Artykuły w czasopismach na temat „Privacy practices”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Privacy practices”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Smith, H. Jeff. "Privacy policies and practices." Communications of the ACM 36, no. 12 (December 1993): 104–22. http://dx.doi.org/10.1145/163298.163349.
Pełny tekst źródłaPaasche-Orlow, Michael K., Dan M. Jacob, and Joshua N. Powell. "Notices of Privacy Practices." Medical Care 43, no. 6 (June 2005): 558–64. http://dx.doi.org/10.1097/01.mlr.0000163646.90393.e4.
Pełny tekst źródłaSchlueter, John P. "Private Practices." Nineteenth-Century Literature 66, no. 3 (December 1, 2011): 283–306. http://dx.doi.org/10.1525/ncl.2011.66.3.283.
Pełny tekst źródłaHsu, Chiung‐wen (Julia). "Privacy concerns, privacy practices and web site categories." Online Information Review 30, no. 5 (September 2006): 569–86. http://dx.doi.org/10.1108/14684520610706433.
Pełny tekst źródłaToy, Alan, David Lau, David Hay, and Gehan Gunasekara. "The views of privacy auditors regarding standards and methodologies." Meditari Accountancy Research 27, no. 3 (June 3, 2019): 366–98. http://dx.doi.org/10.1108/medar-07-2018-0367.
Pełny tekst źródłaMensch, Scott E., and LeAnn Wilkie. "Smart Phone Security Practices." International Journal of Cyber Behavior, Psychology and Learning 9, no. 3 (July 2019): 1–14. http://dx.doi.org/10.4018/ijcbpl.2019070101.
Pełny tekst źródłaHan, Ye, and T. Selwyn Ellis. "A Study of User Continuance Behavioral Intentions Toward Privacy-Protection Practices." Information Resources Management Journal 31, no. 2 (April 2018): 24–46. http://dx.doi.org/10.4018/irmj.2018040102.
Pełny tekst źródłaHope, Joan. "Follow best practices for transparency about student privacy practices." Disability Compliance for Higher Education 20, no. 9 (March 17, 2015): 9. http://dx.doi.org/10.1002/dhe.30049.
Pełny tekst źródłaCohen, Julie E. "Turning Privacy Inside Out." Theoretical Inquiries in Law 20, no. 1 (March 16, 2019): 1–31. http://dx.doi.org/10.1515/til-2019-0002.
Pełny tekst źródłaCulnan, Mary J., and Thomas J. Carlin. "Online privacy practices in higher education." Communications of the ACM 52, no. 3 (March 2009): 126–30. http://dx.doi.org/10.1145/1467247.1467277.
Pełny tekst źródłaLauer, Thomas W., and Xiaodong Deng. "Building online trust through privacy practices." International Journal of Information Security 6, no. 5 (July 3, 2007): 323–31. http://dx.doi.org/10.1007/s10207-007-0028-8.
Pełny tekst źródłaNORD, CATHARINA. "Architectural space as a moulding factor of care practices and resident privacy in assisted living." Ageing and Society 31, no. 6 (March 14, 2011): 934–52. http://dx.doi.org/10.1017/s0144686x10001248.
Pełny tekst źródłaCharlesworth, Andrew J. "Privacy, Personal Information and Employment." Surveillance & Society 1, no. 2 (September 1, 2002): 217–22. http://dx.doi.org/10.24908/ss.v1i2.3355.
Pełny tekst źródłaCoppens, Paulien, Carina Veeckman, and Laurence Claeys. "Privacy in location-based social networks: privacy scripts & user practices." Journal of Location Based Services 9, no. 1 (January 2, 2015): 1–15. http://dx.doi.org/10.1080/17489725.2015.1017015.
Pełny tekst źródłaBurton, Julian. "Privacy on their terms." Canadian Journal of Children's Rights / Revue canadienne des droits des enfants 5, no. 1 (November 9, 2018): 150–72. http://dx.doi.org/10.22215/cjcr.v5i1.1256.
Pełny tekst źródłaCharbonneau, Deborah H. "Privacy Practices of Health Social Networking Sites." CIN: Computers, Informatics, Nursing 34, no. 8 (August 2016): 355–59. http://dx.doi.org/10.1097/cin.0000000000000249.
Pełny tekst źródłaPfleeger, S. L., and C. P. Pfleeger. "Harmonizing privacy with security principles and practices." IBM Journal of Research and Development 53, no. 2 (March 2009): 6:1–6:12. http://dx.doi.org/10.1147/jrd.2009.5429048.
Pełny tekst źródłaMartin, David M., Richard M. Smith, Michael Brittain, Ivan Fetch, and Hailin Wu. "The privacy practices of Web browser extensions." Communications of the ACM 44, no. 2 (February 2001): 45–50. http://dx.doi.org/10.1145/359205.359226.
