Academic literature on the topic 'Privacy of communication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy of communication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Privacy of communication"

1

Vemou, Konstantina, and Maria Karyda. "Requirements for private communications over public spheres." Information & Computer Security 28, no. 1 (2019): 68–96. http://dx.doi.org/10.1108/ics-01-2019-0002.

Full text
Abstract:
Purpose In the Web 2.0 era, users massively communicate through social networking services (SNS), often under false expectations that their communications and personal data are private. This paper aims to analyze privacy requirements of personal communications over a public medium. Design/methodology/approach This paper systematically analyzes SNS services as communication models and considers privacy as an attribute of users’ communication. A privacy threat analysis for each communication model is performed, based on misuse scenarios, to elicit privacy requirements per communication type. Fin
APA, Harvard, Vancouver, ISO, and other styles
2

Petersons, Andris, and Ilkhom Khalimzoda. "Communication privacy management of students in Latvia." Problems and Perspectives in Management 14, no. 2 (2016): 222–27. http://dx.doi.org/10.21511/ppm.14(2-1).2016.11.

Full text
Abstract:
The lack of communication privacy boundaries among students and the fault of self-disclosure are two main reasons for unforeseen distress, broken relationships and trust, vulnerability and conflicts in universities. Based on S. Petronio’s theory of communication privacy management this research investigates the interaction of domestic students and foreign students in Latvia with their peers in order to set up privacy and disclosure boundaries that do not violate peer privacy, especially in a sensitive multicultural context. In fact, the presence of private information and the willingness to di
APA, Harvard, Vancouver, ISO, and other styles
3

Teutsch, Doris, Philipp K. Masur, and Sabine Trepte. "Privacy in Mediated and Nonmediated Interpersonal Communication: How Subjective Concepts and Situational Perceptions Influence Behaviors." Social Media + Society 4, no. 2 (2018): 205630511876713. http://dx.doi.org/10.1177/2056305118767134.

Full text
Abstract:
New communication media such as social networking sites (SNSs) and instant messengers (IMs) challenge users’ privacy perceptions. Technical infrastructures and the flow of digital information lead to novel privacy risks that individuals are often not acquainted with. Users’ subjective perceptions of privacy may thus be flawed and lead to irrational behavior. In this work, we investigated a concept that has been addressed only implicitly in academic research on privacy: the user’s subjective perception of a given level of privacy. We examined the literature on how privacy perceptions have been
APA, Harvard, Vancouver, ISO, and other styles
4

Sekiguchi, Atsuko. "Comparison of the Regulations on Communication Privacy between EU and Japan: Toward Reinforcement of Japan’s Communication Privacy." Information & Security: An International Journal 48 (2021): 84–94. http://dx.doi.org/10.11610/isij.4801.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sari, Putri Widya. "Pengungkapan Diri dalam Perseteruan Youtuber Kembar Tasya Farasya dan Tasyi Athasyia." Jurnal Komunikasi Nusantara 5, no. 1 (2023): 67–77. http://dx.doi.org/10.33366/jkn.v5i1.244.

Full text
Abstract:
Communication Privacy Management (CPM) theory is a theory that addresses the tension between openness and privacy, between "public" and "private" in a relationship. CPM theory in previous studies has been widely used in social media. This study aims to examine the application of privacy rules and restrictions on the disclosure of private information to the public based on the CPM theory carried out by celebrity and YouTuber Tasyi Athasyia through her social media account in a dispute with her twin Tasya Farasya. The method used in this study is a qualitative content analysis method by analyzin
APA, Harvard, Vancouver, ISO, and other styles
6

Kushelvitz, Eyal. "Privacy and Communication Complexity." SIAM Journal on Discrete Mathematics 5, no. 2 (1992): 273–84. http://dx.doi.org/10.1137/0405021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kierkegaard, Sylvia. "Privacy in electronic communication." Computer Law & Security Review 21, no. 3 (2005): 226–36. http://dx.doi.org/10.1016/j.clsr.2005.04.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Meng, Xiaoxiao. "From Interpersonal Privacy to HumanTechnological Privacy: Communication Privacy Management Theory Revisited." Technical Communication 71, no. 2 (2024): 72–88. http://dx.doi.org/10.55177/tc304825.

