Journal articles on the topic 'SPECIAL DATA PROTECTION'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'SPECIAL DATA PROTECTION.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Anjawai, Namrysilia Buti, F. Yudhi Priyo Amboro, and Rufinus Hotmaulana Hutauruk. "Perbandingan Perlindungan Hukum Terkait Data Pribadi di Indonesia dan Jerman." AL-MANHAJ: Jurnal Hukum dan Pranata Sosial Islam 4, no. 2 (2022): 207–18. http://dx.doi.org/10.37680/almanhaj.v4i2.1791.
Full textRahmah, Siti, Darmiwati, and Fitri Wahyuni. "Perlindungan Hukum Terhadap Data Pribadi di Era Big Data." Jurnal Indragiri Penelitian Multidisiplin 4, no. 3 (2024): 43–50. https://doi.org/10.58707/jipm.v4i3.1043.
Full textLestari, Yuliannova, and M. Misbahul Mujib. "Optimizing Personal Data Protection Legal Framework in Indonesia (a Comparative Law Study)." Supremasi Hukum: Jurnal Kajian Ilmu Hukum 11, no. 2 (2022): 203. http://dx.doi.org/10.14421/sh.v11i2.2729.
Full textPusztahelyi, Réka, and Ibolya Stefán. "Household Social Robots − Special Issues Relating to Data Protection." Acta Universitatis Sapientiae, Legal Studies 11, no. 1 (2022): 95–118. http://dx.doi.org/10.47745/ausleg.2022.11.1.06.
Full textNovikov, Petr Aleksandrovich. "Improving the mechanism of protection of a special category of personal data." Право и политика, no. 2 (February 2025): 65–77. https://doi.org/10.7256/2454-0706.2025.2.73265.
Full textHidayah, Ardhiana, and Marsitiningsih Marsitiningsih. "Aspek Hukum Perlindungan Data Konsumen E-Commerce." Kosmik Hukum 20, no. 1 (2020): 56. http://dx.doi.org/10.30595/kosmikhukum.v20i1.8251.
Full textSmyr, Daria, and Ekaterina Ulianova. "Legal Issues of Children’s Personal Data Protection." Open Journal for Legal Studies 5, no. 1 (2022): 1–10. http://dx.doi.org/10.32591/coas.ojls.0501.01001s.
Full textBissaliyev, Marlen Sakenovich, and Karimzhan Nurumovich Shakirov. "SONAL DATA OF LEGAL ENTITIES AS A POTENTIAL SPECIAL OBJECT OF LEGAL PROTECTION IN CYBERSPACE." Bulletin of the Institute of Legislation and Legal Information of the Republic of Kazakhstan 2, no. 73 (2023): 42–52. http://dx.doi.org/10.52026/2788-5291_2023_73_2_42.
Full textBogosavljević, Mirjana. "Protection of Personal Data in Documents: Application of the Law on Personal Data Protection in Serbia and Abroad." Moderna arhivistika 2, no. 1 (2019): 106–15. http://dx.doi.org/10.54356/ma/2019/ghkv7413.
Full textHarahap, Muhammad Anwar Natama, and Harisman Harisman. "UNESCO'S ROLE REGARDING THE PROTECTION OF CULTURAL OBJECTS RECEIVING SPECIAL PROTECTION." Legal Standing : Jurnal Ilmu Hukum 8, no. 2 (2024): 431–43. http://dx.doi.org/10.24269/ls.v8i2.9490.
Full textFang, Ze Nan, Jian Ming Zhou, and Jing Song Zhang. "A Practical Data Security Protection Technology." Advanced Materials Research 846-847 (November 2013): 1620–23. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1620.
Full textShaoxue, Jia. "The Administrative Law Protection of Personal Data in China: Issues and Solutions." Administrative law and procedure 12 (December 10, 2020): 64–68. http://dx.doi.org/10.18572/2071-1166-2020-12-64-68.
Full textLynskey, Orla. "Grappling with “Data Power”: Normative Nudges from Data Protection and Privacy." Theoretical Inquiries in Law 20, no. 1 (2019): 189–220. http://dx.doi.org/10.1515/til-2019-0007.
Full textYEMELIANENKO, Karim, and Oleksandr BRYHINETS. "Legal regulation of protection personal data in a special period." Economics. Finances. Law 6/2024, no. - (2024): 72–74. http://dx.doi.org/10.37634/efp.2024.6.15.
Full textSonia Nath. "Cross-Border Data Transfer Under Indian Data Protection Regimes With Special Reference To The Digital Personal Data Protection Act, 2023." Journal of Information Systems Engineering and Management 10, no. 3 (2025): 601–20. https://doi.org/10.52783/jisem.v10i3.5949.
Full textDresch, Rafael de Freitas Valle, and José Luiz de Moura Faleiros Júnior. "Special strict civil liability in Brazil's General Data Protection Law." Brazilian Journal of Law, Technology and Innovation 2, no. 2 (2025): 98–128. https://doi.org/10.59224/bjlti.v2i2.98-128.
