Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(data protection). Showing records 1 – 30 of 762 total matches.

[1] [2] [3] [4] [5] … [26]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Open Universiteit Nederland

1. Vandenberghe, P.M.M. (Patrick). The data protection officers' perception on conducting a data protection impact assessment: A Belgian perspective on the harmonisation goal of the GDPR.

Degree: Master, Department Information Science and Business Processes, 2019, Open Universiteit Nederland

 The General Data Protection Regulation (GDPR) is the new EU data protection legal framework. It repealed the EU Data Protection Directive in 2018. The aim… (more)

Subjects/Keywords: DPO; harmonisation; General Data Protection Regulation; GDPR; Data Protection Impact Assessment; DPIA; Data Protection Officer

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vandenberghe, P. M. M. (. (2019). The data protection officers' perception on conducting a data protection impact assessment: A Belgian perspective on the harmonisation goal of the GDPR. (Masters Thesis). Open Universiteit Nederland. Retrieved from http://hdl.handle.net/1820/2de7316c-4a3b-434a-b2cd-2f5d878f4546

Chicago Manual of Style (16th Edition):

Vandenberghe, P M M (Patrick). “The data protection officers' perception on conducting a data protection impact assessment: A Belgian perspective on the harmonisation goal of the GDPR.” 2019. Masters Thesis, Open Universiteit Nederland. Accessed December 05, 2020. http://hdl.handle.net/1820/2de7316c-4a3b-434a-b2cd-2f5d878f4546.

MLA Handbook (7th Edition):

Vandenberghe, P M M (Patrick). “The data protection officers' perception on conducting a data protection impact assessment: A Belgian perspective on the harmonisation goal of the GDPR.” 2019. Web. 05 Dec 2020.

Vancouver:

Vandenberghe PMM(. The data protection officers' perception on conducting a data protection impact assessment: A Belgian perspective on the harmonisation goal of the GDPR. [Internet] [Masters thesis]. Open Universiteit Nederland; 2019. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/1820/2de7316c-4a3b-434a-b2cd-2f5d878f4546.

Council of Science Editors:

Vandenberghe PMM(. The data protection officers' perception on conducting a data protection impact assessment: A Belgian perspective on the harmonisation goal of the GDPR. [Masters Thesis]. Open Universiteit Nederland; 2019. Available from: http://hdl.handle.net/1820/2de7316c-4a3b-434a-b2cd-2f5d878f4546


Ryerson University

2. Jaber, Ramzy. Digital watermarking of 3D disparity map based images for transaction tracking.

Degree: 2014, Ryerson University

 In this thesis, the basics of disparity map and watermarking are reviewed extensively. In order to embed binary information into images, a 3D image watermarking… (more)

Subjects/Keywords: Digital watermarking; Data protection; Watermarks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jaber, R. (2014). Digital watermarking of 3D disparity map based images for transaction tracking. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A3434

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jaber, Ramzy. “Digital watermarking of 3D disparity map based images for transaction tracking.” 2014. Thesis, Ryerson University. Accessed December 05, 2020. https://digital.library.ryerson.ca/islandora/object/RULA%3A3434.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jaber, Ramzy. “Digital watermarking of 3D disparity map based images for transaction tracking.” 2014. Web. 05 Dec 2020.

Vancouver:

Jaber R. Digital watermarking of 3D disparity map based images for transaction tracking. [Internet] [Thesis]. Ryerson University; 2014. [cited 2020 Dec 05]. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A3434.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jaber R. Digital watermarking of 3D disparity map based images for transaction tracking. [Thesis]. Ryerson University; 2014. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A3434

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

3. Routly, Wayne A. SIDVI: a model for secure distributed data integration.

Degree: Faculty of Computer Studies, 2004, Port Elizabeth Technikon

 The new millennium has brought about an increase in the use of business intelligence and knowledge management systems. The very foundations of these systems are… (more)

Subjects/Keywords: Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Routly, W. A. (2004). SIDVI: a model for secure distributed data integration. (Thesis). Port Elizabeth Technikon. Retrieved from http://hdl.handle.net/10948/261

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Routly, Wayne A. “SIDVI: a model for secure distributed data integration.” 2004. Thesis, Port Elizabeth Technikon. Accessed December 05, 2020. http://hdl.handle.net/10948/261.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Routly, Wayne A. “SIDVI: a model for secure distributed data integration.” 2004. Web. 05 Dec 2020.

