Academic literature on the topic 'Data protection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data protection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Data protection"
Gama, Cruz. "Data protection and personal data protection." Brazilian Journal of Clinical Medicine and Review 1, Suppl.1 (2023): 18. http://dx.doi.org/10.52600/2965-0968.bjcmr.2023.1.suppl.1.18.
Full textChamberlain, Johanna, and Andreas Kotsios. "Data protection beyond data protection regulation." Stiftelsen Juridisk Fakultetslitteratur, no. 2024 2 (January 17, 2024): 397–424. http://dx.doi.org/10.53292/bd1fa11c.282687ef.
Full textVarsha, Gehlot. "COMPARISON OF DATA PROTECTION LAWS IN INDIA WITH RESPECT TO GDPR." Indian Journal of Law and Society I, no. 8 (2024): 160–77. https://doi.org/10.5281/zenodo.10644661.
Full textAlhababi, Hamad Hamed. "Cross-Border Data Transfer between the gcc Data Protection Laws and the gdpr." Global Journal of Comparative Law 13, no. 2 (2024): 178–200. http://dx.doi.org/10.1163/2211906x-13020003.
Full textRahmah, Siti, Darmiwati, and Fitri Wahyuni. "Perlindungan Hukum Terhadap Data Pribadi di Era Big Data." Jurnal Indragiri Penelitian Multidisiplin 4, no. 3 (2024): 43–50. https://doi.org/10.58707/jipm.v4i3.1043.
Full textWalker-Osborn, C., L. Fitzsimons, and J. Ruane. "Data Protection." ITNOW 55, no. 3 (2013): 38–39. http://dx.doi.org/10.1093/itnow/bwt050.
Full textRowe, Heather, and Robin McGilligan. "DATA PROTECTION." Computer Law & Security Review 17, no. 5 (2001): 333–35. http://dx.doi.org/10.1016/s0267-3649(01)00511-8.
Full textDinant, Jean-Marc, and Ewout Keuleers. "Data protection." Computer Law & Security Review 20, no. 1 (2004): 22–28. http://dx.doi.org/10.1016/s0267-3649(04)00005-6.
Full textChalton, Simon. "Data protection." Computer Law & Security Review 13, no. 6 (1997): 425–28. http://dx.doi.org/10.1016/s0267-3649(97)89792-0.
Full textSizer, Richard. "Data protection." Computer Law & Security Review 2, no. 5 (1987): 13–15. http://dx.doi.org/10.1016/0267-3649(87)90007-0.
Full textDissertations / Theses on the topic "Data protection"
Budd, Chris. "Data Protection and Data Elimination." International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596395.
Full textSebé, Feixas Francesc. "Transparent Protection of Data." Doctoral thesis, Universitat Politècnica de Catalunya, 2003. http://hdl.handle.net/10803/7026.
Full textLoukides, Grigorios. "Data utility and privacy protection in data publishing." Thesis, Cardiff University, 2008. http://orca.cf.ac.uk/54743/.
Full textIslam, Naveed. "Cryptography based Visual Data Protection." Thesis, Montpellier 2, 2011. http://www.theses.fr/2011MON20178/document.
Full textKasneci, Dede. "Data protection law: recent developments." Doctoral thesis, Università degli studi di Trieste, 2010. http://hdl.handle.net/10077/3578.
Full textLloyd, Ian J. "Data processing and individual freedom : data protection and beyond." Thesis, University of Strathclyde, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.233213.
Full textNeophytou, Andonis. "Computer security : data control and protection." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834504.
Full textPizzolante, Raffaele. "Compression and protection of multidimensional data." Doctoral thesis, Universita degli studi di Salerno, 2015. http://hdl.handle.net/10556/1943.
Full textNg, Chi-kwan Miranda. "A study of the administrative provisions governing personal data protection in the Hong Kong Government." [Hong Kong] : University of Hong Kong, 1987. http://sunzi.lib.hku.hk/hkuto/record.jsp?B12335368.
Full textPavlovic, Dusan <1981>. "Online Gambling in the UE: from Data Protection to Gambler Protection." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amsdottorato.unibo.it/8721/1/PAVLOVIC_DUSAN_tesi.pdf.
Full textBooks on the topic "Data protection"
Judith, Firth, Nickson Susan, Hammond Suddards (Firm), and Chartered Institute of Personnel and Development., eds. Data protection. 2nd ed. Chartered Institute of Personnel and Development, 2004.
Find full text(Firm), Hammond Suddards, ed. Data protection. Institute of Personnel and Development, 2000.
Find full textChannel, Executive Business, ed. Data protection. Executive Business Channel, 1994.
Find full textHewage, Chaminda, Lasith Yasakethu, and Dushmantha Nalin K. Jayakody, eds. Data Protection. Springer Nature Switzerland, 2024. https://doi.org/10.1007/978-3-031-76473-8.
Full textInstruments, Great Britain Statutory. Data protection: The data protection regulations, 1985. H.M.S.O, 1985.
Find full textMorgan, Richard. Data protection strategy: Implementing data protection compliance. 2nd ed. Sweet & Maxwell/Thomson Reuters, 2012.
Find full textRuth, Boardman, ed. Data protection strategy: Implementing data protection compliance. Sweet & Maxwell, 2003.
Find full textOffice, Home. Protecting personal data: The Data Protection Act 1984. Home Office, 1985.
Find full textBook chapters on the topic "Data protection"
Finch, John. "Data protection." In Speller’s Law Relating to Hospitals. Springer US, 1994. http://dx.doi.org/10.1007/978-1-4899-7122-7_13.
Full textToker, Kadir Atilla. "Data Protection." In Encyclopedia of Corporate Social Responsibility. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-28036-8_419.
