Works matching DE "INTERNET privacy"
Results: 1464
State Sponsored Cyber Surveillance: The Right to Privacy of Communications and International Law.
- Published in:
- 2024
- By:
- Publication type:
- Book Review
South African Generation Y students’ self-disclosure on Facebook.
- Published in:
- South African Journal of Psychology, 2016, v. 46, n. 1, p. 114, doi. 10.1177/0081246315602645
- By:
- Publication type:
- Article
Use of Taxonomy of Privacy to Identify Activities Found in Social Networks' Terms of Use.
- Published in:
- Knowledge Organization, 2016, v. 43, n. 4, p. 285, doi. 10.5771/0943-7444-2016-4-285
- By:
- Publication type:
- Article
Wafer‐Scale High‐Yield Manufacturing of Degradable Electronics for Environmental Monitoring.
- Published in:
- Advanced Functional Materials, 2019, v. 29, n. 50, p. N.PAG, doi. 10.1002/adfm.201905518
- By:
- Publication type:
- Article
Collaborative caching for efficient dissemination of personalized video streams in resource constrained environments.
- Published in:
- Multimedia Systems, 2014, v. 20, n. 1, p. 1, doi. 10.1007/s00530-012-0300-2
- By:
- Publication type:
- Article
A Design of Secure Communication Protocol Using RLWE-Based Homomorphic Encryption in IoT Convergence Cloud Environment.
- Published in:
- Wireless Personal Communications, 2019, v. 105, n. 2, p. 599, doi. 10.1007/s11277-018-6083-9
- By:
- Publication type:
- Article
A Trust Scheme Based on Vehicles Reports of Events in VANETs.
- Published in:
- Wireless Personal Communications, 2019, v. 105, n. 1, p. 121, doi. 10.1007/s11277-018-6106-6
- By:
- Publication type:
- Article
Feature Selection Based Correlation Attack on HTTPS Secure Searching.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 4, p. 2995, doi. 10.1007/s11277-018-5989-6
- By:
- Publication type:
- Article
Secure Disintegration Protocol for Privacy Preserving Cloud Storage.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 2, p. 1161, doi. 10.1007/s11277-018-5284-6
- By:
- Publication type:
- Article
An Anonymous Authentication Scheme with the Enhanced Security for Wireless Communications.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 2, p. 2665, doi. 10.1007/s11277-017-4629-x
- By:
- Publication type:
- Article
An Improved Algorithm of Individuation K-Anonymity for Multiple Sensitive Attributes.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 2003, doi. 10.1007/s11277-016-3922-4
- By:
- Publication type:
- Article
Privacy Model for Threshold RFID System Based on PUF.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 2803, doi. 10.1007/s11277-017-3965-1
- By:
- Publication type:
- Article
Prywatność vs. świat wirtualny: ochrona praw jednostki w dobie Internetu.
- Published in:
- Studia Prawa Publicznego, 2023, v. 43, n. 3, p. 153, doi. 10.14746/spp.2023.3.43.6
- By:
- Publication type:
- Article
基于区块链的物联网多域数据共享机制.
- Published in:
- Electronic Science & Technology, 2024, v. 37, n. 10, p. 55, doi. 10.16180/j.cnki.issn1007-7820.2024.10.008
- By:
- Publication type:
- Article
O DESAFIO DA PROTEÇÃO DA PRIVACIDADE NA ERA DA INTERNET DAS COISAS: DA IDENTIFICAÇÃO À REGULAMENTAÇÃO NORMATIVA.
- Published in:
- Revista Foco (Interdisciplinary Studies Journal), 2023, v. 16, n. 7, p. 1, doi. 10.54751/revistafoco.v16n7-119
- By:
- Publication type:
- Article
THE CRITICAL ROLE OF PRIVACY AND SAFETY KNOWLEDGE IN THE DIGITAL AGE.