Vancouver:

Routly WA. SIDVI: a model for secure distributed data integration. [Internet] [Thesis]. Port Elizabeth Technikon; 2004. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10948/261.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Routly WA. SIDVI: a model for secure distributed data integration. [Thesis]. Port Elizabeth Technikon; 2004. Available from: http://hdl.handle.net/10948/261

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

4. Von Solms, Rossouw. Information security management : processes and metrics.

Degree: 2014, University of Johannesburg

PhD. (Informatics)

Organizations become daily more dependent on information. Information is captured, processed, stored and distributed by the information resources and services within the organization.… (more)

Subjects/Keywords: Data protection; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Von Solms, R. (2014). Information security management : processes and metrics. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12038

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Von Solms, Rossouw. “Information security management : processes and metrics.” 2014. Thesis, University of Johannesburg. Accessed December 05, 2020. http://hdl.handle.net/10210/12038.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Von Solms, Rossouw. “Information security management : processes and metrics.” 2014. Web. 05 Dec 2020.

Vancouver:

Von Solms R. Information security management : processes and metrics. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10210/12038.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Von Solms R. Information security management : processes and metrics. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12038

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

5. Edwards, Norman Godfrey. Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels.

Degree: 2014, University of Johannesburg

M.Com. (Computer Science)

The area covered in this study is that of logical security models. A logical security model refers to the formal representation of… (more)

Subjects/Keywords: Computers - Access control; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Edwards, N. G. (2014). Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/9810

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Edwards, Norman Godfrey. “Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels.” 2014. Thesis, University of Johannesburg. Accessed December 05, 2020. http://hdl.handle.net/10210/9810.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Edwards, Norman Godfrey. “Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels.” 2014. Web. 05 Dec 2020.

Vancouver:

Edwards NG. Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10210/9810.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Edwards NG. Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/9810

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

6. [No author]. A framework for information security management in local government.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2017, Nelson Mandela Metropolitan University

 Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the… (more)

Subjects/Keywords: Computer security  – Management; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2017). A framework for information security management in local government. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/7588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

author], [No. “A framework for information security management in local government.” 2017. Thesis, Nelson Mandela Metropolitan University. Accessed December 05, 2020. http://hdl.handle.net/10948/7588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

author], [No. “A framework for information security management in local government.” 2017. Web. 05 Dec 2020.

Vancouver:

author] [. A framework for information security management in local government. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2017. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10948/7588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

author] [. A framework for information security management in local government. [Thesis]. Nelson Mandela Metropolitan University; 2017. Available from: http://hdl.handle.net/10948/7588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Université de Neuchâtel

7. Jendly, Manon. La coexistence des secrets en exécution de peine privative de liberté: vers un modèle de partage des informations confidentielles en milieu carcéral.

Degree: 2005, Université de Neuchâtel

 Cette recherche s’inscrit dans le cadre de la refonte de la politique pénitentiaire helvétique, laquelle a été entamée depuis plusieurs décennies et considère la peine… (more)

Subjects/Keywords: Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jendly, M. (2005). La coexistence des secrets en exécution de peine privative de liberté: vers un modèle de partage des informations confidentielles en milieu carcéral. (Thesis). Université de Neuchâtel. Retrieved from http://doc.rero.ch/record/5503

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jendly, Manon. “La coexistence des secrets en exécution de peine privative de liberté: vers un modèle de partage des informations confidentielles en milieu carcéral.” 2005. Thesis, Université de Neuchâtel. Accessed December 05, 2020. http://doc.rero.ch/record/5503.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jendly, Manon. “La coexistence des secrets en exécution de peine privative de liberté: vers un modèle de partage des informations confidentielles en milieu carcéral.” 2005. Web. 05 Dec 2020.

