Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 477.456
1.
  • Compartmentalization-by-Des... Compartmentalization-by-Design: Usability-Aware Web Privacy
    Abdo, Jacques Bou; Zeadally, Sherali; Demerjian, Jacques Computer (Long Beach, Calif.), 2024-July, 2024-7-00, Letnik: 57, Številka: 7
    Journal Article
    Recenzirano

    Web privacy should be achieved without depriving the user of essential and enjoyable services and degrading his/her experience compared to other web surfers. We propose ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
2.
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
3.
  • Contextual Integrity Up and... Contextual Integrity Up and Down the Data Food Chain
    Nissenbaum, Helen Theoretical inquiries in law, 03/2019, Letnik: 20, Številka: 1
    Journal Article
    Recenzirano

    Abstract According to the theory of contextual integrity (CI), privacy norms prescribe information flows with reference to five parameters — sender, recipient, subject, information type, and ...
Celotno besedilo
Dostopno za: CEKLJ, NUK, PRFLJ, UL, UM
4.
  • Privacy and Manipulation in... Privacy and Manipulation in the Digital Age
    Zarsky, Tal Z. Theoretical inquiries in law, 03/2019, Letnik: 20, Številka: 1
    Journal Article
    Recenzirano

    Abstract The digital age brings with it novel forms of data flow. As a result, individuals are constantly being monitored while consuming products, services and content. These abilities have given ...
Celotno besedilo
Dostopno za: CEKLJ, NUK, PRFLJ, UL, UM
5.
  • HA-Med: A Blockchain-Based ... HA-Med: A Blockchain-Based Solution for Sharing Medical Data with Hidden Policies and Attributes
    Yang, Xiaohui; Liu, Jing IET information security, 04/2024, Letnik: 2024
    Journal Article
    Recenzirano
    Odprti dostop

    Existing healthcare data-sharing solutions often combine attribute-based encryption techniques with blockchain technology to achieve fine-grained access control. However, the transparency of ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
6.
Celotno besedilo
Dostopno za: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SBCE, SBMB, UL, UM, UPUK
7.
  • Understanding Online Privac... Understanding Online Privacy—A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines
    Barth, Susanne; Ionita, Dan; Hartel, Pieter ACM computing surveys, 02/2022, Letnik: 55, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Privacy visualizations help users understand the privacy implications of using an online service. Privacy by Design guidelines provide generally accepted privacy standards for developers of online ...
Celotno besedilo
Dostopno za: IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK

PDF
8.
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
9.
  • Online Privacy Concerns and... Online Privacy Concerns and Privacy Management: A Meta‐Analytical Review
    Baruh, Lemi; Secinti, Ekin; Cemalcilar, Zeynep Journal of communication, February 2017, 20170201, Letnik: 67, Številka: 1
    Journal Article
    Recenzirano

    This meta‐analysis investigates privacy concerns and literacy as predictors of use of online services and social network sites (SNSs), sharing information, and adoption of privacy protective ...
Celotno besedilo
Dostopno za: BFBNIB, FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SBCE, SBMB, UL, UM, UPUK
10.
Celotno besedilo

PDF
1 2 3 4 5
zadetkov: 477.456

Nalaganje filtrov