Academic literature on the topic 'Privacy practices'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy practices.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Privacy practices"

1

Smith, H. Jeff. "Privacy policies and practices." Communications of the ACM 36, no. 12 (December 1993): 104–22. http://dx.doi.org/10.1145/163298.163349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Paasche-Orlow, Michael K., Dan M. Jacob, and Joshua N. Powell. "Notices of Privacy Practices." Medical Care 43, no. 6 (June 2005): 558–64. http://dx.doi.org/10.1097/01.mlr.0000163646.90393.e4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schlueter, John P. "Private Practices." Nineteenth-Century Literature 66, no. 3 (December 1, 2011): 283–306. http://dx.doi.org/10.1525/ncl.2011.66.3.283.

Full text
Abstract:
Abstract This essay uses selected works of Washington Irving and Ralph Waldo Emerson to delineate two different privacies. The first privacy is associated with secreted spaces, whether physical or personal, and is one that has been normalized. The other privacy is under-appreciated and far less understood: it is an unpredictable, speculative flight of what Irving calls “fancy.” The essay argues that each privacy comes with a distinct set of consequences. If we choose to associate privacy with secreted spaces, we ourselves become like texts, able to be read, and we then associate with others as
APA, Harvard, Vancouver, ISO, and other styles
4

Hsu, Chiung‐wen (Julia). "Privacy concerns, privacy practices and web site categories." Online Information Review 30, no. 5 (September 2006): 569–86. http://dx.doi.org/10.1108/14684520610706433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Toy, Alan, David Lau, David Hay, and Gehan Gunasekara. "The views of privacy auditors regarding standards and methodologies." Meditari Accountancy Research 27, no. 3 (June 3, 2019): 366–98. http://dx.doi.org/10.1108/medar-07-2018-0367.

Full text
Abstract:
Purpose This paper aims to uncover the practices of different privacy auditors to reveal the extent of any similarities in such practices. The purpose is to investigate the drivers of practices used by privacy auditors and to identify potential for improvements in the practice of privacy auditing so that privacy audits may better serve stakeholders. Design/methodology/approach Six semi-structured interviews with seven privacy auditors and regulators and an analyst across Australia, Canada, New Zealand and the USA are used as the basis for our analysis. Findings The study shows that some privac
APA, Harvard, Vancouver, ISO, and other styles
6

Mensch, Scott E., and LeAnn Wilkie. "Smart Phone Security Practices." International Journal of Cyber Behavior, Psychology and Learning 9, no. 3 (July 2019): 1–14. http://dx.doi.org/10.4018/ijcbpl.2019070101.

Full text
Abstract:
Hand-held cell phone technology has been around for quite some time, however when Apple introduced the iPhone in 2007, the widespread adoption of smartphones took off. Smartphones allow users to communicate via talk, text and video; access personal and work e-mail and the Internet; run applications; make purchases; manage bank accounts; take pictures - and for many of us are an integral part of our everyday (The Privacy Rights Clearinghouse, 2018). Smartphones are “essentially tiny computers, we reach for these devices when we first wake up, bring them with us into the car, and often keep them
APA, Harvard, Vancouver, ISO, and other styles
7

Han, Ye, and T. Selwyn Ellis. "A Study of User Continuance Behavioral Intentions Toward Privacy-Protection Practices." Information Resources Management Journal 31, no. 2 (April 2018): 24–46. http://dx.doi.org/10.4018/irmj.2018040102.

Full text
Abstract:
Prior research on privacy protective behaviors has found that online users irrationally trade protection for convenience, and so act against their own privacy preferences. The present article uses expectancy-confirmation theory (ECT) models to explain the continuance behavioral intentions of online users toward privacy-protection practices. It redefines convenience to highlight human behaviors involved in various stages of implementing privacy practices processes. The results show that earlier privacy practice experiences impact the present as well as the future protective behaviors of users,
APA, Harvard, Vancouver, ISO, and other styles
8

Hope, Joan. "Follow best practices for transparency about student privacy practices." Disability Compliance for Higher Education 20, no. 9 (March 17, 2015): 9. http://dx.doi.org/10.1002/dhe.30049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cohen, Julie E. "Turning Privacy Inside Out." Theoretical Inquiries in Law 20, no. 1 (March 16, 2019): 1–31. http://dx.doi.org/10.1515/til-2019-0002.

