Search

Your search keyword '"Personally identifiable information"' showing total 4,107 results

Search Constraints

Start Over You searched for: Descriptor "Personally identifiable information" Remove constraint Descriptor: "Personally identifiable information" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
4,107 results on '"Personally identifiable information"'

Search Results

1. Who Is Targeting Me? Privacy Perceptions of and Responses to Commercial and Political Targeted Advertising on Social Media.

2. The Early Impact of GDPR Compliance on Display Advertising: The Case of an Ad Publisher.

3. ПРОБЛЕМА ЗАХИСТУ ПЕРСОНАЛЬНИХ ДАНИХ В КІБЕРПРОСТОРІ

4. ЦИФРОВІЗАЦІЯ ТА ЗМІНИ У ПРАВОВОМУ РЕГУЛЮВАННІ МАЙНОВИХ ВІДНОСИН В НІДЕРЛАНДАХ

5. ЗНАЧЕННЯ ПЕРСОНАЛЬНИХ ДАНИХ У СФЕРІ ОХОРОНИ ЗДОРОВ'Я В УМОВАХ ІНФОРМАТИЗАЦІЇ

6. СПОСОБИ І МЕТОДИ АДМІНІСТРАТИВНО-ПРАВОВОГО ЗАХИСТУ ПЕРСОНАЛЬНИХ ДАНИХ В МЕРЕЖІ ІНТЕРНЕТ: ТЕОРЕТИЧНИЙ АНАЛІЗ ТА ПРАКТИЧНІ АСПЕКТИ

7. ВИКЛИКИ ПРАВОВОГО РЕГУЛЮВАННЯ ЕЛЕКТРОННОЇ КОМЕРЦІЇ В КОНТЕКСТІ ГЛОБАЛІЗАЦІЇ ЦИФРОВОЇ ЕКОНОМІКИ.

8. ХАРАКТЕРИСТИКА ДОГОВІРНИХ ВІДНОСИН У ЦИФРОВОМУ ОБОРОТІ.

9. Assessment of fitness for bleomycin use and management of bleomycin pulmonary toxicity in patients with classical Hodgkin lymphoma: A British Society for Haematology Good Practice Paper.

10. ПРАВОВЕ РЕГУЛЮВАННЯ FINTECH У КОРОЛІВСТВІ БЕЛЬГІЯ.

11. ПРОЗОРІСТЬ ТА ЗГОДА ЯК ОСНОВНІ ПРИНЦИПИ ЗАХИСТУ ПЕРСОНАЛЬНИХ ДАНИХ В УКРАЇНІ.

12. The hidden emotions of therapists: An autoethnographic exploration of working with clients who self‐injure.

13. ВИЩА ЮРИДИЧНА ОСВІТА В УКРАЇНІ: ВЕКТОРИ РЕФОРМУВАННЯ.

14. ОСОБЛИВОСТІ РЕАЛІЗАЦІЇ ПРАВА НА ЗАБУТТЯ В КОНТЕКСТІ РІШЕНЬ СУДУ ЄС ТА ЄСПЛ.

15. Einführung in das Datenwirtschaftsrecht.

16. Minderjährige im Datenschuldrecht (Teil 1): Grundlagen des Zusammenspiels von Minderjährigenschutz, Verbrauchervertragsrecht und Datenschutz.

17. Incorporating Information and Communication Technologies (ICTs) to Improve Health and Social Care for Aging Communities: Communication Insights from the ValueCare Project.

18. Automatic video captioning using tree hierarchical deep convolutional neural network and ASRNN-bi-directional LSTM.

19. Analysis of blockchain system based on BMAP/PH[b]/1 queueing model.

20. ТЕЖЕСТ НА ЗДРАВНИТЕ РАЗХОДИ ОТНЕСЕНИ КЪМ БВП И КОНТРОЛ НА РАЗХОДИТЕ ЗА ЗДРАВЕОПАЗВАНЕ, ЧРЕЗ УПРАВЛЕНИЕ НА ТЪРСЕНЕТО И ПРЕДЛАГАНЕТО НА ЗДРАВНИ УСЛУГИ.

21. Evaluating the disclosure risk of anonymized documents via a machine learning-based re-identification attack.

22. EUROPEAN UNION LAW PERSPECTIVE ON THE INTELLECTUAL PROPERTY PROTECTION OF ARTIFICIAL INTELLIGENCE SYSTEMS.

23. Financial conflicts of interest among authors of clinical practice guideline for headache disorders in Japan.

24. Personalized Facebook campaigning and the quest for personal votes in Taiwan.

25. Exploring digital campaign competence: the role of knowledge in data-driven election campaigns.

26. Data protection legislation in Africa and pathways for enhancing compliance in big data health research.

27. Technical note: A guide to using three open-source quality control algorithms for rainfall data from personal weather stations.

28. Accurate and 30-plus days reliable cuffless blood pressure measurements with 9-minutes personal photoplethysmograph data and mixed deduction learning.

29. The inclusive data governance models for algorithms – a dream of the already convinced or a realistic way of action?

30. Honey password vaults tolerating leakage of both personally identifiable information and passwords.

31. INDISCRIMINATE DATA SURVEILLANCE.

32. Personal data as pseudo-property: Between commodification and assetisation.

33. Framing Terrorism Survivors: Visual Representation of Boko Haram Survivors in International News Media.

34. Effects of home care and e-mobile training/consultancy on women's postpartum symptoms and breastfeeding self-efficacy: a randomized clinical trial.

35. Charting the Contours of the Geo-Tech World.

36. Digitalising Asylum Procedures: The Legitimisation of Smartphone Data Extraction for Retrospective Border Control.

37. Blurring the moral limits of data markets: biometrics, emotion and data dividends.

38. Lessons learned from naturalistic driving data processing in a secure data enclave: Preliminary discoveries from analyzing dash camera videos.

39. AI, ART AND COPYRIGHT: PART I.

40. Impact of Gamification on Intention to Donate Using Crowdfunding Platform: Evaluating the Mediating Roles of Affective User Experience and Trust.

41. Shielding Privacy in the Surveillance Era: A Comparative Study of India, USA and South Africa.

42. Feeding trust: exploring key drivers, moderators and consequences related to food app usage.

43. Combating Web Tracking: Analyzing Web Tracking Technologies for User Privacy.

44. Domain knowledge free cloud-IDS with lightweight embedding method.

45. Incorporating Digital Footprints into Credit-Scoring Models through Model Averaging.

46. Modelling user notification scenarios in privacy policies.

47. The limits of internet self-regulation -- the EU's policy for digital internet intermediaries.

48. DIGITAL ANALYSIS IN THE COMPANY'S INFORMATION SECURITY SYSTEM.

49. TOWARD A BIOMETRIC PRIVACY ACT TO PROTECT INDIVIDUAL RIGHTS: WHAT THE UNITED STATES CAN LEARN FROM THE EUROPEAN UNION AND CHINA.

50. Exploring the landscape of automated species identification apps: Development, promise, and user appraisal.

Catalog

Books, media, physical & digital resources