Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Vie privée")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 2722

  • Page / 109
Export

Selection :

  • and

Unknowableness and informational privacyMATHESON, David.Journal of philosophical research. 2007, Vol 32, pp 251-267, issn 1053-8364, 17 p.Article

Vie privéeBOUDOUARD-BRUNET, L; BELLIVIER, F.Informations sociales. 1992, Num 22, pp 98-104, issn 0046-9459Article

Informatique : comment protéger notre vie privée ? = Computer sciences: how to protect your private life ?LOINTIER, Pascal; LONGEON, Robert; PALLEZ, Christophe et al.Sciences (1969). 2004, Num 3, pp 23-38, issn 0151-0304, 16 p.Article

Privacy, publicity, and accountability of self-presentation in an on-line discussion group = Vie privée, publicité, et responsabilité del'auto-présentation dans un groupe de discussion on-lineLEE, Hangwoo.Sociological inquiry. 2006, Vol 76, Num 1, pp 1-22, issn 0038-0245, 22 p.Article

MONTAIGNE AND THE COMIC: EXPOSING PRIVATE LIFECALHOUN, Alison.Philosophy and literature (Print). 2011, Vol 35, Num 2, pp 303-319, issn 0190-0013, 17 p.Article

Privacy enhancing technologies (6th International workshop, PET 2006, Cambridge, UK, June 28-30, 2006)Danezis, George; Golle, Philippe.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-68790-4, 1Vol, VIII-429 p, isbn 3-540-68790-4Conference Proceedings

Privacy, Speech, and the LawMOORE, Adam D.Journal of information ethics. 2013, Vol 22, Num 1, pp 21-43, issn 1061-9321, 23 p.Article

Disorderly Houses: Residences, Privacy, and the Surveillance of Sexuality in 1920s HarlemROBERTSON, Stephen; WHITE, Shane; GARTON, Stephen et al.Journal of the history of sexuality. 2012, Vol 21, Num 3, pp 443-466, issn 1043-4070, 24 p.Article

Privacy and Security Security Risks in Next-Generation Emergency ServicesTSCHOFENIG, Hannes.Communications of the ACM. 2011, Vol 54, Num 11, pp 23-25, issn 0001-0782, 3 p.Article

Technical Perspective Programming with Differential PrivacyGEHRKE, Johannes.Communications of the ACM. 2010, Vol 53, Num 9, issn 0001-0782, p. 88Article

Avances en neurología e implicaciones éticas = Advances in neurology and ethical implicationsMOYA SANTOYO, José.Moralia. 2008, Vol 31, Num 117, pp 97-119, issn 0210-0851, 23 p.Article

Privacy im World Wide WebSACKMANN, Stefan.Wirtschaftsinformatik. 2007, Vol 49, Num 1, pp 49-54, issn 0937-6429, 6 p.Article

Commentary : Legal effect of revealing private information in the US and abroad : Data communicationsSTEWART, Radcliff.Information systems management. 2007, Vol 24, Num 4, pp 343-344, issn 1058-0530, 2 p.Article

Le pouvoir des médiasTRUDEL, L.Cahiers de recherche sociologique. 1990, Num 14, pp 163-169, issn 0831-1048Article

Privateers in Cyberspace: Aargh!LESK, Michael.IEEE security & privacy. 2013, Vol 11, Num 3, pp 81-84, issn 1540-7993, 4 p.Article

Le dévoilement de la vie privée sur les sites de réseau social. Des changements significatifs = Revealing One's Private Life on Social Networks: Significant ChangesVALLET, Caroline.Droit et société (Paris. 1985). 2012, Num 80, pp 163-188, issn 0769-3362, 26 p.Article

Exoinformation & interface designBRUNK, Benjamin.Bulletin of the American Society for Information Science. 2001, Vol 27, Num 6, pp 11-13, issn 0095-4403Article

IEEE Security & Privacy: The Early YearsCYBENKO, George; CLARK-FISHER, Kathy.IEEE security & privacy. 2014, Vol 12, Num 3, pp 18-19, issn 1540-7993, 2 p.Conference Paper

The IEEE Symposium on Security and and Privacy, in RetrospectNEUMANN, Peter G; PEISERT, Sean; SCHAEFER, Marvin et al.IEEE security & privacy. 2014, Vol 12, Num 3, pp 15-17, issn 1540-7993, 3 p.Conference Paper

PRIVATE TALK: TESTIMONY, EVIDENCE, AND THE PRACTICE OF ANONYMIZATION IN RESEARCHBERKHOUT, Suze G.International journal of feminist approaches to bioethics (Print). 2013, Vol 6, Num 1, pp 19-45, issn 1937-4585, 27 p.Article

Sticky Policies: An Approach for Managing Privacy across Multiple Parties : Security and Privacy in an Online WorldPEARSON, Siani; CASASSA MONT, Marco.Computer (Long Beach, CA). 2011, Vol 44, Num 9, pp 60-68, issn 0018-9162, 9 p.Article

FOURTEEN REASONS PRIVACY MATTERS: A MULTIDISCIPLINARY REVIEW OF SCHOLARLY LITERATURE'MAGI, Trina J.The Library quarterly (Chicago, IL). 2011, Vol 81, Num 2, pp 187-209, issn 0024-2519, 23 p.Article

EINE SCHWESTER TRITT AUS DEM SCHATTENKRIEGEL, Peter.Hegel-Studien. 2010, Vol 45, pp 19-34, issn 0073-1587, 16 p.Article

Reflexões em torno do conceito de anonimato = Reflecting upon the concept of anonymityFROIS, Catarina.Análise social. 2010, Num 194, pp 165-177, issn 0003-2573, 13 p.Article

Communications Surveillance: Privacy and Security at RiskDIFFIE, Whitfield; LANDAU, Susan.Communications of the ACM. 2009, Vol 52, Num 11, pp 42-47, issn 0001-0782, 6 p.Article

  • Page / 109