Academic literature on the topic 'Data protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Data protection"

1

Gama, Cruz. "Data protection and personal data protection." Brazilian Journal of Clinical Medicine and Review 1, Suppl.1 (2023): 18. http://dx.doi.org/10.52600/2965-0968.bjcmr.2023.1.suppl.1.18.

Full text
Abstract:
In Angola, the right to privacy is one of the fundamental rights enshrined in the Constitution of the Republic. In addition to the Constitution, the legal framework on the protection of personal data is complemented by other laws, with regard to the Personal Data Protection Law, No. 22/11 of 17 June, which establishes legal rules for the processing of such data and establishes Data Protection (DPA), as the public authority responsible for monitoring compliance with those rules and exercising. The unequivocal and express consent of the data subject or his legal representative and prior notifica
APA, Harvard, Vancouver, ISO, and other styles
2

Chamberlain, Johanna, and Andreas Kotsios. "Data protection beyond data protection regulation." Stiftelsen Juridisk Fakultetslitteratur, no. 2024 2 (January 17, 2024): 397–424. http://dx.doi.org/10.53292/bd1fa11c.282687ef.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Varsha, Gehlot. "COMPARISON OF DATA PROTECTION LAWS IN INDIA WITH RESPECT TO GDPR." Indian Journal of Law and Society I, no. 8 (2024): 160–77. https://doi.org/10.5281/zenodo.10644661.

Full text
Abstract:
<strong>ABSTRACT</strong> <em>This academic legal analysis compares the General Data Protection Regulation (GDPR) of the European Union with India's Digital Personal Data Protection Act (DPDPA) to determine whether the two pieces of legislation are compatible with one another. As we live in an increasingly digital world where information is freely shared across borders, data protection has become a pressing legal and societal concern. In 2018, the General Data Protection Regulation (GDPR) became law, setting a global standard for stricter data protection procedures with an emphasis on protecti
APA, Harvard, Vancouver, ISO, and other styles
4

Alhababi, Hamad Hamed. "Cross-Border Data Transfer between the gcc Data Protection Laws and the gdpr." Global Journal of Comparative Law 13, no. 2 (2024): 178–200. http://dx.doi.org/10.1163/2211906x-13020003.

Full text
Abstract:
Abstract This article explores the procedures related to data protection laws in the Gulf Cooperation Council States (gcc) and the European Union (EU) regarding the General Data Protection Regulation (gdpr). It draws conclusions about the rules governing the transfer of personal information outside of a country. Transfers of personal data to foreign countries or international organizations are discussed, specifically, transfers based on an ‘adequacy’ judgment, or transfers subject to suitable protections. The article also highlights the primary modifications made to safeguard the outbound tran
APA, Harvard, Vancouver, ISO, and other styles
5

Rahmah, Siti, Darmiwati, and Fitri Wahyuni. "Perlindungan Hukum Terhadap Data Pribadi di Era Big Data." Jurnal Indragiri Penelitian Multidisiplin 4, no. 3 (2024): 43–50. https://doi.org/10.58707/jipm.v4i3.1043.

Full text
Abstract:
The increasingly massive use of information and communication technology has raised concerns about protecting personal data in the era of big data which can harm individuals. Big Data as a form of technological development has not been balanced with developments in legal regulations, so there is no harmony between the use of Big Data and legal regulations related to the protection of personal data. Regulations related to the protection of personal data that already exist in Indonesia cannot guarantee and protect confidentiality and overcome the problem of protecting citizens' personal data. Th
APA, Harvard, Vancouver, ISO, and other styles
6

Walker-Osborn, C., L. Fitzsimons, and J. Ruane. "Data Protection." ITNOW 55, no. 3 (2013): 38–39. http://dx.doi.org/10.1093/itnow/bwt050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rowe, Heather, and Robin McGilligan. "DATA PROTECTION." Computer Law & Security Review 17, no. 5 (2001): 333–35. http://dx.doi.org/10.1016/s0267-3649(01)00511-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dinant, Jean-Marc, and Ewout Keuleers. "Data protection." Computer Law & Security Review 20, no. 1 (2004): 22–28. http://dx.doi.org/10.1016/s0267-3649(04)00005-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chalton, Simon. "Data protection." Computer Law & Security Review 13, no. 6 (1997): 425–28. http://dx.doi.org/10.1016/s0267-3649(97)89792-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sizer, Richard. "Data protection." Computer Law & Security Review 2, no. 5 (1987): 13–15. http://dx.doi.org/10.1016/0267-3649(87)90007-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Data protection"

1

Budd, Chris. "Data Protection and Data Elimination." International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596395.