Full text
Abstract:
Purpose: Communication privacy management (CPM) theory is a major theory explaining the tensions between disclosing and concealing private information in interpersonal communication. By considering differences in interpersonal and human-technology information disclosure and drawing on existing work related to privacy and technology, this article presents CPM theory as a broad theoretical framework for human-technology privacy boundary management. Method: This research employed a speculative theoretical approach by drawing on existing literature and synthesizing it to both apply and extend CPM
APA, Harvard, Vancouver, ISO, and other styles
9

Davenny, Ben, and Alex Odom. "Healthcare communication in acoustical consulting practice." Journal of the Acoustical Society of America 152, no. 4 (2022): A95. http://dx.doi.org/10.1121/10.0015662.

Full text
Abstract:
With respect to speech communication in healthcare facilities, acoustical consultants are often concerned with overheard speech in the context of patient privacy. Low background sound is often a culprit with speech privacy problems, and examples will be given in exam rooms and common areas. Case studies of both poor speech privacy and poor speech communication will be given along with proposed solutions. Finally, popular science communications from the authors’ corporate blog during the COVID pandemic on speech communication and personal protective equipment will be discussed.
APA, Harvard, Vancouver, ISO, and other styles
10

Bar-Yehuda, R., B. Chor, E. Kushilevitz, and A. Orlitsky. "Privacy, additional information and communication." IEEE Transactions on Information Theory 39, no. 6 (1993): 1930–43. http://dx.doi.org/10.1109/18.265501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Privacy of communication"

1

Maciejewski, Robert. "Privacy aspects of digital communication." St. Gallen, 2007. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/01665892002/$FILE/01665892002.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kittichokechai, Kittipong. "Communication With Reconstruction and Privacy Constraints." Doctoral thesis, KTH, Kommunikationsteori, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-145134.

Full text
Abstract:
Communication networks are an integral part of the Internet of Things (IoT) era. They enable endless opportunities for connectivity in a wide range of applications, leading to advances in efficiency of day-to-day life. While creating opportunities, they also incur several new challenges. In general, we wish to design a system that performs optimally well in all aspects. However, there usually exist competing objectives which lead to tradeoffs. In this thesis, driven by several applications, new features and objectives are included into the system model, making it closer to reality and needs. T
APA, Harvard, Vancouver, ISO, and other styles
3

Coopamootoo, P. L. "Effective online privacy mechanisms with persuasive communication." Thesis, Cranfield University, 2016. http://dspace.lib.cranfield.ac.uk/handle/1826/10265.

Full text
Abstract:
This thesis contributes to research by taking a social psychological perspective to managing privacy online. The thesis proposes to support the effort to form a mental model that is required to evaluate a context with regards to privacy attitudes or to ease the effort by biasing activation of privacy attitudes. Privacy being a behavioural concept, the human-computer interaction design plays a major role in supporting and contributing to end users’ ability to manage their privacy online. However, unless privacy attitudes are activated or made accessible, end users’ behaviour would not necessari
APA, Harvard, Vancouver, ISO, and other styles
4

Paverd, Andrew James. "Enhancing communication privacy using trustworthy remote entities." Thesis, University of Oxford, 2015. https://ora.ox.ac.uk/objects/uuid:66ce7364-9562-4441-957a-a940e4a50784.

Full text
Abstract:
Communication privacy is the property of a communication system that enables two or more distrusting participants to exchange information without compromising their privacy, with respect to internal and external adversaries. It encompasses aspects of anonymous communication as well as data privacy. A real-world example of the need for communication privacy is the smart energy grid, in which networked smart meters frequently measure energy consumption and communicate with grid operators. Privacy concerns arise from the possible inference of sensitive information from these measurements. Using s
APA, Harvard, Vancouver, ISO, and other styles
5

Dondeti, Lakshminath Reddy. "Efficient private group communication over public networks." [Lincoln, Neb. : University of Nebraska-Lincoln], 1999. http://international.unl.edu/Private/1999/dondetiab.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Du, Jing. "Privacy protection in location-based applications." HKBU Institutional Repository, 2007. http://repository.hkbu.edu.hk/etd_ra/816.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Namprempre, Chanathip. "Simultaneously ensuring privacy and authenticity in digital communication /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2002. http://wwwlib.umi.com/cr/ucsd/fullcit?p3061642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Buslig, Aileen Laura Suzanne 1966. "Aggressiveness in privacy-seeking behavior." Diss., The University of Arizona, 1996. http://hdl.handle.net/10150/290660.