Vancouver:

Jendly M. La coexistence des secrets en exécution de peine privative de liberté: vers un modèle de partage des informations confidentielles en milieu carcéral. [Internet] [Thesis]. Université de Neuchâtel; 2005. [cited 2020 Dec 05]. Available from: http://doc.rero.ch/record/5503.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jendly M. La coexistence des secrets en exécution de peine privative de liberté: vers un modèle de partage des informations confidentielles en milieu carcéral. [Thesis]. Université de Neuchâtel; 2005. Available from: http://doc.rero.ch/record/5503

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Technology, Sydney

8. Chen, L. Achieving trust-oriented data protection in the cloud environment.

Degree: 2014, University of Technology, Sydney

 Cloud computing has gained increasing acceptance in recent years. In privacy-conscious domains such as healthcare and banking, however, data security and privacy are the greatest… (more)

Subjects/Keywords: Data protection.; Cloud computing.; Security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, L. (2014). Achieving trust-oriented data protection in the cloud environment. (Thesis). University of Technology, Sydney. Retrieved from http://hdl.handle.net/10453/29219

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, L. “Achieving trust-oriented data protection in the cloud environment.” 2014. Thesis, University of Technology, Sydney. Accessed December 05, 2020. http://hdl.handle.net/10453/29219.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, L. “Achieving trust-oriented data protection in the cloud environment.” 2014. Web. 05 Dec 2020.

Vancouver:

Chen L. Achieving trust-oriented data protection in the cloud environment. [Internet] [Thesis]. University of Technology, Sydney; 2014. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10453/29219.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen L. Achieving trust-oriented data protection in the cloud environment. [Thesis]. University of Technology, Sydney; 2014. Available from: http://hdl.handle.net/10453/29219

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Massey University

9. McLachlan, Scott. Realism in synthetic data generation : a thesis presented in fulfilment of the requirements for the degree of Master of Philosophy in Science, School of Engineering and Advanced Technology, Massey University, Palmerston North, New Zealand .

Degree: 2017, Massey University

 There are many situations where researchers cannot make use of real data because either the data does not exist in the required format or privacy… (more)

Subjects/Keywords: Computer simulation; Data protection; Data mining

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McLachlan, S. (2017). Realism in synthetic data generation : a thesis presented in fulfilment of the requirements for the degree of Master of Philosophy in Science, School of Engineering and Advanced Technology, Massey University, Palmerston North, New Zealand . (Thesis). Massey University. Retrieved from http://hdl.handle.net/10179/11569

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

McLachlan, Scott. “Realism in synthetic data generation : a thesis presented in fulfilment of the requirements for the degree of Master of Philosophy in Science, School of Engineering and Advanced Technology, Massey University, Palmerston North, New Zealand .” 2017. Thesis, Massey University. Accessed December 05, 2020. http://hdl.handle.net/10179/11569.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

McLachlan, Scott. “Realism in synthetic data generation : a thesis presented in fulfilment of the requirements for the degree of Master of Philosophy in Science, School of Engineering and Advanced Technology, Massey University, Palmerston North, New Zealand .” 2017. Web. 05 Dec 2020.

Vancouver:

McLachlan S. Realism in synthetic data generation : a thesis presented in fulfilment of the requirements for the degree of Master of Philosophy in Science, School of Engineering and Advanced Technology, Massey University, Palmerston North, New Zealand . [Internet] [Thesis]. Massey University; 2017. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10179/11569.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

McLachlan S. Realism in synthetic data generation : a thesis presented in fulfilment of the requirements for the degree of Master of Philosophy in Science, School of Engineering and Advanced Technology, Massey University, Palmerston North, New Zealand . [Thesis]. Massey University; 2017. Available from: http://hdl.handle.net/10179/11569

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Minnesota

10. Mandagere, Nagapramod. Techniques for Optimizing Cost of Enterprise Data Management.

Degree: PhD, Computer Science, 2015, University of Minnesota

 Rapid adoption of data driven decision making, Internet of Things (IoT), mass digitization of content have led to unprecedented changes in data storage requirements. From… (more)

Subjects/Keywords: CDP; Continuous Data Protection; Data Protection; MAID; Storage power management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mandagere, N. (2015). Techniques for Optimizing Cost of Enterprise Data Management. (Doctoral Dissertation). University of Minnesota. Retrieved from http://hdl.handle.net/11299/177133

Chicago Manual of Style (16th Edition):

Mandagere, Nagapramod. “Techniques for Optimizing Cost of Enterprise Data Management.” 2015. Doctoral Dissertation, University of Minnesota. Accessed December 05, 2020. http://hdl.handle.net/11299/177133.

MLA Handbook (7th Edition):

Mandagere, Nagapramod. “Techniques for Optimizing Cost of Enterprise Data Management.” 2015. Web. 05 Dec 2020.

