Journal articles on the topic 'And Data Privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'And Data Privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Gade, Kishore. "Data Analytics: Data Privacy, Data Ethics, Data Monetization." International Journal of Science and Research (IJSR) 9, no. 2 (2020): 1953–59. http://dx.doi.org/10.21275/sr20027110931.
Full textYerbulatov, Sultan. "Data Security and Privacy in Data Engineering." International Journal of Science and Research (IJSR) 13, no. 4 (2024): 232–36. http://dx.doi.org/10.21275/es24318121241.
Full textR.Mahesh and Dr.T.Meyyappan. "A New Method for Preserving Privacy in Data Publishing Against Attribute and Identity Disclosure Risk." International Journal on Cryptography and Information Security (IJCIS) 3, no. 2 (2020): 23–30. https://doi.org/10.5281/zenodo.4013312.
Full textP, Ram Mohan Rao, Murali Krishna S, and P. Siva Kumar A. "Novel algorithm for efficient privacy preservation in data analytics." Indian Journal of Science and Technology 14, no. 6 (2021): 519–26. https://doi.org/10.17485/IJST/v14i6.1773.
Full textTorra, Vicenç, and Guillermo Navarro-Arribas. "Data privacy." Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 4, no. 4 (2014): 269–80. http://dx.doi.org/10.1002/widm.1129.
Full textHassan, Jamal, A. Algeelani Nasir, and Al-Sammarraie Najeeb. "Advance Data-Privacy by Using Artificial Intelligence." International Journal of Computer Science and Information Technology Research 10, no. 4 (2022): 38–45. https://doi.org/10.5281/zenodo.7398762.
Full textBasha, M. John, T. Satyanarayana Murthy, A. S. Valarmathy, et al. "Privacy-Preserving Data Mining and Analytics in Big Data." E3S Web of Conferences 399 (2023): 04033. http://dx.doi.org/10.1051/e3sconf/202339904033.
Full textKrishna, Prasanth Brahmaji Kanagarla. "The Role of Synthetic Data in Ensuring Data Privacy and Enabling Secure Analytics." European Journal of Advances in Engineering and Technology 11, no. 10 (2024): 75–79. https://doi.org/10.5281/zenodo.14012320.
Full textMrs., M. S. Lakshmi Devi. "Privacy-Preserving Data Fragmentation and Aggregation." Journal of Scholastic Engineering Science and Management 2, no. 9 (2023): 23–30. https://doi.org/10.5281/zenodo.8311026.
Full textCOSTEA, Ioan. "Data Privacy Assurance in Virtual Private Networks." International Journal of Information Security and Cybercrime 1, no. 2 (2012): 40–47. http://dx.doi.org/10.19107/ijisc.2012.02.05.
Full textSramka, Michal. "Data mining as a tool in privacy-preserving data publishing." Tatra Mountains Mathematical Publications 45, no. 1 (2010): 151–59. http://dx.doi.org/10.2478/v10127-010-0011-z.
Full textMohapatra, Shubhankar, Jianqiao Zong, Florian Kerschbaum, and Xi He. "Differentially Private Data Generation with Missing Data." Proceedings of the VLDB Endowment 17, no. 8 (2024): 2022–35. http://dx.doi.org/10.14778/3659437.3659455.
Full textM., Santhiya Devi*1 &. Dr.K.Arunesh2. "PRIVACY PRESERVATION TECHNIQUES FOR PERSONALIZED DATA IN BIG DATA." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 4 (2019): 335–40. https://doi.org/10.5281/zenodo.2653603.
Full textQamar, T., N. Z. Bawany, and N. A. Khan. "EDAMS: Efficient Data Anonymization Model Selector for Privacy-Preserving Data Publishing." Engineering, Technology & Applied Science Research 10, no. 2 (2020): 5423–27. https://doi.org/10.5281/zenodo.3748328.
Full textHeubl, B. "News - Briefing. Data privacy: Data privacy group found to have breached online privacy rules." Engineering & Technology 15, no. 3 (2020): 9. http://dx.doi.org/10.1049/et.2020.0317.
Full textWinarsih, Winarsih, and Irwansyah Irwansyah. "PROTEKSI PRIVASI BIG DATA DALAM MEDIA SOSIAL." Jurnal Audience 3, no. 1 (2020): 1–33. http://dx.doi.org/10.33633/ja.v3i1.3722.
Full textJAKŠIĆ, SVETLANA, JOVANKA PANTOVIĆ, and SILVIA GHILEZAN. "Linked data privacy." Mathematical Structures in Computer Science 27, no. 1 (2015): 33–53. http://dx.doi.org/10.1017/s096012951500002x.
