Статті в журналах з теми "Privicy protection"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Privicy protection".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Xie, Guangxu, Gaopan Hou, Qingqi Pei, and Haibo Huang. "Lightweight Privacy Protection via Adversarial Sample." Electronics 13, no. 7 (March 26, 2024): 1230. http://dx.doi.org/10.3390/electronics13071230.
Bonomi, Luca, Xiaoqian Jiang, and Lucila Ohno-Machado. "Protecting patient privacy in survival analyses." Journal of the American Medical Informatics Association 27, no. 3 (November 21, 2019): 366–75. http://dx.doi.org/10.1093/jamia/ocz195.
Zhenjiang Zhang, Zhenjiang Zhang, and Xiaohua Liu Zhenjiang Zhang. "Cloud-side Collaborative Privacy Protection Based on Differential Privacy." 電腦學刊 32, no. 4 (August 2021): 239–51. http://dx.doi.org/10.53106/199115992021083204019.
Meier, Yannic, Johanna Schäwel, and Nicole C. Krämer. "Between protection and disclosure: applying the privacy calculus to investigate the intended use of privacy-protecting tools and self-disclosure on different websites." Studies in Communication and Media 10, no. 3 (2021): 283–306. http://dx.doi.org/10.5771/2192-4007-2021-3-283.
Nussy, Jennifer Ingelyne. "Mekanisme Komisi Pemberantasan Korupsi dalam Proses Penyadapan dilihat dari Perspektif Hak Asasi Manusia (HAM)." JURNAL BELO 5, no. 2 (May 19, 2020): 74–85. http://dx.doi.org/10.30598/belobelovol5issue2page74-85.
Nussy, Jennifer Ingelyne. "Mekanisme Komisi Pemberantasan Korupsi dalam Proses Penyadapan dilihat dari Perspektif Hak Asasi Manusia (HAM)." JURNAL BELO 5, no. 2 (May 19, 2020): 74–85. http://dx.doi.org/10.30598/belovol5issue2page74-85.
Corones, Stephen, and Juliet Davis. "Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions." Federal Law Review 45, no. 1 (March 2017): 65–95. http://dx.doi.org/10.1177/0067205x1704500104.
Singla, Arun. "The Evolving Landscape of Privacy Law: Balancing Digital Innovation and Individual Rights." Indian Journal of Law 2, no. 1 (2024): 1–6. http://dx.doi.org/10.36676/ijl.v2.i1.01.
Chen, Zhixuan, Yixiang Zhang, and Zhiyu Zhang. "Research on Privacy Protection Willingness of New Media Platform Users Based on Theory of Planned Behavior." Communications in Humanities Research 16, no. 1 (November 28, 2023): 264–71. http://dx.doi.org/10.54254/2753-7064/16/20230726.
Nahra, Kirk J. "Remarks by Kirk J. Nahra." Proceedings of the ASIL Annual Meeting 116 (2022): 127–29. http://dx.doi.org/10.1017/amp.2023.65.
Nissim, Kobbi, and Alexandra Wood. "Is privacy privacy ?" Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 376, no. 2128 (August 6, 2018): 20170358. http://dx.doi.org/10.1098/rsta.2017.0358.
Colangelo, Giuseppe, and Mariateresa Maggiolino. "Data Protection in Attention Markets: Protecting Privacy through Competition?" Journal of European Competition Law & Practice 8, no. 6 (May 10, 2017): 363–69. http://dx.doi.org/10.1093/jeclap/lpx037.
Cui, Mingwu, Fangfang Ding, and Kun Cai. "The Influence of Self-Efficacy of College Students in Privacy Protection and Behavior in Social Networking Context." Scientific and Social Research 6, no. 3 (March 29, 2024): 126–43. http://dx.doi.org/10.26689/ssr.v6i3.6445.
Dales, Loring. "Privacy Protection." Pediatrics 107, no. 6 (June 1, 2001): 1495.2–1495. http://dx.doi.org/10.1542/peds.107.6.1495b.
Bransfield, Robert. "Privacy ‘Protection’." Psychiatric News 37, no. 17 (September 6, 2002): 32. http://dx.doi.org/10.1176/pn.37.17.0032.
Rotenberg, Marc. "Privacy protection." Government Information Quarterly 11, no. 3 (January 1994): 253–54. http://dx.doi.org/10.1016/0740-624x(94)90045-0.
Qin, Peng, and Lina Wang. "PPVC: Towards a Personalized Local Differential Privacy-Preserving Scheme for V2G Charging Networks." Mathematics 11, no. 20 (October 12, 2023): 4257. http://dx.doi.org/10.3390/math11204257.
