Статті в журналах з теми "Sensitive information"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Sensitive information".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
SIVÁK, Jaroslav. "SENSITIVE INFORMATION." Krízový Manažment 14, no. 1 (March 30, 2015): 23–29. http://dx.doi.org/10.26552/krm.c.2015.1.23-29.
Повний текст джерелаNicklisch, Andreas, Kristoffel Grechenig, and Christian Thöni. "Information-sensitive Leviathans." Journal of Public Economics 144 (December 2016): 1–13. http://dx.doi.org/10.1016/j.jpubeco.2016.09.008.
Повний текст джерелаPRICE, LINDA L., LAWRENCE F. FEICK, and ROBIN A. HIGIE. "Information Sensitive Consumers and Market Information." Journal of Consumer Affairs 21, no. 2 (December 1987): 328–41. http://dx.doi.org/10.1111/j.1745-6606.1987.tb00206.x.
Повний текст джерелаNAWA, Kotaro. "Sensitive, but unclassified information." Journal of Information Processing and Management 48, no. 4 (2005): 243–44. http://dx.doi.org/10.1241/johokanri.48.243.
Повний текст джерелаVernon;, D. P. "Sensitive Versus Classified Information." Science 306, no. 5697 (October 29, 2004): 811e—812e. http://dx.doi.org/10.1126/science.306.5697.811e.
Повний текст джерелаConley, Sharon. "Keeping Sensitive Information Private." NASNewsletter 22, no. 4 (July 2007): 21. http://dx.doi.org/10.1177/104747570702200407.
Повний текст джерелаJaswal, S. K., and T. Harpham. "Getting Sensitive Information on Sensitive Issues: Gynaecological Morbidity." Health Policy and Planning 12, no. 2 (January 1, 1997): 173–78. http://dx.doi.org/10.1093/heapol/12.2.173.
Повний текст джерелаBesorai, Ahal. "Tentative Information, Inside Information, Price‐sensitive Information and Materiality." Journal of Financial Crime 3, no. 3 (January 1996): 268–71. http://dx.doi.org/10.1108/eb025719.
Повний текст джерелаINAMURA, Tomoaki, and Haruki MADARAME. "ICONE15-10612 Control of Information Relating to Sensitive Nuclear Technology (DRAFT^*)." Proceedings of the International Conference on Nuclear Engineering (ICONE) 2007.15 (2007): _ICONE1510. http://dx.doi.org/10.1299/jsmeicone.2007.15._icone1510_334.
Повний текст джерелаSu, Linping, and Zhipeng Liu. "A T-similarity Sensitive Information Protection Method Based on Sensitive Information Gradient Partition." Journal of Physics: Conference Series 2030, no. 1 (September 1, 2021): 012059. http://dx.doi.org/10.1088/1742-6596/2030/1/012059.
Повний текст джерелаSong, D., and P. D. Bruza. "Towards context sensitive information inference." Journal of the American Society for Information Science and Technology 54, no. 4 (2003): 321–34. http://dx.doi.org/10.1002/asi.10213.
Повний текст джерелаBernstein, Adam. "Keeping business-sensitive information safe." Nursing and Residential Care 25, no. 1 (January 2, 2023): 1–3. http://dx.doi.org/10.12968/nrec.2022.0061.
Повний текст джерелаRajamäki, Jyri, Ilkka Tikanmäki, and Jari Räsänen. "CISE as a Tool for Sharing Sensitive Cyber Information in Maritime Domain." Information & Security: An International Journal 43, no. 2 (2019): 215–35. http://dx.doi.org/10.11610/isij.4317.
Повний текст джерелаMartínez, V. Gayoso, L. Hernández Encinas, A. Queiruga Dios, A. Hernández Encinas, and J. Martín Vaquero. "Avoiding Sensitive Information Leakage in Moodle." Literacy Information and Computer Education Journal Special 2, no. 2 (September 1, 2013): 1422–32. http://dx.doi.org/10.20533/licej.2040.2589.2013.0190.
Повний текст джерелаWALTER, CATHY M. "How biometrics keep sensitive information secure." Nursing 35, no. 5 (May 2005): 76. http://dx.doi.org/10.1097/00152193-200505000-00058.
Повний текст джерелаChou, Winston, Kosuke Imai, and Bryn Rosenfeld. "Sensitive Survey Questions with Auxiliary Information." Sociological Methods & Research 49, no. 2 (December 11, 2017): 418–54. http://dx.doi.org/10.1177/0049124117729711.
Повний текст джерелаWu, Jimmy Ming-Tai, Gautam Srivastava, Alireza Jolfaei, Philippe Fournier-Viger, and Jerry Chun-Wei Lin. "Hiding sensitive information in eHealth datasets." Future Generation Computer Systems 117 (April 2021): 169–80. http://dx.doi.org/10.1016/j.future.2020.11.026.