Full text
Abstract:
Abstract The problem of theorizing privacy moves on two levels, the first consisting of an inadequate conceptual vocabulary and the second consisting of an inadequate institutional grammar. Privacy rights are supposed to protect individual subjects, and so conventional ways of understanding privacy are subject-centered, but subject-centered approaches to theorizing privacy also wrestle with deeply embedded contradictions. And privacy’s most enduring institutional failure modes flow from its insistence on placing the individual and individualized control at the center. Strategies for rescuing p
APA, Harvard, Vancouver, ISO, and other styles
10

Culnan, Mary J., and Thomas J. Carlin. "Online privacy practices in higher education." Communications of the ACM 52, no. 3 (March 2009): 126–30. http://dx.doi.org/10.1145/1467247.1467277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Privacy practices"

1

Lee, Songho. "Current practices for DNS Privacy : Protection towards pervasive surveillance." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-85621.

Full text
Abstract:
Current usage of the DNS system is a significant loophole of Internet users' privacy, as all queries and answers for resolving web address are not protected in most cases. The report elaborates which Internet users' privacy interests exist, and presents the current technologies to enhance DNS Privacy through a systematic literature review. The report also explores the limitations of the current practices and presents several proposals such as DNS-over-Tor and methods to change the trusted recursive resolver to mitigate current limitations periodically.<br>Den nuvarande användningen av DNS-syst
APA, Harvard, Vancouver, ISO, and other styles
2

Andersen, Adelina. "Exploring Security and Privacy Practices of Home IoT Users." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-303002.

Full text
Abstract:
Internet of Things (IoT) devices are becoming more and more common in homes, making the security and privacy of these increasingly important. Previous research has found that home IoT users can become a threat to themselves if they lack knowledge of their devices and awareness of potential threats. To investigate how the users’ security and privacy practices can be improved, it is necessary to understand the current everyday practices and what impacts these. This is examined in 10 interviews, revealing that the practices are primarily influenced by convenience, motivation and the effort requir
APA, Harvard, Vancouver, ISO, and other styles
3

Lysyk, Mary C. "Practices for Protecting Privacy in Health Research: Perspectives of the Public, Privacy Guidance Documents and REBs." Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31093.

Full text
Abstract:
Health research is the single vehicle for uncovering the varying causes of disease or illness, understanding the broader determinants of health, and discovering new or to validating traditional ways of treating the individuals who suffer from these conditions. Thus, health research activities are at the heart of medical, health and scientific developments. While health research activities exemplify some of the greatest hopes for improved health-care, they also highlight public concerns for the protection of personal health information (PHI). More specifically, advances in modern informati
APA, Harvard, Vancouver, ISO, and other styles
4

Ghiami-Mirhosaini, Roozbeh. "Information privacy, an exploratory survey of concerns about organisational practices." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape2/PQDD_0016/MQ48484.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ghiami-Mirhosaini, Roozbeh Carleton University Dissertation Management Studies. "Information privacy: an exploratory survey of concerns about organizational practices." Ottawa, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gandarillas, Carlos. "The impact of web site design and privacy practices on trust." FIU Digital Commons, 2002. http://digitalcommons.fiu.edu/etd/3448.

Full text
Abstract:
The most significant issue facing the growth of eCommerce is trust. This research was conducted to determine the type of information users are willing to allow entities to collect online, such as a user's email addresses and click-stream behavior, and its affect on trust. This study determined empirically that participants were more willing to submit non-personally identifying data (e.g., clickstream data) over personally identifying information (e.g., email address); participants were wary of submitting any personal information such as an email address; when a participant submits an email add
APA, Harvard, Vancouver, ISO, and other styles
7

Visser, Diane. "A study on database marketing practices that raise consumer privacy concern : a proposed model for regulating database marketing practices in South Africa." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52711.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2002.<br>ENGLISH ABSTRACT: One of the phenomena's in the marketing industry of the past decade is the increased use of database marketing. Database marketing involves the collection, processing and dissemination of vast amounts of consumer information in order to compile detailed consumer databases. The increasing popularity of database marketing can be attributed to various factors. Consumer information can now be obtained easier, cheaper and faster due to the availability of information technology. It has become easier to segment consumer market
APA, Harvard, Vancouver, ISO, and other styles
8

Papoutsi, Chrysanthi. "Reconfiguring privacy and confidentiality practices : a case study of technological integration in HIV health services." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:265ff900-72cd-4ec7-bc95-8717d9640240.

