Keeping Internet Users in the Know or in the Dark: An Analysis of the Data Privacy Transparency of Canadian Internet Carriers | Journal of Information Policy | 2016 |
The Privacy Ecosystem: Regulating Digital Identity in the United States and European Union | Journal of Information Policy | 2015 |
Key Legal Issues with Cloud Computing | | |
Agile Software Development | | |
Encyclopedia of Education and Information Technologies | | 2020 |
The Right to Be Forgotten in Denmark | Ius Comparatum | 2020 |
Encyclopedia of Education and Information Technologies | | 2020 |
The Law and Data Protection | Law, Governance and Technology Series | 2020 |
Transforming Healthcare Through Various Technique in Internet of Things | Intelligent Systems Reference Library | 2020 |
Brüksel 1Bis Tüzüğü İle Avrupa Birliği Genel Veri Koruma Tüzüğü Çerçevesinde Kişisel Verilerin İhlaline İlişkin Özel Hukuk Uyuşmazlıklarında Milletlerarası Yetki Kuralları | Hacettepe Hukuk Fakültesi Dergisi | 2019 |
Human, Social, and Ethical Aspects of Information Technology Management Systems | | 2019 |
Encyclopedia of Education and Information Technologies | | 2019 |
Necessary Standard for Providing Privacy and Security in IPv6 Networks | | 2019 |
Data Protection and BI | | 2019 |
Impact of EU Data Protection Laws on Cloud Computing | | 2019 |
YAPISAL ANLAMDA TÜRKİYE KİŞİSEL VERİLERİ KORUMA KURUMU’NA İLİŞKİN BİR DEĞERLENDİRME | R&S - Research Studies Anatolia Journal | 2018 |
Do You Really Trust “Privacy Policy” or “Terms of Use” Agreements Without Reading Them? | Advances in Intelligent Systems and Computing | 2018 |
Exercising Access Rights in Austria | Law, Governance and Technology Series | 2017 |
Transparency-Enabling Systems for Open Governance: Their Impact on Citizens’ Trust and the Role of Information Privacy | Communications in Computer and Information Science | 2017 |
Impact of EU Data Protection Laws on Cloud Computing | | 2016 |
Legal Aspects of Cross-Border Delivery of Voting Documents | | 2015 |
Towards a Common Security and Privacy Requirements Elicitation Methodology | Communications in Computer and Information Science | 2015 |
How Should Digital Humanities Pioneers Manage Their Data Privacy Challenges? | IFIP Advances in Information and Communication Technology | 2015 |
Privacy Preserving Energy Management | Lecture Notes in Computer Science | 2015 |
De-identification of Unstructured Clinical Data for Patient Privacy Protection | | 2015 |
Impact of EU Data Protection Laws on Cloud Computing | Advances in Systems Analysis, Software Engineering, and High Performance Computing Book Series | 2015 |
Cloud Computing | | 2015 |
Costs of Protecting Privacy in Agent Trust Relationships | Communications in Computer and Information Science | 2015 |
A Review of Privacy Preserving Mechanisms for Record Linkage | | 2015 |
Key Legal Issues with Cloud Computing | | 2015 |
Privacy Protection in Trust Models for Agent Societies | Advances in Intelligent Systems and Computing | 2014 |
Privacy and Digital Identity | Springer Theses | 2014 |
Necessary Standard for Providing Privacy and Security in IPv6 Networks | Advances in Information Security, Privacy, and Ethics Book Series | 2014 |
Policy and law of big data use in health care | Journal of the Korean Medical Association | 2014 |
Data Protection and BI | Advances in Business Strategy and Competitive Advantage Book Series | 2014 |
Cloud Computing | Advances in Systems Analysis, Software Engineering, and High Performance Computing Book Series | 2014 |
Data Privacy vs. Data Security | Advances in Business Strategy and Competitive Advantage Book Series | 2014 |
Legally eHealth | | 2014 |
The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software Services | International Federation for Information Processing | 2012 |
The Challenges Raised by the Privacy-Preserving Identity Card | Lecture Notes in Computer Science | 2012 |
Problems and Recommendations on Current Information Legislation in Japan | Journal of Disaster Research | 2011 |
Revocable Anonymity in Network Monitoring Systems | Communications in Computer and Information Science | 2011 |
Towards a Privacy-Preserving National Identity Card | Lecture Notes in Computer Science | 2010 |
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation | Lecture Notes in Computer Science | 2010 |
Surveillance and Datenschutz in Virtual Environments | Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering | 2009 |
A Problem-Based Approach for Computer-Aided Privacy Threat Identification | Lecture Notes in Computer Science | 2014 |
A Holistic View of Security and Privacy Issues in Smart Grids | Lecture Notes in Computer Science | 2013 |
Ethics, Privacy, and Self-Restraint in Social Networking | | 2011 |
A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies | Lecture Notes in Computer Science | 2015 |
Privacy Law, Data Sharing Policies, and Medical Data: A Comparative Perspective | | 2015 |