Works matching DE "GOVERNMENT policy on privacy"
Results: 66
Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding.
- Published in:
- International Journal of Bifurcation & Chaos in Applied Sciences & Engineering, 2017, v. 27, n. 5, p. -1, doi. 10.1142/S0218127417500730
- By:
- Publication type:
- Article
PRIVACY AND RIGHT TO KNOW THE TRUTH IN SLOVAKIA.
- Published in:
- European Review of Public Law, 2016, v. 28, n. 3, p. 949
- By:
- Publication type:
- Article
PRIVACY CONCERNS OVER EMPLOYER ACCESS TO EMPLOYEE SOCIAL MEDIA.
- Published in:
- Monash University Law Review, 2017, v. 43, n. 3, p. 796
- By:
- Publication type:
- Article
CARPE DIEM: PRIVACY PROTECTION IN EMPLOYMENT ACT.
- Published in:
- Akron Law Review, 2010, v. 43, n. 2, p. 331
- By:
- Publication type:
- Article
OPEN DATA, GREY DATA, AND STEWARDSHIP: UNIVERSITIES AT THE PRIVACY FRONTIER.
- Published in:
- Berkeley Technology Law Journal, 2018, v. 33, n. 2, p. 365, doi. 10.15779/Z38B56D489
- By:
- Publication type:
- Article
THE DEATH OF THE PRIVACY POLICY?: EFFECTIVE PRIVACY DISCLOSURES AFTER IN RE SEARS.
- Published in:
- Berkeley Technology Law Journal, 2010, v. 25, n. 1, p. 671
- By:
- Publication type:
- Article
Whither Privacy?
- Published in:
- Surveillance & Society, 2012, v. 10, n. 3/4, p. 344, doi. 10.24908/ss.v10i3/4.4528
- By:
- Publication type:
- Article
PRIVACY, NOTICE, AND DESIGN.
- Published in:
- Stanford Technology Law Review, 2018, v. 21, n. 1, p. 74
- By:
- Publication type:
- Article
JEST IS FOR ALL.
- Published in:
- 2016
- By:
- Publication type:
- Cartoon/Comic Strip
Employee drug testing: Are cities complying with the courts?
- Published in:
- Public Administration Review, 1996, v. 56, n. 1, p. 30, doi. 10.2307/3110051
- By:
- Publication type:
- Article
Commitment analysis to operationalize software requirements from privacy policies.
- Published in:
- Requirements Engineering, 2011, v. 16, n. 1, p. 33, doi. 10.1007/s00766-010-0108-6
- By:
- Publication type:
- Article
Digital privacy: theory, policies and technologies.
- Published in:
- 2011
- By:
- Publication type:
- Editorial
Privacy policies, cross-border health data and the GDPR.
- Published in:
- Information & Communications Technology Law, 2019, v. 28, n. 3, p. 261, doi. 10.1080/13600834.2019.1644068
- By:
- Publication type:
- Article
SOLVING THE UNCERTAINTY: WHY THE HIPAA PRIVACY RULE FAILS TO APPROPRIATELY ADDRESS DISCLOSURES OF PSYCHOTHERAPY NOTES OF DECEASED PATIENTS.
- Published in:
- Health Matrix: Journal of Law-Medicine, 2019, v. 29, p. 401
- By:
- Publication type:
- Article
Opposition to law officers having unfettered access to medical records.
- Published in:
- JAMA: Journal of the American Medical Association, 1998, v. 279, n. 4, p. 257, doi. 10.1001/jama.279.4.257
- By:
- Publication type:
- Article
Privacy in the Shadow of Nanotechnology.
- Published in:
- NanoEthics, 2007, v. 1, n. 3, p. 211, doi. 10.1007/s11569-007-0023-6
- By:
- Publication type:
- Article
Juvenile offenders in Vietnam and the right to defence.
- Published in:
- Youth Justice, 2016, v. 16, n. 1, p. 49, doi. 10.1177/1473225415587737
- By:
- Publication type:
- Article
Health services research and personal health information: privacy concerns, new legislation and beyond.
