Works matching DE "GOVERNMENT policy on privacy"
1
- Government Technology, 2017, v. 30, n. 3, p. 8
- Article
2
- Nature, 2015, v. 525, n. 7570, p. 440, doi. 10.1038/525440a
- Article
3
- Denver Law Review, 2016, v. 93, n. 4, p. 925
- Article
4
- International Journal of Human Rights, 2017, v. 21, n. 7, p. 773, doi. 10.1080/13642987.2017.1298091
- Article
5
- International Journal of Public Administration, 2007, v. 30, n. 3, p. 289, doi. 10.1080/01900690601117770
- Jorgensen, Daniel J.;
- Klay, W. Earle
- Article
6
- Information & Communications Technology Law, 2019, v. 28, n. 3, p. 261, doi. 10.1080/13600834.2019.1644068
- Article
7
- Revista Derecho del Estado, 2013, p. 93
- de Andrade, Fábio Siebeneichler
- Article
8
- American Business Law Journal, 1992, v. 29, n. 4, p. 626, doi. 10.1111/j.1744-1714.1991.tb01527.x
- Article
9
- Journal of Electrical & Computer Engineering, 2017, p. 1, doi. 10.1155/2017/3053202
- Zhong, Jiezhuo;
- Wu, Wei;
- Cao, Chunjie;
- Feng, Wenlong
- Article
10
- Strategic Finance, 2003, v. 84, n. 12, p. 48
- Larson, Linda Lee;
- Larson, Robert K.;
- Greenlee, Janet
- Article
11
- William & Mary Law Review, 2010, v. 51, n. 6, p. 2243
- Article
13
- Renewable Energy Law & Policy Review (Claeys & Casteels BV), 2017, v. 8, n. 1, p. 19, doi. 10.4337/relp.2017.01.02
- Article
14
- Conflict Resolution & Negotiation Journal, 2014, v. 2014, n. 2, p. 110
- Schaaf, Rob;
- Curtman, Paul
- Article
16
- Akron Law Review, 2010, v. 43, n. 2, p. 331
- Article
17
- Berkeley Technology Law Journal, 2018, v. 33, n. 2, p. 365, doi. 10.15779/Z38B56D489
- Article
18
- Berkeley Technology Law Journal, 2010, v. 25, n. 1, p. 671
- Article
19
- Surveillance & Society, 2012, v. 10, n. 3/4, p. 344, doi. 10.24908/ss.v10i3/4.4528
- Article
20
- Stanford Technology Law Review, 2018, v. 21, n. 1, p. 74
- Article
21
- Journal of Homeland Security & Emergency Management, 2017, v. 14, n. 1, p. -1, doi. 10.1515/jhsem-2016-0060
- Biersteker, Erwin;
- Ferguson, Julie E.;
- Beersma, Bianca;
- Groenewegen, Peter
- Article
22
- JAMA: Journal of the American Medical Association, 1998, v. 279, n. 4, p. 257, doi. 10.1001/jama.279.4.257
- Article
23
- JAMA: Journal of the American Medical Association, 1996, v. 276, n. 4, p. 270, doi. 10.1001/jama.1996.03540040014007
- Article
24
- George Washington International Law Review, 2010, v. 42, n. 3, p. 659
- Article
25
- Journal of Supercomputing, 2016, v. 72, n. 1, p. 247, doi. 10.1007/s11227-015-1574-x
- Elmisery, Ahmed;
- Rho, Seungmin;
- Botvich, Dmitri
- Article
26
- Requirements Engineering, 2011, v. 16, n. 1, p. 33, doi. 10.1007/s00766-010-0108-6
- Article
27
- 2011
- Anton, Annie;
- Breaux, Travis;
- Gritzalis, Stefanos;
- Mylopoulos, John
- Editorial
28
- Nature, 1998, v. 392, n. 6671, p. 6, doi. 10.1038/32004
- Article
29
- European Data Protection Law Review (EDPL), 2017, v. 3, n. 2, p. 155, doi. 10.21552/edpl/2017/2/5
- Article
30
- European Data Protection Law Review (EDPL), 2017, v. 3, n. 2, p. 152, doi. 10.21552/edpl/2017/2/4
- Article
31
- European Data Protection Law Review (EDPL), 2017, v. 3, n. 2, p. 147, doi. 10.21552/edpl/2017/2/3
- Article
32
- Monash University Law Review, 2017, v. 43, n. 3, p. 796
- BROWN, MURRAY;
- DENT, CHRIS
- Article
33
- 2016
- Cartoon/Comic Strip
34
- Medical Laboratory Observer (MLO), 2001, v. 33, n. 9, p. 68
- Article
35
- American Intelligence Journal, 2015, v. 32, n. 1, p. 160
- Campbell, Herschel C. M.;
- Hess, James
- Article
36
- American Journal of Comparative Law, 2011, v. 59, n. 2, p. 411, doi. 10.5131/AJCL.2010.0017
- Article
37
- Information & Culture, 2018, v. 53, n. 2, p. 203, doi. 10.7560/IC53204
- Loughnane, Christopher;
- Aspray, William
- Article
38
- Information Security Journal: A Global Perspective, 2018, v. 27, n. 5/6, p. 260, doi. 10.1080/19393555.2019.1606368
- Kaur, Jasmin;
- Dara, Rozita A.;
- Obimbo, Charlie;
- Song, Fei;
- Menard, Karen
- Article
39
- Canadian Review of Sociology, 2012, v. 49, n. 4, p. 328, doi. 10.1111/j.1755-618X.2012.01298.x
- Lett, Dan;
- Hier, Sean;
- Walby, Kevin
- Article
40
- International Journal of Electronic Commerce, 2012, v. 16, n. 4, p. 53, doi. 10.2753/JEC1086-4415160403
- Zhao, Ling;
- Lu, Yaobin;
- Gupta, Sumeet
- Article
41
- Georgia State University Law Review, 2017, v. 33, n. 2, p. 359
- Article
42
- Public Administration Review, 1996, v. 56, n. 1, p. 30, doi. 10.2307/3110051
- Fine, Cory R.;
- Reeves, T. Zane;
- Harney, George P.
- Article
43
- Journal of Economic Literature, 2016, v. 54, n. 2, p. 442, doi. 10.1257/jel.54.2.442
- TAYLOR, CURTIS;
- WAGMAN, LIAD;
- ACQUISTI, ALESSANDRO
- Article
45
- Internal Auditor, 2016, v. 73, n. 5, p. 42
- Sheth, Parthiv;
- Wasti, Khalid;
- Smith, A. Michael
- Article
46
- Statute Law Review, 1997, v. 18, n. 3, p. 208, doi. 10.1093/slr/18.3.208
- Article
47
- European Review of Public Law, 2016, v. 28, n. 3, p. 949
- KOVANIČ, MARTIN;
- LÁŠTIC, ERIK
- Article
48
- University of Toledo Law Review, 2017, v. 49, n. 1, p. 179
- Article
49
- i-Manager's Journal on Computer Science, 2015, v. 3, n. 4, p. 36
- SANTHIYA, J.;
- NIROSHA, K.;
- KALAIVANI, N.;
- JAYANTHINISHA, R.;
- KAMATCHI, K.
- Article
50
- 2007
- Fost, Norman;
- Levine, Robert J.
- Editorial