enhancing Video Surveillance system), joka suojaa valvonnanalaisten sivullisten yksityisyyttä ja siitä huolimatta tuottaa korkean turvallisuustason.. PEVS suojaa henkilöiden yksityisyyttä salaamalla automaattisesti videoaineistosta ne kuva-alat, joissa esiintyy ihmisiä. Mikäli laitonta toimintaa havaittaisiin, olisi riittävillä käyttöoikeuksilla mahdollista purkaa salaus mielenkiinnon kohteena olevien henkilöiden kohdalta tilanteen analysoimiseksi. Tämä mahdollisti yhtäältä puuttumattomuuden sivullisten yksityisyyteen ja toisaalta tiedon käyttämisen todistusaineistona mahdollisen rikoksen tutkimisessa. Tällä järjestelmällä yksityisyys oli mahdollista suojata samanaikaisesti, kun turvallisuudesta huolehdittiin. PEVS mahdollisti ensimmäistä kertaa maailmassa videovalvonnan, joka näyttää vain relevantit henkilöt jättäen muiden henkilöllisyyden paljastamatta. Sen takia tämän tutkimuksen merkittävin kontribuutio oli uudenlaisen lähestymistavan kehittäminen videovalvontaan, joka kykenee valikoivasti suojelemaan ihmisten yksityisyyttä. Tämä ratkaisu sisältää yksityisyyden suojaavan, useita rakenneosia sisältävän videovalvontajärjestelmäarkkitehtuurin esittelyn. Rakenneosiin kuuluu yksityisen tiedon tallennusmenetelmiä ja varjontunnistus- ja segmentointimetodeja, jotka paransivat aiemmin käytettyjen metodien tarkkuutta ja nopeutta. Lisäksi esiteltiin uudenlainen turvallisuus- ja yksityisyysmetriikka videovalvonnalle. Toteutettu järjestelmä on huomattava lisäys nykytietämykseen, jossa yksityisyyden suojan osalta on otettu vasta ensiaskelia ja joka ei mahdollista kattavaa järjestelmää
Chaudhari, Jayashri S. "Privacy Protection for Life-log System." UKnowledge, 2007. http://uknowledge.uky.edu/gradschool_theses/491.
Ajam, Nabil. "Privacy protection for location-based services." Télécom Bretagne, 2010. http://www.theses.fr/2010TELB0124.
In this dissertation, we propose the expression and the modelling of the most important principles of privacy. We deduce the relevant privacy requirements that should be integrated in existing security policy models, such as RBAC models. We suggest the application of a unique model for both access control and privacy requirements. Thus, an access control model is to be enriched with new access constraints and parameters, namely the privacy contexts, which should implement the consent and the notification concepts. For this purpose, we introduce the privacy-aware Organisation role Based Access Control (OrBAC) model. The administration of this new model is significantly different from previous models. Three cases are identified. First, the privacy policy may be defined by the data collector but data owners have the possibility to set their preferences through a contracted Service Level Agreement (SLA). Second, the administration model allows legal organisations, for legal purposes, to impose their needs by bypassing user's preferences. Third, we present the case of a privacy policy which is negotiated between the data collector and the requestor based on user's preferences, defined in the SLA. Overall, our proposal is a distributed administration of privacy policies. Focusing on Location Based Services (LBSs), we finally propose a complete privacy framework ready to be deployed in information systems. We use the model prototype to adapt our solution to cellular networks when the requesters are the service providers. This prototype uses parlay gateways with web services. We also extend the set of Parlay X gateway standardised web services by proposing a dedicated privacy web service to enforce privacy protection
Du, Jing. "Privacy protection in location-based applications." HKBU Institutional Repository, 2007. http://repository.hkbu.edu.hk/etd_ra/816.
Книги з теми "Privicy protection":
Blume, Peter. Protection of informational privacy. Copenhagen: DJØF Pub., 2002.
South African Law Reform Commission. Privacy and data protection. [Pretoria: South African Law Reform Commission], 2003.
South African Law Reform Commission. Privacy and data protection. Pretoria: South African Law Reform Commission, 2005.
Saad, Abdul Raman. Personal data & privacy protection. Kelana Jaya, Selangor, Malaysia: Malayan Law Journal Sdn. Bhd., 2005.
Smiley, Sophie. Protecting our privacy. Cambridge: Independence, 2004.
Rodrigues, Rowena, and Vagelis Papakonstantinou, eds. Privacy and Data Protection Seals. The Hague: T.M.C. Asser Press, 2018. http://dx.doi.org/10.1007/978-94-6265-228-6.
Caloyannides, Michael A. Privacy protection and computer forensics. 2nd ed. Boston: Artech House, 2004.
Kuschewsky, Monika. Data protection & privacy: Jurisdictional comparisons. London: Thomson Reuters, 2014.
George, Yee, ed. Privacy protection for e-services. Hershey PA: Idea Group Pub., 2006.
Bainbridge, David I. Data protection. Welwvyn Garden City: CLT Professional Pub., 2000.
Частини книг з теми "Privicy protection":
Weik, Martin H. "privacy protection." In Computer Science and Communications Dictionary, 1334. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_14678.
Hallinan, Dara, and Paul de Hert. "Genetic Classes and Genetic Categories: Protecting Genetic Groups Through Data Protection Law." In Group Privacy, 175–96. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46608-8_10.
Chaudhuri, Arijit, and Tasos C. Christofides. "Protection of Privacy." In Indirect Questioning in Sample Surveys, 151–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36276-7_7.
