Gotowa bibliografia na temat „Privacy practices”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Privacy practices”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Privacy practices"
Smith, H. Jeff. "Privacy policies and practices." Communications of the ACM 36, no. 12 (December 1993): 104–22. http://dx.doi.org/10.1145/163298.163349.
Pełny tekst źródłaPaasche-Orlow, Michael K., Dan M. Jacob, and Joshua N. Powell. "Notices of Privacy Practices." Medical Care 43, no. 6 (June 2005): 558–64. http://dx.doi.org/10.1097/01.mlr.0000163646.90393.e4.
Pełny tekst źródłaSchlueter, John P. "Private Practices." Nineteenth-Century Literature 66, no. 3 (December 1, 2011): 283–306. http://dx.doi.org/10.1525/ncl.2011.66.3.283.
Pełny tekst źródłaHsu, Chiung‐wen (Julia). "Privacy concerns, privacy practices and web site categories." Online Information Review 30, no. 5 (September 2006): 569–86. http://dx.doi.org/10.1108/14684520610706433.
Pełny tekst źródłaToy, Alan, David Lau, David Hay, and Gehan Gunasekara. "The views of privacy auditors regarding standards and methodologies." Meditari Accountancy Research 27, no. 3 (June 3, 2019): 366–98. http://dx.doi.org/10.1108/medar-07-2018-0367.
Pełny tekst źródłaMensch, Scott E., and LeAnn Wilkie. "Smart Phone Security Practices." International Journal of Cyber Behavior, Psychology and Learning 9, no. 3 (July 2019): 1–14. http://dx.doi.org/10.4018/ijcbpl.2019070101.
Pełny tekst źródłaHan, Ye, and T. Selwyn Ellis. "A Study of User Continuance Behavioral Intentions Toward Privacy-Protection Practices." Information Resources Management Journal 31, no. 2 (April 2018): 24–46. http://dx.doi.org/10.4018/irmj.2018040102.
Pełny tekst źródłaHope, Joan. "Follow best practices for transparency about student privacy practices." Disability Compliance for Higher Education 20, no. 9 (March 17, 2015): 9. http://dx.doi.org/10.1002/dhe.30049.
Pełny tekst źródłaCohen, Julie E. "Turning Privacy Inside Out." Theoretical Inquiries in Law 20, no. 1 (March 16, 2019): 1–31. http://dx.doi.org/10.1515/til-2019-0002.
Pełny tekst źródłaCulnan, Mary J., and Thomas J. Carlin. "Online privacy practices in higher education." Communications of the ACM 52, no. 3 (March 2009): 126–30. http://dx.doi.org/10.1145/1467247.1467277.
Pełny tekst źródłaRozprawy doktorskie na temat "Privacy practices"
Lee, Songho. "Current practices for DNS Privacy : Protection towards pervasive surveillance." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-85621.
Pełny tekst źródłaAndersen, Adelina. "Exploring Security and Privacy Practices of Home IoT Users." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-303002.
Pełny tekst źródłaLysyk, Mary C. "Practices for Protecting Privacy in Health Research: Perspectives of the Public, Privacy Guidance Documents and REBs." Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31093.
Pełny tekst źródłaGhiami-Mirhosaini, Roozbeh. "Information privacy, an exploratory survey of concerns about organisational practices." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape2/PQDD_0016/MQ48484.pdf.
Pełny tekst źródłaGhiami-Mirhosaini, Roozbeh Carleton University Dissertation Management Studies. "Information privacy: an exploratory survey of concerns about organizational practices." Ottawa, 2000.
Znajdź pełny tekst źródłaGandarillas, Carlos. "The impact of web site design and privacy practices on trust." FIU Digital Commons, 2002. http://digitalcommons.fiu.edu/etd/3448.
Pełny tekst źródłaVisser, Diane. "A study on database marketing practices that raise consumer privacy concern : a proposed model for regulating database marketing practices in South Africa." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52711.
Pełny tekst źródłaPapoutsi, Chrysanthi. "Reconfiguring privacy and confidentiality practices : a case study of technological integration in HIV health services." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:265ff900-72cd-4ec7-bc95-8717d9640240.
Pełny tekst źródłaSeveri, Claudia. "Privacy e protezione dei dati personali: il nuovo regolamento europeo e best practices per un sito web." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019.
Znajdź pełny tekst źródłaBrown, Shonda Dellena. "An Information Privacy Examination of the Practices of Pharmaceutical Companies Regarding Use of Information Collected Through Their Websites." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/47.
Pełny tekst źródłaKsiążki na temat "Privacy practices"
Data Security Council of India. DSCI privacy framework: Best practices. New Delhi: Data Security Council of India, 2010.
Znajdź pełny tekst źródłaGrumbling, Emily, ed. Privacy Research and Best Practices. Washington, D.C.: National Academies Press, 2016. http://dx.doi.org/10.17226/21879.
