Works matching DE "INTERNET privacy"
Results: 1444
Authentication Methods in Internet-of-Things Platform: A Comprehensive Review.
- Published in:
- Majlesi Journal of Telecommunication Devices, 2024, v. 13, n. 4, p. 239, doi. 10.71822/mjtd.2024.1123260
- By:
- Publication type:
- Article
The Islamic and Western Cultures and Values of Privacy.
- Published in:
- Muslim World Journal of Human Rights, 2019, v. 16, n. 1, p. 51, doi. 10.1515/mwjhr-2019-0004
- By:
- Publication type:
- Article
A Survey on Understanding and Representing Privacy Requirements in the Internet-of-Things.
- Published in:
- Journal of Artificial Intelligence Research, 2023, v. 76, p. 163, doi. 10.1613/jair.1.14000
- By:
- Publication type:
- Article
CRIMINAL LAW AND DIGITAL TECHNOLOGIES: AN INSTITUTIONAL APPROACH TO RULE CREATION IN A RAPIDLY ADVANCING AND COMPLEX SETTING.
- Published in:
- McGill Law Journal, 2019, v. 65, n. 1, p. 67, doi. 10.7202/1074418ar
- By:
- Publication type:
- Article
Use of Taxonomy of Privacy to Identify Activities Found in Social Networks' Terms of Use.
- Published in:
- Knowledge Organization, 2016, v. 43, n. 4, p. 285, doi. 10.5771/0943-7444-2016-4-285
- By:
- Publication type:
- Article
The Things We Didn't Learn in Library School.
- Published in:
- Alki: The Washington Library Association Journal, 2018, v. 34, n. 2, p. 7
- By:
- Publication type:
- Article
2014 WLA Conference: Arbitrary Highlights and Subjective Extrapolations.
- Published in:
- 2014
- By:
- Publication type:
- Proceeding
Privacy, Community and Limitations: Words & Ideas in the Digital World.
- Published in:
- Alki: The Washington Library Association Journal, 2014, v. 30, n. 2, p. 9
- By:
- Publication type:
- Article
Playing with Privacy: Games for Education and Communication in the Politics of Online Privacy.
- Published in:
- Political Studies, 2015, v. 63, n. 1, p. 142, doi. 10.1111/1467-9248.12049
- By:
- Publication type:
- Article
Ring signature-based blockchain for guaranteeing privacy preservation in online social networks.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 16, p. 47151, doi. 10.1007/s11042-023-17413-3
- By:
- Publication type:
- Article
Privacy protection and beautification of cornea images.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 22, p. 32421, doi. 10.1007/s11042-022-12530-x
- By:
- Publication type:
- Article
A new lightweight conditional privacy preserving authentication and key – agreement protocol in social internet of things for vehicle to smart grid networks.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 19, p. 27683, doi. 10.1007/s11042-022-12946-5
- By:
- Publication type:
- Article
Key Ethical Challenges in the European Medical Information Framework.
- Published in:
- Minds & Machines, 2019, v. 29, n. 3, p. 355, doi. 10.1007/s11023-018-9467-4
- By:
- Publication type:
- Article
An agent-based model of the development of friendship links within Facebook.
- Published in:
- Computational & Mathematical Organization Theory, 2013, v. 19, n. 2, p. 232, doi. 10.1007/s10588-013-9156-z
- By:
- Publication type:
- Article
SAFER SENIOR CITIZENS ONLINE.
- Published in:
- Forum Pedagogiczne / Pedagogical Forum, 2024, v. 14, n. 2, p. 215, doi. 10.21697/fp.2024.2.2.17
- By:
- Publication type:
- Article
O DESAFIO DA PROTEÇÃO DA PRIVACIDADE NA ERA DA INTERNET DAS COISAS: DA IDENTIFICAÇÃO À REGULAMENTAÇÃO NORMATIVA.
- Published in:
- Revista Foco (Interdisciplinary Studies Journal), 2023, v. 16, n. 7, p. 1, doi. 10.54751/revistafoco.v16n7-119
- By:
- Publication type:
- Article
حدود العالقة الزوجية بعد العقد وقبل الدخول المعلن.
- Published in:
- IUG Journal of Sharia & Law Studies, 2023, v. 31, n. 2, p. 1, doi. 10.33976/IUGJSLS.31.2/2023/1
- By:
- Publication type:
- Article
NEURODERECHO: ¿PROTECCIÓN SUFICIENTE DEL SER HUMANO O DISTOPÍAS TÉCNOLOGICAS?
- Published in:
- Revista Electrónica de Estudios Penales y de la Seguridad, 2023, v. 12, n. 1, p. 1
- By:
- Publication type:
- Article
Recognizing Everyday Activism: Understanding Resistance to Facial Recognition.
- Published in:
- Journal of Resistance Studies, 2019, v. 5, n. 2, p. 97
- By:
- Publication type:
- Article
A passive Digital footprint for Extranet environment.
- Published in:
- Al-Qadisiyah Journal of Pure Science, 2018, v. 23, n. 1, p. 152, doi. 10.29350/jops.2018.23.1.727
- By:
- Publication type:
- Article
TÜRKİYE VE NORVEÇ'TE DİN DERSİ ÖĞRETMENLERİNİN YETİŞTİRİLMESİ.
- Published in:
- Turkish Journal of Religious Education Studies / Türkiye Din Eğitimi Araştırmaları Dergisi, 2020, n. 9, p. 97
- By:
- Publication type:
- Article
Book Review: Behind the Screen: Content Moderation in the Shadows of Social Media.
- Published in:
- 2020
- By:
- Publication type:
- Book Review
Is This Thing On?: Massachusetts Wiretap Act Now Offers Little Protection.