Full text
Abstract:
Almost everyone experiences the desire for privacy occasionally. Achieving privacy, on the other hand, can be more difficult, especially when relational concerns are present. While the topic of privacy has received a good deal of attention in a variety of fields (e.g., communication, law, psychology, architecture, sociology), the impact of the act of seeking privacy has received little study. Privacy-seeking is often considered a selfish act, one that is likely to make the seeker feel guilty and the other affected parties rejected. The purpose of the present study is to examine the aggressiven
APA, Harvard, Vancouver, ISO, and other styles
9

Ophoff, Jacobus Albertus. "A model for privacy-aware presence management in mobile communications." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1354.

Full text
Abstract:
As humans we find communicating natural and compelling. Over the centuries we have created many innovations which enable and improve communication between people; during the past decade mobile phone networks have brought about a technological revolution in this area. Never before have people been so connected to one another. Today we have the ability to communicate with almost anyone, anytime, anywhere. Our increased connectivity and reachability also leads to new issues and challenges that we need to deal with. When we phone someone we expect an instant connection, and when this does not occu
APA, Harvard, Vancouver, ISO, and other styles
10

Basel, Sara Roxanne Basel. "The Confidant's Role in Managing Private Disclosures: An Analysis Using Communication Privacy Management Theory." Kent State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=kent1543421181808766.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Privacy of communication"

1

Garcia-Alfaro, Joaquin, Shujun Li, Radha Poovendran, Hervé Debar, and Moti Yung, eds. Security and Privacy in Communication Networks. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90019-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Garcia-Alfaro, Joaquin, Shujun Li, Radha Poovendran, Hervé Debar, and Moti Yung, eds. Security and Privacy in Communication Networks. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90022-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Songqing, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, and Aziz Mohaisen, eds. Security and Privacy in Communication Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37228-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Songqing, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, and Aziz Mohaisen, eds. Security and Privacy in Communication Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37231-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jajodia, Sushil, and Jianying Zhou, eds. Security and Privacy in Communication Networks. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16161-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Park, Noseong, Kun Sun, Sara Foresti, Kevin Butler, and Nitesh Saxena, eds. Security and Privacy in Communication Networks. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63086-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Park, Noseong, Kun Sun, Sara Foresti, Kevin Butler, and Nitesh Saxena, eds. Security and Privacy in Communication Networks. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63095-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Keromytis, Angelos D., and Roberto Di Pietro, eds. Security and Privacy in Communication Networks. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36883-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Beyah, Raheem, Bing Chang, Yingjiu Li, and Sencun Zhu, eds. Security and Privacy in Communication Networks. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01701-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Beyah, Raheem, Bing Chang, Yingjiu Li, and Sencun Zhu, eds. Security and Privacy in Communication Networks. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01704-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Privacy of communication"

1

Caristi, Dom, and William R. Davie. "Privacy." In Communication Law. Routledge, 2018. http://dx.doi.org/10.4324/9781315448367-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Caristi, Dom, William R. Davie, and Laurie Thomas Lee. "Privacy." In Communication Law, 3rd ed. Routledge, 2021. http://dx.doi.org/10.4324/9781003091660-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Caristi, Dom, William R. Davie, and Laurie Thomas Lee. "Privacy." In Communication Law, 4th ed. Routledge, 2025. https://doi.org/10.4324/9781003462989-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bobbitt, Randy. "Privacy." In Exploring Communication Law. Routledge, 2017. http://dx.doi.org/10.4324/9781315232935-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lee, William E., Daxton R. Stewart, and Jonathan Peters. "Privacy." In The Law of Public Communication. Routledge, 2020. http://dx.doi.org/10.4324/9781003043362-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, William E., Daxton R. Stewart, and Jonathan Peters. "Privacy." In The Law of Public Communication, 12th ed. Routledge, 2022. http://dx.doi.org/10.4324/9781003264736-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Middleton, Kent R., William E. Lee, and Daxton R. Stewart. "Privacy." In The Law of Public Communication, 9th ed. Routledge, 2016. http://dx.doi.org/10.4324/9781315455051-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Middleton, Kent R., William E. Lee, and Daxton R. Stewart. "Privacy." In The Law of Public Communication. Routledge, 2017. http://dx.doi.org/10.4324/9781315170589-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lee, William E., Daxton R. Stewart, and Jonathan Peters. "Privacy." In The Law of Public Communication, 13th ed. Routledge, 2024. http://dx.doi.org/10.4324/9781032688527-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Slutskiy, Pavel. "Communication Freedom and Privacy." In Communication and Libertarianism. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6664-0_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Privacy of communication"