- Published in:
- 1998
- By:
- Publication type:
- Editorial
Researchers wrestle with a privacy problem.
- Published in:
- Nature, 2015, v. 525, n. 7570, p. 440, doi. 10.1038/525440a
- By:
- Publication type:
- Article
Privacy Notices as Tabula Rasa: An Empirical Investigation into How Complying with a Privacy Notice Is Related to Meeting Privacy Expectations Online.
- Published in:
- Journal of Public Policy & Marketing, 2015, v. 34, n. 2, p. 210, doi. 10.1509/jppm.14.139
- By:
- Publication type:
- Article
Privacy Challenges and Opportunities: The Role of the Federal Trade Commission.
- Published in:
- Journal of Public Policy & Marketing, 2014, v. 33, n. 1, p. 4, doi. 10.1509/jppm.33.1.4
- By:
- Publication type:
- Article
The Economics of Privacy.
- Published in:
- Journal of Economic Literature, 2016, v. 54, n. 2, p. 442, doi. 10.1257/jel.54.2.442
- By:
- Publication type:
- Article
Corporate Privacy Policy Changes during PRISM and the Rise of Surveillance Capitalism.
- Published in:
- Media & Communication, 2017, v. 5, n. 1, p. 63, doi. 10.17645/mac.v5i1.813
- By:
- Publication type:
- Article
Rethinking the Call for a US National Data Center in the 1960s: Privacy, Social Science Research and Data Fragmentation Viewed from the Perspective of Contemporary Archival Theory.
- Published in:
- Information & Culture, 2018, v. 53, n. 2, p. 203, doi. 10.7560/IC53204
- By:
- Publication type:
- Article
A (Legal) Challenge to Privacy: On the Implementation of Smart Meters in the EU and the US.
- Published in:
- Renewable Energy Law & Policy Review (Claeys & Casteels BV), 2017, v. 8, n. 1, p. 19, doi. 10.4337/relp.2017.01.02
- By:
- Publication type:
- Article
First Bellwether Test On NSA Snooping Set For August 5<sup>th</sup> in Missouri.
- Published in:
- Conflict Resolution & Negotiation Journal, 2014, v. 2014, n. 2, p. 110
- By:
- Publication type:
- Article
WHY THE FEDERAL GOVERNMENT SHOULD HAVE A PRIVACY POLICY OFFICE.
- Published in:
- Journal on Telecommunications & High Technology Law, 2012, v. 10, n. 1, p. 41
- By:
- Publication type:
- Article
On the comprehensibility and perceived privacy protection of indirect questioning techniques.
- Published in:
- Behavior Research Methods, 2017, v. 49, n. 4, p. 1470, doi. 10.3758/s13428-016-0804-3
- By:
- Publication type:
- Article
Privacy as a right or as a commodity in the online world: the limits of regulatory reform and self-regulation.
- Published in:
- Electronic Commerce Research, 2017, v. 17, n. 2, p. 185, doi. 10.1007/s10660-015-9187-2
- By:
- Publication type:
- Article
Privacy in the workplace: Organizations must find ways to accommodate employees' personal technology use while also meeting regulatory and other requirements.
- Published in:
- Internal Auditor, 2016, v. 73, n. 5, p. 42
- By:
- Publication type:
- Article
Privacy policies and national culture on the internet.
- Published in:
- Information Systems Frontiers, 2013, v. 15, n. 2, p. 279, doi. 10.1007/s10796-011-9336-7
- By:
- Publication type:
- Article
A Variable Weight Privacy-Preserving Algorithm for the Mobile Crowd Sensing Network.
- Published in:
- Journal of Electrical & Computer Engineering, 2017, p. 1, doi. 10.1155/2017/3053202
- By:
- Publication type:
- Article
Bir İlişki Düzenleme Sİreci Olarak Mahremiyet.
