Gotowa bibliografia na temat „Data protection”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Data protection”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Data protection"

1

Gama, Cruz. "Data protection and personal data protection." Brazilian Journal of Clinical Medicine and Review 1, Suppl.1 (2023): 18. http://dx.doi.org/10.52600/2965-0968.bjcmr.2023.1.suppl.1.18.

Pełny tekst źródła
Streszczenie:
In Angola, the right to privacy is one of the fundamental rights enshrined in the Constitution of the Republic. In addition to the Constitution, the legal framework on the protection of personal data is complemented by other laws, with regard to the Personal Data Protection Law, No. 22/11 of 17 June, which establishes legal rules for the processing of such data and establishes Data Protection (DPA), as the public authority responsible for monitoring compliance with those rules and exercising. The unequivocal and express consent of the data subject or his legal representative and prior notifica
Style APA, Harvard, Vancouver, ISO itp.
2

Chamberlain, Johanna, and Andreas Kotsios. "Data protection beyond data protection regulation." Stiftelsen Juridisk Fakultetslitteratur, no. 2024 2 (January 17, 2024): 397–424. http://dx.doi.org/10.53292/bd1fa11c.282687ef.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Varsha, Gehlot. "COMPARISON OF DATA PROTECTION LAWS IN INDIA WITH RESPECT TO GDPR." Indian Journal of Law and Society I, no. 8 (2024): 160–77. https://doi.org/10.5281/zenodo.10644661.

Pełny tekst źródła
Streszczenie:
<strong>ABSTRACT</strong> <em>This academic legal analysis compares the General Data Protection Regulation (GDPR) of the European Union with India's Digital Personal Data Protection Act (DPDPA) to determine whether the two pieces of legislation are compatible with one another. As we live in an increasingly digital world where information is freely shared across borders, data protection has become a pressing legal and societal concern. In 2018, the General Data Protection Regulation (GDPR) became law, setting a global standard for stricter data protection procedures with an emphasis on protecti
Style APA, Harvard, Vancouver, ISO itp.
4

Alhababi, Hamad Hamed. "Cross-Border Data Transfer between the gcc Data Protection Laws and the gdpr." Global Journal of Comparative Law 13, no. 2 (2024): 178–200. http://dx.doi.org/10.1163/2211906x-13020003.

Pełny tekst źródła
Streszczenie:
Abstract This article explores the procedures related to data protection laws in the Gulf Cooperation Council States (gcc) and the European Union (EU) regarding the General Data Protection Regulation (gdpr). It draws conclusions about the rules governing the transfer of personal information outside of a country. Transfers of personal data to foreign countries or international organizations are discussed, specifically, transfers based on an ‘adequacy’ judgment, or transfers subject to suitable protections. The article also highlights the primary modifications made to safeguard the outbound tran
Style APA, Harvard, Vancouver, ISO itp.
5

Rahmah, Siti, Darmiwati, and Fitri Wahyuni. "Perlindungan Hukum Terhadap Data Pribadi di Era Big Data." Jurnal Indragiri Penelitian Multidisiplin 4, no. 3 (2024): 43–50. https://doi.org/10.58707/jipm.v4i3.1043.

Pełny tekst źródła
Streszczenie:
The increasingly massive use of information and communication technology has raised concerns about protecting personal data in the era of big data which can harm individuals. Big Data as a form of technological development has not been balanced with developments in legal regulations, so there is no harmony between the use of Big Data and legal regulations related to the protection of personal data. Regulations related to the protection of personal data that already exist in Indonesia cannot guarantee and protect confidentiality and overcome the problem of protecting citizens' personal data. Th
Style APA, Harvard, Vancouver, ISO itp.
6

Walker-Osborn, C., L. Fitzsimons, and J. Ruane. "Data Protection." ITNOW 55, no. 3 (2013): 38–39. http://dx.doi.org/10.1093/itnow/bwt050.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Rowe, Heather, and Robin McGilligan. "DATA PROTECTION." Computer Law & Security Review 17, no. 5 (2001): 333–35. http://dx.doi.org/10.1016/s0267-3649(01)00511-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Dinant, Jean-Marc, and Ewout Keuleers. "Data protection." Computer Law & Security Review 20, no. 1 (2004): 22–28. http://dx.doi.org/10.1016/s0267-3649(04)00005-6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Chalton, Simon. "Data protection." Computer Law & Security Review 13, no. 6 (1997): 425–28. http://dx.doi.org/10.1016/s0267-3649(97)89792-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Sizer, Richard. "Data protection." Computer Law & Security Review 2, no. 5 (1987): 13–15. http://dx.doi.org/10.1016/0267-3649(87)90007-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Data protection"

1

Budd, Chris. "Data Protection and Data Elimination." International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596395.

