Results 271 to 280 of about 2,873,813 (294)
Privacy Protection Behaviour [PDF]
In the previous chapters, the focus has been on location disclosing behaviour, as well as predictors of such behaviours, including privacy attitudes such as perceived norms, risks, benefits, and location privacy valuation. In this chapter the focus moves from location disclosure to privacy protection behaviours in the context of location privacy.
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Privacy Protection in the 1980s
1982 IEEE Symposium on Security and Privacy, 1982Privacy is a term with multiple meanings. However, in the context of automated record-keeping systems which contain personal data about individuals, "privacy" refers to the rights of individuals regarding the collection, storage, processing, circulation, and use of personal information about themselves (1-4).
openaire +2 more sources
Protecting Privacy of Information
Journal of Information Systems Management, 1986One of the greatest challenges facing today's automated business is the protection of data, one often-ignored aspect of which is privacy of information. Because data exists in many forms on many types of media, managers must be familiar with the threats to privacy and must implement security controls that are adequate against all types of risk.
openaire +2 more sources
2016
Online privacy has become one of the greatest concerns in the United States today. There are currently multiple stakeholders with interests in online privacy including the public, industry, and the United States government. This study examines the issues surrounding the protection of online privacy.
openaire +2 more sources
Online privacy has become one of the greatest concerns in the United States today. There are currently multiple stakeholders with interests in online privacy including the public, industry, and the United States government. This study examines the issues surrounding the protection of online privacy.
openaire +2 more sources
Security and privacy protection in cloud computing: Discussions and challenges
Journal of Network and Computer Applications, 2020P. Sun
semanticscholar +1 more source