Journal articles on the topic 'Privacy-Enhancing Technology'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Privacy-Enhancing Technology.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wolfe, Henry B. "Privacy enhancing technology." Computer Fraud & Security 1997, no. 10 (October 1997): 11–15. http://dx.doi.org/10.1016/s1361-3723(97)89951-4.
Full textPelkola, David. "A Framework for Managing Privacy-Enhancing Technology." IEEE Software 29, no. 3 (May 2012): 45–49. http://dx.doi.org/10.1109/ms.2012.47.
Full textJaved, Ibrahim Tariq, Fares Alharbi, Tiziana Margaria, Noel Crespi, and Kashif Naseer Qureshi. "PETchain: A Blockchain-Based Privacy Enhancing Technology." IEEE Access 9 (2021): 41129–43. http://dx.doi.org/10.1109/access.2021.3064896.
Full textHuang, Hsiao-Ying, and Masooda Bashir. "The onion router: Understanding a privacy enhancing technology community." Proceedings of the Association for Information Science and Technology 53, no. 1 (2016): 1–10. http://dx.doi.org/10.1002/pra2.2016.14505301034.
Full textKosta, Eleni, Jan Zibuschka, Tobias Scherner, and Jos Dumortier. "Legal considerations on privacy-enhancing Location Based Services using PRIME technology." Computer Law & Security Review 24, no. 2 (January 2008): 139–46. http://dx.doi.org/10.1016/j.clsr.2008.01.006.
Full textNamara, Moses, Daricia Wilkinson, Kelly Caine, and Bart P. Knijnenburg. "Emotional and Practical Considerations Towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology." Proceedings on Privacy Enhancing Technologies 2020, no. 1 (January 1, 2020): 83–102. http://dx.doi.org/10.2478/popets-2020-0006.
Full textPeltsverger, Svetlana, and Guangzhi Zheng. "Enhancing Privacy Education with a Technical Emphasis in IT Curriculum." Journal of Information Technology Education: Innovations in Practice 15 (2016): 001–17. http://dx.doi.org/10.28945/2330.
Full textFurnell, Steven, Rossouw von Solms, and Andy Phippen. "Preventative Actions for Enhancing Online Protection and Privacy." International Journal of Information Technologies and Systems Approach 4, no. 2 (July 2011): 1–11. http://dx.doi.org/10.4018/jitsa.2011070101.
Full textLahlou, Saadi. "Identity, social status, privacy and face-keeping in digital society." Social Science Information 47, no. 3 (September 2008): 299–330. http://dx.doi.org/10.1177/0539018408092575.
Full textPerez, Alfredo, Sherali Zeadally, Luis Matos Garcia, Jaouad Mouloud, and Scott Griffith. "FacePET: Enhancing Bystanders’ Facial Privacy with Smart Wearables/Internet of Things." Electronics 7, no. 12 (December 3, 2018): 379. http://dx.doi.org/10.3390/electronics7120379.
Full textClaerhout, B., and G. J. E. De Moor. "Privacy Protection for HealthGrid Applications." Methods of Information in Medicine 44, no. 02 (2005): 140–43. http://dx.doi.org/10.1055/s-0038-1633934.
Full textTyan, Inessa, Mariemma I. Yagüe, and Antonio Guevara-Plaza. "Blockchain Technology for Smart Tourism Destinations." Sustainability 12, no. 22 (November 21, 2020): 9715. http://dx.doi.org/10.3390/su12229715.
Full textSher, Ming-Ling, Paul C. Talley, Ching-Wen Yang, and Kuang-Ming Kuo. "Compliance With Electronic Medical Records Privacy Policy: An Empirical Investigation of Hospital Information Technology Staff." INQUIRY: The Journal of Health Care Organization, Provision, and Financing 54 (January 1, 2017): 004695801771175. http://dx.doi.org/10.1177/0046958017711759.