Pełny tekst źródła
Streszczenie:
ITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NV<br>Data security is becoming increasingly important in all areas of storage. The news services frequently have stories about lost or stolen storage devices and the panic it causes. Data security in an SSD usually involves two components: data protection and data elimination. Data protection includes passwords to protect against unauthorized access and encryption to protect against recovering data fro
Style APA, Harvard, Vancouver, ISO itp.
2

Sebé, Feixas Francesc. "Transparent Protection of Data." Doctoral thesis, Universitat Politècnica de Catalunya, 2003. http://hdl.handle.net/10803/7026.

Pełny tekst źródła
Streszczenie:
Aquesta tesi tracta la protecció de dades quan aquestes han de ser lliurades a usuaris en qui no es té absoluta confiança. En aquesta situació, les dades s'han de protegir de manera que segueixin essent utilitzables. Aquesta protecció ha de ser imperceptible, per tal de no destorbar la utilització correcta de les dades, i alhora efectiva, protegint contra la utilització no autoritzada d'aquestes.<br/>L'estudi es divideix tenint en compte els dos tipus de dades la protecció transparent de les quals s'estudia: continguts multimèdia i microdades estadístiques.<br/><br/>Pel que fa a dades multimèd
Style APA, Harvard, Vancouver, ISO itp.
3

Loukides, Grigorios. "Data utility and privacy protection in data publishing." Thesis, Cardiff University, 2008. http://orca.cf.ac.uk/54743/.

Pełny tekst źródła
Streszczenie:
Data about individuals is being increasingly collected and disseminated for purposes such as business analysis and medical research. This has raised some privacy concerns. In response, a number of techniques have been proposed which attempt to transform data prior to its release so that sensitive information about the individuals contained within it is protected. A:-Anonymisation is one such technique that has attracted much recent attention from the database research community. A:-Anonymisation works by transforming data in such a way that each record is made identical to at least A: 1 other
Style APA, Harvard, Vancouver, ISO itp.
4

Islam, Naveed. "Cryptography based Visual Data Protection." Thesis, Montpellier 2, 2011. http://www.theses.fr/2011MON20178/document.

Pełny tekst źródła
Streszczenie:
La transmission de données multimédia sur les réseaux sécurisés a une croissance exponentielle grâce aux progrès scientifique dans les technologies de l'information et de la communication. La sécurité des données dans certaines applications comme le stockage sécurisé, l'authentification, la protection des droits d'auteurs, la communication militaire ou la visioconférence confidentielles, nécessitent de nouvelles stratégies en matière de transmission sécurisée. Deux techniques sont couramment utilisées pour la transmission sécurisée de données visuelles, à savoir : la cryptographie et la stégan
Style APA, Harvard, Vancouver, ISO itp.
5

Kasneci, Dede. "Data protection law: recent developments." Doctoral thesis, Università degli studi di Trieste, 2010. http://hdl.handle.net/10077/3578.

Pełny tekst źródła
Streszczenie:
2008/2009<br>Privacy and data protection concern everyone and are issue of profound importance around the World. Privacy has been hailed as “an integral part of our humanity” the “hart of our liberty” and “the beginning of all freedoms” (Solove, 2008). Given its importance, privacy is recognized as a fundamental human right according to many International Instruments such as: the United Nations Universal Declaration of Human Rights of 1948 (Article 12), International Covenant on the Civil and Political Rights (Article 17) The European Convention of Human Rights of 1950 (Article 8), the Charter
Style APA, Harvard, Vancouver, ISO itp.
6

Lloyd, Ian J. "Data processing and individual freedom : data protection and beyond." Thesis, University of Strathclyde, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.233213.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Neophytou, Andonis. "Computer security : data control and protection." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834504.

Pełny tekst źródła
Streszczenie:
Computer security is a crucial area for any organization based on electronic devices that process data. The security of the devices themselves and the data they process are the backbone of the organization. Until today there have been no completely secure systems or procedures until and a lot of research is being done in this area. It impossible for a machine or a mechanical procedure to "guess" all possible events and lead to conclusive, cohesive and comprehensive secure systems, because of: 1) the human factor, and 2) acts of nature (fire, flood etc). However, proper managerial control can a
Style APA, Harvard, Vancouver, ISO itp.
8

Pizzolante, Raffaele. "Compression and protection of multidimensional data." Doctoral thesis, Universita degli studi di Salerno, 2015. http://hdl.handle.net/10556/1943.

