Works matching DE "CONFIDENTIAL communications


Results: 3243
    1
    2
    3
    4
    5
    6

    Copyright or Fair Use?

    Published in:
    TechTrends: Linking Research & Practice to Improve Learning, 2007, v. 51, n. 2, p. 13, doi. 10.1007/s11528-007-0016-x
    By:
    • DuBoff, Leonard D.
    Publication type:
    Article
    7
    8
    9
    10

    CONFIDENTIAL COMMUNICATION.

    Published in:
    Simulation & Gaming, 2015, v. 46, n. 5, p. 591, doi. 10.1177/1046878115600923
    By:
    • Sher, Shlomo
    Publication type:
    Article
    11
    12
    13
    14
    15
    16

    Major Cases.

    Published in:
    International Review of Law, Computers & Technology, 1999, v. 13, n. 2, p. 255, doi. 10.1080/13600869955189
    By:
    • Cameron, Euan
    Publication type:
    Article
    17
    18
    19
    20
    21
    22
    23
    24

    RETHINKING PRIVACY.

    Published in:
    Government Technology, 2014, v. 27, n. 5, p. 20
    By:
    • WOOD, COLIN
    Publication type:
    Article
    25
    26

    THE PROSPECTS FOR PRIVACY.

    Published in:
    Political Quarterly, 1981, v. 52, n. 3, p. 295, doi. 10.1111/j.1467-923X.1981.tb02807.x
    By:
    • Cornford, James
    Publication type:
    Article
    27

    DEMOCRACY IN THE AGE OF SCIENCE.

    Published in:
    Political Quarterly, 1979, v. 50, n. 1, p. 7, doi. 10.1111/j.1467-923X.1979.tb02433.x
    By:
    • Benn, Anthony Wedgwood
    Publication type:
    Article
    28

    OFFICIAL SECRETS.

    Published in:
    Political Quarterly, 1978, v. 49, n. 4, p. 397
    Publication type:
    Article
    29

    The Official Secrets Acts.

    Published in:
    Political Quarterly, 1973, v. 44, n. 1, p. 88, doi. 10.1111/j.1467-923X.1973.tb02080.x
    By:
    • Drewry, Gavin
    Publication type:
    Article
    30
    31

    Editorial: Official Information.

    Published in:
    Public Administration, 1978, v. 56, n. 3, p. 253, doi. 10.1111/j.1467-9299.1978.tb00326.x
    By:
    • Lee, J.M.
    Publication type:
    Article
    32
    33
    34
    35
    36

    A survey of RFID privacy approaches.

    Published in:
    Personal & Ubiquitous Computing, 2009, v. 13, n. 6, p. 413, doi. 10.1007/s00779-008-0213-4
    By:
    • Langheinrich, Marc
    Publication type:
    Article
    37

    How can we improve the codes of ethics for translators?

    Published in:
    Babel: International Journal of Translation / Revue Internationale de la Traduction / Revista Internacional de Traducción, 2020, v. 66, n. 4/5, p. 706, doi. 10.1075/babel.00190.yun
    By:
    • Lee, Hyang;
    • Yun, Seong Woo
    Publication type:
    Article
    38
    39
    40
    41
    42
    43
    44
    45
    46

    Identity Crisis.

    Published in:
    Marketing Research, 2005, v. 17, n. 4, p. 8
    By:
    • Bowers, Diane K.
    Publication type:
    Article
    47
    48
    49
    50