Results 251 to 260 of about 121,345 (302)
Some of the next articles are maybe not open access.
2020
This Title of the book contains two chapters: regulation of personal data processing (Chapter 1, pp. 165-190) and protection of telecommunications privacy (Chapter 2, pp. 191-201), which provide analyses of subject legal and regulatory frameworks in the Republic of Croatia.
openaire
This Title of the book contains two chapters: regulation of personal data processing (Chapter 1, pp. 165-190) and protection of telecommunications privacy (Chapter 2, pp. 191-201), which provide analyses of subject legal and regulatory frameworks in the Republic of Croatia.
openaire
2021
Frühere Untersuchungen zum Datenschutz und zu jungen Medien und Internetnutzern haben gezeigt, dass Kinder verwundbare Benutzer sind und ihr Mangel an Fähigkeiten ein Risiko darstellen kann. Ziel der vorliegenden Studie ist es, die Erfahrungen und Wahrnehmungen von Kindern in Wien in der Altersgruppe von 6 bis 8 Jahren in Bezug auf Medien- und ...
openaire +1 more source
Frühere Untersuchungen zum Datenschutz und zu jungen Medien und Internetnutzern haben gezeigt, dass Kinder verwundbare Benutzer sind und ihr Mangel an Fähigkeiten ein Risiko darstellen kann. Ziel der vorliegenden Studie ist es, die Erfahrungen und Wahrnehmungen von Kindern in Wien in der Altersgruppe von 6 bis 8 Jahren in Bezug auf Medien- und ...
openaire +1 more source
2013
The main motivation behind indirect questioning is to increase participation, reduce nonresponse and reduce untruthful responses in surveys dealing with stigmatizing characteristics. Indirect questioning techniques are often advertised as methods protecting the privacy of the participants in surveys dealing with stigmatizing or sensitive issues.
Arijit Chaudhuri, Tasos C. Christofides
openaire +1 more source
The main motivation behind indirect questioning is to increase participation, reduce nonresponse and reduce untruthful responses in surveys dealing with stigmatizing characteristics. Indirect questioning techniques are often advertised as methods protecting the privacy of the participants in surveys dealing with stigmatizing or sensitive issues.
Arijit Chaudhuri, Tasos C. Christofides
openaire +1 more source
La Clinica terapeutica, 2015
The topic of data protection is referred closely to the concept of privacy--characterized by the American political philosophy in order to indicate a sphere recognized as personal, and therefore private or intimate, of the person, which exclude other individuals or society--whose protection has deep roots in the international right.
G, La Monaca, I, Schiralli
openaire +1 more source
The topic of data protection is referred closely to the concept of privacy--characterized by the American political philosophy in order to indicate a sphere recognized as personal, and therefore private or intimate, of the person, which exclude other individuals or society--whose protection has deep roots in the international right.
G, La Monaca, I, Schiralli
openaire +1 more source
2019
In the previous chapters, the focus has been on location disclosing behaviour, as well as predictors of such behaviours, including privacy attitudes such as perceived norms, risks, benefits, and location privacy valuation. In this chapter the focus moves from location disclosure to privacy protection behaviours in the context of location privacy.
openaire +1 more source
In the previous chapters, the focus has been on location disclosing behaviour, as well as predictors of such behaviours, including privacy attitudes such as perceived norms, risks, benefits, and location privacy valuation. In this chapter the focus moves from location disclosure to privacy protection behaviours in the context of location privacy.
openaire +1 more source
2015
Protect patron privacy and safeguard Internet usage using this how-to manual for creating a secure environment in your library. You'll learn how simple changes to your policies, procedures, and computer settings can ensure a private and safe research space for users.
openaire +1 more source
Protect patron privacy and safeguard Internet usage using this how-to manual for creating a secure environment in your library. You'll learn how simple changes to your policies, procedures, and computer settings can ensure a private and safe research space for users.
openaire +1 more source
A Comprehensive Survey of Privacy-preserving Federated Learning
ACM Computing Surveys, 2022Xuefei Yin, Yanming Zhu, Jiankun Hu
exaly
Abstract This chapter argues that it is not possible to strike the right balance between domestic data privacy protection and cross-border data flows by just ruling out ‘digital protectionism’, because ‘protectionism’ is socially constructed by the power of discourse. In regulatory conversations on privacy and personal data protection in
openaire +1 more source
openaire +1 more source
A Survey on Metaverse: Fundamentals, Security, and Privacy
IEEE Communications Surveys and Tutorials, 2023Yuntao Wang, Zhou, Ning Zhang
exaly

