Language
English
German
^M
Dutch
Spanish
Title:
Control use of data to protect privacy
Source:
Science [0036-8075] Landau, S yr:2015
Basic
Sorry, no full text available...
Please use the document delivery service (see below)
Holding information
Holdings in library search engine
ALBERT
Document delivery
Request document via
Library/Bibliothek
Users interested in this article also expressed an interest in the following:
description
1.
Buckee, Caroline O.
"Society: Protect privacy of mobile data."
Nature
514.7520 (2014): 35-35.
description
2.
Enserink, M.
"The end of privacy."
Science
347.6221 (2015): 490-491.
description
3.
Letzring, Timothy D.
"Mental health practitioners and HIPAA."
International journal of play therapy
20.3 (2011): 153-164.
description
4.
Rayo, L.
"Optimal Information Disclosure."
Journal of political economy
118.5 (2010): 949-987.
description
5.
"Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005. Proceedings."
Lecture notes in computer science
3592 (2005): 340-340.
description
6.
Rubenfeld, J.
"THE END OF PRIVACY."
Stanford law review
61.1 (2008): 101-161.
description
7.
Schneider, Mark H.
"Standards for health information technology to ensure adolescent privacy."
Pediatrics
130.5 (2012): 987-990.
description
8.
Castro, D.
"Better ways to protect privacy.(EDIT)."
USA today
(2011): 8-.
description
9.
"New rules for big data.(New rules for big data)(privacy rules )."
The Economist
394.8671 (2010): 14-.
description
10.
Ciriani, V.
"Combining Fragmentation and Encryption to Protect Privacy in Data Storage."
ACM transactions on information and system security
13.3 (2010): 22-33.
description
11.
Campbell, Scott W.
"Mobile Communication and Civil Society : Linking Patterns and Places of Use to Engagement with Others in Public."
Human communication research
37.2 (2011): 207-222.
description
12.
Schechtman, M.
"Memory and identity."
Philosophical studies
153.1 (2011): 65-79.
description
13.
Goldfarb, A.
"Privacy Regulation and Online Advertising."
Management science
57.1 (2011): 57-71.
description
14.
Brinkkemper, S.
"Method engineering: Engineering of information systems development methods and tools."
Information and software technology
38.4 (1996): 275-280.
description
15.
"Panel on use of proprietary data."
ACM SIGIR forum.
46.2: 10-18.
description
16.
"Service Brokering in Cloud Governance."
Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), 2012 14th International Symposium on
497-504.
description
17.
Fischer Hübner, S.
"Exploring Trust, Security and Privacy in Digital Business."
Springer Berlin Heidelberg, 2009. 207-210.
description
18.
Stark, P.
"Congressional intent for the HITECH Act."
The American journal of managed care
16.12 Suppl HIT (2010): 24-8.
description
19.
Brendel, Rebecca W.
"An approach to selected legal issues: confidentiality, mandatory reporting, abuse and neglect, informed consent, capacity decisions, boundary issues, and malpractice claims."
The Medical clinics of North America
94.6 (2010): 1229-1240.
description
20.
de Anke, Anke J E de E.
"Attitudes of nursing staff towards electronic patient records: A questionnaire survey."
International Journal of Nursing Studies
47.7 (2009): 846-854.
View More...
View Less...
Select All
Clear All
Save Citations
Select Format
EndNote
RefWorks
ProCite
Reference Manager
Submit citation export
Advanced
Author
Other articles by this author? -- in
GeoRef
author:
Landau, S
last name
initials
Other articles by this author? -- in
Online Contents Geosciences
author:
Landau, S
last name
initials
Other articles by this author? -- using
Web of Science
author:
Landau, S
last name
initials
Web Search
Find related information in
a Web Search Engine
Excite
Google
HotBot
Ixquick
ZOO
Ask
Yahoo!
Bing
Naver
Search Terms:
Search for related information in
Google Scholar
Article Title
Author Name
Journal Title
Other Search
Search Terms:
A service provided by the
Library of the Wissenschaftspark Albert Einstein
, Potsdam, Germany.
© 2005 SFX by Ex Libris Inc.