Jia, Dongning, Bo Yin, and Xianqing Huang. "Association Analysis of Private Information in Distributed Social Networks Based on Big Data." Wireless Communications and Mobile Computing 2021 (June 4, 2021): 1–12. http://dx.doi.org/10.1155/2021/1181129.
Rothstein, Mark A. "Currents in Contemporary Ethics." Journal of Law, Medicine & Ethics 33, no. 1 (2005): 154–59. http://dx.doi.org/10.1111/j.1748-720x.2005.tb00217.x.
Bamberger, Kenneth A., and Ariel Evan Mayse. "PRE-MODERN INSIGHTS FOR POST-MODERN PRIVACY: JEWISH LAW LESSONS FOR THE BIG DATA AGE." Journal of Law and Religion 36, no. 3 (December 2021): 495–532. http://dx.doi.org/10.1017/jlr.2021.90.
Baruh, Lemi, and Mihaela Popescu. "Big data analytics and the limits of privacy self-management." New Media & Society 19, no. 4 (November 2, 2015): 579–96. http://dx.doi.org/10.1177/1461444815614001.
Zhang, Jing, Yanzi Li, Qian Ding, Liwei Lin, and Xiucai Ye. "Successive Trajectory Privacy Protection with Semantics Prediction Differential Privacy." Entropy 24, no. 9 (August 23, 2022): 1172. http://dx.doi.org/10.3390/e24091172.
Islam, Md Toriqul. "ADEQUACY OF PRIVACY REGIME IN BANGLADESH: KEY CHALLENGES AND POTENTIAL POLICY MEASURES." IIUM Law Journal 30, no. 1 (July 7, 2022): 33–74. http://dx.doi.org/10.31436/iiumlj.v30i1.655.
Wang, Weiyuan. "Legal Effect of Internet Privacy Policy." Journal of Education, Humanities and Social Sciences 28 (April 1, 2024): 126–33. http://dx.doi.org/10.54097/zjz34p19.
Kumar, Krishan, Mukesh Kumar Gupta, Nishant Saxena, and Vivek Jaglan. "Homomorphic Encryption Based Privacy Protection for Personalised Web Search." Indian Journal of Science and Technology 15, no. 8 (February 27, 2022): 318–25. http://dx.doi.org/10.17485/ijst/v15i8.44.
Serwin, Andrew. "Privacy 3.0-The Principle of Proportionality." University of Michigan Journal of Law Reform, no. 42.4 (2009): 869. http://dx.doi.org/10.36646/mjlr.42.4.privacy.
Qiu, Ke. "A secure system for electric vehicle battery swap stations using blockchain." Applied and Computational Engineering 16, no. 1 (October 23, 2023): 13–26. http://dx.doi.org/10.54254/2755-2721/16/20230851.
Hao, Li Ping, and Yi Hui Chen. "Research on the Cloud Computing Storage Privacy Preserving Based on MB-Tree Dynamic Access Model." Applied Mechanics and Materials 513-517 (February 2014): 2350–54. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2350.
Yan, Liang, Lei Li, Xuejiao Mu, Hao Wang, Xian Chen, and Hyoseop Shin. "Differential Privacy Preservation for Location Semantics." Sensors 23, no. 4 (February 13, 2023): 2121. http://dx.doi.org/10.3390/s23042121.
Grandison, Tyrone, and Rafae Bhatti. "Regulatory Compliance and the Correlation to Privacy Protection in Healthcare." International Journal of Computational Models and Algorithms in Medicine 1, no. 2 (April 2010): 37–52. http://dx.doi.org/10.4018/jcmam.2010040103.
Wang, Yijing, Jingyi Zhang, and Lupeng Zhang. "Analysis of Users Balance Between Private and Public -- One Case from the TikTok." Communications in Humanities Research 12, no. 1 (November 20, 2023): 146–60. http://dx.doi.org/10.54254/2753-7064/12/20230070.
Wang, Pingshui, Jianwen Zhu, and Qinjuan Ma. "Private Data Protection in Social Networks Based on Blockchain." International Journal of Advanced Networking and Applications 14, no. 04 (2023): 5549–55. http://dx.doi.org/10.35444/ijana.2023.14407.
Zostant, Maxwell, and Robin Chataut. "Privacy in computer ethics: Navigating the digital age." Computer Science and Information Technologies 4, no. 2 (July 1, 2023): 183–90. http://dx.doi.org/10.11591/csit.v4i2.p183-190.
Zostant, Maxwell, and Robin Chataut. "Privacy in computer ethics: Navigating the digital age." Computer Science and Information Technologies 4, no. 2 (July 1, 2023): 183–90. http://dx.doi.org/10.11591/csit.v4i2.pp183-190.
