Keeping Internet Users in the Know or in the Dark: An Analysis of the Data Privacy Transparency of Canadian Internet Carriers | Journal of Information Policy | 2016 |
The Privacy Ecosystem: Regulating Digital Identity in the United States and European Union | Journal of Information Policy | 2015 |
Key Legal Issues with Cloud Computing | | |
Agile Software Development | | |
Encyclopedia of Education and Information Technologies | | 2020 |
The Right to Be Forgotten in Denmark | Ius Comparatum | 2020 |
Encyclopedia of Education and Information Technologies | | 2020 |
The Law and Data Protection | Law, Governance and Technology Series | 2020 |
Transforming Healthcare Through Various Technique in Internet of Things | Intelligent Systems Reference Library | 2020 |
Brüksel 1Bis Tüzüğü İle Avrupa Birliği Genel Veri Koruma Tüzüğü Çerçevesinde Kişisel Verilerin İhlaline İlişkin Özel Hukuk Uyuşmazlıklarında Milletlerarası Yetki Kuralları | Hacettepe Hukuk Fakültesi Dergisi | 2019 |
Human, Social, and Ethical Aspects of Information Technology Management Systems | | 2019 |
Encyclopedia of Education and Information Technologies | | 2019 |
Necessary Standard for Providing Privacy and Security in IPv6 Networks | | 2019 |
Data Protection and BI | | 2019 |
Impact of EU Data Protection Laws on Cloud Computing | | 2019 |
YAPISAL ANLAMDA TÜRKİYE KİŞİSEL VERİLERİ KORUMA KURUMU’NA İLİŞKİN BİR DEĞERLENDİRME | R&S - Research Studies Anatolia Journal | 2018 |
Do You Really Trust “Privacy Policy” or “Terms of Use” Agreements Without Reading Them? | Advances in Intelligent Systems and Computing | 2018 |
Exercising Access Rights in Austria | Law, Governance and Technology Series | 2017 |
Transparency-Enabling Systems for Open Governance: Their Impact on Citizens’ Trust and the Role of Information Privacy | Communications in Computer and Information Science | 2017 |
Impact of EU Data Protection Laws on Cloud Computing | | 2016 |
Legal Aspects of Cross-Border Delivery of Voting Documents | | 2015 |
Towards a Common Security and Privacy Requirements Elicitation Methodology | Communications in Computer and Information Science | 2015 |
How Should Digital Humanities Pioneers Manage Their Data Privacy Challenges? | IFIP Advances in Information and Communication Technology | 2015 |
Privacy Preserving Energy Management | Lecture Notes in Computer Science | 2015 |
De-identification of Unstructured Clinical Data for Patient Privacy Protection | | 2015 |
Impact of EU Data Protection Laws on Cloud Computing | Advances in Systems Analysis, Software Engineering, and High Performance Computing Book Series | 2015 |
Cloud Computing | | 2015 |
Costs of Protecting Privacy in Agent Trust Relationships | Communications in Computer and Information Science | 2015 |
A Review of Privacy Preserving Mechanisms for Record Linkage | | 2015 |
Key Legal Issues with Cloud Computing | | 2015 |
Privacy Protection in Trust Models for Agent Societies | Advances in Intelligent Systems and Computing | 2014 |
Privacy and Digital Identity | Springer Theses | 2014 |
Necessary Standard for Providing Privacy and Security in IPv6 Networks | Advances in Information Security, Privacy, and Ethics Book Series | 2014 |
Policy and law of big data use in health care | Journal of the Korean Medical Association | 2014 |
Data Protection and BI | Advances in Business Strategy and Competitive Advantage Book Series | 2014 |
Cloud Computing | Advances in Systems Analysis, Software Engineering, and High Performance Computing Book Series | 2014 |
Data Privacy vs. Data Security | Advances in Business Strategy and Competitive Advantage Book Series | 2014 |
Legally eHealth | | 2014 |
The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software Services | International Federation for Information Processing | 2012 |
The Challenges Raised by the Privacy-Preserving Identity Card | Lecture Notes in Computer Science | 2012 |
Problems and Recommendations on Current Information Legislation in Japan | Journal of Disaster Research | 2011 |
Revocable Anonymity in Network Monitoring Systems | Communications in Computer and Information Science | 2011 |
Towards a Privacy-Preserving National Identity Card | Lecture Notes in Computer Science | 2010 |
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation | Lecture Notes in Computer Science | 2010 |
Surveillance and Datenschutz in Virtual Environments | Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering | 2009 |
A Problem-Based Approach for Computer-Aided Privacy Threat Identification | Lecture Notes in Computer Science | 2014 |
A Holistic View of Security and Privacy Issues in Smart Grids | Lecture Notes in Computer Science | 2013 |
Ethics, Privacy, and Self-Restraint in Social Networking | | 2011 |
A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies | Lecture Notes in Computer Science | 2015 |
Privacy Law, Data Sharing Policies, and Medical Data: A Comparative Perspective | | 2015 |
Privacy Principles: Towards a Common Privacy Audit Methodology | Lecture Notes in Computer Science | 2015 |
Privacy for Peer Profiling in Collective Adaptive Systems | IFIP Advances in Information and Communication Technology | 2015 |
Patterns in Privacy - A Pattern-Based Approach for Assessments | IFIP Advances in Information and Communication Technology | 2015 |
Privacy in Social Collective Intelligence Systems | | 2014 |
Use of Health Registers | | 2014 |
Enhancing accountability in the cloud | International Journal of Information Management | 2020 |