Full textPerkins, David B., and Tomas C. Mijares. "Right to Privacy Issues in the Context of Crisis Negotiations and Sensory Enhancing Technology." Journal of Police Crisis Negotiations 4, no. 1 (February 23, 2004): 111–14. http://dx.doi.org/10.1300/j173v04n01_08.
Full textLi, Yifang, Nishant Vishwamitra, Bart P. Knijnenburg, Hongxin Hu, and Kelly Caine. "Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos." Proceedings of the ACM on Human-Computer Interaction 1, CSCW (December 6, 2017): 1–24. http://dx.doi.org/10.1145/3134702.
Full textLuo, Huiwen, Haoming Zhang, Shigong Long, and Yi Lin. "Enhancing frequent location privacy-preserving strategy based on geo-Indistinguishability." Multimedia Tools and Applications 80, no. 14 (March 20, 2021): 21823–41. http://dx.doi.org/10.1007/s11042-021-10789-0.
Full textLi, Yifang, Nishant Vishwamitra, Hongxin Hu, Bart P. Knijnenburg, and Kelly Caine. "Effectiveness and Users’ Experience of Face Blurring as a Privacy Protection for Sharing Photos via Online Social Networks." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 803–7. http://dx.doi.org/10.1177/1541931213601694.
Full textBarr, Neil G., Glen E. Randall, Norman P. Archer, and David M. Musson. "Physician communication via Internet-enabled technology: A systematic review." Health Informatics Journal 25, no. 3 (October 9, 2017): 919–34. http://dx.doi.org/10.1177/1460458217733122.
Full textHarborth, David, Sebastian Pape, and Kai Rannenberg. "Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym." Proceedings on Privacy Enhancing Technologies 2020, no. 2 (April 1, 2020): 111–28. http://dx.doi.org/10.2478/popets-2020-0020.
Full textLiu, Haibing, Rubén González Crespo, and Oscar Sanjuán Martínez. "Enhancing Privacy and Data Security across Healthcare Applications Using Blockchain and Distributed Ledger Concepts." Healthcare 8, no. 3 (July 29, 2020): 243. http://dx.doi.org/10.3390/healthcare8030243.
Full textBraun, Sven, and Anne-Marie Oostveen. "Encryption for the masses? An analysis of PGP key usage." Mediatization Studies 2 (June 26, 2019): 69. http://dx.doi.org/10.17951/ms.2018.2.69-84.
Full textKatzan, Jr., Harry. "Dynamic Access Control For Information Technology Service Management." Journal of Service Science (JSS) 7, no. 1 (November 3, 2014): 23–28. http://dx.doi.org/10.19030/jss.v7i1.8887.
Full textBoritz, J. Efrim, and Won Gyun No. "E-Commerce and Privacy: Exploring What We Know and Opportunities for Future Discovery." Journal of Information Systems 25, no. 2 (November 1, 2011): 11–45. http://dx.doi.org/10.2308/isys-10090.
Full textMathew, Alex. "Edge Computing and Its Convergence with Blockchain in 6G: Security Challenges." International Journal of Computer Science and Mobile Computing 10, no. 8 (August 30, 2021): 8–14. http://dx.doi.org/10.47760/ijcsmc.2021.v10i08.002.
Full textRegueiro, Cristina, Iñaki Seco, Santiago de Diego, Oscar Lage, and Leire Etxebarria. "Privacy-enhancing distributed protocol for data aggregation based on blockchain and homomorphic encryption." Information Processing & Management 58, no. 6 (November 2021): 102745. http://dx.doi.org/10.1016/j.ipm.2021.102745.
Full textIdrees, Sheikh Mohammad, Mariusz Nowostawski, Roshan Jameel, and Ashish Kumar Mourya. "Security Aspects of Blockchain Technology Intended for Industrial Applications." Electronics 10, no. 8 (April 16, 2021): 951. http://dx.doi.org/10.3390/electronics10080951.