Vancouver:

Mandagere N. Techniques for Optimizing Cost of Enterprise Data Management. [Internet] [Doctoral dissertation]. University of Minnesota; 2015. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/11299/177133.

Council of Science Editors:

Mandagere N. Techniques for Optimizing Cost of Enterprise Data Management. [Doctoral Dissertation]. University of Minnesota; 2015. Available from: http://hdl.handle.net/11299/177133


University of South Africa

11. London, Ray William. Comparative data protection and security : a critical evaluation of legal standards .

Degree: 2014, University of South Africa

 This study1 addresses the key information technology issues of the age and its unintended consequences. The issues include social control by businesses, governments, and information… (more)

Subjects/Keywords: Australia data protection; Canada data protection; Comparative law privacy or data protection; Data protection; Data security; Information privacy; Information privacy laws; Information technology; International data; Protection legal standards; Social control; Sciolegal information privacy,; South Africa data protection; United Kingdom; United States information protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

London, R. W. (2014). Comparative data protection and security : a critical evaluation of legal standards . (Doctoral Dissertation). University of South Africa. Retrieved from http://hdl.handle.net/10500/13859

Chicago Manual of Style (16th Edition):

London, Ray William. “Comparative data protection and security : a critical evaluation of legal standards .” 2014. Doctoral Dissertation, University of South Africa. Accessed December 05, 2020. http://hdl.handle.net/10500/13859.

MLA Handbook (7th Edition):

London, Ray William. “Comparative data protection and security : a critical evaluation of legal standards .” 2014. Web. 05 Dec 2020.

Vancouver:

London RW. Comparative data protection and security : a critical evaluation of legal standards . [Internet] [Doctoral dissertation]. University of South Africa; 2014. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10500/13859.

Council of Science Editors:

London RW. Comparative data protection and security : a critical evaluation of legal standards . [Doctoral Dissertation]. University of South Africa; 2014. Available from: http://hdl.handle.net/10500/13859


Deakin University

12. Ninggal, Mohd Izuan Hafez. Privacy-preserving mechanism for social network data publishing.

Degree: 2015, Deakin University

  Privacy is receiving growing concern from various parties especially consumers due to the simplification of the collection and distribution of personal data. This research focuses… (more)

Subjects/Keywords: privacy protection; personal data; social network data publishing; data anonymization mechanism

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ninggal, M. I. H. (2015). Privacy-preserving mechanism for social network data publishing. (Thesis). Deakin University. Retrieved from http://hdl.handle.net/10536/DRO/DU:30082967

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ninggal, Mohd Izuan Hafez. “Privacy-preserving mechanism for social network data publishing.” 2015. Thesis, Deakin University. Accessed December 05, 2020. http://hdl.handle.net/10536/DRO/DU:30082967.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ninggal, Mohd Izuan Hafez. “Privacy-preserving mechanism for social network data publishing.” 2015. Web. 05 Dec 2020.

Vancouver:

Ninggal MIH. Privacy-preserving mechanism for social network data publishing. [Internet] [Thesis]. Deakin University; 2015. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10536/DRO/DU:30082967.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ninggal MIH. Privacy-preserving mechanism for social network data publishing. [Thesis]. Deakin University; 2015. Available from: http://hdl.handle.net/10536/DRO/DU:30082967

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

13. Sun, Zongji. Face de-identification for privacy protection.

Degree: PhD, 2019, University of Hertfordshire

 The ability to record, store and analyse images of faces economically, rapidly and on a vast scale brings people's attention to privacy. The current privacy… (more)

Subjects/Keywords: 006.3; face de-identification; data protection; privacy protection; face synthesis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sun, Z. (2019). Face de-identification for privacy protection. (Doctoral Dissertation). University of Hertfordshire. Retrieved from http://hdl.handle.net/2299/21270

Chicago Manual of Style (16th Edition):

Sun, Zongji. “Face de-identification for privacy protection.” 2019. Doctoral Dissertation, University of Hertfordshire. Accessed December 05, 2020. http://hdl.handle.net/2299/21270.

MLA Handbook (7th Edition):

Sun, Zongji. “Face de-identification for privacy protection.” 2019. Web. 05 Dec 2020.

