Your search for 13421 returns 5631 document(s) |
Classification and Evaluation the Privacy Preserving Data Mining Techniques: by using a Data Modification-based Framework (585-592) |
Author: MohammadReza Keyvanpour
Somayyeh Seifi Moradi; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Addressing the Personalization-Privacy Paradox: An Empirical Assessment from a Field Experiment on Smartphone Users, page 1141-1164 |
Author: Juliana Sutanto, Elia Palme, Chuan-Hoo Tan, and Chee Wei Phang | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
State of the information privacy literature: where are we now and where should we go?, page 977-988 |
Author: Paul A. Pavlou | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
How ethics can enhance organizational privacy: lessons from the choicePoint and TJX data breaches, page 673-687 |
Author: Mary J. Culnan and Cynthia Clark Williams | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization, page 13-28 |
Author: Naveen Farag Awad and M. S. Krishnan | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
How Much to Share with Third Parties? User Privacy Concerns and Website Dilemmas, Page 143-164 |
Author: Ram D. Gopal, Hooman Hidaji, Raymond A. Patterson, Erik Rolland, and Dmitry Zhdanov | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Personalization and Privacy |
Author: Eugene Volokh | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Partition model: a deductive database model, page 1 |
Author: Nicolas S. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cyber attacks protecting national infrastructure |
Author: Amoroso, Edward G.; | Call Number: 363.3 Amo c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
E-Commerce security strategies: protecting the enterprise |
Author: Cameron, Debra; | Call Number: 658.478 Cam e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|