Letteratura scientifica selezionata sul tema "Sensitive information"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Sensitive information".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Sensitive information"
SIVÁK, Jaroslav. "SENSITIVE INFORMATION." Krízový Manažment 14, no. 1 (March 30, 2015): 23–29. http://dx.doi.org/10.26552/krm.c.2015.1.23-29.
Testo completoNicklisch, Andreas, Kristoffel Grechenig, and Christian Thöni. "Information-sensitive Leviathans." Journal of Public Economics 144 (December 2016): 1–13. http://dx.doi.org/10.1016/j.jpubeco.2016.09.008.
Testo completoPRICE, LINDA L., LAWRENCE F. FEICK, and ROBIN A. HIGIE. "Information Sensitive Consumers and Market Information." Journal of Consumer Affairs 21, no. 2 (December 1987): 328–41. http://dx.doi.org/10.1111/j.1745-6606.1987.tb00206.x.
Testo completoNAWA, Kotaro. "Sensitive, but unclassified information." Journal of Information Processing and Management 48, no. 4 (2005): 243–44. http://dx.doi.org/10.1241/johokanri.48.243.
Testo completoVernon;, D. P. "Sensitive Versus Classified Information." Science 306, no. 5697 (October 29, 2004): 811e—812e. http://dx.doi.org/10.1126/science.306.5697.811e.
Testo completoConley, Sharon. "Keeping Sensitive Information Private." NASNewsletter 22, no. 4 (July 2007): 21. http://dx.doi.org/10.1177/104747570702200407.
Testo completoJaswal, S. K., and T. Harpham. "Getting Sensitive Information on Sensitive Issues: Gynaecological Morbidity." Health Policy and Planning 12, no. 2 (January 1, 1997): 173–78. http://dx.doi.org/10.1093/heapol/12.2.173.
Testo completoBesorai, Ahal. "Tentative Information, Inside Information, Price‐sensitive Information and Materiality." Journal of Financial Crime 3, no. 3 (January 1996): 268–71. http://dx.doi.org/10.1108/eb025719.
Testo completoINAMURA, Tomoaki, and Haruki MADARAME. "ICONE15-10612 Control of Information Relating to Sensitive Nuclear Technology (DRAFT^*)." Proceedings of the International Conference on Nuclear Engineering (ICONE) 2007.15 (2007): _ICONE1510. http://dx.doi.org/10.1299/jsmeicone.2007.15._icone1510_334.
Testo completoSu, Linping, and Zhipeng Liu. "A T-similarity Sensitive Information Protection Method Based on Sensitive Information Gradient Partition." Journal of Physics: Conference Series 2030, no. 1 (September 1, 2021): 012059. http://dx.doi.org/10.1088/1742-6596/2030/1/012059.
Testo completoTesi sul tema "Sensitive information"
De, Cristofaro E. "Sharing sensitive information with privacy." Thesis, University College London (University of London), 2011. http://discovery.ucl.ac.uk/1450712/.
Testo completoAhlqvist, Ola. "Context Sensitive Transformation of Geographic Information." Doctoral thesis, Stockholm : Univ, 2000. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-200.
Testo completoForti, Cristiano Augusto Borges. "Bank dividends and signaling to information-sensitive depositors." reponame:Repositório Institucional do FGV, 2012. http://hdl.handle.net/10438/10518.
Testo completoKacem, Sahraoui Ameni. "Personalized information retrieval based on time-sensitive user profile." Thesis, Toulouse 3, 2017. http://www.theses.fr/2017TOU30111/document.
Testo completoEma, Ismat. "Sensitive Data Migration to the Cloud." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64736.
Testo completoForde, Edward Steven. "Security Strategies for Hosting Sensitive Information in the Commercial Cloud." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3604.
Testo completoTräutlein, Sarah Anna Elisabeth [Verfasser], Peter [Akademischer Betreuer] Buxmann, and Alexander [Akademischer Betreuer] Benlian. "Employees' sensitive information disclosure behavior in enterprise information systems / Sarah Träutlein ; Peter Buxmann, Alexander Benlian." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2017. http://d-nb.info/1149252448/34.
Testo completoTräutlein, Sarah [Verfasser], Peter [Akademischer Betreuer] Buxmann, and Alexander [Akademischer Betreuer] Benlian. "Employees' sensitive information disclosure behavior in enterprise information systems / Sarah Träutlein ; Peter Buxmann, Alexander Benlian." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2017. http://d-nb.info/1149252448/34.
Testo completoLi, Xinfeng. "Time-sensitive Information Communication, Sensing, and Computing in Cyber-Physical Systems." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1397731767.
Testo completoLiu, Yin. "Methodologies, Techniques, and Tools for Understanding and Managing Sensitive Program Information." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/103421.
Testo completoLibri sul tema "Sensitive information"
Hearing on sensitive but not classified information. [Washington, D.C.]: U.S. National Commission on Libraries and Information Science, 1988.
