To see the other types of publications on this topic, follow the link: Data protection.

Dissertations / Theses on the topic 'Data protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Data protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Budd, Chris. "Data Protection and Data Elimination." International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596395.

Full text
Abstract:
ITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NV<br>Data security is becoming increasingly important in all areas of storage. The news services frequently have stories about lost or stolen storage devices and the panic it causes. Data security in an SSD usually involves two components: data protection and data elimination. Data protection includes passwords to protect against unauthorized access and encryption to protect against recovering data fro
APA, Harvard, Vancouver, ISO, and other styles
2

Sebé, Feixas Francesc. "Transparent Protection of Data." Doctoral thesis, Universitat Politècnica de Catalunya, 2003. http://hdl.handle.net/10803/7026.

Full text
Abstract:
Aquesta tesi tracta la protecció de dades quan aquestes han de ser lliurades a usuaris en qui no es té absoluta confiança. En aquesta situació, les dades s'han de protegir de manera que segueixin essent utilitzables. Aquesta protecció ha de ser imperceptible, per tal de no destorbar la utilització correcta de les dades, i alhora efectiva, protegint contra la utilització no autoritzada d'aquestes.<br/>L'estudi es divideix tenint en compte els dos tipus de dades la protecció transparent de les quals s'estudia: continguts multimèdia i microdades estadístiques.<br/><br/>Pel que fa a dades multimèd
APA, Harvard, Vancouver, ISO, and other styles
3

Loukides, Grigorios. "Data utility and privacy protection in data publishing." Thesis, Cardiff University, 2008. http://orca.cf.ac.uk/54743/.

Full text
Abstract:
Data about individuals is being increasingly collected and disseminated for purposes such as business analysis and medical research. This has raised some privacy concerns. In response, a number of techniques have been proposed which attempt to transform data prior to its release so that sensitive information about the individuals contained within it is protected. A:-Anonymisation is one such technique that has attracted much recent attention from the database research community. A:-Anonymisation works by transforming data in such a way that each record is made identical to at least A: 1 other
APA, Harvard, Vancouver, ISO, and other styles
4

Islam, Naveed. "Cryptography based Visual Data Protection." Thesis, Montpellier 2, 2011. http://www.theses.fr/2011MON20178/document.

Full text
Abstract:
La transmission de données multimédia sur les réseaux sécurisés a une croissance exponentielle grâce aux progrès scientifique dans les technologies de l'information et de la communication. La sécurité des données dans certaines applications comme le stockage sécurisé, l'authentification, la protection des droits d'auteurs, la communication militaire ou la visioconférence confidentielles, nécessitent de nouvelles stratégies en matière de transmission sécurisée. Deux techniques sont couramment utilisées pour la transmission sécurisée de données visuelles, à savoir : la cryptographie et la stégan
APA, Harvard, Vancouver, ISO, and other styles
5

Kasneci, Dede. "Data protection law: recent developments." Doctoral thesis, Università degli studi di Trieste, 2010. http://hdl.handle.net/10077/3578.

Full text
Abstract:
2008/2009<br>Privacy and data protection concern everyone and are issue of profound importance around the World. Privacy has been hailed as “an integral part of our humanity” the “hart of our liberty” and “the beginning of all freedoms” (Solove, 2008). Given its importance, privacy is recognized as a fundamental human right according to many International Instruments such as: the United Nations Universal Declaration of Human Rights of 1948 (Article 12), International Covenant on the Civil and Political Rights (Article 17) The European Convention of Human Rights of 1950 (Article 8), the Charter
APA, Harvard, Vancouver, ISO, and other styles
6

Lloyd, Ian J. "Data processing and individual freedom : data protection and beyond." Thesis, University of Strathclyde, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.233213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Neophytou, Andonis. "Computer security : data control and protection." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834504.

Full text
Abstract:
Computer security is a crucial area for any organization based on electronic devices that process data. The security of the devices themselves and the data they process are the backbone of the organization. Until today there have been no completely secure systems or procedures until and a lot of research is being done in this area. It impossible for a machine or a mechanical procedure to "guess" all possible events and lead to conclusive, cohesive and comprehensive secure systems, because of: 1) the human factor, and 2) acts of nature (fire, flood etc). However, proper managerial control can a
APA, Harvard, Vancouver, ISO, and other styles
8

Pizzolante, Raffaele. "Compression and protection of multidimensional data." Doctoral thesis, Universita degli studi di Salerno, 2015. http://hdl.handle.net/10556/1943.