Повний текст джерелаLamming, Richard, Nigel Caldwell, Wendy Phillips, and Deborah Harrison. "Sharing Sensitive Information in Supply Relationships:." European Management Journal 23, no. 5 (October 2005): 554–63. http://dx.doi.org/10.1016/j.emj.2005.09.010.
Повний текст джерелаStolfo, Salvatore J., and Gene Tsudik. "Privacy-Preserving Sharing of Sensitive Information." IEEE Security & Privacy Magazine 8, no. 4 (July 2010): 16–17. http://dx.doi.org/10.1109/msp.2010.135.
Повний текст джерелаMurphy, Daniel. "Disclosure and sharing of sensitive information." Journal of Financial Crime 13, no. 4 (October 2006): 420–41. http://dx.doi.org/10.1108/13590790610707555.
Повний текст джерелаLarson, David K., and Keith W. Miller. "When Sensitive IT Information Crosses Borders." IT Professional 11, no. 4 (July 2009): 56–59. http://dx.doi.org/10.1109/mitp.2009.85.
Повний текст джерелаBeneš, Vaclav E., and Robert J. Elliott. "Finite Dimensional Risk Sensitive Information States." IFAC Proceedings Volumes 28, no. 14 (June 1995): 429–34. http://dx.doi.org/10.1016/s1474-6670(17)46867-4.
Повний текст джерелаTilling, Simon. "Access to commercially sensitive environmental information." ERA Forum 14, no. 4 (November 29, 2013): 493–506. http://dx.doi.org/10.1007/s12027-013-0329-5.
Повний текст джерелаAthitsos, Vassilis, Marios Hadjieleftheriou, George Kollios, and Stan Sclaroff. "Query-sensitive embeddings." ACM Transactions on Database Systems 32, no. 2 (June 2007): 8. http://dx.doi.org/10.1145/1242524.1242525.
Повний текст джерелаHammer, Christian, and Gregor Snelting. "Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs." International Journal of Information Security 8, no. 6 (June 27, 2009): 399–422. http://dx.doi.org/10.1007/s10207-009-0086-1.
Повний текст джерелаBedford, Andrew, Stephen Chong, Josée Desharnais, Elisavet Kozyri, and Nadia Tawbi. "A progress-sensitive flow-sensitive inlined information-flow control monitor (extended version)." Computers & Security 71 (November 2017): 114–31. http://dx.doi.org/10.1016/j.cose.2017.04.001.
Повний текст джерелаTsuchiya, Ryuji, Akihiko Matsuoka, Takahiko Ogino, Kouich Goto, Toshiro Nakao, and Hajime Takebayashi. "Location-sensitive Itinerary-based Passenger Information System." IEEJ Transactions on Industry Applications 125, no. 4 (2005): 338–47. http://dx.doi.org/10.1541/ieejias.125.338.
Повний текст джерелаBarachevsky, Valery A., Yury P. Strokach, Yury A. Puankov, Olga I. Kobeleva, Tatyana M. Valova, Konstantin S. Levchenko, Vladimir N. Yaroshenko, and Michail M. Krayushkin. "Light-sensitive heterocyclic compounds for information nanotechnologies." Arkivoc 2009, no. 9 (June 21, 2008): 70–95. http://dx.doi.org/10.3998/ark.5550190.0010.906.
Повний текст джерелаSridhar, Aparna, Rosibel Hernandez, and Erin Duffy. "Primary Sources of Sensitive Reproductive Health Information." Obstetrics & Gynecology 127 (May 2016): 115S. http://dx.doi.org/10.1097/01.aog.0000483473.31199.7a.
Повний текст джерелаFord, Carol A., Susan G. Millstein, Bonnie Halpern-Felsher, and Charles E. Irwin. "Confidentiality and adolescents' disclosure of sensitive information." Journal of Adolescent Health 18, no. 2 (February 1996): 111. http://dx.doi.org/10.1016/1054-139x(96)00011-0.
Повний текст джерелаGuo, Yongyan, Jiayong Liu, Wenwu Tang, and Cheng Huang. "Exsense: Extract sensitive information from unstructured data." Computers & Security 102 (March 2021): 102156. http://dx.doi.org/10.1016/j.cose.2020.102156.
Повний текст джерелаKim, Sung-Hwan, Nam-Uk Kim, and Tai-Myoung Chung. "Study on sensitive information leakage vulnerability modeling." Kybernetes 44, no. 1 (January 12, 2015): 77–88. http://dx.doi.org/10.1108/k-05-2014-0106.
Повний текст джерелаGalobardes, Bruna, and Stefaan Demarest. "Asking sensitive information: an example with income." Sozial- und Pr�ventivmedizin/Social and Preventive Medicine 48, no. 1 (March 1, 2003): 70–72. http://dx.doi.org/10.1007/s000380300008.