Cerca il testo completoPrime, Terence. Legal protection of commercially sensitive information and trade secrets. Sudbury, Suffolk: Monitor Press Ltd., 1999.
Cerca il testo completoOffice, General Accounting. NASA aeronautics: Protecting sensitive technology : report to Congressional requesters. Washington, D.C: U.S. General Accounting Office, 1993.
Cerca il testo completoUnited States. National Commission on Libraries and Information Science. Hearing on sensitive but not classified information: Library of Congress, Washington, D.C., Thursday, May 28, 1987. [Washington, D.C: U.S.G.P.O., 1988.
Cerca il testo completoIFIP TC8/WG8.3 International Conference on Context-Sensitive Decision Support Systems (1998 Bled, Slovenia). Context sensitive decision support systems: IFIP TC8 / WG8.3 International Conference on Context-Sensitive Decision Support Systems, 13-15 July 1998, Bled, Slovenia. London: Chapman & Hall, 1998.
Cerca il testo completoIntegrity, Victoria Office of Police. Report on the leak of a sensitive Victoria Police information report. Melbourne: Govt. Printer, 2005.
Cerca il testo completoWorld Summit on Information Society Gender Caucus. Towards a gender sensitive information society: The history of World Summit on Information Society Gender Caucus. Johannesburg, South Africa: World Summit on Information Society Gender Caucus, 2005.
Cerca il testo completoUnited States. Dept. of Energy. Office of Audit Services. Audit report: Protection of the Department of Energy's unclassified sensitive electronic information. [Washington, DC]: U.S. Dept. of Energy, Office of Inspector General, 2009.
Cerca il testo completoNew York (State). Office of the State Comptroller. Division of State Services. Metropolitan Transportation Authority, controls over security-sensitive information for the Capital Projects Program. [Albany, NY: Office of the State Comptroller, Division of State Services, 2006.
Cerca il testo completoN, Gibbs John, Lewis Marieke, and Library of Congress. Federal Research Division., eds. Laws and regulations governing the protection of sensitive but unclassified information, a report. Washington, DC: The Division, 2004.
Cerca il testo completoCapitoli di libri sul tema "Sensitive information"
Weik, Martin H. "sensitive information." In Computer Science and Communications Dictionary, 1546. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16956.
Testo completoChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Private Information Sharing Protocols." In Linking Sensitive Data, 81–97. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_4.
Testo completoWitulski, Klaus. "Context Sensitive Knowledge Processing." In Information and Classification, 335–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/978-3-642-50974-2_34.
Testo completoLippitt, Christopher D., and Douglas A. Stow. "Remote Sensing Theory and Time-Sensitive Information." In Time-Sensitive Remote Sensing, 1–10. New York, NY: Springer New York, 2015. http://dx.doi.org/10.1007/978-1-4939-2602-2_1.
Testo completoTang, Xiaoliang, Xing Wang, Di Jia, Weidong Song, and Xiangfu Meng. "Double-Coding Density Sensitive Hashing." In Neural Information Processing, 429–38. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70093-9_45.
Testo completoTaghva, Kazem. "Identification of Sensitive Unclassified Information." In Computational Methods for Counterterrorism, 89–108. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01141-2_6.
Testo completoEne, Cristian, Laurent Mounier, and Marie-Laure Potet. "Output-Sensitive Information Flow Analysis." In Formal Techniques for Distributed Objects, Components, and Systems, 93–110. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21759-4_6.
Testo completoLiu, Panyu, Yangyang Li, Zhiping Cai, and Shuhui Chen. "Discovering New Sensitive Words Based on Sensitive Information Categorization." In Lecture Notes in Computer Science, 338–46. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24274-9_30.
Testo completoBast, Holger, Christian W. Mortensen, and Ingmar Weber. "Output-Sensitive Autocompletion Search." In String Processing and Information Retrieval, 150–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11880561_13.
Testo completoDüzağaç, Remzi, and Olcay Taner Yıldız. "Context Sensitive Search Engine." In Information Sciences and Systems 2014, 277–84. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09465-6_29.
Testo completoAtti di convegni sul tema "Sensitive information"
Jianying, Zhang, Wang Jiamei, Tang Xue, and Zhao Fei. "Sensitive information filtering system." In 3rd International Conference on Green Communications and Networks. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/gcn130521.
Testo completoZhou, Michelle X., Keith Houck, Shimei Pan, James Shaw, Vikram Aggarwal, and Zhen Wen. "Enabling context-sensitive information seeking." In the 11th international conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1111449.1111479.
Testo completoYe, Fei-Yue, Wen-Jing Wang, Jia-Yong Du, Kun Zhang, and Xiang-Feng Luo. "Research on Sensitive Information Discovery." In 2011 International Conference on Computational and Information Sciences (ICCIS). IEEE, 2011. http://dx.doi.org/10.1109/iccis.2011.236.