Full text
Abstract:
Changes to the technological landscape of the National Health Service (NHS) in the UK have often raised debates on information privacy and patient confidentiality. This has been especially pertinent in the context of HIV health services, where patient records have been historically segregated from hospital notes to protect confidentiality and account for the nature of the condition as a stigmatised terminal illness. However, as current anti-retroviral treatment extends life expectancy, HIV is increasingly managed in ways similar to other chronic conditions and integrated patient management has
APA, Harvard, Vancouver, ISO, and other styles
9

Severi, Claudia. "Privacy e protezione dei dati personali: il nuovo regolamento europeo e best practices per un sito web." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019.

Find full text
Abstract:
Il legislatore Europeo ha lavorato per anni per definire il concetto di sicurezza legato ai dati personali, definendo questa materia come Protezione dei Dati Personali. La Carta dei Diritti Fondamentali dell’Unione Europea, infatti, all'art. 8 garantisce ad ogni persona il diritto alla protezione dei dati di carattere personale che la riguardano. Così, con il continuo avanzare delle tecnologie informatiche il legislatore europeo ha deciso di adottare un Regolamento che si applica a tutte le persone presenti nell'Unione Europea e che per sua natura non necessita di alcun atto di recepimento da pa
APA, Harvard, Vancouver, ISO, and other styles
10

Brown, Shonda Dellena. "An Information Privacy Examination of the Practices of Pharmaceutical Companies Regarding Use of Information Collected Through Their Websites." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/47.

Full text
Abstract:
Consumers have begun to take a more proactive approach to their healthcare by accessing pharmaceutical companies Websites to obtain health and drug information, support groups, rebates, coupons, as well as free drug trials. In exchange for these benefits, companies require consumers to voluntarily disclose information. However, research has shown that consumers continue to be concerned about how their information is managed, used, and distributed by companies, especially if accessed via the Web. To date, there has been limited empirical research to examine the actual online practices of compan
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Privacy practices"

1

Data Security Council of India. DSCI privacy framework: Best practices. New Delhi: Data Security Council of India, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Grumbling, Emily, ed. Privacy Research and Best Practices. Washington, D.C.: National Academies Press, 2016. http://dx.doi.org/10.17226/21879.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Protecting patron privacy: Safe practices for public computers. Santa Barbara, California: Libraries Unlimited, An Imprint of ABC-CLIO, LLC, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

R, Elden Charles, ed. Wireless security and privacy: Best practices and design techniques. Boston: Addison-Wesley, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wakulowsky, Lydia. Personal Health Information Protection Act: Implementing best privacy practices. 2nd ed. Markham, Ont: LexisNexis Canada, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ezor, Jonathan. Privacy and data protection in business: Laws and practices. New Providence, NJ: LexisNexis, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Milne, George R. A business perspective on database marketing and consumer privacy practices. Cambridge, Mass: Marketing Science Institute, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gauthronet, Serge. Practices to implement the OECD privacy guidelines on global networks. Paris, France: OECD, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Milne, George R. A business perspective on database marketing and consumer privacy practices. Cambridge, Mass: Marketing Science Institute, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Internet and wireless privacy: A legal guide to global business practices. Toronto: CCH Canada, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Privacy practices"

