Suggested Topics within your search.
Suggested Topics within your search.
Law
23
Data protection law
14
Privacy & data protection
11
Computer security
10
Privacy and data protection
10
Media studies
9
Data privacy
7
Data protection
6
Entertainment & media law
6
International law
6
human
6
Copyright law
5
GDPR
5
Information retrieval
5
Artificial intelligence
4
Business & management
4
Computer science
4
Contract law
4
Ethics & moral philosophy
4
IT & Communications law
4
Information technology industries
4
LNQD
4
Network security
4
QA75 Electronic computers. Computer science
4
data protection
4
Arbitration, mediation & alternative dispute resolution
3
Blockchain
3
Communication studies
3
Communications engineering / telecommunications
3
Constitutional & administrative law
3
-
2721by Ching-Hsien Chen, 陳清憲“..., affairs completed on time, personal data protected, behavior and morality that the citizens concern...”
Get full text
Others -
2722by Malipatlolla, Sunil Dath Kumar“... TPMs and lose the data protected by them, if someday a cryptographic engine on the TPM becomes...”
Published 2013
Get full text
Get full text
Others -
2723“... is illustrated using two (key) fragments of the General Data Protect Regulation, namely Articles 6 (Lawfulness...”
Get full text
Others -
2724“... cost or pricing data protects the government’s funding: if a later audit shows pricing deviations...”
Get full text
-
2725“... to perform learning procedures from data disseminated across multiple users, keeping the sensitive data...”
Get full text
Article -
2726by Mohamad Jawhara, Signe Bek Sørensen, Berit Lilienthal Heitmann, Þórhallur Ingi Halldórsson, Andreas Kristian Pedersen, Vibeke Andersen“.... This study is approved by the Danish Ethics Committee (S-20160124) and the Danish Data Protecting Agency...”
Published 2020-06-01
Get full text
Article -
2727by Rumyana Simeonova, Vessela Vitcheva, Magdalena Kondeva-Burdina, Ilina Krasteva, Vassil Manov, Mitka Mitcheva“... in lipid peroxidation. The biochemical changes are in good correlation with the histopathological data...”
Published 2013-01-01
Get full text
Article -
2728“... for data protected by cryptographic devices. Therefore such devices must be tested for resistance...”
Get full text
Article -
2729by Lavallée, Michel Thomas“... and potential for a unified approach, 3) discuss potential methods for storing data, protecting confidentiality...”
Published 2010
Get full text
Others -
2730“... the underlying data protected by the policy. Also, since the policies usually incur linearly increasing...”
Get full text
Article -
2731“... of digital technologies in MENA but also ensure equity of access, transparency of use, data protections...”
Get full text
Article -
2732“...The possible effects of the General Data Protections Regulations (GDPR) have been widely discussed...”
Get full text
Others -
2733“... security and data protections breaches has increased twice during 2015 (Pricewaterhouse Coopers 2015...”
Get full text
Article -
2734“... into four domains: personal data, protective measures (−before patient arrival; −in the waiting room...”
Get full text
Article -
2735by Afshar, Faranak“..., and decision framing influence the decision to invest in data protective technologies in SMEs. Specifically...”
Published 2014
Get full text
Get full text
Others -
2736“... energy, water and raw material conservation in accordance with environmental data, protects the ecosystem...”
Get full text
Article -
2737by Johnson, David Philip“... of improved security practices. Achieving data protections cannot be through technical means alone. Addressing...”
Published 2017
Get full text
Get full text
Others -
2738“... of the individuals, and the rights they should have to disclose or not their personal data, and to have this data...”
Get full text
Article -
2739“... the participation of sensing users and the authenticity of sensing data, protect the users’ data privacy...”
Get full text
Article -
2740by Kvalbein, Susanne“... was assessed in relation to Tanzanian conditions, and to some degree compared with Landscan population data...”
Published 2011
Get full text
Others