Full textHannah, Kathryn J., Marion J. Ball, and Margaret J. A. Edwards. "Data Protection." In Health Informatics. Springer New York, 1999. http://dx.doi.org/10.1007/978-1-4757-3095-1_14.
Full textIslam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_95-1.
Full textIslam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_95-2.
Full textGlasby, Jon, and Helen Dickinson. "Data Protection." In A–Z of Inter-Agency Working. Macmillan Education UK, 2014. http://dx.doi.org/10.1007/978-1-137-00533-5_15.
Full textLakshmi, Vasantha. "Data Protection." In Beginning Security with Microsoft Technologies. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4853-9_5.
Full textFrost, Chris. "Data protection." In Privacy and the News Media. Routledge, 2019. http://dx.doi.org/10.4324/9780429029813-10.
Full textKolb, Marina. "Data Protection." In The European Union and the Council of Europe. Palgrave Macmillan UK, 2013. http://dx.doi.org/10.1057/9781137023636_4.
Full textKissoon, Tara. "Data Protection." In Optimal Spending on Cybersecurity Measures. CRC Press, 2024. http://dx.doi.org/10.1201/9781003497523-3.
Full textConference papers on the topic "Data protection"
Tagde, Anand, Pranjali Jibhakate, Yami Pimpalikar, Rahul Agrawal, Chetan Dhule, and Nekita Chavan Morris. "Comprehensive Data Access Protection Suite." In 2025 International Conference on Computational, Communication and Information Technology (ICCCIT). IEEE, 2025. https://doi.org/10.1109/icccit62592.2025.10928082.
Full textLi, Yifeng. "Blockchain transaction data privacy protection scheme." In Fifth International Conference on Computer Communication and Network Security (CCNS 2024), edited by Zhiyong Xiong and Zhaolong Ning. SPIE, 2024. http://dx.doi.org/10.1117/12.3038136.
Full textWang, Guanyu, Jiaxuan Huang, Hongliu Cai, et al. "Dynamic multidimensional data privacy protection algorithm." In International Conference on Computer Application and Information Security (ICCAIS 2024), edited by Sadiq Ali Safaa, Pandey Hari Mohan, and Boussaid Farid. SPIE, 2025. https://doi.org/10.1117/12.3061152.
Full textJava, Abhinav, Simra Shahid, and Chirag Agarwal. "Towards Operationalizing Right to Data Protection." In Proceedings of the 2025 Conference of the Nations of the Americas Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 1: Long Papers). Association for Computational Linguistics, 2025. https://doi.org/10.18653/v1/2025.naacl-long.416.
Full textXu, Shouyin, Lingguang Lei, Yuewu Wang, and Heqing Huang. "KPDP: Kernel Permission Data Protection Against Data-Oriented Attacks." In 2024 9th International Conference on Signal and Image Processing (ICSIP). IEEE, 2024. http://dx.doi.org/10.1109/icsip61881.2024.10671512.
Full textBărbuceanu, Teodor, Razvan Craciunescu, and Eduard Popovici. "Data Protection Device." In 2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). IEEE, 2023. http://dx.doi.org/10.1109/ecai58194.2023.10194205.
Full textSkendzic, A., B. Kovacic, and E. Tijan. "General data protection regulation — Protection of personal data in an organisation." In 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2018. http://dx.doi.org/10.23919/mipro.2018.8400247.
Full textFotiou, Nikos, George Xylomenos, and Yannis Thomas. "Data integrity protection for data spaces." In EuroSys '24: Nineteenth European Conference on Computer Systems. ACM, 2024. http://dx.doi.org/10.1145/3642974.3652284.
Full text"TOWARDS DATA PROTECTION COMPLIANCE." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2010. http://dx.doi.org/10.5220/0002981802130216.
Full textBenjamin, Bruce, Joel Coffman, Hadi Esiely-Barrera, et al. "Data Protection in OpenStack." In 2017 IEEE 10th International Conference on Cloud Computing (CLOUD). IEEE, 2017. http://dx.doi.org/10.1109/cloud.2017.77.
Full textReports on the topic "Data protection"
Souppaya, Murugiah. Data Classification Concepts and Considerations for Improving Data Protection. National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.ir.8496.ipd.
Full textRiyadi, Gliddheo. Data Privacy in the Indonesian Personal Data Protection Legislation. Center for Indonesian Policy Studies, 2021. http://dx.doi.org/10.35497/341482.
Full textNewhouse, Bill. Data Classification Concepts and Considerations for Improving Data Protection. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.cswp.43.
Full textBandyopadhyay, Subhayu, and Suryadipta Roy. Corruption and Trade Protection: Evidence from Panel Data. Federal Reserve Bank of St. Louis, 2007. http://dx.doi.org/10.20955/wp.2007.022.
Full textPerdana, Arif, and Saru Arifin. Finding a fix for Indonesia’s data protection problems. Edited by Ria Ernunsari. Monash University, 2023. http://dx.doi.org/10.54377/130f-dbb9.
Full textChandramouli, Ramaswamy. A Data Protection Approach for Cloud-Native Applications. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8505.ipd.
Full textChandramouli, Ramaswamy. A Data Protection Approach for Cloud-Native Applications. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8505.
Full textNasution, Sri. Improving Data Governance and Personal Data Protection through ASEAN Digital Masterplan 2025. Center for Indonesian Policy Studies, 2021. http://dx.doi.org/10.35497/353777.
Full textNotarianni, Kathy, and William Rinkinen. Protection of data processing equipment with fine water sprays. National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.ir.5514.
Full textYin, Tianzhixi, Jianming Lian, John Buckheit, and Rui Fan. Bridging Power System Protection Gaps with Data-driven Approaches. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1771797.
Full text