Results: 3
Evaluating Re-Identification Risks of Data Protected by Additive Data Perturbation.
- Published in:
- Journal of Database Management, 2014, v. 25, n. 2, p. 52, doi. 10.4018/jdm.2014040103
- By:
- Publication type:
- Article
Mindfully Experimenting with IT: Cases on Corporate Social Media Introduction.
- Published in:
- Journal of Database Management, 2014, v. 25, n. 2, p. 29, doi. 10.4018/jdm.2014040102
- By:
- Publication type:
- Article
Enabling Resource Access Visibility for Automated Enterprise Services.
- Published in:
- Journal of Database Management, 2014, v. 25, n. 2, p. 1, doi. 10.4018/jdm.2014040101
- By:
- Publication type:
- Article