Ghorashi, Seyed Ramin, Tanveer Zia, Michael Bewong, and Yinhao Jiang. "An Analytical Review of Industrial Privacy Frameworks and Regulations for Organisational Data Sharing." Applied Sciences 13, no. 23 (November 27, 2023): 12727. http://dx.doi.org/10.3390/app132312727.
Altman, Micah, and Aloni Cohen. "Natural differential privacy—a perspective on protection guarantees." PeerJ Computer Science 9 (September 28, 2023): e1576. http://dx.doi.org/10.7717/peerj-cs.1576.
Li, Yijing, Ran Bi, Nan Jiang, Fengqiu Li, Mingsi Wang, and Xiangping Jing. "Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular Networks." Electronics 13, no. 12 (June 17, 2024): 2372. http://dx.doi.org/10.3390/electronics13122372.
AllahRakha, Naeem. "Constitutional Safeguards for Digital Rights and Privacy." International Journal of Law and Policy 2, no. 4 (April 30, 2024): 31–43. http://dx.doi.org/10.59022/ijlp.172.
Bhandari, Vrinda, and Renuka Sane. "Protecting citizens from the state post Puttaswamy: Analysing the privacy implications of the Justice Shrikrishna Committee Report and the Data Protection Bill, 2018." Socio-Legal Review 14, no. 2 (January 2018): 143. http://dx.doi.org/10.55496/uuiz9934.
Chukwunonso Aloamaka, Patrick. "Effective Data Protection in Nigeria: Challenges." Commonwealth Law Review Journal 08 (2022): 656–62. http://dx.doi.org/10.55662/clrj.2022.811.
A. Razon, Arvin Kristopher. "Are Narco-Lists Covered by the Philippine Law on Privacy?: Exploring the Limits of the ‘Classic’ Right to Privacy and Applying a Constitutionally Grounded Data Protection Right." Global Privacy Law Review 2, Issue 1 (February 1, 2021): 44–58. http://dx.doi.org/10.54648/gplr2021006.
Yang, Xuechao, Xun Yi, Andrei Kelarev, Leanne Rylands, Yuqing Lin, and Joe Ryan. "Protecting Private Information for Two Classes of Aggregated Database Queries." Informatics 9, no. 3 (September 5, 2022): 66. http://dx.doi.org/10.3390/informatics9030066.
Krishnamurthy, Vivek. "A Tale of Two Privacy Laws: The GDPR and the International Right to Privacy." AJIL Unbound 114 (2020): 26–30. http://dx.doi.org/10.1017/aju.2019.79.
Panvelwala, Fatema, and Archana G. "Data Protection Guidelines for Protecting Privacy of Users on Social Media." International Journal of Computer Applications 182, no. 2 (July 16, 2018): 7–12. http://dx.doi.org/10.5120/ijca2018917449.
Kohl, Uta. "THE RIGHT TO BE FORGOTTEN IN DATA PROTECTION LAW AND TWO WESTERN CULTURES OF PRIVACY." International and Comparative Law Quarterly 72, no. 3 (July 2023): 737–69. http://dx.doi.org/10.1017/s0020589323000258.
Zhang, Xiangfei, Feng Yang, Yu Guo, Hang Yu, Zhengxia Wang, and Qingchen Zhang. "Adaptive Differential Privacy Mechanism Based on Entropy Theory for Preserving Deep Neural Networks." Mathematics 11, no. 2 (January 8, 2023): 330. http://dx.doi.org/10.3390/math11020330.
Zhou, Leming, and Bambang Parmanto. "User Preferences for Privacy Protection Methods in Mobile Health Apps: A Mixed-Methods Study." International Journal of Telerehabilitation 12, no. 2 (December 8, 2020): 13–26. http://dx.doi.org/10.5195/ijt.2020.6319.
Sundaram, Ranjany, and Snehal Shetty. "Privacy concerns and protection behavior during the Covid-19 pandemic." Problems and Perspectives in Management 20, no. 2 (April 20, 2022): 57–70. http://dx.doi.org/10.21511/ppm.20(2).2022.06.
Kravchuk, V. "Foreign experience of personal data protection in social networks." Uzhhorod National University Herald. Series: Law 2, no. 78 (August 31, 2023): 49–53. http://dx.doi.org/10.24144/2307-3322.2023.78.2.7.
Wang, Yanbing. "Privacy Protection of Public Figures in China—The Case of Yundi Li’s Prostitution." Studies in Law and Justice 2, no. 2 (June 2023): 109–17. http://dx.doi.org/10.56397/slj.2023.06.15.