- Published in:
- New England Law Review, 2022, v. 57, p. 75
- By:
- Publication type:
- Article
Contextual Integrity and Personal Health Information Sharing in Online Social Networks.
- Published in:
- Journal of the Association for Information Systems, 2024, v. 25, n. 6, p. 1500, doi. 10.17705/1jais.00892
- By:
- Publication type:
- Article
Time to Talk About It: Neurodiversity of Information Systems Users in Leisure Settings.
- Published in:
- Journal of the Association for Information Systems, 2024, v. 25, n. 5, p. 1343, doi. 10.17705/1jais.00877
- By:
- Publication type:
- Article
Reconciling the Personalization-Privacy Paradox: Exploring Privacy Boundaries in Online Personalized Advertising.
- Published in:
- Journal of the Association for Information Systems, 2022, v. 24, n. 1, p. 294, doi. 10.17705/1jais.00775
- By:
- Publication type:
- Article
Policy to Avoid a Privacy Disaster.
- Published in:
- Journal of the Association for Information Systems, 2019, v. 20, n. 6, p. 848, doi. 10.17705/1jais.00554
- By:
- Publication type:
- Article
"They're All the Same!" Stereotypical Thinking and Systematic Errors in Users' Privacy-Related Judgments About Online Services.
- Published in:
- Journal of the Association for Information Systems, 2019, v. 20, n. 6, p. 787, doi. 10.17705/1jais.00551
- By:
- Publication type:
- Article
Beyond Information: The Role of Territory in Privacy Management Behavior on Social Networking Sites.
- Published in:
- Journal of the Association for Information Systems, 2019, v. 20, n. 4, p. 434, doi. 10.17705/1jais.00540
- By:
- Publication type:
- Article
Cypherpunk ideology: objectives, profiles, and influences (1992–1998).
- Published in:
- Internet Histories, 2022, v. 6, n. 3, p. 315, doi. 10.1080/24701475.2021.1935547
- By:
- Publication type:
- Article
Privacy preserving scheme for document similarity detection.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2022, v. 30, n. 3, p. 609, doi. 10.55730/1300-0632.3801
- By:
- Publication type:
- Article
Privacy issues in post dissemination on Facebook.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2019, v. 27, n. 5, p. 3417, doi. 10.3906/elk-1811-25
- By:
- Publication type:
- Article
A NEW MULTI-PARTY PRIVATE SET INTERSECTION PROTOCOL BASED on OPRFs.
- Published in:
- Mugla Journal of Science & Technology, 2022, v. 8, n. 1, p. 69, doi. 10.22531/muglajsci.1075788
- By:
- Publication type:
- Article
Opening the door: inviting youth and parent perspectives on youth mental health emergency department use.
- Published in:
- Research Involvement & Engagement, 2020, v. 6, n. 1, p. 1, doi. 10.1186/s40900-020-00204-7
- By:
- Publication type:
- Article
Inteligencia Artificial, periodismo y democracia.
- Published in:
- Communication & Society, 2024, v. 37, n. 2, p. 293, doi. 10.15581/003.37.2.293-294
- By:
- Publication type:
- Article
The right to be forgotten on the Internet for children and teenagers. A survey in Spain.
- Published in:
- Communication & Society, 2022, v. 35, n. 4, p. 19, doi. 10.15581/003.35.4.19-36
- By:
- Publication type:
- Article
Central Bank Digital Currency, Cyber Security & Privacy.
- Published in:
- ISSA Journal, 2024, v. 22, n. 5, p. 16
- By:
- Publication type:
- Article
Converging Data Privacy and Security.
- Published in:
- ISSA Journal, 2020, v. 18, n. 8, p. 26
- By:
- Publication type:
- Article
Regaining Privacy?
- Published in:
- ISSA Journal, 2020, v. 18, n. 7, p. 9
- By:
- Publication type:
- Article
Enact in Haste...
- Published in:
- ISSA Journal, 2020, v. 18, n. 7, p. 8
- By:
- Publication type:
- Article
It's a Pendulum, Not a Tug-of-war...
- Published in:
- ISSA Journal, 2020, v. 18, n. 7, p. 5
- By:
- Publication type:
- Article
Privacy (by Itself) is Overrated.
- Published in:
- ISSA Journal, 2019, v. 17, n. 6, p. 5
- By:
- Publication type:
- Article
A Data-Centric, Defense-in-Depth Approach for Securing the Internet of Things.
- Published in:
- ISSA Journal, 2018, v. 16, n. 6, p. 40
- By:
- Publication type:
- Article
GDPR - What Does It Mean for Infosec?
- Published in:
- ISSA Journal, 2018, v. 16, n. 2, p. 8
- By:
- Publication type:
- Article
GDPRidiculous!
- Published in:
- ISSA Journal, 2018, v. 16, n. 2, p. 6
- By:
- Publication type:
- Article
Answer: May 25, 2018.
- Published in:
- ISSA Journal, 2018, v. 16, n. 2, p. 5
- By:
- Publication type:
- Article
Security and Privacy in Vehicular Clouds.
- Published in:
- ISSA Journal, 2017, v. 15, n. 11, p. 8
- By:
- Publication type:
- Article
I Made My Kid Cry.
- Published in:
- ISSA Journal, 2017, v. 15, n. 12, p. 6
- By:
- Publication type:
- Article
When You Cannot Be Silent: Whistle-Blowing 2.0.
- Published in:
- ISSA Journal, 2017, v. 15, n. 8, p. 32
- By:
- Publication type:
- Article
Blockchain Versus the GDPR.
- Published in:
- ISSA Journal, 2017, v. 15, n. 8, p. 8
- By:
- Publication type:
- Article