1

Schmidt, Jan-Hinrik. "(Micro)blogs: Practices of Privacy Management." In Privacy Online, 159–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21521-6_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Raul, Alan Charles. "“Best Practices,” Findings and Recommendations." In Privacy and the Digital State: Balancing Public Information and Personal Privacy, 73–82. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-0889-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Deckter, David, and Jeffrey Fisher. "Security, Controls, and Privacy." In IT Best Practices for Financial Managers, 127–38. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119198819.ch9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Karjoth, Günter, Matthias Schunter, and Michael Waidner. "Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data." In Privacy Enhancing Technologies, 69–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36467-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kalantari, Shirin, Andreas Put, and Bart De Decker. "Trackers in Your Inbox: Criticizing Current Email Tracking Practices." In Privacy Technologies and Policy, 156–67. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-76663-4_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cavoukian, Ann. "Privacy by Design: Best Practices for Privacy and the Smart Grid." In ISSE 2010 Securing Electronic Business Processes, 260–70. Wiesbaden: Vieweg+Teubner, 2011. http://dx.doi.org/10.1007/978-3-8348-9788-6_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Coudert, Fanny. "Accountable Surveillance Practices: Is the EU Moving in the Right Direction?" In Privacy Technologies and Policy, 70–85. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-06749-0_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kobsa, Alfred, and Maximilian Teltzrow. "Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users’ Data Sharing and Purchase Behavior." In Privacy Enhancing Technologies, 329–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11423409_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dooly, Zeta, Kenny Doyle, and Jamie Power. "Uncovering Innovation Practices and Requirements in Privacy and Cyber Security Organisations: Insights from IPACSO." In Cyber Security and Privacy, 140–50. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25360-2_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wanka, Anna. "Spaces and practices of privacy in older age." In Räume und Kulturen des Privaten, 85–107. Wiesbaden: Springer Fachmedien Wiesbaden, 2017. http://dx.doi.org/10.1007/978-3-658-14632-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Privacy practices"

1

Coles-Kemp, Lizzie, and Elahe Kani-Zabihi. "Practice Makes Perfect: Motivating Confident Privacy Protection Practices." In 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom). IEEE, 2011. http://dx.doi.org/10.1109/passat/socialcom.2011.51.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Murphy, Alison R., Madhu C. Reddy, and Heng Xu. "Privacy practices in collaborative environments." In CSCW'14: Computer Supported Cooperative Work. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2531602.2531643.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Notario, Nicolas, Alberto Crespo, Yod-Samuel Martin, Jose M. Del Alamo, Daniel Le Metayer, Thibaud Antignac, Antonio Kung, Inga Kroener, and David Wright. "PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering Methodology." In 2015 IEEE Security and Privacy Workshops (SPW). IEEE, 2015. http://dx.doi.org/10.1109/spw.2015.22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Prasad, Aarathi, Matthew Clark, Ha Nguyen, Ruben Ruiz, and Emily Xiao. "Analyzing Privacy Practices of Existing mHealth Apps." In 13th International Conference on Health Informatics. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009059605630570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Asiri, Fatima, and David Millard. "Unpacking Privacy Practices in SNSs: Users’ Protection Strategies to Enforce Privacy Boundaries." In 2018 21st Saudi Computer Society National Computer Conference (NCC). IEEE, 2018. http://dx.doi.org/10.1109/ncg.2018.8593046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Brandt, Galina. "Interpenetration Phenomenon of Public & Private Aspects in Contemporary Theatrical Practices." In The Public/Private in Modern Civilization, the 22nd Russian Scientific-Practical Conference (with international participation) (Yekaterinburg, April 16-17, 2020). Liberal Arts University – University for Humanities, Yekaterinburg, 2020. http://dx.doi.org/10.35853/ufh-public/private-2020-12.

Full text
Abstract:
The article hypothesises that the opposition of ‘publicity/privacy’ concepts (alongside with other fundamental dichotomies, e.g. spiritual/material, social/individual, political/personal) in the media era, and first of all in the era of the Internet together with related communicative resources, is no longer productive. The study was performed via discursive analysis since it concerns methods of making use of the original concepts of ‘publicity’ and ‘privacy’. The author also addresses media survey methods since it is a contemporary media context that guides changes in the balance between the
APA, Harvard, Vancouver, ISO, and other styles
7

