Search

Your search keyword '"Privacy risk"' showing total 297 results

Search Constraints

Start Over You searched for: Descriptor "Privacy risk" Remove constraint Descriptor: "Privacy risk"
297 results on '"Privacy risk"'

Search Results

102. YES, FIRMS HAVE MY DATA BUT WHAT DOES IT MATTER? MEASURING PRIVACY RISKS.

103. Using Experiential Learning to Effectively Inform People About Web Privacy Risks.

104. Privacy Risks from Public Data Sources

105. Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication

106. Enhancing Privacy by Design from a Developer’s Perspective

107. C3P: Context-Aware Crowdsourced Cloud Privacy

109. Identifying incompleteness in privacy policy goals using semantic frames.

110. The effect of role conflict on self‐disclosure in social network sites: An integrated perspective of boundary regulation and dual process model.

111. Fast De-anonymization of Social Networks with Structural Information.

112. DETERMINANTS OF MOBILE PAYMENT USAGE AND THE MODERATING EFFECT OF GENDER: EXTENDING THE UTAUT MODEL WITH PRIVACY RISK.

113. Implementing next generation privacy and ethics research in education technology

114. The Antecedents of Customer Satisfaction in the Portuguese Telecommunications Sector

116. A Study Using TAM on the Recognition of Individuals’ Privacy and the Acceptance of Risk : –The Case of Japanese Internet Users–

135. Differentially Private Projected Histograms: Construction and Use for Prediction

136. A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings

137. Evaluating the Privacy Risk of Location-Based Services

141. Sharing Data for Public Security

142. A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression

143. Mobile shopping apps adoption and perceived risks: A cross-country perspective utilizing the Unified Theory of Acceptance and Use of Technology.

144. Self-concepts in cyber censorship awareness and privacy risk perceptions: What do cyber asylum-seekers have?

146. RequestPolicy: Increasing Web Browsing Privacy through Control of Cross-Site Requests

147. Bluetooth Tracking without Discoverability

Catalog

Books, media, physical & digital resources