113
Citations
56
Journals
2008
First Cited
2020
Last Cited

Articles citing This Document (Page 2 of 3)

ArticleJournalYear
Keeping Internet Users in the Know or in the Dark: An Analysis of the Data Privacy Transparency of Canadian Internet CarriersJournal of Information Policy2016
The Privacy Ecosystem: Regulating Digital Identity in the United States and European UnionJournal of Information Policy2015
Key Legal Issues with Cloud Computing
Agile Software Development
Encyclopedia of Education and Information Technologies2020
The Right to Be Forgotten in DenmarkIus Comparatum2020
Encyclopedia of Education and Information Technologies2020
The Law and Data ProtectionLaw, Governance and Technology Series2020
Transforming Healthcare Through Various Technique in Internet of ThingsIntelligent Systems Reference Library2020
Brüksel 1Bis Tüzüğü İle Avrupa Birliği Genel Veri Koruma Tüzüğü Çerçevesinde Kişisel Verilerin İhlaline İlişkin Özel Hukuk Uyuşmazlıklarında Milletlerarası Yetki KurallarıHacettepe Hukuk Fakültesi Dergisi2019
Human, Social, and Ethical Aspects of Information Technology Management Systems2019
Encyclopedia of Education and Information Technologies2019
Necessary Standard for Providing Privacy and Security in IPv6 Networks2019
Data Protection and BI2019
Impact of EU Data Protection Laws on Cloud Computing2019
YAPISAL ANLAMDA TÜRKİYE KİŞİSEL VERİLERİ KORUMA KURUMU’NA İLİŞKİN BİR DEĞERLENDİRMER&S - Research Studies Anatolia Journal2018
Do You Really Trust “Privacy Policy” or “Terms of Use” Agreements Without Reading Them?Advances in Intelligent Systems and Computing2018
Exercising Access Rights in AustriaLaw, Governance and Technology Series2017
Transparency-Enabling Systems for Open Governance: Their Impact on Citizens’ Trust and the Role of Information PrivacyCommunications in Computer and Information Science2017
Impact of EU Data Protection Laws on Cloud Computing2016
Legal Aspects of Cross-Border Delivery of Voting Documents2015
Towards a Common Security and Privacy Requirements Elicitation MethodologyCommunications in Computer and Information Science2015
How Should Digital Humanities Pioneers Manage Their Data Privacy Challenges?IFIP Advances in Information and Communication Technology2015
Privacy Preserving Energy ManagementLecture Notes in Computer Science2015
De-identification of Unstructured Clinical Data for Patient Privacy Protection2015
Impact of EU Data Protection Laws on Cloud ComputingAdvances in Systems Analysis, Software Engineering, and High Performance Computing Book Series2015
Cloud Computing2015
Costs of Protecting Privacy in Agent Trust RelationshipsCommunications in Computer and Information Science2015
A Review of Privacy Preserving Mechanisms for Record Linkage2015
Key Legal Issues with Cloud Computing2015
Privacy Protection in Trust Models for Agent SocietiesAdvances in Intelligent Systems and Computing2014
Privacy and Digital IdentitySpringer Theses2014
Necessary Standard for Providing Privacy and Security in IPv6 NetworksAdvances in Information Security, Privacy, and Ethics Book Series2014
Policy and law of big data use in health careJournal of the Korean Medical Association2014
Data Protection and BIAdvances in Business Strategy and Competitive Advantage Book Series2014
Cloud ComputingAdvances in Systems Analysis, Software Engineering, and High Performance Computing Book Series2014
Data Privacy vs. Data SecurityAdvances in Business Strategy and Competitive Advantage Book Series2014
Legally eHealth2014
The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software ServicesInternational Federation for Information Processing2012
The Challenges Raised by the Privacy-Preserving Identity CardLecture Notes in Computer Science2012
Problems and Recommendations on Current Information Legislation in JapanJournal of Disaster Research2011
Revocable Anonymity in Network Monitoring SystemsCommunications in Computer and Information Science2011
Towards a Privacy-Preserving National Identity CardLecture Notes in Computer Science2010
Extending XACML Access Control Architecture for Allowing Preference-Based AuthorisationLecture Notes in Computer Science2010
Surveillance and Datenschutz in Virtual EnvironmentsLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering2009
A Problem-Based Approach for Computer-Aided Privacy Threat IdentificationLecture Notes in Computer Science2014
A Holistic View of Security and Privacy Issues in Smart GridsLecture Notes in Computer Science2013
Ethics, Privacy, and Self-Restraint in Social Networking2011
A Declarative Framework for Specifying and Enforcing Purpose-Aware PoliciesLecture Notes in Computer Science2015
Privacy Law, Data Sharing Policies, and Medical Data: A Comparative Perspective2015
Privacy Principles: Towards a Common Privacy Audit MethodologyLecture Notes in Computer Science2015
Privacy for Peer Profiling in Collective Adaptive SystemsIFIP Advances in Information and Communication Technology2015
Patterns in Privacy - A Pattern-Based Approach for AssessmentsIFIP Advances in Information and Communication Technology2015
Privacy in Social Collective Intelligence Systems2014
Use of Health Registers2014