- Published in:
- Knowledge: International Journal, 2024, v. 65, n. 6, p. 1123
- By:
- Publication type:
- Article
مرويات الرحالة ابن بطوطة عن سلطان دولة مغول فارس والعراق (الايلخانيين) بو سعيد بهادر (716 - 736هـ)
- Published in:
- Al-Adab / Al-ādāb, 2019, n. 130, p. 225
- By:
- Publication type:
- Article
عناصر بناء محتوى المواقع الإلكترونية الحكومية: د ا رسة تجريبية
- Published in:
- Al-Bahith Al-Aalami, 2019, v. 11, n. 46, p. 71
- By:
- Publication type:
- Article
انتهاك الخصوصية في مواقع التواصل الاجتماعي (بحث مستل)
- Published in:
- Al-Bahith Al-Aalami, 2017, v. 9, n. 36, p. 213, doi. 10.33282/abaa.v9i36.121
- By:
- Publication type:
- Article
k-均值问题的差分隐私算法综述.
- Published in:
- Operations Research Transactions / Yunchouxue Xuebao, 2022, v. 26, n. 3, p. 1, doi. 10.15960/j.cnki.issn.1007-6093.2022.03.001
- By:
- Publication type:
- Article
PRIVACY CONCERNS ON THE INTERNET: INVESTIGATING THE ATTITUDES AND BEHAVIOURS OF YOUNG INTERNET USERS TO ONLINE ANONYMITY.
- Published in:
- Romanian Journal of Sociological Studies, 2017, n. 1, p. 89
- By:
- Publication type:
- Article
QUALE UMANESIMO PER LA SOCIETÀ DEL FUTURO?
- Published in:
- Asprenas, 2019, v. 66, n. 4, p. 383
- By:
- Publication type:
- Article
Predicting Facebook Users’ Online Privacy Protection: Risk, Trust, Norm Focus Theory, and the Theory of Planned Behavior.
- Published in:
- Journal of Social Psychology, 2014, v. 154, n. 4, p. 352, doi. 10.1080/00224545.2014.914881
- By:
- Publication type:
- Article
Protection of privacy in Bangladesh: issues, challenges and way forward.
- Published in:
- International Journal of Human Rights, 2024, v. 28, n. 1, p. 89, doi. 10.1080/13642987.2023.2234296
- By:
- Publication type:
- Article
Exploring the impacts of artificial intelligence on freedom of religion or belief online.
- Published in:
- International Journal of Human Rights, 2022, v. 26, n. 5, p. 757, doi. 10.1080/13642987.2021.1968376
- By:
- Publication type:
- Article
Indonesian constitutional rights: expressing and purposing opinions on the internet.
- Published in:
- International Journal of Human Rights, 2021, v. 25, n. 9, p. 1395, doi. 10.1080/13642987.2020.1826450
- By:
- Publication type:
- Article
Sharentíng: Adicción a Internet, autocontrol y fotografías online de menores.
- Published in:
- Comunicar, 2020, v. 28, n. 64, p. 97, doi. 10.3916/C64-2020-09
- By:
- Publication type:
- Article
Smart Contract-Based Access Control Framework for Internet of Things Devices.
- Published in:
- Computers (2073-431X), 2023, v. 12, n. 11, p. 240, doi. 10.3390/computers12110240
- By:
- Publication type:
- Article
Network Intrusion Detection with a Hashing Based Apriori Algorithm Using Hadoop MapReduce.
- Published in:
- Computers (2073-431X), 2019, v. 8, n. 4, p. 86, doi. 10.3390/computers8040086
- By:
- Publication type:
- Article
Privacy Awareness Monitoring.
- Published in:
- Management Issues / Problemy Zarządzania, 2019, v. 17, n. 5, p. 111, doi. 10.7172/1644-9584.85.7
- By:
- Publication type:
- Article
Where you go is who you are: a study on machine learning based semantic privacy attacks.
- Published in:
- Journal of Big Data, 2024, v. 11, n. 1, p. 1, doi. 10.1186/s40537-024-00888-8
- By:
- Publication type:
- Article
Privacy preserved incremental record linkage.
- Published in:
- Journal of Big Data, 2022, v. 9, n. 1, p. 1, doi. 10.1186/s40537-022-00655-7
- By:
- Publication type:
- Article
More Consumers Concerned About Companies Sharing Data than Government Surveillance Programmes.