Full textAlaqra, Ala Sarah, Bridget Kane, and Simone Fischer-Hübner. "Machine Learning–Based Analysis of Encrypted Medical Data in the Cloud: Qualitative Study of Expert Stakeholders’ Perspectives." JMIR Human Factors 8, no. 3 (September 16, 2021): e21810. http://dx.doi.org/10.2196/21810.
Full textGoodell, Geoffrey, Hazem Danny Al-Nakib, and Paolo Tasca. "A Digital Currency Architecture for Privacy and Owner-Custodianship." Future Internet 13, no. 5 (May 14, 2021): 130. http://dx.doi.org/10.3390/fi13050130.
Full textFritsch, Lothar. "Privacy-Respecting Location-Based Service Infrastructures: A Socio-Technical Approach to Requirements Engineering." Journal of Theoretical and Applied Electronic Commerce Research 2, no. 3 (December 1, 2007): 1–17. http://dx.doi.org/10.3390/jtaer2030018.
Full textElMamy, Sidi Boubacar, Hichem Mrabet, Hassen Gharbi, Abderrazak Jemai, and Damien Trentesaux. "A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0." Sustainability 12, no. 21 (November 4, 2020): 9179. http://dx.doi.org/10.3390/su12219179.
Full textStott, Tonia C., Ann MacEachron, and Nora Gustavsson. "Social Media and Child Welfare: Policy, Training, and the Risks and Benefits From the Administrator’s Perspective." Advances in Social Work 17, no. 2 (January 30, 2017): 221–34. http://dx.doi.org/10.18060/21263.
Full textvan Boekel, Leonieke, Eveline Wouters, Bea Grimberg, Nardo van der Meer, and Katrien Luijkx. "Perspectives of Stakeholders on Technology Use in the Care of Community-Living Older Adults with Dementia: A Systematic Literature Review." Healthcare 7, no. 2 (May 28, 2019): 73. http://dx.doi.org/10.3390/healthcare7020073.
Full textKadhim, Thair A. "Development a Teaching Methods using a Cloud Computing Technology in Iraqi Schools ." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 26, no. 4 (February 1, 2018): 18–26. http://dx.doi.org/10.29196/jub.v26i4.680.
Full textZhang, Jing, Zhenjing Li, Rong Tan, and Cong Liu. "Design and Application of Electronic Rehabilitation Medical Record (ERMR) Sharing Scheme Based on Blockchain Technology." BioMed Research International 2021 (August 27, 2021): 1–12. http://dx.doi.org/10.1155/2021/3540830.
Full textWirth, Felix Nikolaus, Marco Johns, Thierry Meurers, and Fabian Prasser. "Citizen-Centered Mobile Health Apps Collecting Individual-Level Spatial Data for Infectious Disease Management: Scoping Review." JMIR mHealth and uHealth 8, no. 11 (November 10, 2020): e22594. http://dx.doi.org/10.2196/22594.
Full textMakin, David A., and Leanna Ireland. "The secret life of PETs." Policing: An International Journal 43, no. 1 (December 18, 2019): 121–36. http://dx.doi.org/10.1108/pijpsm-07-2019-0124.
Full textChattu, Vijay Kumar, Anjali Nanda, Soosanna Kumary Chattu, Syed Manzoor Kadri, and Andy W. Knight. "The Emerging Role of Blockchain Technology Applications in Routine Disease Surveillance Systems to Strengthen Global Health Security." Big Data and Cognitive Computing 3, no. 2 (May 8, 2019): 25. http://dx.doi.org/10.3390/bdcc3020025.
Full textTsohou, Aggeliki, Emmanouil Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni, and Beatriz Gallego-Nicasio Crespo. "Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform." Information & Computer Security 28, no. 4 (April 16, 2020): 531–53. http://dx.doi.org/10.1108/ics-01-2020-0002.