Pełny tekst źródłaProtecting patron privacy: Safe practices for public computers. Santa Barbara, California: Libraries Unlimited, An Imprint of ABC-CLIO, LLC, 2015.
Znajdź pełny tekst źródłaR, Elden Charles, ed. Wireless security and privacy: Best practices and design techniques. Boston: Addison-Wesley, 2003.
Znajdź pełny tekst źródłaWakulowsky, Lydia. Personal Health Information Protection Act: Implementing best privacy practices. 2nd ed. Markham, Ont: LexisNexis Canada, 2011.
Znajdź pełny tekst źródłaEzor, Jonathan. Privacy and data protection in business: Laws and practices. New Providence, NJ: LexisNexis, 2012.
Znajdź pełny tekst źródłaMilne, George R. A business perspective on database marketing and consumer privacy practices. Cambridge, Mass: Marketing Science Institute, 1998.
Znajdź pełny tekst źródłaGauthronet, Serge. Practices to implement the OECD privacy guidelines on global networks. Paris, France: OECD, 1998.
Znajdź pełny tekst źródłaMilne, George R. A business perspective on database marketing and consumer privacy practices. Cambridge, Mass: Marketing Science Institute, 1998.
Znajdź pełny tekst źródłaInternet and wireless privacy: A legal guide to global business practices. Toronto: CCH Canada, 2003.
Znajdź pełny tekst źródłaCzęści książek na temat "Privacy practices"
Schmidt, Jan-Hinrik. "(Micro)blogs: Practices of Privacy Management." In Privacy Online, 159–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21521-6_12.
Pełny tekst źródłaRaul, Alan Charles. "“Best Practices,” Findings and Recommendations." In Privacy and the Digital State: Balancing Public Information and Personal Privacy, 73–82. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-0889-2_6.
Pełny tekst źródłaDeckter, David, and Jeffrey Fisher. "Security, Controls, and Privacy." In IT Best Practices for Financial Managers, 127–38. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119198819.ch9.
Pełny tekst źródłaKarjoth, Günter, Matthias Schunter, and Michael Waidner. "Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data." In Privacy Enhancing Technologies, 69–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36467-6_6.
Pełny tekst źródłaKalantari, Shirin, Andreas Put, and Bart De Decker. "Trackers in Your Inbox: Criticizing Current Email Tracking Practices." In Privacy Technologies and Policy, 156–67. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-76663-4_9.
Pełny tekst źródłaCavoukian, Ann. "Privacy by Design: Best Practices for Privacy and the Smart Grid." In ISSE 2010 Securing Electronic Business Processes, 260–70. Wiesbaden: Vieweg+Teubner, 2011. http://dx.doi.org/10.1007/978-3-8348-9788-6_25.
Pełny tekst źródłaCoudert, Fanny. "Accountable Surveillance Practices: Is the EU Moving in the Right Direction?" In Privacy Technologies and Policy, 70–85. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-06749-0_5.
Pełny tekst źródłaKobsa, Alfred, and Maximilian Teltzrow. "Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users’ Data Sharing and Purchase Behavior." In Privacy Enhancing Technologies, 329–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11423409_21.
Pełny tekst źródłaDooly, Zeta, Kenny Doyle, and Jamie Power. "Uncovering Innovation Practices and Requirements in Privacy and Cyber Security Organisations: Insights from IPACSO." In Cyber Security and Privacy, 140–50. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25360-2_12.
Pełny tekst źródłaWanka, Anna. "Spaces and practices of privacy in older age." In Räume und Kulturen des Privaten, 85–107. Wiesbaden: Springer Fachmedien Wiesbaden, 2017. http://dx.doi.org/10.1007/978-3-658-14632-0_4.
Pełny tekst źródłaStreszczenia konferencji na temat "Privacy practices"
Coles-Kemp, Lizzie, and Elahe Kani-Zabihi. "Practice Makes Perfect: Motivating Confident Privacy Protection Practices." In 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom). IEEE, 2011. http://dx.doi.org/10.1109/passat/socialcom.2011.51.
Pełny tekst źródłaMurphy, Alison R., Madhu C. Reddy, and Heng Xu. "Privacy practices in collaborative environments." In CSCW'14: Computer Supported Cooperative Work. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2531602.2531643.
Pełny tekst źródłaNotario, Nicolas, Alberto Crespo, Yod-Samuel Martin, Jose M. Del Alamo, Daniel Le Metayer, Thibaud Antignac, Antonio Kung, Inga Kroener, and David Wright. "PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering Methodology." In 2015 IEEE Security and Privacy Workshops (SPW). IEEE, 2015. http://dx.doi.org/10.1109/spw.2015.22.
Pełny tekst źródłaPrasad, Aarathi, Matthew Clark, Ha Nguyen, Ruben Ruiz, and Emily Xiao. "Analyzing Privacy Practices of Existing mHealth Apps." In 13th International Conference on Health Informatics. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009059605630570.
