Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Sensitive information.

Zeitschriftenartikel zum Thema „Sensitive information“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Sensitive information" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

SIVÁK, Jaroslav. "SENSITIVE INFORMATION." Krízový Manažment 14, no. 1 (March 30, 2015): 23–29. http://dx.doi.org/10.26552/krm.c.2015.1.23-29.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Nicklisch, Andreas, Kristoffel Grechenig, and Christian Thöni. "Information-sensitive Leviathans." Journal of Public Economics 144 (December 2016): 1–13. http://dx.doi.org/10.1016/j.jpubeco.2016.09.008.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

PRICE, LINDA L., LAWRENCE F. FEICK, and ROBIN A. HIGIE. "Information Sensitive Consumers and Market Information." Journal of Consumer Affairs 21, no. 2 (December 1987): 328–41. http://dx.doi.org/10.1111/j.1745-6606.1987.tb00206.x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

NAWA, Kotaro. "Sensitive, but unclassified information." Journal of Information Processing and Management 48, no. 4 (2005): 243–44. http://dx.doi.org/10.1241/johokanri.48.243.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Vernon;, D. P. "Sensitive Versus Classified Information." Science 306, no. 5697 (October 29, 2004): 811e—812e. http://dx.doi.org/10.1126/science.306.5697.811e.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Conley, Sharon. "Keeping Sensitive Information Private." NASNewsletter 22, no. 4 (July 2007): 21. http://dx.doi.org/10.1177/104747570702200407.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Jaswal, S. K., and T. Harpham. "Getting Sensitive Information on Sensitive Issues: Gynaecological Morbidity." Health Policy and Planning 12, no. 2 (January 1, 1997): 173–78. http://dx.doi.org/10.1093/heapol/12.2.173.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Besorai, Ahal. "Tentative Information, Inside Information, Price‐sensitive Information and Materiality." Journal of Financial Crime 3, no. 3 (January 1996): 268–71. http://dx.doi.org/10.1108/eb025719.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

INAMURA, Tomoaki, and Haruki MADARAME. "ICONE15-10612 Control of Information Relating to Sensitive Nuclear Technology (DRAFT^*)." Proceedings of the International Conference on Nuclear Engineering (ICONE) 2007.15 (2007): _ICONE1510. http://dx.doi.org/10.1299/jsmeicone.2007.15._icone1510_334.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Su, Linping, and Zhipeng Liu. "A T-similarity Sensitive Information Protection Method Based on Sensitive Information Gradient Partition." Journal of Physics: Conference Series 2030, no. 1 (September 1, 2021): 012059. http://dx.doi.org/10.1088/1742-6596/2030/1/012059.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Song, D., and P. D. Bruza. "Towards context sensitive information inference." Journal of the American Society for Information Science and Technology 54, no. 4 (2003): 321–34. http://dx.doi.org/10.1002/asi.10213.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Bernstein, Adam. "Keeping business-sensitive information safe." Nursing and Residential Care 25, no. 1 (January 2, 2023): 1–3. http://dx.doi.org/10.12968/nrec.2022.0061.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Rajamäki, Jyri, Ilkka Tikanmäki, and Jari Räsänen. "CISE as a Tool for Sharing Sensitive Cyber Information in Maritime Domain." Information & Security: An International Journal 43, no. 2 (2019): 215–35. http://dx.doi.org/10.11610/isij.4317.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Martínez, V. Gayoso, L. Hernández Encinas, A. Queiruga Dios, A. Hernández Encinas, and J. Martín Vaquero. "Avoiding Sensitive Information Leakage in Moodle." Literacy Information and Computer Education Journal Special 2, no. 2 (September 1, 2013): 1422–32. http://dx.doi.org/10.20533/licej.2040.2589.2013.0190.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

WALTER, CATHY M. "How biometrics keep sensitive information secure." Nursing 35, no. 5 (May 2005): 76. http://dx.doi.org/10.1097/00152193-200505000-00058.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Chou, Winston, Kosuke Imai, and Bryn Rosenfeld. "Sensitive Survey Questions with Auxiliary Information." Sociological Methods & Research 49, no. 2 (December 11, 2017): 418–54. http://dx.doi.org/10.1177/0049124117729711.

