Showing 2,521 - 2,540 results of 2,762 for search '"data protection"', query time: 2.44s Refine Results
  1. 2521
  2. 2522
    by Yin-chen Kuo, 郭穎臻
    Published 2007
    ... of insecurity for using new products is due to the sense of insecurity on personal data protection; the greatest...
    Get full text
    Others
  3. 2523
    ... as the systematic technological dimension of copyright laws and personal data protection laws. According...
    Get full text
    Others
  4. 2524
    by Wen-bin Hsieh, 謝文彬
    Published 2013
    ...) sensitive data protection mechanisms in smart phones. First we propose suitable secure authentication...
    Get full text
    Others
  5. 2525
    by Watrin, Lucie
    Published 2016
    ... scientifically based likelihood. Finally, the law intervenes at the stage of data protection, in order...
    Get full text
  6. 2526
    by Olby, Linnea, Thomander, Isabel
    Published 2018
    ...The General Data Protection Regulation enforced on the 25th of may in 2018 is a response...
    Get full text
    Others
  7. 2527
    by Li, Jiatong
    Published 2019
    ... different systems. It is essential to considering data security vulnerabilities and data protection. One...
    Get full text
    Others
  8. 2528
  9. 2529
  10. 2530
  11. 2531
    by Hsieh, Naiwen, 謝乃文
    Published 2013
    ...碩士 === 東吳大學 === 法律學系 === 101 === Neither Computer-Processed Personal Data Protection Law enforced...
    Get full text
    Others
  12. 2532
    ... of mHealth apps associated with organizations’ promotional strategies and personal data protection...
    Get full text
    Article
  13. 2533
    ... importance as (1) several recent regulations such as Europe's General Data Protection Regulation (GDPR) have...
    Get full text
    Article
  14. 2534
    by Hinde , Charles Christopher
    Published 2015
    ... (the European Union issued their Data Protection Directive in 1995), South African legislators have had...
    Get full text
    Dissertation
  15. 2535
    by Paladi, Nicolae
    Published 2012
    .... The protocol relies on the use of Trusted Platform Module (TPM) for key generation and data protection. The TPM...
    Get full text
    Others
  16. 2536
    ... to achieve high‐level data protection security. Herein, robust aggregation‐induced emissive polymeric...
    Get full text
    Article
  17. 2537
  18. 2538
  19. 2539
  20. 2540