- Published in:
- Document News, 2012, v. 30, n. 5/6, p. 11
- Publication type:
- Article
Privacy Conundrums In The Age Of Social Media - A Critical Analysis.
- Published in:
- Journal of Namibian Studies, 2023, v. 38, p. 789
- By:
- Publication type:
- Article
Customer Perception Of Online Marketplace Competitiveness In Malaysia: The Moderating Effect Of Trialability.
- Published in:
- Journal of Namibian Studies, 2023, v. 33, p. 3184
- By:
- Publication type:
- Article
"Impact Of Social Media On Digital Society".
- Published in:
- Journal of Namibian Studies, 2023, v. 33, p. 4101
- By:
- Publication type:
- Article
Analysis of Validity and Evidentiary Effectiveness of Surreptitious Recordings.
- Published in:
- Journal of Namibian Studies, 2023, v. 33, p. 3009
- By:
- Publication type:
- Article
PODRIVANJE ANONIMNOSTI U DOBA INTERNETA.
- Published in:
- Anali Pravnog Fakulteta u Beogradu, 2022, v. 70, n. 1, p. 159, doi. 10.51204/Anali_PFBU_22106A
- By:
- Publication type:
- Article
The Impact of Digital Transformation on Business Performance: A Study of Pakistani SMEs.
- Published in:
- Engineering, Technology & Applied Science Research, 2019, v. 9, n. 6, p. 5056, doi. 10.48084/etasr.3201
- By:
- Publication type:
- Article
Privacy-Preserving Data Mining based on Integrated Customer Databases from Different Enterprises.
- Published in:
- Economy Informatics, 2014, v. 14, n. 1, p. 14
- By:
- Publication type:
- Article
Predictors of fairness assessment for social media screening in employee selection.
- Published in:
- Journal of Entrepreneurship, Management & Innovation, 2023, v. 19, n. 2, p. 99, doi. 10.7341/20231923
- By:
- Publication type:
- Article
Understanding the Benefits and Costs of the Digital Economy Digital Economic Policy.
- Published in:
- Economic Record, 2023, v. 99, n. 325, p. 323, doi. 10.1111/1475-4932.12742
- By:
- Publication type:
- Article
SAFETY ASPECTS IN SHARED MEDICAL IT ENVIRONMENT.
- Published in:
- Journal of Information Technology & Applications, 2018, v. 8, n. 2, p. 86, doi. 10.7251/JIT1802086D
- By:
- Publication type:
- Article
Exploring the Effects of the Privacy-Handling Management Styles of Social Networking Sites on User Satisfaction: A Conflict Management Perspective.
- Published in:
- Decision Sciences, 2017, v. 48, n. 5, p. 956, doi. 10.1111/deci.12243
- By:
- Publication type:
- Article
DOSARUL ELECTRONIC DE SĂNĂTATE – REPERE ACTUALE, VULNERABILITĂȚI ȘI SOLUȚII.
- Published in:
- Dreptul, 2022, n. 10, p. 68
- By:
- Publication type:
- Article
Fear for Doocing and Digital Privacy in the Workplace: A Dual Pathway Model.
- Published in:
- Management Revue, 2018, v. 29, n. 2, p. 162, doi. 10.5771/0935-9915-2018-2-162
- By:
- Publication type:
- Article
Data Privacy and Displacement: A Cultural Approach.
- Published in:
- Journal of Refugee Studies, 2021, v. 34, n. 2, p. 2291, doi. 10.1093/jrs/feaa004
- By:
- Publication type:
- Article
PubHubs identity management.
- Published in:
- Journal of Logic & Computation, 2024, v. 34, n. 7, p. 1377, doi. 10.1093/logcom/exad062
- By:
- Publication type:
- Article
Enhancing HCI Through Real-Time Gesture Recognition with Federated CNNs: Improving Performance and Responsiveness.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 4, p. 859, doi. 10.14569/ijacsa.2024.0150489
- By:
- Publication type:
- Article
Analyzing Privacy Implications and Security Vulnerabilities in Single Sign-On Systems: A Case Study on OpenID Connect.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 4, p. 637, doi. 10.14569/ijacsa.2024.0150465
- By:
- Publication type:
- Article