Full textOgiela, Lidia, Marek R. Ogiela, and Hoon Ko. "Intelligent Data Management and Security in Cloud Computing." Sensors 20, no. 12 (2020): 3458. http://dx.doi.org/10.3390/s20123458.
Full textNi, Pin. "Research on Legal Protection of Minors' Data in Digital Age." International Journal of Education and Humanities 8, no. 3 (2023): 53–56. http://dx.doi.org/10.54097/ijeh.v8i3.8319.
Full textDelacroix, D., J. P. Guerre, P. Leblanc, and C. Hickman. "Radionuclide and Radiation Protection Data Handbook (2002) (2nd Edition, 2002): Special Issue: Radiation Protection Dosimetry." International Journal of Radioactive Materials Transport 14, no. 1 (2003): 77. http://dx.doi.org/10.1179/rmt.2003.14.1.77.
Full textComandè, Giovanni, and Giulia Schneider. "Regulatory Challenges of Data Mining Practices: The Case of the Never-ending Lifecycles of ‘Health Data’." European Journal of Health Law 25, no. 3 (2018): 284–307. http://dx.doi.org/10.1163/15718093-12520368.
Full textPakpahan, Elvira Fitriyani, Lionel Ricky Chandra, and Ananta Aria Dewa. "PERLINDUNGAN HUKUM TERHADAP DATA PRIBADI DALAM INDUSTRI FINANCIAL TECHNOLOGY." Veritas et Justitia 6, no. 2 (2020): 298–323. http://dx.doi.org/10.25123/vej.3778.
Full textDir, I. Yu. "Special institutions of the European Union." Analytical and Comparative Jurisprudence, no. 3 (July 22, 2024): 584–88. http://dx.doi.org/10.24144/2788-6018.2024.03.99.
Full textKovačević, Zoran, and Aida Šeta Čavčić. "PROTECTION AND TRANSFER OF SECRET DATA IN BOSNIA AND HERZEGOVINA WITH A FOCUS ON INTERNATIONAL OPERATIONAL POLICE COOPERATION." Zaštita i sigurnost 1, no. 7 (2024): 1–28. http://dx.doi.org/10.70329/2744-2403.2024.1.7.1.
Full textKuźnicka-Błaszkowska, Dominika. "Protecting Children’s Personal Data under General Data Protection Regulation and California Consumer Privacy Act in Relation to Information Society Services – European Perspective." Przegląd Prawa Konstytucyjnego 70, no. 6 (2022): 487–98. http://dx.doi.org/10.15804/ppk.2022.06.36.
Full textAyu Silvi, Ferina Widyawati, and Anom Wahyu Asmorojati. "The urgency of establishing a special agency of personal data protection and supervision to ensure the Indonesian citizens’ privacy rights." Borobudur Law Review 4, no. 2 (2022): 110–22. http://dx.doi.org/10.31603/burrev.7184.
Full textNgompat, Yohanes Leonardus, and Mary Grace Megumi Maran. "LEGAL DEVELOPMENT AND URGENCY OF PERSONAL DATA PROTECTION IN INDONESIA." JILPR Journal Indonesia Law and Policy Review 5, no. 3 (2024): 627–35. http://dx.doi.org/10.56371/jirpl.v5i3.284.
Full textSasea, Enny Martha, and Alice Ance Bonggoibo. "Social Justice and Human Rights: Legal Protection of Indigenous Papuan Labour in The Framework of Papua's Special Autonomy." International Journal of Religion 5, no. 11 (2024): 5604–13. http://dx.doi.org/10.61707/t5rcg793.
Full textSpitsyna, Hanna, Anton Polianskyi, and Yuliia Khlystun. "Regarding the Issue of Personal data Protection of Employees in Conditions of Digital Transformation." Archives of Criminology and Forensic Sciences 6, no. 2 (2021): 45–52. http://dx.doi.org/10.32353/acfs.6.2022.02.
Full textRapajić, Milan, and Dejan Logarušić. "Special ombudsmen with reference to the position of the Commissioner for Information of Public Importance and Protection of Personal Data." Pravo - teorija i praksa 41, no. 4 (2024): 82–101. https://doi.org/10.5937/ptp2404082r.
Full textHajnal, Zsolt, and Fanni Tóth. "Protection of Children’s Personal Data and Risks Posed by Smart Toys." Acta Universitatis Sapientiae, Legal Studies 12, no. 1 (2023): 43–59. https://doi.org/10.47745/ausleg.2023.12.1.04.
Full textCiosek, Ireneusz, Zbigniew Kuźniar, and Magdalena Kempa. "Psychological Methods of Eliciting Statements. Personal Security Versus Data Objectivity." Security Dimensions 26, no. 26 (2018): 116–29. http://dx.doi.org/10.5604/01.3001.0012.7244.
Full textHolubnycha, S. "Excursion service nature protection." Visnyk of the Lviv University. Series Geography 2, no. 43 (2013): 20–25. http://dx.doi.org/10.30970/vgg.2013.43.1660.
