Search Result Save to File Save as CSV
Your search for 13421 returns 5631 document(s)
Classification and Evaluation the Privacy Preserving Data Mining Techniques: by using a Data Modification-based Framework (585-592)
Author: MohammadReza Keyvanpour Somayyeh Seifi Moradi; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Addressing the Personalization-Privacy Paradox: An Empirical Assessment from a Field Experiment on Smartphone Users, page 1141-1164
Author: Juliana Sutanto, Elia Palme, Chuan-Hoo Tan, and Chee Wei Phang | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
State of the information privacy literature: where are we now and where should we go?, page 977-988
Author: Paul A. Pavlou | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
How ethics can enhance organizational privacy: lessons from the choicePoint and TJX data breaches, page 673-687
Author: Mary J. Culnan and Cynthia Clark Williams | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization, page 13-28
Author: Naveen Farag Awad and M. S. Krishnan | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
How Much to Share with Third Parties? User Privacy Concerns and Website Dilemmas, Page 143-164
Author: Ram D. Gopal, Hooman Hidaji, Raymond A. Patterson, Erik Rolland, and Dmitry Zhdanov | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Personalization and Privacy
Author: Eugene Volokh | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
The Partition model: a deductive database model, page 1
Author: Nicolas S. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Cyber attacks protecting national infrastructure
Author: Amoroso, Edward G.; | Call Number: 363.3 Amo c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
E-Commerce security strategies: protecting the enterprise
Author: Cameron, Debra; | Call Number: 658.478 Cam e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next