Search

Showing total 585 results
585 results

Search Results

1. Should consumers be prohibited from storing card data on the internet?

2. Fundamental rights control when implementing predictive policing – a European perspective.

3. Predictive analytics and the collective dimensions of data protection.

4. BYOD security issues: a systematic literature review.

5. Special Section: Cognitive Perspectives on Information Systems.

6. Introduction to the special issue on platform economic in China.

7. When should EU merger assessment address privacy? The conditions for addressing privacy issues under the EU merger control regulation.

8. SLAPPed by the GDPR: protecting public interest journalism in the face of GDPR-based strategic litigation against public participation.

9. Call for Papers.

10. Comparison of information security decisions under different security and business environments.

11. Data governance in China's platform economy.

12. Policing faces: the present and future of intelligent facial surveillance.

13. Raising Teacher Retention in Online Courses through Personalized Support. Evidence from a Cross-National Randomized Controlled Trial.

14. The lawful sharing of health research data in South Africa and beyond.

15. Cacophony in conceptualizing and operationalizing ethnicity: the case of Roma in Hungary.

16. Data protection in the UK post-Brexit: the only certainty is uncertainty.

17. Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment.

18. Shifting Mindsets; A Critical Commentary on Child Protection and Welfare, Disability, and Online Risk Through Critical Literature Review.

19. Indonesia's personal data protection bill, 2020: does it meet the needs of the new digital economy?

20. Hybrid Elliptic Curve Cryptographic Approach for Data Privacy and Authentication in Secured Map Reduce Layer (SMR) for Optimized CPU Utilization.

21. Politicising European counter-terrorism: the role of NGOs.

22. The concept of function creep.

23. Security of networked control systems subject to deception attacks: a survey.

24. (Re)making data markets: an exploration of the regulatory challenges.

25. Applications of federated learning in smart cities: recent advances, taxonomy, and open challenges.

26. Understanding the interrelationship of barriers towards business model re-engineering under the evolving privacy laws: an interpretive Structure Modelling approach.

27. Contact tracing applications and informational privacy amidst the pandemic in India.

28. Duty to protect and responsibility to respect: data privacy violations in pandemic times.

29. Privacy boundaries in digital space: an exercise in responsibilisation.

30. Data Hiding in Iris Image for Privacy Protection.

31. Access to Public Archives in Europe: progress in the implementation of CoE Recommendation R (2000)13 on a European policy on access to archives.

32. Privacy and Utility-Assisted Data Protection Strategy for Secure Data Sharing and Retrieval in Cloud System.

33. The use of checksums to ensure data integrity in the healthcare industry.

34. The Nature of Cyber-attacks in the Future:A Position Paper.

35. The Power to Selectively Reveal Oneself: Privacy Protection among Hacker-activists.

36. Adaptive Protection Strategy in a Microgrid Under Disparate Operating Modes.

37. The INSPIRE directive: some observations on the legal framework and implementation.

38. Weaponising Europe? Rule-makers and rule-takers in the EU regulatory security state.

39. 'They're all about pushing the products and shiny things rather than fundamental security':Mapping socio-technical challenges in securing the smart home.

40. Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system.

41. A Credit Risk Model with Small Sample Data Based on G-XGBoost.

42. Towards a 'gold standard for the world'? The European General Data Protection Regulation between supranational and national norm entrepreneurship.

44. Experiments with automatic software piracy detection utilising machine-learning classifiers for micro-signatures.

45. Constructive Steganography Using Texture Synthesis.

46. Data access control in data exchanging supporting big data arena.

47. Online plagiarism detection services—saviour or scourge?

48. Too little too late?: An exploration and analysis of the inadequacies of antitrust law when regulating GAFAM data-driven mergers and the potential legal remedies available in the age of Big Data.

49. Market innovation as framing, productive friction and bricolage: an exploration of the personal data market.

50. Narratives about privacy and forgetting in English law.