ExLibris header image
SFX Logo
Title: Control use of data to protect privacy
Source:

Science [0036-8075] Landau, S yr:2015


Collapse list of basic services Basic
Sorry, no full text available...
Please use the document delivery service (see below)  
Holding information
Holdings in library search engine ALBERT GO
Document delivery
Request document via Library/Bibliothek GO
Users interested in this article also expressed an interest in the following:
1. Buckee, Caroline O. "Society: Protect privacy of mobile data." Nature 514.7520 (2014): 35-35. Link to Full Text for this item Link to SFX for this item
2. Enserink, M. "The end of privacy." Science 347.6221 (2015): 490-491. Link to SFX for this item
3. Letzring, Timothy D. "Mental health practitioners and HIPAA." International journal of play therapy 20.3 (2011): 153-164. Link to SFX for this item
4. Rayo, L. "Optimal Information Disclosure." Journal of political economy 118.5 (2010): 949-987. Link to Full Text for this item Link to SFX for this item
5. "Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005. Proceedings." Lecture notes in computer science 3592 (2005): 340-340. Link to SFX for this item
6. Rubenfeld, J. "THE END OF PRIVACY." Stanford law review 61.1 (2008): 101-161. Link to SFX for this item
7. Schneider, Mark H. "Standards for health information technology to ensure adolescent privacy." Pediatrics 130.5 (2012): 987-990. Link to SFX for this item
8. Castro, D. "Better ways to protect privacy.(EDIT)." USA today (2011): 8-. Link to SFX for this item
9. "New rules for big data.(New rules for big data)(privacy rules )." The Economist 394.8671 (2010): 14-. Link to SFX for this item
10. Ciriani, V. "Combining Fragmentation and Encryption to Protect Privacy in Data Storage." ACM transactions on information and system security 13.3 (2010): 22-33. Link to SFX for this item
11. Campbell, Scott W. "Mobile Communication and Civil Society : Linking Patterns and Places of Use to Engagement with Others in Public." Human communication research 37.2 (2011): 207-222. Link to SFX for this item
12. Schechtman, M. "Memory and identity." Philosophical studies 153.1 (2011): 65-79. Link to SFX for this item
13. Goldfarb, A. "Privacy Regulation and Online Advertising." Management science 57.1 (2011): 57-71. Link to Full Text for this item Link to SFX for this item
14. Brinkkemper, S. "Method engineering: Engineering of information systems development methods and tools." Information and software technology 38.4 (1996): 275-280. Link to SFX for this item
15. "Panel on use of proprietary data." ACM SIGIR forum. 46.2: 10-18. Link to SFX for this item
16. "Service Brokering in Cloud Governance." Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), 2012 14th International Symposium on 497-504. Link to SFX for this item
17. Fischer Hübner, S. "Exploring Trust, Security and Privacy in Digital Business." Springer Berlin Heidelberg, 2009. 207-210. Link to SFX for this item
18. Stark, P. "Congressional intent for the HITECH Act." The American journal of managed care 16.12 Suppl HIT (2010): 24-8. Link to SFX for this item
19. Brendel, Rebecca W. "An approach to selected legal issues: confidentiality, mandatory reporting, abuse and neglect, informed consent, capacity decisions, boundary issues, and malpractice claims." The Medical clinics of North America 94.6 (2010): 1229-1240. Link to SFX for this item
20. de Anke, Anke J E de E. "Attitudes of nursing staff towards electronic patient records: A questionnaire survey." International Journal of Nursing Studies 47.7 (2009): 846-854. Link to SFX for this item
View More...
View Less...
Select All Clear All

Expand list of advanced services Advanced