Full text
Abstract:
2013 - 2014<br>The main objective of this thesis is to explore and discuss novel techniques related to the compression and protection of multidimensional data (i.e., 3-D medical images, hyperspectral images, 3-D microscopy images and 5-D functional Magnetic Resonance Images). First, we outline a lossless compression scheme based on the predictive model, denoted as Medical Images Lossless Compression algorithm (MILC). MILC is characterized to provide a good trade-off between the compression performances and reduced usage of the hardware resources. Since in the medical and medical-relate
APA, Harvard, Vancouver, ISO, and other styles
9

Ng, Chi-kwan Miranda. "A study of the administrative provisions governing personal data protection in the Hong Kong Government." [Hong Kong] : University of Hong Kong, 1987. http://sunzi.lib.hku.hk/hkuto/record.jsp?B12335368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pavlovic, Dusan <1981&gt. "Online Gambling in the UE: from Data Protection to Gambler Protection." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amsdottorato.unibo.it/8721/1/PAVLOVIC_DUSAN_tesi.pdf.

Full text
Abstract:
The thesis tends to answer how does the processing of online gamblers’ personal data, which is used for identification and commercial communication purposes, affect the protection of online gamblers in the EU? After the introduction into the context of online gambling in Europe and risks that jeopardize the protection of online gamblers and the concept of responsible gambling, the first part of the thesis sheds light on the relationship between the processing of online gamblers’ data and the provocation of problem gambling. The attention is given to the gambling-related commercial communic
APA, Harvard, Vancouver, ISO, and other styles
11

Degli, Esposti Sara. "From dataveillance to data economy : firm view on data protection." Thesis, Open University, 2016. http://oro.open.ac.uk/53072/.

Full text
Abstract:
The increasing availability of electronic records and the expanded reliance on online communications and services have made available a huge amount of data about people’s behaviours, characteristics, and preferences. Advancements in data processing technology, known as big data, offer opportunities to increase organisational efficiency and competitiveness. Analytically sophisticated companies excel in their ability to extract value from the analysis of digital data. However, in order to exploit the potential economic benefits produced by big data and analytics, issues of data privacy and infor
APA, Harvard, Vancouver, ISO, and other styles
12

Duricu, Alexandra. "Data Protection Impact Assessment (DPIA) and Risk Assessment in the context of the General Data Protection Regulation (GDPR)." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Ammar, Bassem AbuBakr. "Error protection and security for data transmission." Thesis, Lancaster University, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.421640.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Lee, Ryan 1980. "Personal data protection in the semantic web." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/29656.

Full text
Abstract:
Thesis (M.Eng. and S.B.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.<br>Includes bibliographical references (p. 167-168).<br>Growing concerns over the abuse of personal information via the World Wide Web can be addressed at political, social, and technical levels. As the Web evolves into the Semantic Web, where machines understand the information they process, technical solutions such as PEDAL become feasible. PEDAL, the Personal Data Access Language, defines a vocabulary for composing policies that describe characteristics of clients who
APA, Harvard, Vancouver, ISO, and other styles
15

Shamsuri, Nurul A. "PROPOSAL ON REGIONAL DATA PROTECTION FOR ASEAN." Thesis, Юриспруденція в сучасному інформаційному просторі: [Матеріали ІХ Міжнародної науково-практичної конференції, м. Київ, Національний авіаційний університет, 1 березня 2019 р.] Том 1. – Тернопіль: Вектор, 2019. – 394 с, 2019. http://er.nau.edu.ua/handle/NAU/38075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Snell, Mark A. "Data protection and transborder data flow : a British and Australian perspective." Thesis, University of Oxford, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.360014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Cannon, Jennifer Elizabeth. "Strategies for Improving Data Protection to Reduce Data Loss from Cyberattacks." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7277.

Full text
Abstract:
Accidental and targeted data breaches threaten sustainable business practices and personal privacy, exposing all types of businesses to increased data loss and financial impacts. This single case study was conducted in a medium-sized enterprise located in Brevard County, Florida, to explore the successful data protection strategies employed by the information system and information technology business leaders. Actor-network theory was the conceptual framework for the study with a graphical syntax to model data protection strategies. Data were collected from semistructured interviews of 3 busin
APA, Harvard, Vancouver, ISO, and other styles
18

Scalavino, Enrico. "A data protection architecture for derived data control in partially disconnected networks." Thesis, Imperial College London, 2012. http://hdl.handle.net/10044/1/10203.