Gulzar, Nikki, Basra Abbasi, Eddie Wu, Anil Ozbal, and WeiQi Yan. "Surveillance Privacy Protection." In Intelligent Multimedia Surveillance, 83–105. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41512-8_5.
Hung, Patrick C. K., Marcelo Fantinato, and Jorge Roa. "Children Privacy Protection." In Encyclopedia of Computer Graphics and Games, 1–3. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-08234-9_198-1.
Hung, Patrick C. K., Marcelo Fantinato, and Jorge Roa. "Children Privacy Protection." In Encyclopedia of Computer Graphics and Games, 293–95. Cham: Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-23161-2_198.
Poikela, Maija Elina. "Privacy Protection Behaviour." In T-Labs Series in Telecommunication Services, 109–29. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34171-8_7.
Chaudhuri, Arijit, Sanghamitra Pal, and Dipika Patra. "Protection of Privacy." In Randomized Response Techniques, 119–38. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9669-8_7.
Tang, Alan. "Workforce Data Protection." In Privacy in Practice, 329–61. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003225089-29.
Stahl, Bernd Carsten, Doris Schroeder, and Rowena Rodrigues. "Privacy." In Ethics of Artificial Intelligence, 25–37. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17040-9_3.
Тези доповідей конференцій з теми "Privicy protection":
Rezer, Tatiana. "Privacy Right as A Personal Value in an Information Society." In The Public/Private in Modern Civilization, the 22nd Russian Scientific-Practical Conference (with international participation) (Yekaterinburg, April 16-17, 2020). Liberal Arts University – University for Humanities, Yekaterinburg, 2020. http://dx.doi.org/10.35853/ufh-public/private-2020-76.
Ye, Mengmei, Zhongze Tang, Huy Phan, Yi Xie, Bo Yuan, and Sheng Wei. "Visual privacy protection in mobile image recognition using protective perturbation." In MMSys '22: 13th ACM Multimedia Systems Conference. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3524273.3528189.
Srinivasan, S. "Privacy Protection and Data Breaches." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2261.
"Place Determinants for the Personalization-Privacy Tradeoff among Students." In InSITE 2018: Informing Science + IT Education Conferences: La Verne California. Informing Science Institute, 2018. http://dx.doi.org/10.28945/4069.
Chhetri, Chola, and Vivian Genaro Motti. "Privacy Concerns about Smart Home Devices: A Comparative Analysis between Non-Users and Users." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002207.
Bennett, Colin, and Smith Oduro-Marfo. "GLOBAL Privacy Protection." In UbiComp '18: The 2018 ACM International Joint Conference on Pervasive and Ubiquitous Computing. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3267305.3274149.
Karunagaran, Surya, Saji K. Mathew, and Franz Lehner. "Privacy Protection Dashboard." In SIGMIS-CPR '17: Computers and People Research Conference. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3084381.3084424.
Li, Chau Yi, Ali Shahin Shamsabadi, Ricardo Sanchez-Matilla, Riccardo Mazzon, and Andrea Cavallaro. "Scene Privacy Protection." In ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2019. http://dx.doi.org/10.1109/icassp.2019.8682225.
Zhao, Fangyuan, Xuebin Ren, Shusen Yang, and Xinyu Yang. "On Privacy Protection of Latent Dirichlet Allocation Model Training." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/675.
Matveev, Artem. "Cost-Efficient Data Privacy Protection in Multi Cloud Storage." In 3rd International Conference on Data Mining and Machine Learning (DMML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120706.
Звіти організацій з теми "Privicy protection":
Plesser, Ronald L., and Emilio W. Cividanes. Privacy protection in the United States:. Gaithersburg, MD: National Institute of Standards and Technology, 1992. http://dx.doi.org/10.6028/nist.ir.4781.
Chang, LiWu, and Ira A. Moskowitz. An Integrated Framework for Database Privacy Protection. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada465125.
Riyadi, Gliddheo. Data Privacy in the Indonesian Personal Data Protection Legislation. Jakarta, Indonesia: Center for Indonesian Policy Studies, 2021. http://dx.doi.org/10.35497/341482.
Hasty, III, and Thomas J. Protection of Personal Privacy Interests under the Freedom of Information Act. Fort Belvoir, VA: Defense Technical Information Center, June 1991. http://dx.doi.org/10.21236/ada242183.
Lunt, Teresa, Paul Aoki, Dirk Balfanz, Glenn Durfee, Philippe Golle, Diana Smetters, Jessica Staddon, Jim Thornton, and Tomas Uribe. Protecting the Privacy of Individuals in Terrorist Tracking Applications. Fort Belvoir, VA: Defense Technical Information Center, April 2005. http://dx.doi.org/10.21236/ada433707.
Buillamon, Bernardo. Risk Mitigation as a Cost-Effective Microfinance Strategy: Case Study IDB-Peru Global Micro-Enterprise Credit Program. Inter-American Development Bank, March 2000. http://dx.doi.org/10.18235/0008670.
Rothstein, M. A. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Office of Scientific and Technical Information (OSTI), July 1998. http://dx.doi.org/10.2172/656488.
Vaz, Maria João, and Helena Machado. A systematic literature review of Big Data in tourism industry: a state of the art and future directions. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, May 2022. http://dx.doi.org/10.37766/inplasy2022.5.0012.
Abdul Hamid, Umar Zakir. Privacy for Software-defined Battery Electric Vehicles. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, June 2024. http://dx.doi.org/10.4271/epr2024012.
Rothstein, M. A. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report. Office of Scientific and Technical Information (OSTI), September 1998. http://dx.doi.org/10.2172/656499.