Full textAbdul Manap, Nazura, Mohamad Rizal Abd Rahman, and Siti Nur Farah Atiqah Salleh. "HEALTH DATA OWNERSHIP IN MALAYSIA PUBLIC AND PRIVATE HEALTHCARE: A LEGAL ANALYSIS OF HEALTH DATA PRIVACY IN THE AGE OF BIG DATA." International Journal of Law, Government and Communication 7, no. 30 (2022): 33–41. http://dx.doi.org/10.35631/ijlgc.730004.
Full textDE CAPITANI DI VIMERCATI, SABRINA, SARA FORESTI, GIOVANNI LIVRAGA, and PIERANGELA SAMARATI. "DATA PRIVACY: DEFINITIONS AND TECHNIQUES." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 20, no. 06 (2012): 793–817. http://dx.doi.org/10.1142/s0218488512400247.
Full textBhoomi, Shukla. "DATA PRIVACY, DATA PROTECTION: "The Unprecedented Challenges of Ambient Intelligence"." Indian Journal of Law and Society I, no. 8 (2024): 25–31. https://doi.org/10.5281/zenodo.10644515.
Full textSmith, J. H., and JS Horne. "Data privacy and DNA data." IASSIST Quarterly 47, no. 3-4 (2023): 1–3. http://dx.doi.org/10.29173/iq1094.
Full textRavindar, Reddy Gopireddy. "Data Anonymization Techniques: Ensuring Privacy in Big Data Analytics." European Journal of Advances in Engineering and Technology 7, no. 11 (2020): 68–74. https://doi.org/10.5281/zenodo.13253009.
Full textPatel, Mohnish, Prashant Richariya, and Anurag Shrivastava. "A review paper on Privacy-Preserving Data Mining." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 09 (2013): 296–99. https://doi.org/10.5281/zenodo.14613361.
Full textQamar, T., N. Z. Bawany, and N. A. Khan. "EDAMS: Efficient Data Anonymization Model Selector for Privacy-Preserving Data Publishing." Engineering, Technology & Applied Science Research 10, no. 2 (2020): 5423–27. http://dx.doi.org/10.48084/etasr.3374.
Full textLobo-Vesga, Elisabet, Alejandro Russo, and Marco Gaboardi. "A Programming Language for Data Privacy with Accuracy Estimations." ACM Transactions on Programming Languages and Systems 43, no. 2 (2021): 1–42. http://dx.doi.org/10.1145/3452096.
Full textLuo, Xiaohui. "A Method for Privacy-Safe Synthetic Health Data." Academic Journal of Science and Technology 10, no. 1 (2024): 445–50. http://dx.doi.org/10.54097/f7fjss40.
Full textGertner, Yael, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. "Protecting Data Privacy in Private Information Retrieval Schemes." Journal of Computer and System Sciences 60, no. 3 (2000): 592–629. http://dx.doi.org/10.1006/jcss.1999.1689.
Full textYang, Qing, Cheng Wang, Teng Hu, Xue Chen, and Changjun Jiang. "Implicit privacy preservation: a framework based on data generation." Security and Safety 1 (2022): 2022008. http://dx.doi.org/10.1051/sands/2022008.
Full textOyekan, Basirat. "DEVELOPING PRIVACY-PRESERVING FEDERATED LEARNING MODELS FOR COLLABORATIVE HEALTH DATA ANALYSIS ACROSS MULTIPLE INSTITUTIONS WITHOUT COMPROMISING DATA SECURITY." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 3, no. 3 (2024): 139–64. http://dx.doi.org/10.60087/jklst.vol3.n3.p139-164.
Full textGayathri, Tata, and N. Durga. "Privacy Preserving Approaches for High Dimensional Data." International Journal of Trend in Scientific Research and Development Volume-1, Issue-5 (2017): 1120–25. http://dx.doi.org/10.31142/ijtsrd2430.
Full textSandeep Agrawal, Tanay. "Blockchain Applications in Data Security and Privacy." International Journal of Science and Research (IJSR) 13, no. 12 (2024): 22–23. https://doi.org/10.21275/sr241127154835.
Full textM, Madhushree. "Privacy Preserving Utility Verification of Data Published." International Journal of Science and Research (IJSR) 10, no. 8 (2021): 1126–29. https://doi.org/10.21275/sr21825190409.
Full textPurnamaningsih, Sari Nur Indahty, Joko Ismono, Ichwani Siti Utami, Vernando Parlindungan, and Salma Nur Hanifah. "The Challenges of Data Privacy Laws in the Age of Big Data: Balancing Security, Privacy, and Innovation." Join: Journal of Social Science 1, no. 6 (2024): 455–65. http://dx.doi.org/10.59613/gny8bq82.