Full text
Abstract:
Every organisation needs to exchange and disseminate data constantly amongst its employees, members, customers and partners. Disseminated data is often sensitive or confidential and access to it should be restricted to authorised recipients. Several enterprise rights management (ERM) systems and data protection solutions have been proposed by both academia and industry to enable usage control on disseminated data, i.e. to allow data originators to retain control over whom accesses their information, under which circumstances, and how it is used. This is often obtained by means of cryptographic
APA, Harvard, Vancouver, ISO, and other styles
19

Sallaku, Redlon <1994&gt. "Privacy and Protecting Privacy: Using Static Analysis for legal compliance. General Data Protection Regulation." Master's Degree Thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/14682.

Full text
Abstract:
The main purpose of the thesis is to study Privacy and how protecting Privacy, including the new regulation framework proposed by EU the GDPR, investigating how static analysis could help GDPR enforcement, and develop a new static analysis prototype to fulfill this task in practice. GDPR (General Data Protection Regulation) is a recent European regulation to harmonize and enforce data privacy laws across Europe, to protect and empower all EU citizens data privacy, and to reshape the way organizations deal with sensitive data. This regulation has been enforced starting from May 2018. While it i
APA, Harvard, Vancouver, ISO, and other styles
20

Puglisi, Silvia. "Analysis, modelling and protection of online private data." Doctoral thesis, Universitat Politècnica de Catalunya, 2017. http://hdl.handle.net/10803/456205.

Full text
Abstract:
Online communications generate a consistent amount of data flowing between users, services and applications. This information results from the interactions among different parties, and once collected, it is used for a variety of purposes, from marketing profiling to product recommendations, from news filtering to relationship suggestions. Understanding how data is shared and used by services on behalf of users is the motivation behind this work. When a user creates a new account on a certain platform, this creates a logical container that will be used to store the user's activity. The service
APA, Harvard, Vancouver, ISO, and other styles
21

Øztarman, Jo Mehmet Sollihagen. "End-to-End Data Protection of SMS Messages." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-15075.

Full text
Abstract:
Short Message Service (SMS) has become a very commonly used service. It does not only work as a substitute for voice telephony, but is also used for automated services. Some of these service are related to security issues like SMS banking, or one time passwords, even though SMS messages can be spoofed or eavesdropped.We propose a design where we add security to SMS by making an easily configurable module that utilizes a fast cryptographic scheme called Elliptic Curve Signcryption. To prove our concept, we implement an SMS client for Android smart phones that utilizes our security module and se
APA, Harvard, Vancouver, ISO, and other styles
22

Sundqvist, Erik. "Protection of Non-Volatile Data in IaaS-environments." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-112954.

Full text
Abstract:
Infrastructure-as-a-Service (IaaS) cloud solutions continue to experience growth, but many enterprises and organizations are of the opinion that cloud adoption has decreased security in several aspects. This thesis addresses protection of IaaS-environment non- volatile data. A risk analysis is conducted, using the CORAS method, to identify and evaluate risks, and to propose treatments to those risks considered non-acceptable. The complex and distributed nature of an IaaS deployment is investigated to identify di↵erent approaches to data protection using encryption in combination with Trusted C
APA, Harvard, Vancouver, ISO, and other styles
23

Holovach, M. "OS for data protection in modern tablet devices." Thesis, Sumy State University, 2014. http://essuir.sumdu.edu.ua/handle/123456789/45439.

Full text
Abstract:
Nowadays the tablet devices are steadily increasing in popularity with modern users. Because of their portability more and more people become getting used to them. The new possibilities make it easy to create and carry some data. As a consequence it needs some protection to secure our personal information.
APA, Harvard, Vancouver, ISO, and other styles
24

Eskandari, Mojtaba. "Smartphone Data Transfer Protection According to Jurisdiction Regulations." Doctoral thesis, Università degli studi di Trento, 2017. https://hdl.handle.net/11572/367700.

Full text
Abstract:
The prevalence of mobile devices and their capability to access high speed Internet have transformed them into a portable pocket cloud interface. The sensitivity of a user’s personal data demands adequate level of protection in the cloud. In this regard, the European Union Data Protection regulations (e.g., article 25.1) restricts the transfer of European users’ personal data to certain locations. The matter of concern, however, is the enforcement of such regulations. Since cloud service provision is independent of physical location and data can travel to various servers, it is a challengi
APA, Harvard, Vancouver, ISO, and other styles
25

Eskandari, Mojtaba. "Smartphone Data Transfer Protection According to Jurisdiction Regulations." Doctoral thesis, University of Trento, 2017. http://eprints-phd.biblio.unitn.it/2597/1/thesis-mojizz2.pdf.