- Published in:
- TISK Academy / TISK Akademi, 2008, v. 3, n. 6, p. 128
- By:
- Publication type:
- Article
How Safe are Safe Harbors? The Difficulties of Self-Regulatory Children's Online Privacy Protection Act Programs.
- Published in:
- 2015
- By:
- Publication type:
- Opinion
PAGING DR. GOOGLE: PERSONAL HEALTH RECORDS AND PATIENT PRIVACY.
- Published in:
- William & Mary Law Review, 2010, v. 51, n. 6, p. 2243
- By:
- Publication type:
- Article
Privacy bill under fire from researchers.
- Published in:
- Nature, 1998, v. 392, n. 6671, p. 6, doi. 10.1038/32004
- By:
- Publication type:
- Article
Privacy and the Integrity of Liberal Politics: The Case of Governmental Internet Searches.
- Published in:
- Journal of Social Philosophy, 2014, v. 45, n. 3, p. 369, doi. 10.1111/josp.12068
- By:
- Publication type:
- Article
The Right to Privacy: An Emerging Right in Chinese Law.
- Published in:
- Statute Law Review, 1997, v. 18, n. 3, p. 208, doi. 10.1093/slr/18.3.208
- By:
- Publication type:
- Article
Increasing use of computerized recordkeeping leads to legislative proposals for medical privacy.
- Published in:
- JAMA: Journal of the American Medical Association, 1996, v. 276, n. 4, p. 270, doi. 10.1001/jama.1996.03540040014007
- By:
- Publication type:
- Article
KEEP OUT! THE EFFICACY OF TRESPASS, NUISANCE AND PRIVACY TORTS AS APPLIED TO DRONES.
- Published in:
- Georgia State University Law Review, 2017, v. 33, n. 2, p. 359
- By:
- Publication type:
- Article
Disclosure Intention of Location-Related Information in Location-Based Social Network Services.
- Published in:
- International Journal of Electronic Commerce, 2012, v. 16, n. 4, p. 53, doi. 10.2753/JEC1086-4415160403
- By:
- Publication type:
- Article
IOS FEAR THE GOVERNMENT: CLOSING THE BACK DOOR ON GOVERNMENTAL ACCESS.
- Published in:
- University of Toledo Law Review, 2017, v. 49, n. 1, p. 179
- By:
- Publication type:
- Article
WHEN THE DEFAULT IS NO PENALTY: NEGOTIATING PRIVACY AT THE NTIA.
- Published in:
- Denver Law Review, 2016, v. 93, n. 4, p. 925
- By:
- Publication type:
- Article
Cooperative Legalism and the Non-Americanization of European Regulatory Styles: The Case of Data Privacy.
- Published in:
- American Journal of Comparative Law, 2011, v. 59, n. 2, p. 411, doi. 10.5131/AJCL.2010.0017
- By:
- Publication type:
- Article
Privacy and trust attitudes in the intent to volunteer for data-tracking research.
- Published in:
- Information Research, 2016, v. 21, n. 4, p. 1
- By:
- Publication type:
- Article
Bad News for Bloggers.
- Published in:
- 2009
- By:
- Publication type:
- Opinion
The Dysregulation of Human Subjects Research.
- Published in:
- 2007
- By:
- Publication type:
- Editorial
Workplace privacy and the fourth amendment: An end to reasonable expectations?
- Published in:
- American Business Law Journal, 1992, v. 29, n. 4, p. 626, doi. 10.1111/j.1744-1714.1991.tb01527.x
- By:
- Publication type:
- Article
PRIVACY PROTECTION ON THE INTERNET.
- Published in:
- Strategic Finance, 2003, v. 84, n. 12, p. 48
- By:
- Publication type:
- Article
Policy Legitimacy, Rhetorical Politics, and the Evaluation of City-Street Video Surveillance Monitoring Programs in Canada.
- Published in:
- Canadian Review of Sociology, 2012, v. 49, n. 4, p. 328, doi. 10.1111/j.1755-618X.2012.01298.x
- By:
- Publication type:
- Article