Testo completoLiu, Yucheng, Lawrence Ong, Phee Lep Yeoh, Parastoo Sadeghi, Joerg Kliewer, and Sarah Johnson. "Information Leakage in Index Coding With Sensitive and Non-Sensitive Messages." In 2022 IEEE International Symposium on Information Theory (ISIT). IEEE, 2022. http://dx.doi.org/10.1109/isit50566.2022.9834747.
Testo completoBryant, Ian. "Factors in sharing sensitive security information." In 2014 Science and Information Conference (SAI). IEEE, 2014. http://dx.doi.org/10.1109/sai.2014.6918243.
Testo completoKaushik, Sona, and Shalini Puri. "An enhanced sensitive information security model." In 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET). IEEE, 2012. http://dx.doi.org/10.1109/icceet.2012.6203910.
Testo completoHussain, Khaled, Naveen Addulla, Sharon Rajan, and Ghada Moussa. "Preventing the capture of sensitive information." In the 43rd annual southeast regional conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1167253.1167291.
Testo completoMacrina, Andrea, and Priyanka A. Parbhoo. "Security Pricing with Information-Sensitive Discounting." In Proceedings of the KIER-TMU International Workshop on Financial Engineering 2009. WORLD SCIENTIFIC, 2010. http://dx.doi.org/10.1142/9789814304078_0006.
Testo completoNoiret, Sophie. "Assessing Algorithmic Fairness without Sensitive Information." In GoodIT '21: Conference on Information Technology for Social Good. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3462203.3475894.
Testo completoRakers, Jason. "Managing professional and personal sensitive information." In the 38th annual fall conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1878335.1878340.
Testo completoRapporti di organizzazioni sul tema "Sensitive information"
Donahue, S. C. A guide to unclassified sensitive information protection. Office of Scientific and Technical Information (OSTI), November 1996. http://dx.doi.org/10.2172/645491.
Testo completoSmith, Julie A. Risk Assessment Methodology for EDI Unclassified/Sensitive Information Systems. Fort Belvoir, VA: Defense Technical Information Center, May 1993. http://dx.doi.org/10.21236/ada268676.
Testo completoHudson-Vitale, Cynthia, and Katherine Klosek. Issue Brief: New US Federal Compliance Rules for Sensitive Information. Association of Research Libraries, May 2021. http://dx.doi.org/10.29242/brief.sensitiveinfo2021.
Testo completoKang, Myong, Steven Pieper, Jeremy Smith, and Allen Yeh. The Protections of Bilaterally Sensitive Information on a Restricted Multilateral Network. Fort Belvoir, VA: Defense Technical Information Center, October 2007. http://dx.doi.org/10.21236/ada473751.
Testo completoJarman, Kenneth D., Benjamin S. McDonald, Sean M. Robinson, Andrew J. Gilbert, Timothy A. White, W. Karl Pitts, Alex C. Misner, and Allen Seifert. Low-Intrusion Techniques and Sensitive Information Management for Warhead Counting and Verification: FY2012 Annual Report. Office of Scientific and Technical Information (OSTI), November 2012. http://dx.doi.org/10.2172/1072911.
Testo completoJarman, Kenneth D., Sean M. Robinson, Benjamin S. McDonald, Andrew J. Gilbert, Alex C. Misner, W. Karl Pitts, Timothy A. White, Allen Seifert, and Erin A. Miller. Low-Intrusion Techniques and Sensitive Information Management for Warhead Counting and Verification: FY2011 Annual Report. Office of Scientific and Technical Information (OSTI), September 2011. http://dx.doi.org/10.2172/1031988.
Testo completoOstoja, Steven, Tapan Pathak, Katherine Jarvis-Shean, Mark Battany, and George Zhuang. Adapt - On-farm changes in the face of climate change: NRCS Area 3. USDA California Climate Hub, April 2018. http://dx.doi.org/10.32747/2018.7444387.ch.
Testo completoOstoja, Steven, Tapan Pathak, Katherine Jarvis-Shean, and Mark Battany. Adapt - On-farm changes in the face of climate change: NRCS Area 1. USDA California Climate Hub, April 2018. http://dx.doi.org/10.32747/2018.7444389.ch.
Testo completoOstoja, Steven, Tapan Pathak, Andre S. Biscaro, and Mark Battany. Adapt - On-farm changes in the face of climate change: NRCS area 4. USDA California Climate Hub, April 2018. http://dx.doi.org/10.32747/2018.7435379.ch.
Testo completoOstoja, Steven, Tapan Pathak, Katherine Jarvis-Shean, Mark Battany, and Andre S. Biscaro. Adapt - On-farm changes in the face of climate change: NRCS Area 2. USDA California Climate Hub, April 2018. http://dx.doi.org/10.32747/2018.7444388.ch.
Testo completo