Full text
Abstract:
The prevalence of mobile devices and their capability to access high speed Internet have transformed them into a portable pocket cloud interface. The sensitivity of a user’s personal data demands adequate level of protection in the cloud. In this regard, the European Union Data Protection regulations (e.g., article 25.1) restricts the transfer of European users’ personal data to certain locations. The matter of concern, however, is the enforcement of such regulations. Since cloud service provision is independent of physical location and data can travel to various servers, it is a challenging t
APA, Harvard, Vancouver, ISO, and other styles
26

Koutsias, Marios. "Consumer protection and global trade in the digital environment : the case of data protection." Thesis, University of Essex, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.437826.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ng, Chi-kwan Miranda, and 吳志坤. "A study of the administrative provisions governing personal data protection in the Hong Kong Government." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1987. http://hub.hku.hk/bib/B31975136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Nyamunda, James. "Mandatory Business-To-Government Data Sharing: Exploring data protection through International Investment Law." Thesis, Uppsala universitet, Juridiska institutionen, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-443655.

Full text
Abstract:
As more data is gathered, analysed and stored, private companies create new products and unlock new commercial frontiers. Simultaneously, governments are beginning to realise that the laws in place require a revamp for the good of commercial innovation and for execution of governmental prerogatives. Hence, in a bid to catch up with the data economy, governments have begun looking for new legal measures that allow them to legally access the data that is held by private companies. Amongst the existing solutions and sprouting suggestions, mandatory business-to-government data sharing often featur
APA, Harvard, Vancouver, ISO, and other styles
29

Routly, Wayne A. "SIDVI: a model for secure distributed data integration." Thesis, Port Elizabeth Technikon, 2004. http://hdl.handle.net/10948/261.

Full text
Abstract:
The new millennium has brought about an increase in the use of business intelligence and knowledge management systems. The very foundations of these systems are the multitude of source databases that store the data. The ability to derive information from these databases is brought about by means of data integration. With the current emphasis on security in all walks of information and communication technology, a renewed interest must be placed in the systems that provide us with information; data integration systems. This dissertation investigates security issues at specific stages in the data
APA, Harvard, Vancouver, ISO, and other styles
30

Wallace, Amelia. "Protection of Personal Data in Blockchain Technology : An investigation on the compatibility of the General Data Protection Regulation and the public blockchain." Thesis, Stockholms universitet, Institutet för rättsinformatik (IRI), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-167303.

Full text
Abstract:
On 25 May 2018 the General Data Protection Regulation, GDPR, came into force in the EU. The regulation strengthened the rights of the data subjects’ in relation to the data controllers and processors and gave them more control over their personal data. The recitals of the GDPR state that it was the rapid development in technology and globalisation that brought new challenges for the protection of personal data. Private companies and public authorities where making use of personal data on an unprecedented scale in order to pursue their own activities. The protection should be technologically ne
APA, Harvard, Vancouver, ISO, and other styles
31

Marés, Soler Jordi. "Categorical Data Protection on Statistical Datasets and Social Networks." Doctoral thesis, Universitat Autònoma de Barcelona, 2013. http://hdl.handle.net/10803/129327.

Full text
Abstract:
L’augment continu de la publicació de dades amb contingut sensible ha incrementat el risc de violar la privacitat de les persones i/o institucions. Actualment aquest augment és cada cop mes ràpid degut a la gran expansió d’Internet. Aquest aspecte fa molt important la comprovació del rendiment dels mètodes de protecció utilitzats. Per tal de fer aquestes comprovacions existeixen dos tipus de mesures a tenir en compte: la pèrdua d’informació i el risc de revelació. Una altra àrea on la privacitat ha incrementat el seu rol n’és el de les xarxes socials. Les xarxes socials han esdevingut u
APA, Harvard, Vancouver, ISO, and other styles
32

Baena, Mirabete Daniel. "Exact and heuristic methods for statistical tabular data protection." Doctoral thesis, Universitat Politècnica de Catalunya, 2017. http://hdl.handle.net/10803/456809.

