Journal articles on the topic 'Data protection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Data protection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Gama, Cruz. "Data protection and personal data protection." Brazilian Journal of Clinical Medicine and Review 1, Suppl.1 (2023): 18. http://dx.doi.org/10.52600/2965-0968.bjcmr.2023.1.suppl.1.18.
Full textChamberlain, Johanna, and Andreas Kotsios. "Data protection beyond data protection regulation." Stiftelsen Juridisk Fakultetslitteratur, no. 2024 2 (January 17, 2024): 397–424. http://dx.doi.org/10.53292/bd1fa11c.282687ef.
Full textVarsha, Gehlot. "COMPARISON OF DATA PROTECTION LAWS IN INDIA WITH RESPECT TO GDPR." Indian Journal of Law and Society I, no. 8 (2024): 160–77. https://doi.org/10.5281/zenodo.10644661.
Full textAlhababi, Hamad Hamed. "Cross-Border Data Transfer between the gcc Data Protection Laws and the gdpr." Global Journal of Comparative Law 13, no. 2 (2024): 178–200. http://dx.doi.org/10.1163/2211906x-13020003.
Full textRahmah, Siti, Darmiwati, and Fitri Wahyuni. "Perlindungan Hukum Terhadap Data Pribadi di Era Big Data." Jurnal Indragiri Penelitian Multidisiplin 4, no. 3 (2024): 43–50. https://doi.org/10.58707/jipm.v4i3.1043.
Full textWalker-Osborn, C., L. Fitzsimons, and J. Ruane. "Data Protection." ITNOW 55, no. 3 (2013): 38–39. http://dx.doi.org/10.1093/itnow/bwt050.
Full textRowe, Heather, and Robin McGilligan. "DATA PROTECTION." Computer Law & Security Review 17, no. 5 (2001): 333–35. http://dx.doi.org/10.1016/s0267-3649(01)00511-8.
Full textDinant, Jean-Marc, and Ewout Keuleers. "Data protection." Computer Law & Security Review 20, no. 1 (2004): 22–28. http://dx.doi.org/10.1016/s0267-3649(04)00005-6.
Full textChalton, Simon. "Data protection." Computer Law & Security Review 13, no. 6 (1997): 425–28. http://dx.doi.org/10.1016/s0267-3649(97)89792-0.
Full textSizer, Richard. "Data protection." Computer Law & Security Review 2, no. 5 (1987): 13–15. http://dx.doi.org/10.1016/0267-3649(87)90007-0.
Full textReynolds, Chris. "Data protection." Computer Law & Security Review 5, no. 6 (1990): 19–22. http://dx.doi.org/10.1016/0267-3649(90)90059-k.
Full textClark, Robert. "Data protection." Computer Law & Security Review 6, no. 6 (1991): 16–19. http://dx.doi.org/10.1016/0267-3649(91)90172-r.
Full textGeorge, R. E. "Data protection." Physics Bulletin 37, no. 9 (1986): 363. http://dx.doi.org/10.1088/0031-9112/37/9/001.
Full textSaxby, S. "Data protection." Computer Law & Security Review 21, no. 3 (2005): 277. http://dx.doi.org/10.1016/j.clsr.2005.01.012.
Full textRowe, Heather. "Data protection." Computer Law & Security Review 10, no. 1 (1994): 47. http://dx.doi.org/10.1016/0267-3649(94)90092-2.
Full textMamanazarov, Sardor. "Methods and Tools for Personal Data Protection in Big Data: Analysis of Uzbekistan’s Legal Framework." International Journal of Law and Policy 3, no. 4 (2025): 20–40. https://doi.org/10.59022/ijlp.322.
Full textEditorial, Team IndraStra Global. "Understanding the DNA of EU's GDPR." IndraStra Global 004, no. 04 (2018): 0021. https://doi.org/10.5281/zenodo.1221358.
