Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Privacy")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 2307

  • Page / 93
Export

Selection :

  • and

Preserving confidentiality when sharing medical database with the Cellsecu systemCHIANG, Yu-Cheng; HSU, Tsan-Sheng; SUN KUO et al.International journal of medical informatics. 2003, Vol 71, Num 1, pp 17-23, issn 1386-5056, 7 p.Article

Privacy Expectations at Work-What is Reasonable and Why?PALM, Elin.Ethical theory and moral practice. 2009, Vol 12, Num 2, pp 201-215, issn 1386-2820, 15 p.Article

Philosophical theories of privacy : Implications for an adequate online privacy policyTAVANI, Herman T.Metaphilosophy. 2007, Vol 38, Num 1, pp 1-22, issn 0026-1068, 22 p.Article

Privacy-enhancing technologies for the world wide webOPPLIGER, Rolf.Computer communications. 2005, Vol 28, Num 16, pp 1791-1797, issn 0140-3664, 7 p.Article

Same-sex relations and the lawSUNSTEIN, C. R.Metaphilosophy. 1994, Vol 25, Num 4, pp 262-284, issn 0026-1068Article

Privacy in information technology : Designing to enable privacy policy management in organizationsKARAT, John; KARAT, Clare-Marie; BRODIE, Carolyn et al.International journal of human-computer studies. 2005, Vol 63, Num 1-2, pp 153-174, issn 1071-5819, 22 p.Article

Personal information privacy : implications for MIS managersHENDERSON, S. C; SNYDER, C. A.Information & management. 1999, Vol 36, Num 4, pp 213-220, issn 0378-7206Article

A six-dimensional approach to online privacyHARKIOLAKIS, Nicholas.International journal of technology transfer and commercialisation. 2007, Vol 6, Num 1, pp 56-63, issn 1470-6075, 8 p.Article

Four challenges for a theory of informational privacyFLORIDI, Luciano.Ethics and information technology. 2006, Vol 8, Num 3, pp 109-119, issn 1388-1957, 11 p.Conference Paper

The evolution (or devolution) of privacy = Evolution (ou dévolution) de la vie privéeKASPER, Debbie V. S.Sociological forum (Randolph, N.J.). 2005, Vol 20, Num 1, pp 69-92, issn 0884-8971, 24 p.Article

Passengers information in public transport and privacy: Can anonymous tickets prevent tracking?AVOINE, Gildas; CALDERONI, Luca; DELVAUX, Jonathan et al.International journal of information management. 2014, Vol 34, Num 5, pp 682-688, issn 0268-4012, 7 p.Article

An Organizational View of Pervasive Computing : Policy Implications for Information ExchangeKARAT, John; KARAT, Clare-Marie.Social science computer review. 2008, Vol 26, Num 1, pp 13-19, issn 0894-4393, 7 p.Article

Privacy and social interactionROESSLER, Beate; MOKROSINSKA, Dorota.Philosophy & social criticism. 2013, Vol 39, Num 8, pp 771-791, issn 0191-4537, 21 p.Article

Measure of privacy in randomized response modelHONG ZHIMIN; YAN ZAIZAI.Quality & quantity. 2012, Vol 46, Num 4, pp 1167-1180, issn 0033-5177, 14 p.Article

Sujetividad y privacidad = Subjectivity and PrivacyHURTADO, G.Crítica - Instituto de Investigaciones Filosóficas. Universidad Nacional Autónoma de México. 1994, Vol 26, Num 76-77, pp 185-203, issn 0011-1503Article

Quining Qualia Quine's wayROSS, D.Dialogue. Canadian Philosophical Association. 1993, Vol 32, Num 3, pp 439-459, issn 0012-2173Article

Privacy, publicity, and accountability of self-presentation in an on-line discussion group = Vie privée, publicité, et responsabilité del'auto-présentation dans un groupe de discussion on-lineLEE, Hangwoo.Sociological inquiry. 2006, Vol 76, Num 1, pp 1-22, issn 0038-0245, 22 p.Article

Investigating Privacy Attitudes and Behavior in Relation to PersonalizationVAN DE GARDE-PERIK, Evelien; MARKOPOULOS, Panos; DE RUYTER, Boris et al.Social science computer review. 2008, Vol 26, Num 1, pp 20-43, issn 0894-4393, 24 p.Article

A Strategy for Operationalizing Privacy by DesignKROENER, Inga; WRIGHT, David.The Information society. 2014, Vol 30, Num 5, pp 355-365, issn 0197-2243, 11 p.Article

Le WHOIS, talon d'Achille de la protection des données personnelles : Traçabilité et réseaux = WHOIS, the Achilles'Heel of Data ProtectionARNAUD, Michel.Hermès (Paris. 1988). 2009, Num 53, issn 0767-9513, 105-108, 235 [5 p.]Article

A lesson on authentication protocol designWOO, T. Y. C; LAM, S. S.Operating systems review. 1994, Vol 28, Num 3, pp 24-37, issn 0163-5980Article

Theories in online information privacy research: A critical review and an integrated frameworkYUAN LI.Decision support systems. 2012, Vol 54, Num 1, pp 471-481, issn 0167-9236, 11 p.Article

A Comprehensive Theoretical Framework for Personal Information―Related Behaviors on the InternetBELDAD, Ardion; DE JONG, Menno; STEEHOUDER, Michael et al.The Information society. 2011, Vol 27, Num 4, pp 220-232, issn 0197-2243, 13 p.Article

Disorderly Houses: Residences, Privacy, and the Surveillance of Sexuality in 1920s HarlemROBERTSON, Stephen; WHITE, Shane; GARTON, Stephen et al.Journal of the history of sexuality. 2012, Vol 21, Num 3, pp 443-466, issn 1043-4070, 24 p.Article

Understanding the Behavioral Intention to Report Unethical Information Technology Practices: The Role of Machiavellianism, Gender, and Computer ExpertiseSTYLIANOU, Antonis C; WINTER, Susan; YUAN NIU et al.Journal of business ethics. 2013, Vol 117, Num 2, pp 333-343, issn 0167-4544, 11 p.Article

  • Page / 93