Suggested Topics within your search.
Suggested Topics within your search.
Law
23
Data protection law
14
Privacy & data protection
11
Computer security
10
Privacy and data protection
10
Media studies
9
Data privacy
7
Data protection
6
Entertainment & media law
6
International law
6
human
6
Copyright law
5
GDPR
5
Information retrieval
5
Artificial intelligence
4
Business & management
4
Computer science
4
Contract law
4
Ethics & moral philosophy
4
IT & Communications law
4
Information technology industries
4
LNQD
4
Network security
4
QA75 Electronic computers. Computer science
4
data protection
4
Arbitration, mediation & alternative dispute resolution
3
Blockchain
3
Communication studies
3
Communications engineering / telecommunications
3
Constitutional & administrative law
3
-
2741by Indra Suwahyono“..., this application is expected to control the system remotely so the important data protected and cannot be accessed...”
Published 2015-04-01
Get full text
Article -
2742“... and heterogeneous cloud environment it is a challenging task to maintain data protections by just utilizing fine...”
Get full text
Others -
2743
-
2744by Brawerman, Alessandro“... the configuration data; protects sensitive information through the use of protected storage; creates and protects...”
Published 2005
Get full text
Others -
2745by Shann-Bin Chang, 張善斌“... be divided to four groups: data protect, operation research, finance, and postage metering. Finally...”
Get full text
Others -
2746by Paes, William Neville Wayne“... infections. Due to the paucity of robust clinical data, protective immune parameters have largely been...”
Published 2015
Get full text
-
2747“... data protections. Using privacy building blocks (which we refer to as axioms), we turn questions...”
Get full text
Article -
2748“..., volunteer preferences, and sensitive data protections. We present a typology for citizen science openness...”
Get full text
Article -
2749“... in clinical care. Respondents also recommended training regarding data protections for individuals involved...”
Get full text
Article -
2750“... rights, greater regulatory data protections, or both. This study reveals mixed outcomes with respect...”
Get full text
Article -
2751by Elizabeth C. Pasipanodya, Maulika Kohli, Celia B. Fisher, David J. Moore, Brenda Curtis“... user-initiated reporting of location to tailor messages, and ensuring adequate data protections...”
Published 2020-06-01
Get full text
Article -
2752“... centre. Need was recognised for standardized, data protective documentation and a health passport...”
Get full text
Article -
2753by Roux, Marike“... to verify and integrate data. Protective and risk factors were explored within the toddler, the family...”
Published 2012
Get full text
Others -
2754by Roux, Marike“... to verify and integrate data. Protective and risk factors were explored within the toddler, the family...”
Published 2012
Get full text
Get full text
Others -
2755by Brumen, Bostjan, Heričko, Marjan, Sevčnikar, Andrej, Završnik, Jernej, Hölbl, Marko“... data into an encrypted file with the data protected in such a way that external data analyses are still...”
Published 2013-12-01
Get full text
Article -
2756“... another are its ability to ensure the data protected against attacks and their speed and efficiency to do...”
Get full text
Article -
2757“... to avoid being destroyed. In order to promote the security level that the data protect, a lot...”
Get full text
Others -
2758
-
2759
-
2760“... the operating need to check the personal data protect act. 6. Vertical and horizontal links between...”
Get full text
Others