Vancouver:

Sun Z. Face de-identification for privacy protection. [Internet] [Doctoral dissertation]. University of Hertfordshire; 2019. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/2299/21270.

Council of Science Editors:

Sun Z. Face de-identification for privacy protection. [Doctoral Dissertation]. University of Hertfordshire; 2019. Available from: http://hdl.handle.net/2299/21270


RMIT University

14. Ahmad, T. Global and local feature-based transformations for fingerprint data protection.

Degree: 2012, RMIT University

 Due to its non-shareable characteristic, biometrics has been widely implemented for authenticating users. This characteristic asserts that biometrics meets the non-repudiation requirement which is one… (more)

Subjects/Keywords: Fields of Research; Fingerprint; biometrics; data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ahmad, T. (2012). Global and local feature-based transformations for fingerprint data protection. (Thesis). RMIT University. Retrieved from http://researchbank.rmit.edu.au/view/rmit:160073

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ahmad, T. “Global and local feature-based transformations for fingerprint data protection.” 2012. Thesis, RMIT University. Accessed December 05, 2020. http://researchbank.rmit.edu.au/view/rmit:160073.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ahmad, T. “Global and local feature-based transformations for fingerprint data protection.” 2012. Web. 05 Dec 2020.

Vancouver:

Ahmad T. Global and local feature-based transformations for fingerprint data protection. [Internet] [Thesis]. RMIT University; 2012. [cited 2020 Dec 05]. Available from: http://researchbank.rmit.edu.au/view/rmit:160073.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ahmad T. Global and local feature-based transformations for fingerprint data protection. [Thesis]. RMIT University; 2012. Available from: http://researchbank.rmit.edu.au/view/rmit:160073

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

15. Boshoff, Ryno. A baseline for information security knowledge for end users.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2012, Nelson Mandela Metropolitan University

 Information plays a vast contributing role to all resources within an organisation. Organisations should recognise the importance of information and implement information security controls to… (more)

Subjects/Keywords: Data protection  – Management; Computer security  – Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Boshoff, R. (2012). A baseline for information security knowledge for end users. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1013260

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Boshoff, Ryno. “A baseline for information security knowledge for end users.” 2012. Thesis, Nelson Mandela Metropolitan University. Accessed December 05, 2020. http://hdl.handle.net/10948/d1013260.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Boshoff, Ryno. “A baseline for information security knowledge for end users.” 2012. Web. 05 Dec 2020.

Vancouver:

Boshoff R. A baseline for information security knowledge for end users. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2012. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10948/d1013260.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Boshoff R. A baseline for information security knowledge for end users. [Thesis]. Nelson Mandela Metropolitan University; 2012. Available from: http://hdl.handle.net/10948/d1013260

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

16. Deysel, Natasha. A model for information security control audit for small to mid-sized organisations.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2009, Nelson Mandela Metropolitan University

 Organisations are increasingly dependent on their information. Compromise to this information in terms of loss, inaccuracy or competitors gaining unauthorised access could have devastating consequences… (more)

Subjects/Keywords: Data protection; Computer networks  – Information technology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Deysel, N. (2009). A model for information security control audit for small to mid-sized organisations. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/940

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Deysel, Natasha. “A model for information security control audit for small to mid-sized organisations.” 2009. Thesis, Nelson Mandela Metropolitan University. Accessed December 05, 2020. http://hdl.handle.net/10948/940.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Deysel, Natasha. “A model for information security control audit for small to mid-sized organisations.” 2009. Web. 05 Dec 2020.

Vancouver:

Deysel N. A model for information security control audit for small to mid-sized organisations. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2009. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10948/940.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Deysel N. A model for information security control audit for small to mid-sized organisations. [Thesis]. Nelson Mandela Metropolitan University; 2009. Available from: http://hdl.handle.net/10948/940

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

17. Gaadingwe, Tshepo Gaadingwe. A critical review of the IFIP TC11 Security Conference Series.

Degree: MTech, Faculty of Engineering, the Built Environment and Information Technology, 2007, Nelson Mandela Metropolitan University

 Over the past few decades the field of computing has grown and evolved. In this time, information security research has experienced the same type of… (more)

Subjects/Keywords: Database security; Data protection; Computers  – Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gaadingwe, T. G. (2007). A critical review of the IFIP TC11 Security Conference Series. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/507

Chicago Manual of Style (16th Edition):

Gaadingwe, Tshepo Gaadingwe. “A critical review of the IFIP TC11 Security Conference Series.” 2007. Masters Thesis, Nelson Mandela Metropolitan University. Accessed December 05, 2020. http://hdl.handle.net/10948/507.