Full text
Abstract:
One of the main purposes of National Statistical Agencies (NSAs) is to provide citizens or researchers with a large amount of trustful and high quality statistical information. NSAs must guarantee that no confidential individual information can be obtained from the released statistical outputs. The discipline of Statistical disclosure control (SDC) aims to avoid that confidential information is derived from data released while, at the same time, maintaining as much as possible the data utility. NSAs work with two types of data: microdata and tabular data. Microdata files contain records of ind
APA, Harvard, Vancouver, ISO, and other styles
33

Völp, Marcus. "Provable Protection of Confidential Data in Microkernel-Based Systems." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2011. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-66757.

Full text
Abstract:
Although modern computer systems process increasing amounts of sensitive, private, and valuable information, most of today’s operating systems (OSs) fail to protect confidential data against unauthorized disclosure over covert channels. Securing the large code bases of these OSs and checking the secured code for the absence of covert channels would come at enormous costs. Microkernels significantly reduce the necessarily trusted code. However, cost-efficient, provable confidential-data protection in microkernel-based systems is still challenging. This thesis makes two central contributions to
APA, Harvard, Vancouver, ISO, and other styles
34

Bredtmann, Oliver [Verfasser]. "Unequal Error Protection Coding of Quantized Data / Oliver Bredtmann." Aachen : Shaker, 2011. http://d-nb.info/1098039947/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Sweeney, Latanya. "Computational disclosure control : a primer on data privacy protection." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/8589.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2001.<br>Includes bibliographical references (leaves 213-216) and index.<br>Today's globally networked society places great demand on the dissemination and sharing of person specific data for many new and exciting uses. When these data are linked together, they provide an electronic shadow of a person or organization that is as identifying and personal as a fingerprint even when the information contains no explicit identifiers, such as name and phone number. Other distinctive data, suc
APA, Harvard, Vancouver, ISO, and other styles
36

Laribi, Atika. "A protection model for distributed data base management systems." Diss., Virginia Polytechnic Institute and State University, 1985. http://hdl.handle.net/10919/53883.

Full text
Abstract:
Security is important for Centralized Data Base Management Systems (CDBMS) and becomes crucial for Distributed Data Base Management Systems (DDBMS) when different organizations share information. Secure cooperation can be achieved only if each participating organization is assured that the data it makes available will not be abused by other users. In this work differences between CDBMS and DDBMS that characterize the nature of the protection problem in DDBMS are identified. These differences are translated into basic protection requirements. Policies that a distributed data base management pro
APA, Harvard, Vancouver, ISO, and other styles
37

Montecuollo, Ferdinando. "Compression and indexing of genomic data with confidentiality protection." Doctoral thesis, Universita degli studi di Salerno, 2015. http://hdl.handle.net/10556/1945.

Full text
Abstract:
2013 - 2014<br>The problem of data compression having specific security properties in order to guarantee user’s privacy is a living matter. On the other hand, high-throughput systems in genomics (e.g. the so-called Next Generation Sequencers) generate massive amounts of genetic data at affordable costs. As a consequence, huge DBMSs integrating many types of genomic information, clinical data and other (personal, environmental, historical, etc.) information types are on the way. This will allow for an unprecedented capability of doing large-scale, comprehensive and in-depth analysis of h
APA, Harvard, Vancouver, ISO, and other styles
38

Yang, Cao. "Rigorous and Flexible Privacy Protection Framework for Utilizing Personal Spatiotemporal Data." 京都大学 (Kyoto University), 2017. http://hdl.handle.net/2433/225733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Benson, Glenn Stuart. "A formal protection model of security in distributed systems." Diss., Georgia Institute of Technology, 1989. http://hdl.handle.net/1853/12238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Widener, Patrick M. (Patrick McCall). "Dynamic Differential Data Protection for High-Performance and Pervasive Applications." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7239.

Full text
Abstract:
Modern distributed applications are long-lived, are expected to provide flexible and adaptive data services, and must meet the functionality and scalability challenges posed by dynamically changing user communities in heterogeneous execution environments. The practical implications of these requirements are that reconfiguration and upgrades are increasingly necessary, but opportunities to perform such tasks offline are greatly reduced. Developers are responding to this situation by dynamically extending or adjusting application functionality and by tuning application performance, a typical m
APA, Harvard, Vancouver, ISO, and other styles
41

DASHTI, SALIMEH. "An Assisted Methodology to Conduct a Data Protection Impact Assessment." Doctoral thesis, Università degli studi di Genova, 2021. http://hdl.handle.net/11567/1050120.