Full textMishra, Amit. "Fundamental Rights and Data Protection (Balancing Innovation and Privacy in Light of Digital Personal Data Protection Act, 2023)." International Journal of Science and Research (IJSR) 13, no. 5 (2024): 332–37. http://dx.doi.org/10.21275/mr24504204804.
Full textKhamidovna, Akbarova Marguba, Sharipov Bahodir Akilovich, Zhangazova Kumriniso Abdulvahobovna, and Nurdullaev Alisher Niyatilla ugli. "The Importance of Data Protection in Institutions." American Journal Of Applied Science And Technology 5, no. 4 (2025): 77–81. https://doi.org/10.37547/ajast/volume05issue04-17.
Full textKhamidovna, Akbarova Marguba, Sharipov Bahodir Akilovich, Djangazova Kumriniso Abdulvahobovna, and Nurdullaev Alisher Niyatilla ugli. "New Approaches to Data Identification and Protection." American Journal Of Applied Science And Technology 5, no. 4 (2025): 82–86. https://doi.org/10.37547/ajast/volume05issue04-18.
Full textBegum, Shameena, V. Ratna Vasuki, and K. V. V. Srinivas K.V.V.Srinivas. "Data Security and Protection in Cloud Computing." International Journal of Scientific Research 1, no. 2 (2012): 31–34. http://dx.doi.org/10.15373/22778179/jul2012/9.
Full textAljibawi, Mayas, and Roslan Ismail. "Personal Data Protection Acts: Concepts and Review." International Journal of Scientific Engineering and Research 2, no. 9 (2014): 12–16. https://doi.org/10.70729/j2013362.
Full textAruna, K. B., A. LallithaShri, Aravindh ., Jayakumar ., and Jayasurya . "Protection for Multi Owner Data Sharing Scheme." Bonfring International Journal of Advances in Image Processing 7, no. 1 (2017): 01–05. http://dx.doi.org/10.9756/bijaip.10485.
Full text-. "Data Protection Agreement." ASA Bulletin 37, Issue 4 (2019): 838–52. http://dx.doi.org/10.54648/asab2019076.
Full textBlackwell, D. "Data protection countdown." Computer Bulletin 40, no. 3 (1998): 22–23. http://dx.doi.org/10.1093/combul/40.3.22.
Full textGossman, P., and J. R. Wilkinson. "Data Protection Act." BMJ 295, no. 6610 (1987): 1418. http://dx.doi.org/10.1136/bmj.295.6610.1418.
Full textJakobs, Kai. "Data protection dangers." Science and Public Policy 29, no. 2 (2002): 149–50. http://dx.doi.org/10.1093/spp/29.2.149.
Full textBLUME, PETER. "Practical data protection." International Journal of Law and Information Technology 2, no. 2 (1994): 194–209. http://dx.doi.org/10.1093/ijlit/2.2.194.
Full textPriest, R. G. "Data Protection Act." Psychiatric Bulletin 12, no. 5 (1988): 204. http://dx.doi.org/10.1192/pb.12.5.204.
Full textDhont, Jan, and Yves Poullet. "Data protection — Belgium." Computer Law & Security Review 16, no. 1 (2000): 5–19. http://dx.doi.org/10.1016/s0267-3649(00)87063-6.
Full textRowe, Heather. "EU data protection." Computer Law & Security Review 16, no. 1 (2000): 41–42. http://dx.doi.org/10.1016/s0267-3649(00)87072-7.
Full textJackson, Margaret. "DATA PROTECTION - AUSTRALIA." Computer Law & Security Review 16, no. 3 (2000): 166–69. http://dx.doi.org/10.1016/s0267-3649(00)88911-6.
Full textBygrave, Lee A. "EUROPEAN DATA PROTECTION." Computer Law & Security Review 16, no. 4 (2000): 252–57. http://dx.doi.org/10.1016/s0267-3649(00)89134-7.
Full textCarey, Peter, and David Berry. "DATA PROTECTION — SECURITY." Computer Law & Security Review 18, no. 2 (2002): 112–13. http://dx.doi.org/10.1016/s0267-3649(02)03010-8.