MLA Handbook (7th Edition):

Gaadingwe, Tshepo Gaadingwe. “A critical review of the IFIP TC11 Security Conference Series.” 2007. Web. 05 Dec 2020.

Vancouver:

Gaadingwe TG. A critical review of the IFIP TC11 Security Conference Series. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2007. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10948/507.

Council of Science Editors:

Gaadingwe TG. A critical review of the IFIP TC11 Security Conference Series. [Masters Thesis]. Nelson Mandela Metropolitan University; 2007. Available from: http://hdl.handle.net/10948/507


Nelson Mandela Metropolitan University

18. Reid, Rayne. A brain-compatible approach to the presentation of cyber security educational material.

Degree: MTech, Faculty of Engineering, the Built Environment and Information Technology, 2012, Nelson Mandela Metropolitan University

 Information is an extremely important asset in modern society. It is used in most daily activities and transactions, and, thus, the importance of information is… (more)

Subjects/Keywords: Data protection  – Management; Computer security  – Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Reid, R. (2012). A brain-compatible approach to the presentation of cyber security educational material. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1019895

Chicago Manual of Style (16th Edition):

Reid, Rayne. “A brain-compatible approach to the presentation of cyber security educational material.” 2012. Masters Thesis, Nelson Mandela Metropolitan University. Accessed December 05, 2020. http://hdl.handle.net/10948/d1019895.

MLA Handbook (7th Edition):

Reid, Rayne. “A brain-compatible approach to the presentation of cyber security educational material.” 2012. Web. 05 Dec 2020.

Vancouver:

Reid R. A brain-compatible approach to the presentation of cyber security educational material. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2012. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10948/d1019895.

Council of Science Editors:

Reid R. A brain-compatible approach to the presentation of cyber security educational material. [Masters Thesis]. Nelson Mandela Metropolitan University; 2012. Available from: http://hdl.handle.net/10948/d1019895


Nelson Mandela Metropolitan University

19. Maninjwa, Prosecutor Mvikeli. Managing an information security policy architecture : a technical documentation perspective.

Degree: MTech, Faculty of Engineering, the Built Environment and Information Technology, 2012, Nelson Mandela Metropolitan University

 Information and the related assets form critical business assets for most organizations. Organizations depend on their information assets to survive and to remain competitive. However,… (more)

Subjects/Keywords: Computer security  – Management; Computer architecture; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Maninjwa, P. M. (2012). Managing an information security policy architecture : a technical documentation perspective. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1020757

Chicago Manual of Style (16th Edition):

Maninjwa, Prosecutor Mvikeli. “Managing an information security policy architecture : a technical documentation perspective.” 2012. Masters Thesis, Nelson Mandela Metropolitan University. Accessed December 05, 2020. http://hdl.handle.net/10948/d1020757.

MLA Handbook (7th Edition):

Maninjwa, Prosecutor Mvikeli. “Managing an information security policy architecture : a technical documentation perspective.” 2012. Web. 05 Dec 2020.

Vancouver:

Maninjwa PM. Managing an information security policy architecture : a technical documentation perspective. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2012. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10948/d1020757.

Council of Science Editors:

Maninjwa PM. Managing an information security policy architecture : a technical documentation perspective. [Masters Thesis]. Nelson Mandela Metropolitan University; 2012. Available from: http://hdl.handle.net/10948/d1020757


University of Johannesburg

20. Pottas, Dalenca. The automatic generation of information security profiles.

Degree: 2014, University of Johannesburg

D.Phil. (Computer Science)

Security needs have changed considerably in the past decade as the economics of computer usage necessitates increased business reliance on computers. As… (more)

Subjects/Keywords: Computers - Access control; Data protection; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pottas, D. (2014). The automatic generation of information security profiles. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12333

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pottas, Dalenca. “The automatic generation of information security profiles.” 2014. Thesis, University of Johannesburg. Accessed December 05, 2020. http://hdl.handle.net/10210/12333.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pottas, Dalenca. “The automatic generation of information security profiles.” 2014. Web. 05 Dec 2020.