Pełny tekst źródłaJin, Haojian, Hong Shen, Mayank Jain, Swarun Kumar, and Jason I. Hong. "Lean Privacy Review: Collecting Users’ Privacy Concerns of Data Practices at a Low Cost." ACM Transactions on Computer-Human Interaction 28, no. 5 (October 31, 2021): 1–55. http://dx.doi.org/10.1145/3463910.
Pełny tekst źródłaHartman-Caverly, Sarah, and Alexandria Chisholm. "Privacy literacy instruction practices in academic libraries: Past, present, and possibilities." IFLA Journal 46, no. 4 (August 28, 2020): 305–27. http://dx.doi.org/10.1177/0340035220956804.
Pełny tekst źródłaChen, Wenhong, Gejun Huang, Joshua Miller, Kye-Hyoung Lee, Daniel Mauro, Bryan Stephens, and Xiaoqian Li. "“As We Grow, It Will Become a Priority”: American Mobile Start-Ups’ Privacy Practices." American Behavioral Scientist 62, no. 10 (July 12, 2018): 1338–55. http://dx.doi.org/10.1177/0002764218787867.
Pełny tekst źródłaCulnan, Mary J. "Protecting Privacy Online: Is Self-Regulation Working?" Journal of Public Policy & Marketing 19, no. 1 (April 2000): 20–26. http://dx.doi.org/10.1509/jppm.19.1.20.16944.
Pełny tekst źródłaMcQuay, Terry, and Ann Cavoukian. "A pragmatic approach to privacy risk optimization: privacy by design for business practices." Identity in the Information Society 3, no. 2 (July 11, 2010): 379–96. http://dx.doi.org/10.1007/s12394-010-0067-6.
Pełny tekst źródłaParsons, Christopher. "Beyond Privacy: Articulating the Broader Harms of Pervasive Mass Surveillance." Media and Communication 3, no. 3 (October 20, 2015): 1–11. http://dx.doi.org/10.17645/mac.v3i3.263.
Pełny tekst źródłaHosseini, Henry, Martin Degeling, Christine Utz, and Thomas Hupperich. "Unifying Privacy Policy Detection." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (July 23, 2021): 480–99. http://dx.doi.org/10.2478/popets-2021-0081.
Pełny tekst źródłaBarbosa, Natã M., Joon S. Park, Yaxing Yao, and Yang Wang. "“What if?” Predicting Individual Users’ Smart Home Privacy Preferences and Their Changes." Proceedings on Privacy Enhancing Technologies 2019, no. 4 (October 1, 2019): 211–31. http://dx.doi.org/10.2478/popets-2019-0066.
Pełny tekst źródłaOdella, Francesca. "Privacy Awareness and the Networking Generation." International Journal of Technoethics 9, no. 1 (January 2018): 51–70. http://dx.doi.org/10.4018/ijt.2018010105.
Pełny tekst źródłaSheehan, Kim Bartel, and Timothy W. Gleason. "Online Privacy: Internet Advertising Practitioners' Knowledge and Practices." Journal of Current Issues & Research in Advertising 23, no. 1 (March 2001): 31–41. http://dx.doi.org/10.1080/10641734.2001.10505112.
Pełny tekst źródłaDowling, Thomas. "Protecting patron privacy: Safe practices for public computers." Technical Services Quarterly 33, no. 2 (March 21, 2016): 214–15. http://dx.doi.org/10.1080/07317131.2016.1135018.
Pełny tekst źródłaDewi, Sinta. "Balancing privacy rights and legal enforcement: Indonesian practices." International Journal of Liability and Scientific Enquiry 5, no. 3/4 (2012): 232. http://dx.doi.org/10.1504/ijlse.2012.051961.
Pełny tekst źródłaWeber, R. H. "Privacy management practices in the proposed EU regulation." International Data Privacy Law 4, no. 4 (September 4, 2014): 290–97. http://dx.doi.org/10.1093/idpl/ipu018.
Pełny tekst źródłaSmith, H. Jeff, Sandra J. Milberg, and Sandra J. Burke. "Information Privacy: Measuring Individuals' Concerns about Organizational Practices." MIS Quarterly 20, no. 2 (June 1996): 167. http://dx.doi.org/10.2307/249477.
Pełny tekst źródłaSchellenberg, Kathryn. "Police Information Systems, Information Practices and Individual Privacy." Canadian Public Policy / Analyse de Politiques 23, no. 1 (March 1997): 23. http://dx.doi.org/10.2307/3552129.
Pełny tekst źródłaMillar, Sheila A. "Privacy and security: Best practices for global security." Journal of International Trade Law and Policy 5, no. 1 (May 31, 2006): 36–49. http://dx.doi.org/10.1108/14770020680000539.
