Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Privacy")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 1559

  • Page / 63
Export

Selection :

  • and

Preserving confidentiality when sharing medical database with the Cellsecu systemCHIANG, Yu-Cheng; HSU, Tsan-Sheng; SUN KUO et al.International journal of medical informatics. 2003, Vol 71, Num 1, pp 17-23, issn 1386-5056, 7 p.Article

Privacy Expectations at Work-What is Reasonable and Why?PALM, Elin.Ethical theory and moral practice. 2009, Vol 12, Num 2, pp 201-215, issn 1386-2820, 15 p.Article

Philosophical theories of privacy : Implications for an adequate online privacy policyTAVANI, Herman T.Metaphilosophy. 2007, Vol 38, Num 1, pp 1-22, issn 0026-1068, 22 p.Article

Same-sex relations and the lawSUNSTEIN, C. R.Metaphilosophy. 1994, Vol 25, Num 4, pp 262-284, issn 0026-1068Article

Privacy in information technology : Designing to enable privacy policy management in organizationsKARAT, John; KARAT, Clare-Marie; BRODIE, Carolyn et al.International journal of human-computer studies. 2005, Vol 63, Num 1-2, pp 153-174, issn 1071-5819, 22 p.Article

Personal information privacy : implications for MIS managersHENDERSON, S. C; SNYDER, C. A.Information & management. 1999, Vol 36, Num 4, pp 213-220, issn 0378-7206Article

A six-dimensional approach to online privacyHARKIOLAKIS, Nicholas.International journal of technology transfer and commercialisation. 2007, Vol 6, Num 1, pp 56-63, issn 1470-6075, 8 p.Article

Four challenges for a theory of informational privacyFLORIDI, Luciano.Ethics and information technology. 2006, Vol 8, Num 3, pp 109-119, issn 1388-1957, 11 p.Conference Paper

The evolution (or devolution) of privacy = Evolution (ou dévolution) de la vie privéeKASPER, Debbie V. S.Sociological forum (Randolph, N.J.). 2005, Vol 20, Num 1, pp 69-92, issn 0884-8971, 24 p.Article

An Organizational View of Pervasive Computing : Policy Implications for Information ExchangeKARAT, John; KARAT, Clare-Marie.Social science computer review. 2008, Vol 26, Num 1, pp 13-19, issn 0894-4393, 7 p.Article

Privacy and social interactionROESSLER, Beate; MOKROSINSKA, Dorota.Philosophy & social criticism. 2013, Vol 39, Num 8, pp 771-791, issn 0191-4537, 21 p.Article

Measure of privacy in randomized response modelHONG ZHIMIN; YAN ZAIZAI.Quality & quantity. 2012, Vol 46, Num 4, pp 1167-1180, issn 0033-5177, 14 p.Article

Sujetividad y privacidad = Subjectivity and PrivacyHURTADO, G.Crítica - Instituto de Investigaciones Filosóficas. Universidad Nacional Autónoma de México. 1994, Vol 26, Num 76-77, pp 185-203, issn 0011-1503Article

Quining Qualia Quine's wayROSS, D.Dialogue. Canadian Philosophical Association. 1993, Vol 32, Num 3, pp 439-459, issn 0012-2173Article

Privacy, publicity, and accountability of self-presentation in an on-line discussion group = Vie privée, publicité, et responsabilité del'auto-présentation dans un groupe de discussion on-lineLEE, Hangwoo.Sociological inquiry. 2006, Vol 76, Num 1, pp 1-22, issn 0038-0245, 22 p.Article

Investigating Privacy Attitudes and Behavior in Relation to PersonalizationVAN DE GARDE-PERIK, Evelien; MARKOPOULOS, Panos; DE RUYTER, Boris et al.Social science computer review. 2008, Vol 26, Num 1, pp 20-43, issn 0894-4393, 24 p.Article

A Strategy for Operationalizing Privacy by DesignKROENER, Inga; WRIGHT, David.The Information society. 2014, Vol 30, Num 5, pp 355-365, issn 0197-2243, 11 p.Article

Theories in online information privacy research: A critical review and an integrated frameworkYUAN LI.Decision support systems. 2012, Vol 54, Num 1, pp 471-481, issn 0167-9236, 11 p.Article

A Comprehensive Theoretical Framework for Personal Information―Related Behaviors on the InternetBELDAD, Ardion; DE JONG, Menno; STEEHOUDER, Michael et al.The Information society. 2011, Vol 27, Num 4, pp 220-232, issn 0197-2243, 13 p.Article

Disorderly Houses: Residences, Privacy, and the Surveillance of Sexuality in 1920s HarlemROBERTSON, Stephen; WHITE, Shane; GARTON, Stephen et al.Journal of the history of sexuality. 2012, Vol 21, Num 3, pp 443-466, issn 1043-4070, 24 p.Article

Enhancing Privacy in Public Spaces Through Crossmodal DisplaysHAN CAO; OLIVIER, Patrick; JACKSON, Daniel et al.Social science computer review. 2008, Vol 26, Num 1, pp 87-102, issn 0894-4393, 16 p.Article

Privacy in the Age of Transparency : The New Vulnerability of the IndividualGADZHEVA, Maya.Social science computer review. 2008, Vol 26, Num 1, pp 60-74, issn 0894-4393, 15 p.Article

Floridi's ontological theory of informational privacy : Some implications and challengesTAVANI, Herman T.Ethics and information technology. 2008, Vol 10, Num 2-3, pp 155-166, issn 1388-1957, 12 p.Article

The social consequences of a mass surveillance measure: What happens when we become the 'others' ?MARAS, Marie-Helen.International journal of law, crime and justice (Print). 2012, Vol 40, Num 2, pp 65-81, issn 1756-0616, 17 p.Article

I am Spartacus: privacy enhancing technologies, collaborative obfuscation and privacy as a public goodKWECKA, Zbigniew; BUCHANAN, William; SCHAFER, Burkhard et al.Artificial intelligence and law (Dordrecht. Print). 2014, Vol 22, Num 2, pp 113-139, issn 0924-8463, 27 p.Article

  • Page / 63