Vancouver:

Pottas D. The automatic generation of information security profiles. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10210/12333.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pottas D. The automatic generation of information security profiles. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12333

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

21. Van Heerden, Chris. Packaged software : security and controls audit review.

Degree: 2015, University of Johannesburg

M.Com.

In recent years large organisations that developed mainframe application software in-house are now purchasing software packages to replace these applications. These advanced packages incorporate… (more)

Subjects/Keywords: Auditing - Data processing; Software protection; Database security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Heerden, C. (2015). Packaged software : security and controls audit review. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/14536

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Van Heerden, Chris. “Packaged software : security and controls audit review.” 2015. Thesis, University of Johannesburg. Accessed December 05, 2020. http://hdl.handle.net/10210/14536.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Van Heerden, Chris. “Packaged software : security and controls audit review.” 2015. Web. 05 Dec 2020.

Vancouver:

Van Heerden C. Packaged software : security and controls audit review. [Internet] [Thesis]. University of Johannesburg; 2015. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10210/14536.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Van Heerden C. Packaged software : security and controls audit review. [Thesis]. University of Johannesburg; 2015. Available from: http://hdl.handle.net/10210/14536

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

22. Pretorius, Maria Rebecca. Application of the access path model with specific reference to the SAP R/3 environment.

Degree: 2014, University of Johannesburg

M.Com. (Computer Auditing)

The management and control of modern day computer systems are becoming more and more trying due to the complexity of systems. This… (more)

Subjects/Keywords: Computer security; Data protection; Computers - Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pretorius, M. R. (2014). Application of the access path model with specific reference to the SAP R/3 environment. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12328

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pretorius, Maria Rebecca. “Application of the access path model with specific reference to the SAP R/3 environment.” 2014. Thesis, University of Johannesburg. Accessed December 05, 2020. http://hdl.handle.net/10210/12328.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pretorius, Maria Rebecca. “Application of the access path model with specific reference to the SAP R/3 environment.” 2014. Web. 05 Dec 2020.

Vancouver:

Pretorius MR. Application of the access path model with specific reference to the SAP R/3 environment. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10210/12328.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pretorius MR. Application of the access path model with specific reference to the SAP R/3 environment. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12328

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

23. Jansson, Kenny. A model for cultivating resistance to social engineering attacks.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2011, Nelson Mandela Metropolitan University

 The human being is commonly considered as being the weakest link in information security. Subsequently, as information is one of the most critical assets in… (more)

Subjects/Keywords: Computer security; Data protection; Human-computer interaction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jansson, K. (2011). A model for cultivating resistance to social engineering attacks. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/1588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jansson, Kenny. “A model for cultivating resistance to social engineering attacks.” 2011. Thesis, Nelson Mandela Metropolitan University. Accessed December 05, 2020. http://hdl.handle.net/10948/1588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jansson, Kenny. “A model for cultivating resistance to social engineering attacks.” 2011. Web. 05 Dec 2020.

Vancouver:

Jansson K. A model for cultivating resistance to social engineering attacks. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2011. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/10948/1588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jansson K. A model for cultivating resistance to social engineering attacks. [Thesis]. Nelson Mandela Metropolitan University; 2011. Available from: http://hdl.handle.net/10948/1588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

24. Lacoste-Vaysse, Guillaume. La protection des données de santé à caractère personnel : pour la reconnaissance des droits du patient : The protection of personal health data : In recognition of patient rights.

Degree: Docteur es, Droit privé et sciences criminelles, 2016, Université Toulouse I – Capitole

Les données personnelles sont omniprésentes sur internet et leur importance économique est croissante. Pour les services de la société de l’information tels que les moteurs… (more)

Subjects/Keywords: Informatique et Libertés; Data protection; E-Commerce

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lacoste-Vaysse, G. (2016). La protection des données de santé à caractère personnel : pour la reconnaissance des droits du patient : The protection of personal health data : In recognition of patient rights. (Doctoral Dissertation). Université Toulouse I – Capitole. Retrieved from http://www.theses.fr/2016TOU10047

Chicago Manual of Style (16th Edition):

Lacoste-Vaysse, Guillaume. “La protection des données de santé à caractère personnel : pour la reconnaissance des droits du patient : The protection of personal health data : In recognition of patient rights.” 2016. Doctoral Dissertation, Université Toulouse I – Capitole. Accessed December 05, 2020. http://www.theses.fr/2016TOU10047.

