Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 479,569
1.
Full text
Available for: NUK, UL, UM, UPUK
2.
  • Contextual Integrity Up and... Contextual Integrity Up and Down the Data Food Chain
    Nissenbaum, Helen Theoretical inquiries in law, 03/2019, Volume: 20, Issue: 1
    Journal Article
    Peer reviewed

    Abstract According to the theory of contextual integrity (CI), privacy norms prescribe information flows with reference to five parameters — sender, recipient, subject, information type, and ...
Full text
Available for: CEKLJ, NUK, PRFLJ, UL, UM
3.
  • Privacy and Manipulation in... Privacy and Manipulation in the Digital Age
    Zarsky, Tal Z. Theoretical inquiries in law, 03/2019, Volume: 20, Issue: 1
    Journal Article
    Peer reviewed

    Abstract The digital age brings with it novel forms of data flow. As a result, individuals are constantly being monitored while consuming products, services and content. These abilities have given ...
Full text
Available for: CEKLJ, NUK, PRFLJ, UL, UM
4.
Full text
Available for: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SBCE, SBMB, UL, UM, UPUK
5.
  • Understanding Online Privac... Understanding Online Privacy—A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines
    Barth, Susanne; Ionita, Dan; Hartel, Pieter ACM computing surveys, 02/2022, Volume: 55, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Privacy visualizations help users understand the privacy implications of using an online service. Privacy by Design guidelines provide generally accepted privacy standards for developers of online ...
Full text
Available for: IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK

PDF
6.
Full text
Available for: NUK, UL, UM, UPUK
7.
  • Online Privacy Concerns and... Online Privacy Concerns and Privacy Management: A Meta‐Analytical Review
    Baruh, Lemi; Secinti, Ekin; Cemalcilar, Zeynep Journal of communication, February 2017, 20170201, Volume: 67, Issue: 1
    Journal Article
    Peer reviewed

    This meta‐analysis investigates privacy concerns and literacy as predictors of use of online services and social network sites (SNSs), sharing information, and adoption of privacy protective ...
Full text
Available for: BFBNIB, FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SBCE, SBMB, UL, UM, UPUK
8.
Full text

PDF
9.
  • The art of data privacy The art of data privacy
    Bowen, Claire McKay Significance (Oxford, England), February 2022, 2022-02-01, 20220201, Volume: 19, Issue: 1
    Journal Article
    Open access

    Statistics are vital for understanding society, but they can pose a risk to the privacy of individuals who contribute their data. Claire McKay Bowen illustrates some of the methods used to minimise ...
Full text
Available for: BFBNIB, FZAB, GIS, IJS, IZUM, KILJ, NLZOH, NUK, OILJ, PILJ, PNG, SAZU, SBCE, SBMB, UL, UM, UPUK
10.
  • A Theory of Multilevel Info... A Theory of Multilevel Information Privacy Management for the Digital Era
    Bélanger, France; James, Tabitha L. Information systems research, 06/2020, Volume: 31, Issue: 2
    Journal Article
    Peer reviewed

    In the digital era, it is increasingly important to understand how privacy decisions are made because information is frequently perceived as a commodity that is mismanaged. The preponderance of ...
Full text
Available for: CEKLJ
1 2 3 4 5
hits: 479,569

Load filters