Enhancing accountability in the cloudInternational Journal of Information Management2020
Privacy Protection in Exchanging Electronic Evidence in EuropeLaw, Governance and Technology Series2018
International data-sharing norms: from the OECD to the General Data Protection Regulation (GDPR)Human Genetics2018
Linking Auxiliary Data to Survey Data2018
Risk stratification, genomic data and the lawJournal of Community Genetics2018
The Behavioral Response to Location Based Services: An Examination of the Influence of Social and Environmental Benefits, and PrivacySustainability2017
Privacy Disclosure Adaptation for Trading between Personal Attributes and IncentivesJournal of Information Processing2017
Hungary’s unorthodox approach to personal privacyHealth and Technology2017
Data Security and Privacy in Cyber-Physical Systems for Healthcare2017
Anonymizing datasets with demographics and diagnosis codes in the presence of utility constraintsJournal of Biomedical Informatics2017
Donor's support tool: Enabling informed secondary use of patient's biomaterial and personal dataInternational Journal of Medical Informatics2017
Personalized privacy in open data sharing scenariosOnline Information Review2017
Architecture-based regulatory compliance argumentationJournal of Systems and Software2016
Developing the Clarity and Openness in Reporting: E3-based (CORE) Reference user manual for creation of clinical study reports in the era of clinical trial transparencyResearch Integrity and Peer Review2016
The INTEGRATE project: Delivering solutions for efficient multi-centric clinical research and trialsJournal of Biomedical Informatics2016
Data sharing and the evolving role of statisticiansBMC Medical Research Methodology2016
Protecting patient privacy when sharing patient-level data from clinical trialsBMC Medical Research Methodology2016
Keeping Internet Users in the Know or in the Dark: An Analysis of the Data Privacy Transparency of Canadian Internet CarriersJournal of Information Policy2016
Ontology-Based Obfuscation and Anonymisation for PrivacyIFIP Advances in Information and Communication Technology2016
Regulations and latency-aware load distribution of web applications in Multi-CloudsJournal of Supercomputing2016
Failures of Privacy Self-Regulation in the United StatesLaw, Governance and Technology Series2016
An Overview on the Internet of Things for Health Monitoring SystemsLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering2016
Randomized trial of a novel game-based appointment system for a university hospital venereology unit: study protocolBMC Medical Informatics and Decision Making2015
Whether or not to engage in sexting: Explaining adolescent sexting behaviour by applying the prototype willingness modelTelematics and Informatics2015
Evaluating the importance of personal information attributes using graph mining technique2015
Technology Roadmap Development for Big Data Healthcare ApplicationsKI - Kunstliche Intelligenz2015
The European Union's Proposed Equality and Data Protection Rules: An Existential Problem for Insurers?Economic Affairs2015
Individual privacy versus public good: protecting confidentiality in health researchStatistics in Medicine2015
Advanced services for critical infrastructures protectionJournal of Ambient Intelligence and Humanized Computing2015
I always feel like somebody's watching me2015
The Privacy Ecosystem: Regulating Digital Identity in the United States and European UnionJournal of Information Policy2015
Disassociation for electronic health record privacyJournal of Biomedical Informatics2014
Building a data sharing model for global genomic researchGenome Biology2014
Building and Sustaining a Local Transplant Data Management Program2014
Multidetector CT radiation dose optimisation in adults: short- and long-term effects of a clinical auditEuropean Radiology2014
Privacy query rewriting algorithm instrumented by a privacy-aware access control modelAnnales Des Telecommunications/Annals of Telecommunications2014
Privacy in the Life-Cycle of IT Services – An Investigation of Process Reference ModelsIFIP Advances in Information and Communication Technology2014
Privacy Protection of Biometric TemplatesCommunications in Computer and Information Science2014
Research Guide to European Data Protection LawInternational Journal of Legal Information2014
A lightweight Web of Things Open Platform to facilitate context data management and personalized healthcare services creationInternational Journal of Environmental Research and Public Health2014
What Do They Really Know About Me in the Cloud? A Comparative Law Perspective on Protecting Privacy and Security of Sensitive Consumer DataAmerican Business Law Journal2013
Legal Issues and Requirements for Cloud Computing in e-ScienceLecture Notes in Information Systems and Organisation2013
Ethics and data protection in human biomarker studies in environmental healthInternational Journal of Hygiene and Environmental Health2013
A PLA-based privacy-enhancing user modeling framework and its evaluationUser Modeling and User-Adapted Interaction2013
Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and educationBMC Medical Informatics and Decision Making2013