Full textSkrop, Adrienn. "DATALEAK: Data Leakage Detection System." MACRo 2015 1, no. 1 (2015): 113–24. http://dx.doi.org/10.1515/macro-2015-0011.
Full textPestana, Helena, Catarina Domingues Domingues David, and Mónica Alexandra Miranda Pereira. "Data Security and Protection in Nursing." Pensar Enfermagem - Revista Científica | Journal of Nursing 28, no. 1 (2024): 82–88. http://dx.doi.org/10.56732/pensarenf.v28i1.322.
Full textNešić, Ana. "Data protection about children on the Internet." Savremene studije bezbednosti, no. 1 (2023): 29–48. http://dx.doi.org/10.5937/ssb202301029n.
Full textShen, Jian, Jun Shen, Chin-Feng Lai, Qi Liu, and Tianqi Zhou. "Cloud Based Data Protection in Anonymously Controlled SDN." Security and Communication Networks 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/9845426.
Full textSetiawati, Diana, Tyas Permata Dewi, and Zulfiana Ayu Astutik. "Personal Data Protection Vulnerabilities In Cybercrime Sniffing Bank Account Break-Ins." Yurispruden: Jurnal Fakultas Hukum Universitas Islam Malang 7, no. 2 (2024): 184–99. http://dx.doi.org/10.33474/yur.v7i2.21184.
Full textO. E., Rubtsov, Norkina A. N., and Chicherov K.A. "Information Protection Tools for Android-based Mobile Devices." KnE Social Sciences 3, no. 2 (2018): 235. http://dx.doi.org/10.18502/kss.v3i2.1548.
Full textSamahalska, Y. "Personal data protection in the Internet." Uzhhorod National University Herald. Series: Law 2, no. 82 (2024): 259–63. http://dx.doi.org/10.24144/2307-3322.2024.82.2.41.
Full textHasnati, Hasnati, and Puti Mayang Seruni. "Consumer’s Personal Data Protection in the Digital Era." Jurnal Ius Constituendum 9, no. 1 (2024): 20–35. https://doi.org/10.26623/jic.v9i1.8061.
Full textPor, Lip Yee, Jing Yang, Chin Soon Ku, and Abdullah Ayub Khan. "Special Issue on Cryptography and Information Security." Applied Sciences 13, no. 10 (2023): 6042. http://dx.doi.org/10.3390/app13106042.
Full textSaraswati, Rika, Petrus Soerjowinoto, and Emanuel Boputra. "PERLINDUNGAN HUKUM KHUSUS BAGI ANAK DALAM MASA PANDEMI COVID-19 OLEH DP3A KOTA SEMARANG." Jurnal Jendela Hukum 10, no. 1 (2023): 1–22. http://dx.doi.org/10.24929/jjh.v10i1.2433.
Full textKlyukina, Dina V., and Fedor K. Romanov. "Blockchain technology as a means of protecting personal data." Vestnik BIST (Bashkir Institute of Social Technologies), no. 1(62) (March 29, 2024): 11–16. http://dx.doi.org/10.47598/2078-9025-2024-1-62-11-16.
Full textNurhasanah, Nurhasanah, and Indra Rahmatullah. "Financial Technology and the Legal Protection of Personal Data: The Case of Malaysia and Indonesia." Al-Risalah: Forum Kajian Hukum dan Sosial Kemasyarakatan 20, no. 2 (2020): 197–214. http://dx.doi.org/10.30631/alrisalah.v20i2.602.
Full textNurhasanah, Nurhasanah, and Indra Rahmatullah. "Financial Technology and the Legal Protection of Personal Data: The Case of Malaysia and Indonesia." Al-Risalah 20, no. 2 (2020): 197–214. http://dx.doi.org/10.30631/al-risalah.v20i2.602.
Full textFlint, Jason. "Do Social Media Platforms Always Use Personal Data Lawfully?" Global Privacy Law Review 2, Issue 3 (2021): 212–18. http://dx.doi.org/10.54648/gplr2021026.
Full textFriedewald, M., and S. Gutwirth. "Introduction to special section: Governing privacy and data protection issues of emerging technologies." Science and Public Policy 40, no. 6 (2013): 705–7. http://dx.doi.org/10.1093/scipol/sct094.
Full textEliantonio, Mariolina. "International Personal Data Transfers and Effective Redress: Concluding Remarks." Review of European Administrative Law 16, no. 1 (2023): 103–8. http://dx.doi.org/10.7590/187479823x16800083010301.
Full textMohiqi, Mohammad Mustafa. "Personal Data Protection in the Iranian Legal System." Journal of Politics and Law 16, no. 3 (2023): 10. http://dx.doi.org/10.5539/jpl.v16n3p10.
Full textChudzikiewicz, Jan, and Janusz Furtak. "Cryptographic Protection of Removable Media with a USB Interface for Secure Workstation for Special Applications." Journal of Telecommunications and Information Technology, no. 3 (September 30, 2012): 22–31. http://dx.doi.org/10.26636/jtit.2012.3.1275.
Full text