Pełny tekst źródłaAsiri, Fatima, and David Millard. "Unpacking Privacy Practices in SNSs: Users’ Protection Strategies to Enforce Privacy Boundaries." In 2018 21st Saudi Computer Society National Computer Conference (NCC). IEEE, 2018. http://dx.doi.org/10.1109/ncg.2018.8593046.
Pełny tekst źródłaBrandt, Galina. "Interpenetration Phenomenon of Public & Private Aspects in Contemporary Theatrical Practices." In The Public/Private in Modern Civilization, the 22nd Russian Scientific-Practical Conference (with international participation) (Yekaterinburg, April 16-17, 2020). Liberal Arts University – University for Humanities, Yekaterinburg, 2020. http://dx.doi.org/10.35853/ufh-public/private-2020-12.
Pełny tekst źródłaAlqhatani, Abdulmajeed, and Heather Lipford. "Exploring Parents’ Security and Privacy Concerns and Practices." In Workshop on Usable Security. Reston, VA: Internet Society, 2018. http://dx.doi.org/10.14722/usec.2018.23019.
Pełny tekst źródłaPatil, Sameer, and Alfred Kobsa. "Uncovering privacy attitudes and practices in instant messaging." In the 2005 international ACM SIGGROUP conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1099203.1099220.
Pełny tekst źródłaAleyasen, Amirhossein, Oleksii Starov, Alyssa Phung Au, Allan Schiffman, and Jeff Shrager. "On the Privacy Practices of Just Plain Sites." In CCS'15: The 22nd ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2808138.2808140.
Pełny tekst źródłaSharma, Tanusree, Md Mirajul Islam, Anupam Das, S. M. Taiabul Haque, and Syed Ishtiaque Ahmed. "Privacy during Pandemic: A Global View of Privacy Practices around COVID-19 Apps." In COMPASS '21: ACM SIGCAS Conference on Computing and Sustainable Societies. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3460112.3471958.
Pełny tekst źródłaRaporty organizacyjne na temat "Privacy practices"
Youpa, Daniel G., Ralph M. Carney, Martin F. Wiskoff, and John D. Tippit. Review of Private Sector Personnel Screening Practices. Fort Belvoir, VA: Defense Technical Information Center, October 2000. http://dx.doi.org/10.21236/ada384046.
Pełny tekst źródłaBrophy, Daniel. Evaluative styles of clinicians in private practice. Portland State University Library, January 2000. http://dx.doi.org/10.15760/etd.5340.
Pełny tekst źródłaBarnett, Michael, Andrew Olenski, and Adam Sacarny. Common Practice: Spillovers from Medicare on Private Health Care. Cambridge, MA: National Bureau of Economic Research, May 2020. http://dx.doi.org/10.3386/w27270.
Pełny tekst źródłaIllman, Julia, Mikko Halonen, Shelagh Whitley, and Nella Canales Trujillo. Practical Methods for Assessing Private Climate Finance Flows. Nordic Council of Ministers, February 2014. http://dx.doi.org/10.6027/tn2014-506.
Pełny tekst źródłaFrakes, Michael, Jonathan Gruber, and Timothy Justicz. Public and Private Options in Practice: The Military Health System. Cambridge, MA: National Bureau of Economic Research, December 2020. http://dx.doi.org/10.3386/w28256.
Pełny tekst źródłaChetty, Raj, and John Friedman. A Practical Method to Reduce Privacy Loss when Disclosing Statistics Based on Small Samples. Cambridge, MA: National Bureau of Economic Research, March 2019. http://dx.doi.org/10.3386/w25626.
Pełny tekst źródłaKreighbaum, Jay M. Busting DoD Bureaucracy: Creating Fundamental Change by Leveraging Concepts and Practices from the Private Sectors. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada401901.
Pełny tekst źródłaReynolds, Julie C., Susan C. McKernan, Jennifer Michelle Cecelia Sukalski, Brooke McInroy, Peter Damiano, and Raymond Kuthy. Evaluation of the Dental Wellness Plan. Experiences of Private Practice Dentists after Two Years. Iowa City, Iowa: University of Iowa Public Policy Center, July 2017. http://dx.doi.org/10.17077/4u27-r72m.
Pełny tekst źródłaHertz, Jana C., Derick W. Brinkerhoff, Robin Bush, and Petrarca Karetji. Knowledge Systems: Evidence to Policy Concepts in Practice. RTI Press, June 2020. http://dx.doi.org/10.3768/rtipress.2020.pb.0024.2006.
Pełny tekst źródłaOsidoma, Japhet, and Ashiru Mohammed Kinkwa. Creatively Improving Agricultural Practices and Productivity: Pro Resilience Action (PROACT) project, Nigeria. Oxfam, February 2021. http://dx.doi.org/10.21201/2021.7260.
Pełny tekst źródła