Full text
Abstract:
ITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NV<br>Data security is becoming increasingly important in all areas of storage. The news services frequently have stories about lost or stolen storage devices and the panic it causes. Data security in an SSD usually involves two components: data protection and data elimination. Data protection includes passwords to protect against unauthorized access and encryption to protect against recovering data fro
APA, Harvard, Vancouver, ISO, and other styles
2

Sebé, Feixas Francesc. "Transparent Protection of Data." Doctoral thesis, Universitat Politècnica de Catalunya, 2003. http://hdl.handle.net/10803/7026.

Full text
Abstract:
Aquesta tesi tracta la protecció de dades quan aquestes han de ser lliurades a usuaris en qui no es té absoluta confiança. En aquesta situació, les dades s'han de protegir de manera que segueixin essent utilitzables. Aquesta protecció ha de ser imperceptible, per tal de no destorbar la utilització correcta de les dades, i alhora efectiva, protegint contra la utilització no autoritzada d'aquestes.<br/>L'estudi es divideix tenint en compte els dos tipus de dades la protecció transparent de les quals s'estudia: continguts multimèdia i microdades estadístiques.<br/><br/>Pel que fa a dades multimèd
APA, Harvard, Vancouver, ISO, and other styles
3

Loukides, Grigorios. "Data utility and privacy protection in data publishing." Thesis, Cardiff University, 2008. http://orca.cf.ac.uk/54743/.

Full text
Abstract:
Data about individuals is being increasingly collected and disseminated for purposes such as business analysis and medical research. This has raised some privacy concerns. In response, a number of techniques have been proposed which attempt to transform data prior to its release so that sensitive information about the individuals contained within it is protected. A:-Anonymisation is one such technique that has attracted much recent attention from the database research community. A:-Anonymisation works by transforming data in such a way that each record is made identical to at least A: 1 other
APA, Harvard, Vancouver, ISO, and other styles
4

Islam, Naveed. "Cryptography based Visual Data Protection." Thesis, Montpellier 2, 2011. http://www.theses.fr/2011MON20178/document.

Full text
Abstract:
La transmission de données multimédia sur les réseaux sécurisés a une croissance exponentielle grâce aux progrès scientifique dans les technologies de l'information et de la communication. La sécurité des données dans certaines applications comme le stockage sécurisé, l'authentification, la protection des droits d'auteurs, la communication militaire ou la visioconférence confidentielles, nécessitent de nouvelles stratégies en matière de transmission sécurisée. Deux techniques sont couramment utilisées pour la transmission sécurisée de données visuelles, à savoir : la cryptographie et la stégan
APA, Harvard, Vancouver, ISO, and other styles
5

Kasneci, Dede. "Data protection law: recent developments." Doctoral thesis, Università degli studi di Trieste, 2010. http://hdl.handle.net/10077/3578.

Full text
Abstract:
2008/2009<br>Privacy and data protection concern everyone and are issue of profound importance around the World. Privacy has been hailed as “an integral part of our humanity” the “hart of our liberty” and “the beginning of all freedoms” (Solove, 2008). Given its importance, privacy is recognized as a fundamental human right according to many International Instruments such as: the United Nations Universal Declaration of Human Rights of 1948 (Article 12), International Covenant on the Civil and Political Rights (Article 17) The European Convention of Human Rights of 1950 (Article 8), the Charter
APA, Harvard, Vancouver, ISO, and other styles
6

Lloyd, Ian J. "Data processing and individual freedom : data protection and beyond." Thesis, University of Strathclyde, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.233213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Neophytou, Andonis. "Computer security : data control and protection." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834504.

Full text
Abstract:
Computer security is a crucial area for any organization based on electronic devices that process data. The security of the devices themselves and the data they process are the backbone of the organization. Until today there have been no completely secure systems or procedures until and a lot of research is being done in this area. It impossible for a machine or a mechanical procedure to "guess" all possible events and lead to conclusive, cohesive and comprehensive secure systems, because of: 1) the human factor, and 2) acts of nature (fire, flood etc). However, proper managerial control can a
APA, Harvard, Vancouver, ISO, and other styles
8

Pizzolante, Raffaele. "Compression and protection of multidimensional data." Doctoral thesis, Universita degli studi di Salerno, 2015. http://hdl.handle.net/10556/1943.

