113
Citations
56
Journals
2008
First Cited
2020
Last Cited

Articles citing This Document (Page 1 of 3)

ArticleJournalYear
Keeping Internet Users in the Know or in the Dark: An Analysis of the Data Privacy Transparency of Canadian Internet CarriersJournal of Information Policy2016
The Privacy Ecosystem: Regulating Digital Identity in the United States and European UnionJournal of Information Policy2015
Key Legal Issues with Cloud Computing
Agile Software Development
Encyclopedia of Education and Information Technologies2020
The Right to Be Forgotten in DenmarkIus Comparatum2020
Encyclopedia of Education and Information Technologies2020
The Law and Data ProtectionLaw, Governance and Technology Series2020
Transforming Healthcare Through Various Technique in Internet of ThingsIntelligent Systems Reference Library2020
Brüksel 1Bis Tüzüğü İle Avrupa Birliği Genel Veri Koruma Tüzüğü Çerçevesinde Kişisel Verilerin İhlaline İlişkin Özel Hukuk Uyuşmazlıklarında Milletlerarası Yetki KurallarıHacettepe Hukuk Fakültesi Dergisi2019
Human, Social, and Ethical Aspects of Information Technology Management Systems2019
Encyclopedia of Education and Information Technologies2019
Necessary Standard for Providing Privacy and Security in IPv6 Networks2019
Data Protection and BI2019
Impact of EU Data Protection Laws on Cloud Computing2019
YAPISAL ANLAMDA TÜRKİYE KİŞİSEL VERİLERİ KORUMA KURUMU’NA İLİŞKİN BİR DEĞERLENDİRMER&S - Research Studies Anatolia Journal2018
Do You Really Trust “Privacy Policy” or “Terms of Use” Agreements Without Reading Them?Advances in Intelligent Systems and Computing2018
Exercising Access Rights in AustriaLaw, Governance and Technology Series2017
Transparency-Enabling Systems for Open Governance: Their Impact on Citizens’ Trust and the Role of Information PrivacyCommunications in Computer and Information Science2017
Impact of EU Data Protection Laws on Cloud Computing2016
Legal Aspects of Cross-Border Delivery of Voting Documents2015
Towards a Common Security and Privacy Requirements Elicitation MethodologyCommunications in Computer and Information Science2015
How Should Digital Humanities Pioneers Manage Their Data Privacy Challenges?IFIP Advances in Information and Communication Technology2015
Privacy Preserving Energy ManagementLecture Notes in Computer Science2015
De-identification of Unstructured Clinical Data for Patient Privacy Protection2015
Impact of EU Data Protection Laws on Cloud ComputingAdvances in Systems Analysis, Software Engineering, and High Performance Computing Book Series2015
Cloud Computing2015
Costs of Protecting Privacy in Agent Trust RelationshipsCommunications in Computer and Information Science2015
A Review of Privacy Preserving Mechanisms for Record Linkage2015
Key Legal Issues with Cloud Computing2015
Privacy Protection in Trust Models for Agent SocietiesAdvances in Intelligent Systems and Computing2014
Privacy and Digital IdentitySpringer Theses2014
Necessary Standard for Providing Privacy and Security in IPv6 NetworksAdvances in Information Security, Privacy, and Ethics Book Series2014
Policy and law of big data use in health careJournal of the Korean Medical Association2014
Data Protection and BIAdvances in Business Strategy and Competitive Advantage Book Series2014
Cloud ComputingAdvances in Systems Analysis, Software Engineering, and High Performance Computing Book Series2014
Data Privacy vs. Data SecurityAdvances in Business Strategy and Competitive Advantage Book Series2014
Legally eHealth2014
The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software ServicesInternational Federation for Information Processing2012
The Challenges Raised by the Privacy-Preserving Identity CardLecture Notes in Computer Science2012
Problems and Recommendations on Current Information Legislation in JapanJournal of Disaster Research2011
Revocable Anonymity in Network Monitoring SystemsCommunications in Computer and Information Science2011
Towards a Privacy-Preserving National Identity CardLecture Notes in Computer Science2010
Extending XACML Access Control Architecture for Allowing Preference-Based AuthorisationLecture Notes in Computer Science2010
Surveillance and Datenschutz in Virtual EnvironmentsLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering2009
A Problem-Based Approach for Computer-Aided Privacy Threat IdentificationLecture Notes in Computer Science2014
A Holistic View of Security and Privacy Issues in Smart GridsLecture Notes in Computer Science2013
Ethics, Privacy, and Self-Restraint in Social Networking2011
A Declarative Framework for Specifying and Enforcing Purpose-Aware PoliciesLecture Notes in Computer Science2015
Privacy Law, Data Sharing Policies, and Medical Data: A Comparative Perspective2015