Der volle Inhalt der Quelle
Annotation:
Scholars increasingly rely on indirect questioning techniques to reduce social desirability bias and item nonresponse for sensitive survey questions. The major drawback of these approaches, however, is their inefficiency relative to direct questioning. We show how to improve the statistical analysis of the list experiment, randomized response technique, and endorsement experiment by exploiting auxiliary information on the sensitive trait. We apply the proposed methodology to survey experiments conducted among voters in a controversial antiabortion referendum held during the 2011 Mississippi Ge
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Wu, Jimmy Ming-Tai, Gautam Srivastava, Alireza Jolfaei, Philippe Fournier-Viger, and Jerry Chun-Wei Lin. "Hiding sensitive information in eHealth datasets." Future Generation Computer Systems 117 (April 2021): 169–80. http://dx.doi.org/10.1016/j.future.2020.11.026.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Lamming, Richard, Nigel Caldwell, Wendy Phillips, and Deborah Harrison. "Sharing Sensitive Information in Supply Relationships:." European Management Journal 23, no. 5 (October 2005): 554–63. http://dx.doi.org/10.1016/j.emj.2005.09.010.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Stolfo, Salvatore J., and Gene Tsudik. "Privacy-Preserving Sharing of Sensitive Information." IEEE Security & Privacy Magazine 8, no. 4 (July 2010): 16–17. http://dx.doi.org/10.1109/msp.2010.135.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Murphy, Daniel. "Disclosure and sharing of sensitive information." Journal of Financial Crime 13, no. 4 (October 2006): 420–41. http://dx.doi.org/10.1108/13590790610707555.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Larson, David K., and Keith W. Miller. "When Sensitive IT Information Crosses Borders." IT Professional 11, no. 4 (July 2009): 56–59. http://dx.doi.org/10.1109/mitp.2009.85.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Beneš, Vaclav E., and Robert J. Elliott. "Finite Dimensional Risk Sensitive Information States." IFAC Proceedings Volumes 28, no. 14 (June 1995): 429–34. http://dx.doi.org/10.1016/s1474-6670(17)46867-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Tilling, Simon. "Access to commercially sensitive environmental information." ERA Forum 14, no. 4 (November 29, 2013): 493–506. http://dx.doi.org/10.1007/s12027-013-0329-5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Athitsos, Vassilis, Marios Hadjieleftheriou, George Kollios, and Stan Sclaroff. "Query-sensitive embeddings." ACM Transactions on Database Systems 32, no. 2 (June 2007): 8. http://dx.doi.org/10.1145/1242524.1242525.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Hammer, Christian, and Gregor Snelting. "Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs." International Journal of Information Security 8, no. 6 (June 27, 2009): 399–422. http://dx.doi.org/10.1007/s10207-009-0086-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Bedford, Andrew, Stephen Chong, Josée Desharnais, Elisavet Kozyri, and Nadia Tawbi. "A progress-sensitive flow-sensitive inlined information-flow control monitor (extended version)." Computers & Security 71 (November 2017): 114–31. http://dx.doi.org/10.1016/j.cose.2017.04.001.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Tsuchiya, Ryuji, Akihiko Matsuoka, Takahiko Ogino, Kouich Goto, Toshiro Nakao, and Hajime Takebayashi. "Location-sensitive Itinerary-based Passenger Information System." IEEJ Transactions on Industry Applications 125, no. 4 (2005): 338–47. http://dx.doi.org/10.1541/ieejias.125.338.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Barachevsky, Valery A., Yury P. Strokach, Yury A. Puankov, Olga I. Kobeleva, Tatyana M. Valova, Konstantin S. Levchenko, Vladimir N. Yaroshenko, and Michail M. Krayushkin. "Light-sensitive heterocyclic compounds for information nanotechnologies." Arkivoc 2009, no. 9 (June 21, 2008): 70–95. http://dx.doi.org/10.3998/ark.5550190.0010.906.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Sridhar, Aparna, Rosibel Hernandez, and Erin Duffy. "Primary Sources of Sensitive Reproductive Health Information." Obstetrics & Gynecology 127 (May 2016): 115S. http://dx.doi.org/10.1097/01.aog.0000483473.31199.7a.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Ford, Carol A., Susan G. Millstein, Bonnie Halpern-Felsher, and Charles E. Irwin. "Confidentiality and adolescents' disclosure of sensitive information." Journal of Adolescent Health 18, no. 2 (February 1996): 111. http://dx.doi.org/10.1016/1054-139x(96)00011-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Guo, Yongyan, Jiayong Liu, Wenwu Tang, and Cheng Huang. "Exsense: Extract sensitive information from unstructured data." Computers & Security 102 (March 2021): 102156. http://dx.doi.org/10.1016/j.cose.2020.102156.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Kim, Sung-Hwan, Nam-Uk Kim, and Tai-Myoung Chung. "Study on sensitive information leakage vulnerability modeling." Kybernetes 44, no. 1 (January 12, 2015): 77–88. http://dx.doi.org/10.1108/k-05-2014-0106.