Full textKowalczuk, Pascal. "Consumer acceptance of smart speakers: a mixed methods approach." Journal of Research in Interactive Marketing 12, no. 4 (October 8, 2018): 418–31. http://dx.doi.org/10.1108/jrim-01-2018-0022.
Full textLiza, Farhana Yasmin. "Factors Influencing the Adoption of Mobile Banking: Perspective Bangladesh." Global Disclosure of Economics and Business 3, no. 2 (December 31, 2014): 199–220. http://dx.doi.org/10.18034/gdeb.v3i2.164.
Full textHenriksen, Kerm, Marilyn Sue Bogner, Pascale Carayon, Richard I. Cook, Matthew B. Weinger, and Yan Xiao. "Human Factors Research in Patient Safety: A Candid Assessment." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 46, no. 16 (September 2002): 1462–66. http://dx.doi.org/10.1177/154193120204601612.
Full textXu, He, Xin Chen, Feng Zhu, and Peng Li. "A Novel Security Authentication Protocol Based on Physical Unclonable Function for RFID Healthcare Systems." Wireless Communications and Mobile Computing 2021 (July 23, 2021): 1–14. http://dx.doi.org/10.1155/2021/8844178.
Full textNaik, Shalini S., Narayana Manjunatha, Channaveerachari Naveen Kumar, Suresh Bada Math, and Sydney Moirangthem. "Patient’s Perspectives of Telepsychiatry: The Past, Present and Future." Indian Journal of Psychological Medicine 42, no. 5_suppl (October 2020): 102S—107S. http://dx.doi.org/10.1177/0253717620963341.
Full textSheikh, Aziz, Harpreet S. Sood, and David W. Bates. "Leveraging health information technology to achieve the “triple aim” of healthcare reform." Journal of the American Medical Informatics Association 22, no. 4 (April 16, 2015): 849–56. http://dx.doi.org/10.1093/jamia/ocv022.
Full textHang, Lei, BumHwi Kim, KyuHyung Kim, and DoHyeun Kim. "A Permissioned Blockchain-Based Clinical Trial Service Platform to Improve Trial Data Transparency." BioMed Research International 2021 (July 29, 2021): 1–22. http://dx.doi.org/10.1155/2021/5554487.
Full textPaluch, Stefanie, and Sven Tuzovic. "Persuaded self-tracking with wearable technology: carrot or stick?" Journal of Services Marketing 33, no. 4 (August 12, 2019): 436–48. http://dx.doi.org/10.1108/jsm-03-2018-0091.
Full textOng, Shawn Y., Lisa Stump, Matthew Zawalich, Lisa Edwards, Glynn Stanton, Michael Matthews, and Allen L. Hsiao. "Inpatient Telehealth Tools to Enhance Communication and Decrease Personal Protective Equipment Consumption during Disaster Situations: A Case Study during the COVID-19 Pandemic." Applied Clinical Informatics 11, no. 05 (October 2020): 733–41. http://dx.doi.org/10.1055/s-0040-1719180.
Full textHassankhani, Mahnoosh, Mehdi Alidadi, Ayyoob Sharifi, and Abolghasem Azhdari. "Smart City and Crisis Management: Lessons for the COVID-19 Pandemic." International Journal of Environmental Research and Public Health 18, no. 15 (July 21, 2021): 7736. http://dx.doi.org/10.3390/ijerph18157736.
Full textAlam, Tanweer, Baha Rababah, Arshad Ali, and Shamimul Qamar. "Distributed Intelligence at the Edge on IoT Networks." Annals of Emerging Technologies in Computing 4, no. 5 (December 20, 2020): 1–18. http://dx.doi.org/10.33166/aetic.2020.05.001.
Full textKelly, Jaimon T., Katrina L. Campbell, Enying Gong, and Paul Scuffham. "The Internet of Things: Impact and Implications for Health Care Delivery." Journal of Medical Internet Research 22, no. 11 (November 10, 2020): e20135. http://dx.doi.org/10.2196/20135.
Full text