Pełny tekst źródła
Streszczenie:
2013 - 2014<br>The main objective of this thesis is to explore and discuss novel techniques related to the compression and protection of multidimensional data (i.e., 3-D medical images, hyperspectral images, 3-D microscopy images and 5-D functional Magnetic Resonance Images). First, we outline a lossless compression scheme based on the predictive model, denoted as Medical Images Lossless Compression algorithm (MILC). MILC is characterized to provide a good trade-off between the compression performances and reduced usage of the hardware resources. Since in the medical and medical-relate
Style APA, Harvard, Vancouver, ISO itp.
9

Ng, Chi-kwan Miranda. "A study of the administrative provisions governing personal data protection in the Hong Kong Government." [Hong Kong] : University of Hong Kong, 1987. http://sunzi.lib.hku.hk/hkuto/record.jsp?B12335368.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Pavlovic, Dusan <1981&gt. "Online Gambling in the UE: from Data Protection to Gambler Protection." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amsdottorato.unibo.it/8721/1/PAVLOVIC_DUSAN_tesi.pdf.

Pełny tekst źródła
Streszczenie:
The thesis tends to answer how does the processing of online gamblers’ personal data, which is used for identification and commercial communication purposes, affect the protection of online gamblers in the EU? After the introduction into the context of online gambling in Europe and risks that jeopardize the protection of online gamblers and the concept of responsible gambling, the first part of the thesis sheds light on the relationship between the processing of online gamblers’ data and the provocation of problem gambling. The attention is given to the gambling-related commercial communic
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Książki na temat "Data protection"

1

Judith, Firth, Nickson Susan, Hammond Suddards (Firm), and Chartered Institute of Personnel and Development., eds. Data protection. 2nd ed. Chartered Institute of Personnel and Development, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

(Firm), Hammond Suddards, ed. Data protection. Institute of Personnel and Development, 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Channel, Executive Business, ed. Data protection. Executive Business Channel, 1994.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Association, British Dental. Data protection. British Dental Association, 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Bainbridge, David I. Data protection. CLT Professional Pub., 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Hewage, Chaminda, Lasith Yasakethu, and Dushmantha Nalin K. Jayakody, eds. Data Protection. Springer Nature Switzerland, 2024. https://doi.org/10.1007/978-3-031-76473-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Instruments, Great Britain Statutory. Data protection: The data protection regulations, 1985. H.M.S.O, 1985.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Morgan, Richard. Data protection strategy: Implementing data protection compliance. 2nd ed. Sweet & Maxwell/Thomson Reuters, 2012.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Ruth, Boardman, ed. Data protection strategy: Implementing data protection compliance. Sweet & Maxwell, 2003.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Office, Home. Protecting personal data: The Data Protection Act 1984. Home Office, 1985.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Części książek na temat "Data protection"

1

Finch, John. "Data protection." In Speller’s Law Relating to Hospitals. Springer US, 1994. http://dx.doi.org/10.1007/978-1-4899-7122-7_13.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Toker, Kadir Atilla. "Data Protection." In Encyclopedia of Corporate Social Responsibility. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-28036-8_419.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Hannah, Kathryn J., Marion J. Ball, and Margaret J. A. Edwards. "Data Protection." In Health Informatics. Springer New York, 1999. http://dx.doi.org/10.1007/978-1-4757-3095-1_14.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Islam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_95-1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Islam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_95-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Glasby, Jon, and Helen Dickinson. "Data Protection." In A–Z of Inter-Agency Working. Macmillan Education UK, 2014. http://dx.doi.org/10.1007/978-1-137-00533-5_15.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Lakshmi, Vasantha. "Data Protection." In Beginning Security with Microsoft Technologies. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4853-9_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Frost, Chris. "Data protection." In Privacy and the News Media. Routledge, 2019. http://dx.doi.org/10.4324/9780429029813-10.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Kolb, Marina. "Data Protection." In The European Union and the Council of Europe. Palgrave Macmillan UK, 2013. http://dx.doi.org/10.1057/9781137023636_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Kissoon, Tara. "Data Protection." In Optimal Spending on Cybersecurity Measures. CRC Press, 2024. http://dx.doi.org/10.1201/9781003497523-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Data protection"