1

S, Sangeetha, Pavithra R, Vigneshwaran Thangaraju, et al. "Privacy-Preserving Sequential Recommendation: Enhancing User Privacy with Differentially Private RNNs, GRUs, and Transformers." In 2025 3rd International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA). IEEE, 2025. https://doi.org/10.1109/icaeca63854.2025.11012397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Weixuan, Shunpu Tang, and Qianqian Yang. "Enhancing Image Privacy in Semantic Communication over Wiretap Channels Leveraging Differential Privacy." In 2024 IEEE 34th International Workshop on Machine Learning for Signal Processing (MLSP). IEEE, 2024. http://dx.doi.org/10.1109/mlsp58920.2024.10734725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Campbell, Molly, Sandhya Joshi, Ankur Barthwal, Austin Shouli, and Ajay Kumar Shrestha. "Applying Communication Privacy Management Theory to Youth Privacy Management in AI Contexts." In 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC). IEEE, 2025. https://doi.org/10.1109/icaic63015.2025.10848639.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sathiyapriya, K., R. Kavin Aravindhan, B. Kireshvanth, Yadav Ranganathan, and P. Hardik. "Privacy-Preserving Social Network Clustering Using Differential Privacy." In 2024 International Conference on Smart Systems for Electrical, Electronics, Communication and Computer Engineering (ICSSEECC). IEEE, 2024. http://dx.doi.org/10.1109/icsseecc61126.2024.10649423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhou, Hanlei, and Jie Kong. "Distributed Differential Privacy for Federated Learning: A Privacy-Enhancing Approach." In 2024 4th International Conference on Artificial Intelligence, Robotics, and Communication (ICAIRC). IEEE, 2024. https://doi.org/10.1109/icairc64177.2024.10900017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Do, Quang Tuan, Dongwook Won, Tung Son Do, Thanh Phung Truong, and Sungrae Cho. "Security and Privacy Challenges in Semantic Communication Networks." In 2025 International Conference on Artificial Intelligence in Information and Communication (ICAIIC). IEEE, 2025. https://doi.org/10.1109/icaiic64266.2025.10920721.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Enci, and Haoran Sun. "Towards Privacy Preservation in Federated Learning: a Dynamic Multilayer Differential Privacy Framework." In 2025 10th International Conference on Computer and Communication System (ICCCS). IEEE, 2025. https://doi.org/10.1109/icccs65393.2025.11069522.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Lumin, Yuyi Mao, Jun Zhang, Shenghui Song, and Khaled B. Letaief. "Quantization and Privacy Noise Co-Design for Utility-Privacy-Communication Trade-off in Federated Learning." In GLOBECOM 2024 - 2024 IEEE Global Communications Conference. IEEE, 2024. https://doi.org/10.1109/globecom52923.2024.10901124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhao, Canzhe, Yanjie Ze, Jing Dong, Baoxiang Wang, and Shuai Li. "DPMAC: Differentially Private Communication for Cooperative Multi-Agent Reinforcement Learning." In Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/516.

Full text
Abstract:
Communication lays the foundation for cooperation in human society and in multi-agent reinforcement learning (MARL). Humans also desire to maintain their privacy when communicating with others, yet such privacy concern has not been considered in existing works in MARL. We propose the differentially private multi-agent communication (DPMAC) algorithm, which protects the sensitive information of individual agents by equipping each agent with a local message sender with rigorous (epsilon, delta)-differential privacy (DP) guarantee. In contrast to directly perturbing the messages with predefined D
APA, Harvard, Vancouver, ISO, and other styles
10

Kushilevitz, E. "Privacy and communication complexity." In 30th Annual Symposium on Foundations of Computer Science. IEEE, 1989. http://dx.doi.org/10.1109/sfcs.1989.63512.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Privacy of communication"

1

Vaz, Maria João, and Helena Machado. A systematic literature review of Big Data in tourism industry: a state of the art and future directions. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, 2022. http://dx.doi.org/10.37766/inplasy2022.5.0012.