Privacy Protection in Exchanging Electronic Evidence in Europe | Law, Governance and Technology Series | 2018 |
International data-sharing norms: from the OECD to the General Data Protection Regulation (GDPR) | Human Genetics | 2018 |
Linking Auxiliary Data to Survey Data | | 2018 |
Risk stratification, genomic data and the law | Journal of Community Genetics | 2018 |
The Behavioral Response to Location Based Services: An Examination of the Influence of Social and Environmental Benefits, and Privacy | Sustainability | 2017 |
Privacy Disclosure Adaptation for Trading between Personal Attributes and Incentives | Journal of Information Processing | 2017 |
Hungary’s unorthodox approach to personal privacy | Health and Technology | 2017 |
Data Security and Privacy in Cyber-Physical Systems for Healthcare | | 2017 |
Anonymizing datasets with demographics and diagnosis codes in the presence of utility constraints | Journal of Biomedical Informatics | 2017 |
Donor's support tool: Enabling informed secondary use of patient's biomaterial and personal data | International Journal of Medical Informatics | 2017 |
Personalized privacy in open data sharing scenarios | Online Information Review | 2017 |
Architecture-based regulatory compliance argumentation | Journal of Systems and Software | 2016 |
Developing the Clarity and Openness in Reporting: E3-based (CORE) Reference user manual for creation of clinical study reports in the era of clinical trial transparency | Research Integrity and Peer Review | 2016 |
The INTEGRATE project: Delivering solutions for efficient multi-centric clinical research and trials | Journal of Biomedical Informatics | 2016 |
Data sharing and the evolving role of statisticians | BMC Medical Research Methodology | 2016 |
Protecting patient privacy when sharing patient-level data from clinical trials | BMC Medical Research Methodology | 2016 |
Keeping Internet Users in the Know or in the Dark: An Analysis of the Data Privacy Transparency of Canadian Internet Carriers | Journal of Information Policy | 2016 |
Ontology-Based Obfuscation and Anonymisation for Privacy | IFIP Advances in Information and Communication Technology | 2016 |
Regulations and latency-aware load distribution of web applications in Multi-Clouds | Journal of Supercomputing | 2016 |
Failures of Privacy Self-Regulation in the United States | Law, Governance and Technology Series | 2016 |
An Overview on the Internet of Things for Health Monitoring Systems | Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering | 2016 |
Randomized trial of a novel game-based appointment system for a university hospital venereology unit: study protocol | BMC Medical Informatics and Decision Making | 2015 |
Whether or not to engage in sexting: Explaining adolescent sexting behaviour by applying the prototype willingness model | Telematics and Informatics | 2015 |
Evaluating the importance of personal information attributes using graph mining technique | | 2015 |
Technology Roadmap Development for Big Data Healthcare Applications | KI - Kunstliche Intelligenz | 2015 |
The European Union's Proposed Equality and Data Protection Rules: An Existential Problem for Insurers? | Economic Affairs | 2015 |
Individual privacy versus public good: protecting confidentiality in health research | Statistics in Medicine | 2015 |
Advanced services for critical infrastructures protection | Journal of Ambient Intelligence and Humanized Computing | 2015 |
I always feel like somebody's watching me | | 2015 |
The Privacy Ecosystem: Regulating Digital Identity in the United States and European Union | Journal of Information Policy | 2015 |
Disassociation for electronic health record privacy | Journal of Biomedical Informatics | 2014 |
Building a data sharing model for global genomic research | Genome Biology | 2014 |
Building and Sustaining a Local Transplant Data Management Program | | 2014 |
Multidetector CT radiation dose optimisation in adults: short- and long-term effects of a clinical audit | European Radiology | 2014 |
Privacy query rewriting algorithm instrumented by a privacy-aware access control model | Annales Des Telecommunications/Annals of Telecommunications | 2014 |
Privacy in the Life-Cycle of IT Services – An Investigation of Process Reference Models | IFIP Advances in Information and Communication Technology | 2014 |
Privacy Protection of Biometric Templates | Communications in Computer and Information Science | 2014 |
Research Guide to European Data Protection Law | International Journal of Legal Information | 2014 |
A lightweight Web of Things Open Platform to facilitate context data management and personalized healthcare services creation | International Journal of Environmental Research and Public Health | 2014 |
What Do They Really Know About Me in the Cloud? A Comparative Law Perspective on Protecting Privacy and Security of Sensitive Consumer Data | American Business Law Journal | 2013 |
Legal Issues and Requirements for Cloud Computing in e-Science | Lecture Notes in Information Systems and Organisation | 2013 |
Ethics and data protection in human biomarker studies in environmental health | International Journal of Hygiene and Environmental Health | 2013 |
A PLA-based privacy-enhancing user modeling framework and its evaluation | User Modeling and User-Adapted Interaction | 2013 |
Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education | BMC Medical Informatics and Decision Making | 2013 |