Full textAjana, Btihaj. "Reinventing data protection?" Identity in the Information Society 2, no. 3 (2009): 355–58. http://dx.doi.org/10.1007/s12394-009-0025-3.
Full textDavies, David. "Data protection corner." Computer Law & Security Review 1, no. 5 (1986): 9–11. http://dx.doi.org/10.1016/0267-3649(86)90007-5.
Full textKolb, Angela. "Data protection — Germany." Computer Law & Security Review 7, no. 3 (1991): 123–26. http://dx.doi.org/10.1016/0267-3649(91)90089-e.
Full textPoullet, Y., and M. H. Boulanger. "Data protection — medicine." Computer Law & Security Review 6, no. 5 (1991): 18–23. http://dx.doi.org/10.1016/0267-3649(91)90150-t.
Full textDetermann, Lothar. "Healthy Data Protection." Michigan Technology Law Review, no. 26.2 (2020): 229. http://dx.doi.org/10.36645/mtlr.26.2.healthy.
Full textPriest, R. G. "Data Protection Act." Bulletin of the Royal College of Psychiatrists 12, no. 5 (1988): 204. http://dx.doi.org/10.1192/s0140078900020162.
Full textMcIntyre, T. J. "Reinventing data protection?" Computer Law & Security Review 26, no. 6 (2010): 673–76. http://dx.doi.org/10.1016/j.clsr.2010.07.003.
Full textBak, Başak. "Protecting Genetic Privacy in Biobanking through Data Protection Law by Dara Hallinan." Northern Ireland Legal Quarterly 76, no. 1 (2025): 146–49. https://doi.org/10.53386/nilq.v76i1.1187.
Full textANA, DHAMO. "EUROPEAN GENERAL DATA PROTECTION REGULATION VS HABEAS DATA." INTERNATIONAL JOURNAL OF NEW HORIZONS IN THE SOCIAL SCIENCES 1, no. 1 (2024): 37–40. https://doi.org/10.5281/zenodo.10600296.
Full textPoongodi, R. K. "Biometric for Data Protection." International Journal for Research in Applied Science and Engineering Technology 13, no. 2 (2025): 159–63. https://doi.org/10.22214/ijraset.2025.66818.
Full textShahul Ikram, Nur Adlin Hanisah. "DATA BREACHES EXIT STRATEGY: A COMPARATIVE ANALYSIS OF DATA PRIVACY LAWS." Malaysian Journal of Syariah and Law 12, no. 1 (2024): 135–47. http://dx.doi.org/10.33102/mjsl.vol12no1.458.
Full textHallinan, D. "Opinions ∙ Data Protection without Data: Could Data Protection Law Apply without Personal Data Being Processed?" European Data Protection Law Review 5, no. 3 (2019): 293–99. http://dx.doi.org/10.21552/edpl/2019/3/5.
Full textGuzmán-Rodríguez, Héctor E. "Data Protection in Mexico: One Right, Two Systems, Different Protections and Uncontrolled Data Breaches." Global Privacy Law Review 2, Issue 2 (2021): 149–54. http://dx.doi.org/10.54648/gplr2021019.
Full textMendes de Leon, Pablo. "The Fight Against Terrorism Through Aviation: Data Protection Versus Data Protection." Air and Space Law 31, Issue 4/5 (2006): 320–30. http://dx.doi.org/10.54648/aila2006027.
Full textHu, Pengnian, and Qian Wei. "Research on Personal Data Protection of EU General Data Protection Regulation." IOP Conference Series: Materials Science and Engineering 806 (May 5, 2020): 012003. http://dx.doi.org/10.1088/1757-899x/806/1/012003.
Full textHemmings, Nicholas, and Joseph Noar. "Data protection is changing − the new general data protection regulations (GDPR)." Orthodontic Update 11, no. 3 (2018): 110–14. http://dx.doi.org/10.12968/ortu.2018.11.3.110.
Full text