Works matching DE "GOVERNMENT policy on privacy"
2
- Revista Derecho del Estado, 2013, p. 93
- de Andrade, Fábio Siebeneichler
- Article
3
- Statute Law Review, 1997, v. 18, n. 3, p. 208, doi. 10.1093/slr/18.3.208
- Article
4
- 2007
- Fost, Norman;
- Levine, Robert J.
- Editorial
5
- Information Systems Frontiers, 2013, v. 15, n. 2, p. 279, doi. 10.1007/s10796-011-9336-7
- Reay, I.;
- Beatty, P.;
- Dick, S.;
- Miller, J.
- Article
6
- TISK Academy / TISK Akademi, 2008, v. 3, n. 6, p. 128
- Article
8
- William & Mary Law Review, 2010, v. 51, n. 6, p. 2243
- Article
9
- European Data Protection Law Review (EDPL), 2017, v. 3, n. 2, p. 155, doi. 10.21552/edpl/2017/2/5
- Article
10
- European Data Protection Law Review (EDPL), 2017, v. 3, n. 2, p. 152, doi. 10.21552/edpl/2017/2/4
- Article
11
- European Data Protection Law Review (EDPL), 2017, v. 3, n. 2, p. 147, doi. 10.21552/edpl/2017/2/3
- Article
12
- Denver Law Review, 2016, v. 93, n. 4, p. 925
- Article
13
- Internal Auditor, 2016, v. 73, n. 5, p. 42
- Sheth, Parthiv;
- Wasti, Khalid;
- Smith, A. Michael
- Article
14
- Conflict Resolution & Negotiation Journal, 2014, v. 2014, n. 2, p. 110
- Schaaf, Rob;
- Curtman, Paul
- Article
15
- JAMA: Journal of the American Medical Association, 1996, v. 276, n. 4, p. 270, doi. 10.1001/jama.1996.03540040014007
- Article
16
- Canadian Review of Sociology, 2012, v. 49, n. 4, p. 328, doi. 10.1111/j.1755-618X.2012.01298.x
- Lett, Dan;
- Hier, Sean;
- Walby, Kevin
- Article
17
- Berkeley Technology Law Journal, 2018, v. 33, n. 2, p. 365, doi. 10.15779/Z38B56D489
- Article
18
- Berkeley Technology Law Journal, 2010, v. 25, n. 1, p. 671
- Article
19
- Surveillance & Society, 2012, v. 10, n. 3/4, p. 344, doi. 10.24908/ss.v10i3/4.4528
- Article
20
- Stanford Technology Law Review, 2018, v. 21, n. 1, p. 74
- Article
21
- American Journal of Comparative Law, 2011, v. 59, n. 2, p. 411, doi. 10.5131/AJCL.2010.0017
- Article
22
- Information & Culture, 2018, v. 53, n. 2, p. 203, doi. 10.7560/IC53204
- Loughnane, Christopher;
- Aspray, William
- Article
23
- Renewable Energy Law & Policy Review (Claeys & Casteels BV), 2017, v. 8, n. 1, p. 19, doi. 10.4337/relp.2017.01.02
- Article
25
- International Journal of Bifurcation & Chaos in Applied Sciences & Engineering, 2017, v. 27, n. 5, p. -1, doi. 10.1142/S0218127417500730
- Sun, Jianglin;
- Liao, Xiaofeng;
- Chen, Xin;
- Guo, Shangwei
- Article
27
- Youth Justice, 2016, v. 16, n. 1, p. 49, doi. 10.1177/1473225415587737
- Article
28
- Public Administration Review, 1996, v. 56, n. 1, p. 30, doi. 10.2307/3110051
- Fine, Cory R.;
- Reeves, T. Zane;
- Harney, George P.
- Article
29
- Requirements Engineering, 2011, v. 16, n. 1, p. 33, doi. 10.1007/s00766-010-0108-6
- Article
30
- 2011
- Anton, Annie;
- Breaux, Travis;
- Gritzalis, Stefanos;
- Mylopoulos, John
- Editorial
31
- Appeal: Review of Current Law & Law Reform, 2016, v. 21, p. 59
- Article
32
- JAMA: Journal of the American Medical Association, 1998, v. 279, n. 4, p. 257, doi. 10.1001/jama.279.4.257
- Article
33
- European Review of Public Law, 2016, v. 28, n. 3, p. 949
- KOVANIČ, MARTIN;
- LÁŠTIC, ERIK
- Article
34
- Information Security Journal: A Global Perspective, 2018, v. 27, n. 5/6, p. 260, doi. 10.1080/19393555.2019.1606368
- Kaur, Jasmin;
- Dara, Rozita A.;
- Obimbo, Charlie;
- Song, Fei;
- Menard, Karen
- Article
35
- Strategic Finance, 2003, v. 84, n. 12, p. 48
- Larson, Linda Lee;
- Larson, Robert K.;
- Greenlee, Janet
- Article
36
- Journal on Telecommunications & High Technology Law, 2012, v. 10, n. 1, p. 41
- Article
37
- Journal of Homeland Security & Emergency Management, 2017, v. 14, n. 1, p. -1, doi. 10.1515/jhsem-2016-0060
- Biersteker, Erwin;
- Ferguson, Julie E.;
- Beersma, Bianca;
- Groenewegen, Peter
- Article
38
- Electronic Commerce Research, 2017, v. 17, n. 2, p. 185, doi. 10.1007/s10660-015-9187-2
- Walsh, Diana;
- Parisi, James;
- Passerini, Katia
- Article
39
- Nature, 2015, v. 525, n. 7570, p. 440, doi. 10.1038/525440a
- Article
40
- NanoEthics, 2007, v. 1, n. 3, p. 211, doi. 10.1007/s11569-007-0023-6
- Article
41
- Behavior Research Methods, 2017, v. 49, n. 4, p. 1470, doi. 10.3758/s13428-016-0804-3
- Hoffmann, Adrian;
- Waubert de Puiseau, Berenike;
- Schmidt, Alexander;
- Musch, Jochen
- Article
43
- i-Manager's Journal on Computer Science, 2015, v. 3, n. 4, p. 36
- SANTHIYA, J.;
- NIROSHA, K.;
- KALAIVANI, N.;
- JAYANTHINISHA, R.;
- KAMATCHI, K.
- Article
44
- International Journal of Human Rights, 2017, v. 21, n. 7, p. 773, doi. 10.1080/13642987.2017.1298091
- Article
46
- Nature, 1998, v. 392, n. 6671, p. 6, doi. 10.1038/32004
- Article
47
- Journal of Public Policy & Marketing, 2015, v. 34, n. 2, p. 210, doi. 10.1509/jppm.14.139
- Article
48
- Journal of Public Policy & Marketing, 2014, v. 33, n. 1, p. 4, doi. 10.1509/jppm.33.1.4
- Article
49
- Health Matrix: Journal of Law-Medicine, 2019, v. 29, p. 401
- Article
50
- American Intelligence Journal, 2015, v. 32, n. 1, p. 160
- Campbell, Herschel C. M.;
- Hess, James
- Article