Full textRiyana, Surapon, Nobutaka Ito, Tatsanee Chaiya, et al. "Privacy Threats and Privacy Preservation Techniques for Farmer Data Collections Based on Data Shuffling." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 16, no. 3 (2022): 289–301. http://dx.doi.org/10.37936/ecti-cit.2022163.246469.
Full textZhu, Xiao Ming. "Research on Privacy Preserving Data Mining Association Rules Protocol." Advanced Materials Research 756-759 (September 2013): 1661–64. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1661.
Full textJain, Pinkal, Vikas Thada, and Deepak Motwani. "Providing Highest Privacy Preservation Scenario for Achieving Privacy in Confidential Data." International Journal of Experimental Research and Review 39, Spl Volume (2024): 190–99. http://dx.doi.org/10.52756/ijerr.2024.v39spl.015.
Full textRaj, Diana Judith Irudaya, Vijay Sai Radhakrishnan, Manyam Rajasekhar Reddy, Natarajan Senthil Selvan, Balasubramanian Elangovan, and Manikandan Ganesan. "The Projection-Based Data Transformation Approach for Privacy Preservation in Data Mining." Engineering, Technology & Applied Science Research 14, no. 4 (2024): 15969–74. http://dx.doi.org/10.48084/etasr.7969.
Full textDuan, Huabin, Jie Yang, and Huanjun Yang. "A Blockchain-Based Privacy Protection Application for Logistics Big Data." Journal of Cases on Information Technology 24, no. 5 (2022): 1–12. http://dx.doi.org/10.4018/jcit.295249.
Full textAppenzeller, Arno, Moritz Leitner, Patrick Philipp, Erik Krempel, and Jürgen Beyerer. "Privacy and Utility of Private Synthetic Data for Medical Data Analyses." Applied Sciences 12, no. 23 (2022): 12320. http://dx.doi.org/10.3390/app122312320.
Full textDu, Jiawen, and Yong Pi. "Research on Privacy Protection Technology of Mobile Social Network Based on Data Mining under Big Data." Security and Communication Networks 2022 (January 13, 2022): 1–9. http://dx.doi.org/10.1155/2022/3826126.
Full textVarun, Pratap Singh Bhakuni, and Chandr Singh Nalnish. "Digital Data vis a vis Right to Privacy in India." Recent Researches in Social Sciences & Humanties 11, no. 1 (Jan.-Feb.-Mar. 2024) (2024): 87–92. https://doi.org/10.5281/zenodo.11001650.
Full textArjun, Mantri. "Ensuring Data Security and Privacy During Data Migration." European Journal of Advances in Engineering and Technology 6, no. 3 (2019): 111–15. https://doi.org/10.5281/zenodo.13354011.
Full textMantsha, Arif, and kumar Dheeraj. "Privacy and Data Protection : A Critical Analysis in Context of Existing Data Protection Laws." Career Point International Journal of Research(CPIJR) 2, no. 2 (2023): 44–49. https://doi.org/10.5281/zenodo.8312345.
Full textBRYZHKO, V. "Data privacy in cloud technologies." INFORMATION AND LAW, no. 4(19) (December 15, 2016): 47–59. http://dx.doi.org/10.37750/2616-6798.2016.4(19).272976.
Full textVishnoi, Meenakshi, and Seeja K. R. "Privacy Preserving Data Mining using Attribute Encryption and Data Perturbation." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 6, no. 3 (2013): 370–78. http://dx.doi.org/10.24297/ijct.v6i3.4461.
Full textSilva, Paulo, Carolina Gonçalves, Nuno Antunes, Marilia Curado, and Bogdan Walek. "Privacy risk assessment and privacy-preserving data monitoring." Expert Systems with Applications 200 (August 2022): 116867. http://dx.doi.org/10.1016/j.eswa.2022.116867.
Full textYao-Huai, Lü. "Privacy and Data Privacy Issues in Contemporary China." Ethics and Information Technology 7, no. 1 (2005): 7–15. http://dx.doi.org/10.1007/s10676-005-0456-y.
Full textIngale, Indrajeet. "Privacy Preserving of Collaborative Data Publishing WithM-Privacy." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 2 (2015): 845–47. http://dx.doi.org/10.17762/ijritcc2321-8169.150290.
Full textWang, Yi-Ren, and Yun-Cheng Tsai. "The Protection of Data Sharing for Privacy in Financial Vision." Applied Sciences 12, no. 15 (2022): 7408. http://dx.doi.org/10.3390/app12157408.
Full textDavid, Shamoo Excel. "Privacy-preserving data analysis." World Journal of Advanced Research and Reviews 23, no. 3 (2024): 597–609. https://doi.org/10.5281/zenodo.14930698.
Full text