Full text
Abstract:
2013 - 2014<br>The main objective of this thesis is to explore and discuss novel techniques related to the compression and protection of multidimensional data (i.e., 3-D medical images, hyperspectral images, 3-D microscopy images and 5-D functional Magnetic Resonance Images). First, we outline a lossless compression scheme based on the predictive model, denoted as Medical Images Lossless Compression algorithm (MILC). MILC is characterized to provide a good trade-off between the compression performances and reduced usage of the hardware resources. Since in the medical and medical-relate
APA, Harvard, Vancouver, ISO, and other styles
9

Ng, Chi-kwan Miranda. "A study of the administrative provisions governing personal data protection in the Hong Kong Government." [Hong Kong] : University of Hong Kong, 1987. http://sunzi.lib.hku.hk/hkuto/record.jsp?B12335368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pavlovic, Dusan <1981&gt. "Online Gambling in the UE: from Data Protection to Gambler Protection." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amsdottorato.unibo.it/8721/1/PAVLOVIC_DUSAN_tesi.pdf.

Full text
Abstract:
The thesis tends to answer how does the processing of online gamblers’ personal data, which is used for identification and commercial communication purposes, affect the protection of online gamblers in the EU? After the introduction into the context of online gambling in Europe and risks that jeopardize the protection of online gamblers and the concept of responsible gambling, the first part of the thesis sheds light on the relationship between the processing of online gamblers’ data and the provocation of problem gambling. The attention is given to the gambling-related commercial communic
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Data protection"

1

Judith, Firth, Nickson Susan, Hammond Suddards (Firm), and Chartered Institute of Personnel and Development., eds. Data protection. 2nd ed. Chartered Institute of Personnel and Development, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

(Firm), Hammond Suddards, ed. Data protection. Institute of Personnel and Development, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Channel, Executive Business, ed. Data protection. Executive Business Channel, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Association, British Dental. Data protection. British Dental Association, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bainbridge, David I. Data protection. CLT Professional Pub., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hewage, Chaminda, Lasith Yasakethu, and Dushmantha Nalin K. Jayakody, eds. Data Protection. Springer Nature Switzerland, 2024. https://doi.org/10.1007/978-3-031-76473-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Instruments, Great Britain Statutory. Data protection: The data protection regulations, 1985. H.M.S.O, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Morgan, Richard. Data protection strategy: Implementing data protection compliance. 2nd ed. Sweet & Maxwell/Thomson Reuters, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ruth, Boardman, ed. Data protection strategy: Implementing data protection compliance. Sweet & Maxwell, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Office, Home. Protecting personal data: The Data Protection Act 1984. Home Office, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Data protection"

1

Finch, John. "Data protection." In Speller’s Law Relating to Hospitals. Springer US, 1994. http://dx.doi.org/10.1007/978-1-4899-7122-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Toker, Kadir Atilla. "Data Protection." In Encyclopedia of Corporate Social Responsibility. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-28036-8_419.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hannah, Kathryn J., Marion J. Ball, and Margaret J. A. Edwards. "Data Protection." In Health Informatics. Springer New York, 1999. http://dx.doi.org/10.1007/978-1-4757-3095-1_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Islam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_95-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Islam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_95-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Glasby, Jon, and Helen Dickinson. "Data Protection." In A–Z of Inter-Agency Working. Macmillan Education UK, 2014. http://dx.doi.org/10.1007/978-1-137-00533-5_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lakshmi, Vasantha. "Data Protection." In Beginning Security with Microsoft Technologies. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4853-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Frost, Chris. "Data protection." In Privacy and the News Media. Routledge, 2019. http://dx.doi.org/10.4324/9780429029813-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kolb, Marina. "Data Protection." In The European Union and the Council of Europe. Palgrave Macmillan UK, 2013. http://dx.doi.org/10.1057/9781137023636_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kissoon, Tara. "Data Protection." In Optimal Spending on Cybersecurity Measures. CRC Press, 2024. http://dx.doi.org/10.1201/9781003497523-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Data protection"