Full text
Abstract:
Review question / Objective: P.E.O: Population, exposure, outcome. What privacy and data protection challenges are linked by different stakeholders, to the Big Data's application in the tourism sector: P - stakeholders; E - Big Data in tourism; O - privacy and data protection challenges. Condition being studied: This investigation aims to map the social and ethical controversies associated with the use of Big Data, addressing the “technological optimism” that tends to surround the use of these techniques in the tourism sector, which may compromise sustainable tourism in the long term. Main out
APA, Harvard, Vancouver, ISO, and other styles
2

Perdigão, Rui A. P. Beyond Quantum Security with Emerging Pathways in Information Physics and Complexity. Synergistic Manifolds, 2022. http://dx.doi.org/10.46337/220602.

Full text
Abstract:
Information security and associated vulnerabilities have long been a pressing challenge, from the fundamental scientific backstage to the frontline across the most diverse sectors of society. At the tip of the iceberg of this problem, the citizens immediately feel that the reservation of privacy and the degradation of the quality and security of the information and communication on which they depend for the day-to-day activities, already of crucial relevance, are at stake. Naturally though, the challenges do not end there. There is a whole infrastructure for storing information, processing and
APA, Harvard, Vancouver, ISO, and other styles
3

Gracias, Jose Sanchez, Gregory Parnell, Eric Specking, Edward Pohl, and Randy Buchanan. Smart cities–a structured literature review. Engineer Research and Development Center (U.S.), 2025. https://doi.org/10.21079/11681/49695.

Full text
Abstract:
Smart cities are rapidly evolving concept-transforming urban developments. They use advanced technologies and data analytics to improve quality of life, increase efficiency of infrastructure and services, and promote sustainable economic growth. They integrate multiple domains to create an interconnected and intelligent urban environment. The implementation of smart city solutions in international contexts was also analyzed and proposes strategies to overcome implementation challenges. The integration of technology and data-driven solutions has potential to revolutionize urban living by provid
APA, Harvard, Vancouver, ISO, and other styles
4

Ul Haq, Ijaz, and Saima Ashraf. Temporary and Permanent Sanitation in Flood Relief Camps and Communities, Pakistan. Institute of Development Studies, 2024. https://doi.org/10.19088/slh.2024.011.

Full text
Abstract:
This case study documents efforts following the devastating 2022 floods in Pakistan, where unprecedented torrential rains triggered massive floods which affected the areas of Sindh, Baluchistan, Khyber Pakhtunkhwa and South Punjab. This case study focuses on the temporary and permanent arrangements for the rehabilitation and rebuilding of sanitation facilities in these affected areas. It details the sanitation arrangements made in temporary flood relief camps, including development and distribution of menstrual hygiene kits and development of awareness campaigns to overcome social reluctance t
APA, Harvard, Vancouver, ISO, and other styles
5

DEPARTMENT OF THE ARMY WASHINGTON DC. Information Management: Telecommunications: Record Communications and the Privacy Communications System. Defense Technical Information Center, 1990. http://dx.doi.org/10.21236/ada402244.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dover, Mike. Open Source and Energy Interoperability: Opportunities for Energy Stakeholders in Canada. The Linux Foundation, 2024. https://doi.org/10.70828/vlfn5091.

Full text
Abstract:
The energy sector faces immense pressure to increase its supply while at the same time becoming greener and smarter. Open source software (OSS) can help speed up this transition in a number of ways, in particular by enabling the integration of distributed energy sources. How does OSS solve the issue of interoperability amongst these different energy sources? In a study prepared for Natural Resources Canada, LF Research investigated this research question in the context of the Canadian energy grid. From interviews with 17 experts working in energy grid modernization, this report explains the ma
APA, Harvard, Vancouver, ISO, and other styles
7

Baron, David, Renee Bowen, and Salvatore Nunnari. Durable Coalitions and Communication: Public versus Private Negotiations. National Bureau of Economic Research, 2016. http://dx.doi.org/10.3386/w22821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mayle, Ashley. Blockchain based Communication Architectures with Applications to Private Security Networks. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1720211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Altamirano Benitez, V., I. Marín-Gutiérrez, and K. Ordóñez González. Tourism 2.0 communication in Ecuador. Analysis of public and private companies. Revista Latina de Comunicación Social, 2018. http://dx.doi.org/10.4185/rlcs-2018-1273en.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Birch, Thomas W., Nancy A. Pywell, and Nancy A. Pywell. Communicating with nonindustrial private forest-land owners: Getting programs on target. U.S. Department of Agriculture, Forest Service, Northeastern Forest Experimental Station, 1986. http://dx.doi.org/10.2737/ne-rp-593.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!