Der volle Inhalt der Quelle
Annotation:
Purpose – The purpose of this paper is to provide a model for quantitatively analyzing the security profile of an organization’s IT environment. The model considers the security risks associated with stored data, as well as services and devices that can act as channels for data leakages. The authors propose a sensitive information (SI) leakage vulnerability model. Design/methodology/approach – Factors identified as having an impact on the security profile are identified, and scores are assigned based on detailed criteria. These scores are utilized by mathematical models that produce a vulnerab
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Galobardes, Bruna, and Stefaan Demarest. "Asking sensitive information: an example with income." Sozial- und Pr�ventivmedizin/Social and Preventive Medicine 48, no. 1 (March 1, 2003): 70–72. http://dx.doi.org/10.1007/s000380300008.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Guo, Dongdan, Hao Sun, Tao Zhu, and Chang Cai. "An Automated Recognition Model for Sensitive Information." Journal of Physics: Conference Series 1575 (June 2020): 012043. http://dx.doi.org/10.1088/1742-6596/1575/1/012043.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Reeser, Linda Cherrey, and Robert A. Wertkin. "Sharing Sensitive Student Information With Field Instructors." Journal of Social Work Education 33, no. 2 (April 1997): 347–62. http://dx.doi.org/10.1080/10437797.1997.10778875.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Rollestone, Giles. "Networked information services in context-sensitive environments." Interactions 11, no. 2 (March 2004): 67–69. http://dx.doi.org/10.1145/971258.971282.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Tombros, Anastasios, and C. J. van Rijsbergen. "Query-Sensitive Similarity Measures for Information Retrieval." Knowledge and Information Systems 6, no. 5 (January 15, 2004): 617–42. http://dx.doi.org/10.1007/s10115-003-0115-8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Thompson, E. Dale, and Michelle L. Kaarst-Brown. "Sensitive information: A review and research agenda." Journal of the American Society for Information Science and Technology 56, no. 3 (2005): 245–57. http://dx.doi.org/10.1002/asi.20121.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Bast, Holger, Christian W. Mortensen, and Ingmar Weber. "Output-sensitive autocompletion search." Information Retrieval 11, no. 4 (March 4, 2008): 269–86. http://dx.doi.org/10.1007/s10791-008-9048-x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Mary A, Geetha, D. P. Acharjya, and N. Ch S. N. Iyengar. "Improved Anonymization Algorithms for Hiding Sensitive Information in Hybrid Information System." International Journal of Computer Network and Information Security 6, no. 6 (May 8, 2014): 9–17. http://dx.doi.org/10.5815/ijcnis.2014.06.02.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Maviglia, Saverio M., Catherine S. Yoon, David W. Bates, and Gilad Kuperman. "KnowledgeLink: Impact of Context-Sensitive Information Retrieval on Clinicians' Information Needs." Journal of the American Medical Informatics Association 13, no. 1 (January 2006): 67–73. http://dx.doi.org/10.1197/jamia.m1861.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Dueck, Gunter. "Highly Sensitive!" Informatik-Spektrum 28, no. 2 (April 2005): 151–57. http://dx.doi.org/10.1007/s00287-005-00475-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Kim, Jeongeun, Howard Dubowitz, Elizabeth Hudson-Martin, and Wendy Lane. "Comparison of 3 Data Collection Methods for Gathering Sensitive and Less Sensitive Information." Ambulatory Pediatrics 8, no. 4 (July 2008): 255–60. http://dx.doi.org/10.1016/j.ambp.2008.03.033.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Tsai, Cheng-Jung, Chien-I. Lee, and Wei-Pang Yang. "An Efficient and Sensitive Decision Tree Approach to Mining Concept-Drifting Data Streams." Informatica 19, no. 1 (January 1, 2008): 135–56. http://dx.doi.org/10.15388/informatica.2008.206.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Collins, Maria D. D., and Christine L. Ferguson. "Context-Sensitive Linking." Serials Review 28, no. 4 (December 2002): 267–82. http://dx.doi.org/10.1080/00987913.2002.10764759.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Condliffe, Anna. "Freedom of Information: Exemptions for Confidential Information." Business Law Review 28, Issue 7 (July 1, 2007): 206–8. http://dx.doi.org/10.54648/bula2007034.

