Search Results - "privacy"
Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 35
- Computer networks 23
- Computer security 17
- Data protection 16
- Privacy, Right of 16
- Information technology 12
- Prevention 10
- Social aspects 10
- Computer crimes 9
- Computers 8
- Internet 7
- Electronic data processing 6
- Internet of things 6
- Law and legislation 6
- Big data 5
- Data encryption (Computer science) 5
- Moral and ethical aspects 5
- Terrorism 5
- access control 5
- Access control 4
- Biometric identification 4
- Cloud computing 4
- Data processing 4
- Online social networks 4
- Artificial intelligence 3
- Business ethics 3
- Cyberterrorism 3
- Information society 3
- Mobile communication systems 3
- Multimedia communications 3
-
1
Negotiating privacy the European Union, the United States, and personal data protection
Published 2005Subjects: “…Privacy, Right of European Union countries…”
Book -
2
The Right to Privacy
Published 2011Subjects: “…Privacy, Right of…”
Get full text
Rights
Electronic eBook -
3
Privacy on the line the politics of wiretapping and encryption
Published 2007Table of Contents: “…Introduction -- Cryptography -- Cryptography and public policy -- National security -- Law enforcement -- Privacy: protections and threats -- Wiretapping -- Communication in the 1990s -- Cryptography in the 1990s -- And then it all changed -- Après le déluge -- Conclusion…”
Book -
4
The basics of digital privacy simple tools to protect your personal your information and your identity online
Published 2014Table of Contents: “…; E-mail; Setting up PGP on Microsoft's Outlook 2013; Sending encrypted e-mails; Importing a public key from another person; Web browsing; Consequences; Ease of use; Government scrutiny; Summary -- Chapter 7: Laws and Internet Privacy; The law and changing technology; PRISM; Canadian version of PRISM; Is all this legal?…”
Book -
5
-
6
Personal data and privacy protection
Published 2005Table of Contents: “…The relationship between general law protection of privacy and information privacy laws / David Lindsay -- Implementation of the APEC privacy framework / Graham Greenleaf -- Regulators' challenge in getting data protection bill passed in Malaysia / Vicknaraj Thanarajah -- The EU & the measurement of adequacy, what can Malaysia learn from world experience? …”
Book -
7
-
8
Beyond the HIPAA privacy rule enhancing privacy, improving health through research /
Published 2009Table of Contents: “…The value and importance of health information privacy -- The value, importance, and oversight of health research -- HIPAA, the privacy rule, and its application to health research -- Effect of the HIPAA privacy rule on health research -- A new framework for protecting privacy in health research.…”
Freely available online
Get full text
MyiLibrary
NetLibrary
MyiLibrary
Electronic eBook -
9
-
10
Security and privacy in smart grids
Published 2014Table of Contents: “…Cognitive Radio Network for the Smart Grid -- pt. 2. Security and privacy in smart grids -- Chapter 6. Requirements and Challenges of Cybersecurity for Smart Grid Communication Infrastructures -- Chapter 7. …”
Book -
11
-
12
-
13
-
14
Cryptography for security and privacy in cloud computing
Published 2014“…Artech House information security and privacy series…”
Book -
15
The new battle over workplace privacy how far can management go? what rights do employee have? safe practices to minimize conflicts, confusion, and litigation
Published 1998Subjects: “…Privacy, Right of United States…”
Book -
16
-
17
-
18
Security and privacy management, techniques, and protocols
Published 2018Subjects: “…Privacy, Right of…”
Book -
19
Trust, Security and Privacy for Big Data /
Published 2022Table of Contents: “…DigImoPriv : a big data framework for preserving privacy of digital immortals / Kumar Vikram and Muhammad Rizwan Asghar -- Federated learning role in big data, Iot services and applications security, privacy and trust in Iot : a survey / Supriya y and Thippa Reddy Gadekallu -- From the cloud to the edge : towards a distributed and light weight secure big data pipelines for IoT applications / Feras M Awaysheh.…”
Book -
20