1

Tagde, Anand, Pranjali Jibhakate, Yami Pimpalikar, Rahul Agrawal, Chetan Dhule, and Nekita Chavan Morris. "Comprehensive Data Access Protection Suite." In 2025 International Conference on Computational, Communication and Information Technology (ICCCIT). IEEE, 2025. https://doi.org/10.1109/icccit62592.2025.10928082.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Li, Yifeng. "Blockchain transaction data privacy protection scheme." In Fifth International Conference on Computer Communication and Network Security (CCNS 2024), edited by Zhiyong Xiong and Zhaolong Ning. SPIE, 2024. http://dx.doi.org/10.1117/12.3038136.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Wang, Guanyu, Jiaxuan Huang, Hongliu Cai, et al. "Dynamic multidimensional data privacy protection algorithm." In International Conference on Computer Application and Information Security (ICCAIS 2024), edited by Sadiq Ali Safaa, Pandey Hari Mohan, and Boussaid Farid. SPIE, 2025. https://doi.org/10.1117/12.3061152.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Java, Abhinav, Simra Shahid, and Chirag Agarwal. "Towards Operationalizing Right to Data Protection." In Proceedings of the 2025 Conference of the Nations of the Americas Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 1: Long Papers). Association for Computational Linguistics, 2025. https://doi.org/10.18653/v1/2025.naacl-long.416.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Xu, Shouyin, Lingguang Lei, Yuewu Wang, and Heqing Huang. "KPDP: Kernel Permission Data Protection Against Data-Oriented Attacks." In 2024 9th International Conference on Signal and Image Processing (ICSIP). IEEE, 2024. http://dx.doi.org/10.1109/icsip61881.2024.10671512.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Bărbuceanu, Teodor, Razvan Craciunescu, and Eduard Popovici. "Data Protection Device." In 2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). IEEE, 2023. http://dx.doi.org/10.1109/ecai58194.2023.10194205.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Skendzic, A., B. Kovacic, and E. Tijan. "General data protection regulation — Protection of personal data in an organisation." In 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2018. http://dx.doi.org/10.23919/mipro.2018.8400247.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Fotiou, Nikos, George Xylomenos, and Yannis Thomas. "Data integrity protection for data spaces." In EuroSys '24: Nineteenth European Conference on Computer Systems. ACM, 2024. http://dx.doi.org/10.1145/3642974.3652284.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

"TOWARDS DATA PROTECTION COMPLIANCE." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2010. http://dx.doi.org/10.5220/0002981802130216.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Benjamin, Bruce, Joel Coffman, Hadi Esiely-Barrera, et al. "Data Protection in OpenStack." In 2017 IEEE 10th International Conference on Cloud Computing (CLOUD). IEEE, 2017. http://dx.doi.org/10.1109/cloud.2017.77.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Data protection"

1

Souppaya, Murugiah. Data Classification Concepts and Considerations for Improving Data Protection. National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.ir.8496.ipd.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Riyadi, Gliddheo. Data Privacy in the Indonesian Personal Data Protection Legislation. Center for Indonesian Policy Studies, 2021. http://dx.doi.org/10.35497/341482.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Newhouse, Bill. Data Classification Concepts and Considerations for Improving Data Protection. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.cswp.43.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Bandyopadhyay, Subhayu, and Suryadipta Roy. Corruption and Trade Protection: Evidence from Panel Data. Federal Reserve Bank of St. Louis, 2007. http://dx.doi.org/10.20955/wp.2007.022.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Perdana, Arif, and Saru Arifin. Finding a fix for Indonesia’s data protection problems. Edited by Ria Ernunsari. Monash University, 2023. http://dx.doi.org/10.54377/130f-dbb9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Chandramouli, Ramaswamy. A Data Protection Approach for Cloud-Native Applications. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8505.ipd.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Chandramouli, Ramaswamy. A Data Protection Approach for Cloud-Native Applications. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8505.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Nasution, Sri. Improving Data Governance and Personal Data Protection through ASEAN Digital Masterplan 2025. Center for Indonesian Policy Studies, 2021. http://dx.doi.org/10.35497/353777.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Notarianni, Kathy, and William Rinkinen. Protection of data processing equipment with fine water sprays. National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.ir.5514.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Yin, Tianzhixi, Jianming Lian, John Buckheit, and Rui Fan. Bridging Power System Protection Gaps with Data-driven Approaches. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1771797.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!