Повний текст джерелаGuo, Dongdan, Hao Sun, Tao Zhu, and Chang Cai. "An Automated Recognition Model for Sensitive Information." Journal of Physics: Conference Series 1575 (June 2020): 012043. http://dx.doi.org/10.1088/1742-6596/1575/1/012043.
Повний текст джерелаReeser, Linda Cherrey, and Robert A. Wertkin. "Sharing Sensitive Student Information With Field Instructors." Journal of Social Work Education 33, no. 2 (April 1997): 347–62. http://dx.doi.org/10.1080/10437797.1997.10778875.
Повний текст джерелаRollestone, Giles. "Networked information services in context-sensitive environments." Interactions 11, no. 2 (March 2004): 67–69. http://dx.doi.org/10.1145/971258.971282.
Повний текст джерелаTombros, Anastasios, and C. J. van Rijsbergen. "Query-Sensitive Similarity Measures for Information Retrieval." Knowledge and Information Systems 6, no. 5 (January 15, 2004): 617–42. http://dx.doi.org/10.1007/s10115-003-0115-8.
Повний текст джерелаThompson, E. Dale, and Michelle L. Kaarst-Brown. "Sensitive information: A review and research agenda." Journal of the American Society for Information Science and Technology 56, no. 3 (2005): 245–57. http://dx.doi.org/10.1002/asi.20121.
Повний текст джерелаBast, Holger, Christian W. Mortensen, and Ingmar Weber. "Output-sensitive autocompletion search." Information Retrieval 11, no. 4 (March 4, 2008): 269–86. http://dx.doi.org/10.1007/s10791-008-9048-x.
Повний текст джерелаMary A, Geetha, D. P. Acharjya, and N. Ch S. N. Iyengar. "Improved Anonymization Algorithms for Hiding Sensitive Information in Hybrid Information System." International Journal of Computer Network and Information Security 6, no. 6 (May 8, 2014): 9–17. http://dx.doi.org/10.5815/ijcnis.2014.06.02.
Повний текст джерелаMaviglia, Saverio M., Catherine S. Yoon, David W. Bates, and Gilad Kuperman. "KnowledgeLink: Impact of Context-Sensitive Information Retrieval on Clinicians' Information Needs." Journal of the American Medical Informatics Association 13, no. 1 (January 2006): 67–73. http://dx.doi.org/10.1197/jamia.m1861.
Повний текст джерелаDueck, Gunter. "Highly Sensitive!" Informatik-Spektrum 28, no. 2 (April 2005): 151–57. http://dx.doi.org/10.1007/s00287-005-00475-4.
Повний текст джерелаKim, Jeongeun, Howard Dubowitz, Elizabeth Hudson-Martin, and Wendy Lane. "Comparison of 3 Data Collection Methods for Gathering Sensitive and Less Sensitive Information." Ambulatory Pediatrics 8, no. 4 (July 2008): 255–60. http://dx.doi.org/10.1016/j.ambp.2008.03.033.
Повний текст джерелаTsai, Cheng-Jung, Chien-I. Lee, and Wei-Pang Yang. "An Efficient and Sensitive Decision Tree Approach to Mining Concept-Drifting Data Streams." Informatica 19, no. 1 (January 1, 2008): 135–56. http://dx.doi.org/10.15388/informatica.2008.206.
Повний текст джерелаCollins, Maria D. D., and Christine L. Ferguson. "Context-Sensitive Linking." Serials Review 28, no. 4 (December 2002): 267–82. http://dx.doi.org/10.1080/00987913.2002.10764759.
Повний текст джерелаCondliffe, Anna. "Freedom of Information: Exemptions for Confidential Information." Business Law Review 28, Issue 7 (July 1, 2007): 206–8. http://dx.doi.org/10.54648/bula2007034.
Повний текст джерелаCheng, Xian Yi, Wei Kang, and Yu Guo. "An Algorithm of Network Sensitive Information Features Extracting." Applied Mechanics and Materials 556-562 (May 2014): 3558–61. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.3558.
Повний текст джерелаOh, Jin-Kwan, Seh-La Oh, Kwang-Hoon Choi, and Jin-Hee Yim. "A Study on Sensitive Information Filtering Requirements for Supporting Original Information Disclosure." Journal of Records Management & Archives Society of Korea 17, no. 1 (February 28, 2017): 51–71. http://dx.doi.org/10.14404/jksarm.2017.17.1.051.
Повний текст джерелаJiang, Ying, Ming Jing, Jie Zeng, Feng Qi Shen, Du Lan Qi, and Li Hua Wang. "LanguageTool Based Proofreading of Sensitive Chinese Political Information." Applied Mechanics and Materials 687-691 (November 2014): 2644–47. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2644.
Повний текст джерелаKiran, Asha, Manimala Puri, and S. Srinivasa. "Preserving Sensitive Information using Fuzzy C-Means Approach." International Journal of Computer Applications 181, no. 10 (August 14, 2018): 40–46. http://dx.doi.org/10.5120/ijca2018917656.
Повний текст джерела