Pełny tekst źródłaROTFELD, HERBERT JACK. "Privacy Crimes, Annoyances and Self-Defeating Business Practices." Journal of Consumer Affairs 43, no. 3 (September 2009): 538–42. http://dx.doi.org/10.1111/j.1745-6606.2009.01154.x.
Pełny tekst źródłaWang, Shu-Ching, and Jen-Her Wu. "Proactive privacy practices in transition: Toward ubiquitous services." Information & Management 51, no. 1 (January 2014): 93–103. http://dx.doi.org/10.1016/j.im.2013.09.005.
Pełny tekst źródłaKaryda, Maria, Stefanos Gritzalis, Jong Hyuk Park, and Spyros Kokolakis. "Privacy and fair information practices in ubiquitous environments." Internet Research 19, no. 2 (April 3, 2009): 194–208. http://dx.doi.org/10.1108/10662240910952346.
Pełny tekst źródłaSchwaig, Kathy Stewart, Gerald C. Kane, and Veda C. Storey. "Privacy, fair information practices and the fortune 500." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 36, no. 1 (February 7, 2005): 49–63. http://dx.doi.org/10.1145/1047070.1047075.
Pełny tekst źródłaBui, Duc, Kang G. Shin, Jong-Min Choi, and Junbum Shin. "Automated Extraction and Presentation of Data Practices in Privacy Policies." Proceedings on Privacy Enhancing Technologies 2021, no. 2 (January 29, 2021): 88–110. http://dx.doi.org/10.2478/popets-2021-0019.
Pełny tekst źródłaLaMonica, Haley M., Anna E. Roberts, Grace Yeeun Lee, Tracey A. Davenport, and Ian B. Hickie. "Privacy Practices of Health Information Technologies: Privacy Policy Risk Assessment Study and Proposed Guidelines." Journal of Medical Internet Research 23, no. 9 (September 16, 2021): e26317. http://dx.doi.org/10.2196/26317.
Pełny tekst źródłaShipp, Laura, and Jorge Blasco. "How private is your period?: A systematic analysis of menstrual app privacy policies." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (October 1, 2020): 491–510. http://dx.doi.org/10.2478/popets-2020-0083.
Pełny tekst źródłaHollenbaugh, Erin E. "Privacy Management Among Social Media Natives: An Exploratory Study of Facebook and Snapchat." Social Media + Society 5, no. 3 (April 2019): 205630511985514. http://dx.doi.org/10.1177/2056305119855144.
Pełny tekst źródłaKönig, Katharina, and Florence Oloff. "Mobile Medienpraktiken im Spannungsfeld von Öffentlichkeit, Privatheit und Anonymität." Journal für Medienlinguistik 2, no. 2 (September 27, 2019): 1–27. http://dx.doi.org/10.21248/jfml.2019.9.
Pełny tekst źródłaKönig, Katharina, and Florence Oloff. "Mobile Medienpraktiken im Spannungsfeld von Öffentlichkeit, Privatheit und Anonymität." Journal für Medienlinguistik 2, no. 2 (September 27, 2019): 1–27. http://dx.doi.org/10.21248/jfml.2019.9.
Pełny tekst źródłaKitsos, Panagiotis, and Aikaterini Yannoukakou. "Privacy in the 21st Century." International Journal of E-Politics 4, no. 3 (July 2013): 15–29. http://dx.doi.org/10.4018/jep.2013070102.
Pełny tekst źródłaAdorjan, Michael, and Rosemary Ricciardelli. "A New Privacy Paradox? Youth Agentic Practices of Privacy Management Despite “Nothing to Hide” Online." Canadian Review of Sociology/Revue canadienne de sociologie 56, no. 1 (January 15, 2019): 8–29. http://dx.doi.org/10.1111/cars.12227.
Pełny tekst źródłaBarhamgi, Mahmoud, Arosha K. Bandara, Yijun Yu, Khalid Belhajjame, and Bashar Nuseibeh. "Protecting Privacy in the Cloud: Current Practices, Future Directions." Computer 49, no. 2 (February 2016): 68–72. http://dx.doi.org/10.1109/mc.2016.59.
Pełny tekst źródłaDias, Gonçalo Paiva, Hélder Gomes, and André Zúquete. "Privacy policies and practices in Portuguese local e-government." Electronic Government, an International Journal 12, no. 4 (2016): 301. http://dx.doi.org/10.1504/eg.2016.080430.
Pełny tekst źródłaZúquete, André, Gonçalo Paiva Dias, and Hélder Gomes. "Privacy policies and practices in Portuguese local e-government." Electronic Government, an International Journal 12, no. 4 (2016): 301. http://dx.doi.org/10.1504/eg.2016.10001404.
Pełny tekst źródłaKemp, Katharine. "Concealed data practices and competition law: why privacy matters." European Competition Journal 16, no. 2-3 (September 1, 2020): 628–72. http://dx.doi.org/10.1080/17441056.2020.1839228.
Pełny tekst źródła