1

Tagde, Anand, Pranjali Jibhakate, Yami Pimpalikar, Rahul Agrawal, Chetan Dhule, and Nekita Chavan Morris. "Comprehensive Data Access Protection Suite." In 2025 International Conference on Computational, Communication and Information Technology (ICCCIT). IEEE, 2025. https://doi.org/10.1109/icccit62592.2025.10928082.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Yifeng. "Blockchain transaction data privacy protection scheme." In Fifth International Conference on Computer Communication and Network Security (CCNS 2024), edited by Zhiyong Xiong and Zhaolong Ning. SPIE, 2024. http://dx.doi.org/10.1117/12.3038136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Guanyu, Jiaxuan Huang, Hongliu Cai, et al. "Dynamic multidimensional data privacy protection algorithm." In International Conference on Computer Application and Information Security (ICCAIS 2024), edited by Sadiq Ali Safaa, Pandey Hari Mohan, and Boussaid Farid. SPIE, 2025. https://doi.org/10.1117/12.3061152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Java, Abhinav, Simra Shahid, and Chirag Agarwal. "Towards Operationalizing Right to Data Protection." In Proceedings of the 2025 Conference of the Nations of the Americas Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 1: Long Papers). Association for Computational Linguistics, 2025. https://doi.org/10.18653/v1/2025.naacl-long.416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xu, Shouyin, Lingguang Lei, Yuewu Wang, and Heqing Huang. "KPDP: Kernel Permission Data Protection Against Data-Oriented Attacks." In 2024 9th International Conference on Signal and Image Processing (ICSIP). IEEE, 2024. http://dx.doi.org/10.1109/icsip61881.2024.10671512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bărbuceanu, Teodor, Razvan Craciunescu, and Eduard Popovici. "Data Protection Device." In 2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). IEEE, 2023. http://dx.doi.org/10.1109/ecai58194.2023.10194205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Skendzic, A., B. Kovacic, and E. Tijan. "General data protection regulation — Protection of personal data in an organisation." In 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2018. http://dx.doi.org/10.23919/mipro.2018.8400247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fotiou, Nikos, George Xylomenos, and Yannis Thomas. "Data integrity protection for data spaces." In EuroSys '24: Nineteenth European Conference on Computer Systems. ACM, 2024. http://dx.doi.org/10.1145/3642974.3652284.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"TOWARDS DATA PROTECTION COMPLIANCE." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2010. http://dx.doi.org/10.5220/0002981802130216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Benjamin, Bruce, Joel Coffman, Hadi Esiely-Barrera, et al. "Data Protection in OpenStack." In 2017 IEEE 10th International Conference on Cloud Computing (CLOUD). IEEE, 2017. http://dx.doi.org/10.1109/cloud.2017.77.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Data protection"

1

Souppaya, Murugiah. Data Classification Concepts and Considerations for Improving Data Protection. National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.ir.8496.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Riyadi, Gliddheo. Data Privacy in the Indonesian Personal Data Protection Legislation. Center for Indonesian Policy Studies, 2021. http://dx.doi.org/10.35497/341482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Newhouse, Bill. Data Classification Concepts and Considerations for Improving Data Protection. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.cswp.43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bandyopadhyay, Subhayu, and Suryadipta Roy. Corruption and Trade Protection: Evidence from Panel Data. Federal Reserve Bank of St. Louis, 2007. http://dx.doi.org/10.20955/wp.2007.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Perdana, Arif, and Saru Arifin. Finding a fix for Indonesia’s data protection problems. Edited by Ria Ernunsari. Monash University, 2023. http://dx.doi.org/10.54377/130f-dbb9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chandramouli, Ramaswamy. A Data Protection Approach for Cloud-Native Applications. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8505.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chandramouli, Ramaswamy. A Data Protection Approach for Cloud-Native Applications. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nasution, Sri. Improving Data Governance and Personal Data Protection through ASEAN Digital Masterplan 2025. Center for Indonesian Policy Studies, 2021. http://dx.doi.org/10.35497/353777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Notarianni, Kathy, and William Rinkinen. Protection of data processing equipment with fine water sprays. National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.ir.5514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yin, Tianzhixi, Jianming Lian, John Buckheit, and Rui Fan. Bridging Power System Protection Gaps with Data-driven Approaches. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1771797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!