Der volle Inhalt der Quelle
Annotation:
The Information Tribunal has ruled in Derry City Council v The Information Commissioner that contracts are not protected by Freedom of Information Act exemption for confidential information. The case and this article provide important guidance on the scope of the exemptions for con.dential and commercially sensitive information.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Cheng, Xian Yi, Wei Kang, and Yu Guo. "An Algorithm of Network Sensitive Information Features Extracting." Applied Mechanics and Materials 556-562 (May 2014): 3558–61. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.3558.

Der volle Inhalt der Quelle
Annotation:
In the vast ocean of data, how people can learn from the best, to eliminate the dross, the Internet age has become a major issue, also facing great challenge for data processing, and it is the key to develop the national network economy. For sensitive information filtering time lag, low accuracy, poor self-adaptability to the Internet, Chinese text media (webpage, micro-blogging, forum, etc.) for the study, using the technology of the opinion mining and natural language processing, study of sensitive information feature extraction algorithm to reveal the interrelationship of sensitive informat
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Oh, Jin-Kwan, Seh-La Oh, Kwang-Hoon Choi, and Jin-Hee Yim. "A Study on Sensitive Information Filtering Requirements for Supporting Original Information Disclosure." Journal of Records Management & Archives Society of Korea 17, no. 1 (February 28, 2017): 51–71. http://dx.doi.org/10.14404/jksarm.2017.17.1.051.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Jiang, Ying, Ming Jing, Jie Zeng, Feng Qi Shen, Du Lan Qi, and Li Hua Wang. "LanguageTool Based Proofreading of Sensitive Chinese Political Information." Applied Mechanics and Materials 687-691 (November 2014): 2644–47. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2644.

Der volle Inhalt der Quelle
Annotation:
Sensitive Chinese political information are partly monitored and controlled by Chinese mainstream media (newspaper, television, the Internet, etc.) and the National Security Agency as well as corresponding political authorities. However, Chinese media authorities still lack in a technology or some methods to detect and identify sensitive Chinese political information quickly and efficiently. Due to complexity of sensitive Chinese political information, it cannot be monitored by a list of keywords or a simple pattern matching. How to satisfy the demands of media institutions is one of the most
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Kiran, Asha, Manimala Puri, and S. Srinivasa. "Preserving Sensitive Information using Fuzzy C-Means Approach." International Journal of Computer Applications 181, no. 10 (August 14, 2018): 40–46. http://dx.doi.org/10.5120/ijca2018917656.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!