Full text
Abstract:
The uptake of digital technologies in our everyday activities today is unlike any time in history. Consequently, the amount of personal data produced and shared is staggering. Indeed, they have become the primary asset for many businesses. While users benefit from online engagement, an increasing number of critics have voiced their privacy concerns. To protect peoples’ fundamental rights concerning processing their personal data, General Data Protection Regulation (GDPR) has been introduced. GDPR requires to conduct a Data Protection Impact Assessment (DPIA) when data processing is likely to r
APA, Harvard, Vancouver, ISO, and other styles
42

"Transparent Protection of Data." Universitat Politècnica de Catalunya, 2003. http://www.tesisenxarxa.net/TDX-0307103-114315/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

"Data Protection over Cloud." Master's thesis, 2016. http://hdl.handle.net/2286/R.I.38668.

Full text
Abstract:
abstract: Data protection has long been a point of contention and a vastly researched field. With the advent of technology and advances in Internet technologies, securing data has become much more challenging these days. Cloud services have become very popular. Given the ease of access and availability of the systems, it is not easy to not use cloud to store data. This however, pose a significant risk to data security as more of your data is available to a third party. Given the easy transmission and almost infinite storage of data, securing one's sensitive information has become a major chal
APA, Harvard, Vancouver, ISO, and other styles
44

Ting, Kuan-Chi, and 丁冠齊. "Big Data and the Personal Data Protection Law." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/43499798353409527461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Qian, Li, and 錢. 力. "The “Precautionary Protection” Mechanism under the GDPR: Focusing on the Principles of “Data Protection by Design” and “Data Protection Impact Assessment”." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/pjbm8k.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

CHEN, CHIEN-YUN, and 陳倩韻. "The Theory and Practice of Data Protection after the Amendment of the New Data Protection Act." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/97560954807508456263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Cao, Ming. "Privacy Protection on RFID Data Publishing." Thesis, 2009. http://spectrum.library.concordia.ca/976641/1/MR63109.pdf.

Full text
Abstract:
Radio Frequency IDentification (RFID) is a technology of automatic object identification. Retailers and manufacturers have created compelling business cases for deploying RFID in their supply chains. Yet, the uniquely identifiable objects pose a privacy threat to individuals. In this paper, we study the privacy threats caused by publishing RFID data. Even if the explicit identifying information, such as name and social security number, has been removed from the published RFID data, an adversary may identify a target victim's record or infer her sensitive value by matching a priori known visite
APA, Harvard, Vancouver, ISO, and other styles
48

Chen, Yi-Jie, and 陳羿傑. "Privacy Information Protection through Data Anonymization." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/3bpp9z.

Full text
Abstract:
碩士<br>中原大學<br>資訊工程研究所<br>103<br>Mobile apps is moving power behind the prevalence of intelligent mobile devices, which, in turn, bring in the exponentially growing number of mobile apps being developed. The personalized and ubiquitous characteristics of intelligent mobile devices, with the added variety of record taking and data sensing capabilities become a serious threat to user privacy when linked with the communication ability of the mobile devices. How to allow us to enjoy all the conveniences and services without privacy risk is an important issue to all users of mobile devices. The avai
APA, Harvard, Vancouver, ISO, and other styles
49

HSU, MING-WEI, and 許銘瑋. "Cloud Services and Personal Data Protection." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/nd6344.

Full text
Abstract:
碩士<br>東吳大學<br>法律學系<br>105<br>With the progress of science and technology as well as the popularity of the Internet, in recent years, cloud services emerge. Cloud service means individuals store his personal resources in the remote data center managed and operated by others, and through the Internet the resources in the cloud can be accessed. While cloud computing allows its users to easily access to their information at anytime and anywhere, as long as there is internet connect, thus technology like this brings serious data security and privacy concerns. This article first introduces the co
APA, Harvard, Vancouver, ISO, and other styles
50

Silva, Paulo Miguel Guimarães da. "Data Privacy Protection for the Cloud." Master's thesis, 2016. http://hdl.handle.net/10316/93238.

Full text
Abstract:
Dissertação de Mestrado em Engenharia Informática apresentada à Faculdade de Ciências e Tecnologia da Universidade de Coimbra.<br>Privacy is for a long time a concern when data is being discussed. Nowadays, with an increasing amount of personal and confidential data being transmitted and stored online, data curators have to assure certain guarantees of data protection and privacy. This Master Dissertation presents a background of anonymization and concealing techniques. Their characteristics and capabilities are described, as well as tools to implement and evaluate anonymization and concea
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!