Alqhatani, Abdulmajeed, and Heather Lipford. "Exploring Parents’ Security and Privacy Concerns and Practices." In Workshop on Usable Security. Reston, VA: Internet Society, 2018. http://dx.doi.org/10.14722/usec.2018.23019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Patil, Sameer, and Alfred Kobsa. "Uncovering privacy attitudes and practices in instant messaging." In the 2005 international ACM SIGGROUP conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1099203.1099220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Aleyasen, Amirhossein, Oleksii Starov, Alyssa Phung Au, Allan Schiffman, and Jeff Shrager. "On the Privacy Practices of Just Plain Sites." In CCS'15: The 22nd ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2808138.2808140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sharma, Tanusree, Md Mirajul Islam, Anupam Das, S. M. Taiabul Haque, and Syed Ishtiaque Ahmed. "Privacy during Pandemic: A Global View of Privacy Practices around COVID-19 Apps." In COMPASS '21: ACM SIGCAS Conference on Computing and Sustainable Societies. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3460112.3471958.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Privacy practices"

1

Youpa, Daniel G., Ralph M. Carney, Martin F. Wiskoff, and John D. Tippit. Review of Private Sector Personnel Screening Practices. Fort Belvoir, VA: Defense Technical Information Center, October 2000. http://dx.doi.org/10.21236/ada384046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Brophy, Daniel. Evaluative styles of clinicians in private practice. Portland State University Library, January 2000. http://dx.doi.org/10.15760/etd.5340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Barnett, Michael, Andrew Olenski, and Adam Sacarny. Common Practice: Spillovers from Medicare on Private Health Care. Cambridge, MA: National Bureau of Economic Research, May 2020. http://dx.doi.org/10.3386/w27270.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Illman, Julia, Mikko Halonen, Shelagh Whitley, and Nella Canales Trujillo. Practical Methods for Assessing Private Climate Finance Flows. Nordic Council of Ministers, February 2014. http://dx.doi.org/10.6027/tn2014-506.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Frakes, Michael, Jonathan Gruber, and Timothy Justicz. Public and Private Options in Practice: The Military Health System. Cambridge, MA: National Bureau of Economic Research, December 2020. http://dx.doi.org/10.3386/w28256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chetty, Raj, and John Friedman. A Practical Method to Reduce Privacy Loss when Disclosing Statistics Based on Small Samples. Cambridge, MA: National Bureau of Economic Research, March 2019. http://dx.doi.org/10.3386/w25626.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kreighbaum, Jay M. Busting DoD Bureaucracy: Creating Fundamental Change by Leveraging Concepts and Practices from the Private Sectors. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada401901.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Reynolds, Julie C., Susan C. McKernan, Jennifer Michelle Cecelia Sukalski, Brooke McInroy, Peter Damiano, and Raymond Kuthy. Evaluation of the Dental Wellness Plan. Experiences of Private Practice Dentists after Two Years. Iowa City, Iowa: University of Iowa Public Policy Center, July 2017. http://dx.doi.org/10.17077/4u27-r72m.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hertz, Jana C., Derick W. Brinkerhoff, Robin Bush, and Petrarca Karetji. Knowledge Systems: Evidence to Policy Concepts in Practice. RTI Press, June 2020. http://dx.doi.org/10.3768/rtipress.2020.pb.0024.2006.

Full text
Abstract:
This policy brief reviews the evolution of knowledge-to-policy studies and the emergence of systems perspectives. We explore the less well understood issue of how to grow and reinforce knowledge systems in settings where they are weak and underdeveloped. We offer a knowledge systems model that encapsulates current thinking and present an example of an effort to strengthen a knowledge system, drawn from a project managed by RTI in Indonesia. We conclude with some recommendations for strengthening knowledge systems including promoting debate among a diversity of voices within the knowledge syste
APA, Harvard, Vancouver, ISO, and other styles
10

Osidoma, Japhet, and Ashiru Mohammed Kinkwa. Creatively Improving Agricultural Practices and Productivity: Pro Resilience Action (PROACT) project, Nigeria. Oxfam, February 2021. http://dx.doi.org/10.21201/2021.7260.

Full text
Abstract:
Since April 2016, The European Union and the Oxfam Pro-Resilience Action Project in Kebbi and Adamawa States, Nigeria, have supported poor smallholder rural farmers to improve their agricultural productivity. The project has a specific focus on increasing crop yields per hectare for better land usage, as well as ensuring farmers possess the skills they need to maintain good agricultural practices, such as inputs utilization and climate mitigation strategies, as well as an information-sharing system on weather and market prices. The project uses a Farmer Field School model that continues to ser
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!