MLA Handbook (7th Edition):

Lacoste-Vaysse, Guillaume. “La protection des données de santé à caractère personnel : pour la reconnaissance des droits du patient : The protection of personal health data : In recognition of patient rights.” 2016. Web. 05 Dec 2020.

Vancouver:

Lacoste-Vaysse G. La protection des données de santé à caractère personnel : pour la reconnaissance des droits du patient : The protection of personal health data : In recognition of patient rights. [Internet] [Doctoral dissertation]. Université Toulouse I – Capitole; 2016. [cited 2020 Dec 05]. Available from: http://www.theses.fr/2016TOU10047.

Council of Science Editors:

Lacoste-Vaysse G. La protection des données de santé à caractère personnel : pour la reconnaissance des droits du patient : The protection of personal health data : In recognition of patient rights. [Doctoral Dissertation]. Université Toulouse I – Capitole; 2016. Available from: http://www.theses.fr/2016TOU10047

25. Möller, Carolin. The evolution of data protection and privacy in the public security context : an institutional analysis of three EU data retention and access regimes.

Degree: PhD, 2017, Queen Mary, University of London

 Since nearly two decades threats to public security through events such as 9/11, the Madrid (2004) and London (2005) bombings and more recently the Paris… (more)

Subjects/Keywords: Law; Data protection; Privacy; Terrorism; public security.

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Möller, C. (2017). The evolution of data protection and privacy in the public security context : an institutional analysis of three EU data retention and access regimes. (Doctoral Dissertation). Queen Mary, University of London. Retrieved from http://qmro.qmul.ac.uk/xmlui/handle/123456789/25911 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.765979

Chicago Manual of Style (16th Edition):

Möller, Carolin. “The evolution of data protection and privacy in the public security context : an institutional analysis of three EU data retention and access regimes.” 2017. Doctoral Dissertation, Queen Mary, University of London. Accessed December 05, 2020. http://qmro.qmul.ac.uk/xmlui/handle/123456789/25911 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.765979.

MLA Handbook (7th Edition):

Möller, Carolin. “The evolution of data protection and privacy in the public security context : an institutional analysis of three EU data retention and access regimes.” 2017. Web. 05 Dec 2020.

Vancouver:

Möller C. The evolution of data protection and privacy in the public security context : an institutional analysis of three EU data retention and access regimes. [Internet] [Doctoral dissertation]. Queen Mary, University of London; 2017. [cited 2020 Dec 05]. Available from: http://qmro.qmul.ac.uk/xmlui/handle/123456789/25911 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.765979.

Council of Science Editors:

Möller C. The evolution of data protection and privacy in the public security context : an institutional analysis of three EU data retention and access regimes. [Doctoral Dissertation]. Queen Mary, University of London; 2017. Available from: http://qmro.qmul.ac.uk/xmlui/handle/123456789/25911 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.765979


Columbia University

26. Spahn, Riley Burns. New Data Protection Abstractions for Emerging Mobile and Big Data Workloads.

Degree: 2020, Columbia University

 Two recent shifts in computing are challenging the effectiveness of traditional approaches to data protection. Emerging machine learning workloads have complex access patterns and unique… (more)

Subjects/Keywords: Computer science; Data protection; Mobile computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Spahn, R. B. (2020). New Data Protection Abstractions for Emerging Mobile and Big Data Workloads. (Doctoral Dissertation). Columbia University. Retrieved from https://doi.org/10.7916/d8-3xvj-xa75

Chicago Manual of Style (16th Edition):

Spahn, Riley Burns. “New Data Protection Abstractions for Emerging Mobile and Big Data Workloads.” 2020. Doctoral Dissertation, Columbia University. Accessed December 05, 2020. https://doi.org/10.7916/d8-3xvj-xa75.

MLA Handbook (7th Edition):

Spahn, Riley Burns. “New Data Protection Abstractions for Emerging Mobile and Big Data Workloads.” 2020. Web. 05 Dec 2020.

Vancouver:

Spahn RB. New Data Protection Abstractions for Emerging Mobile and Big Data Workloads. [Internet] [Doctoral dissertation]. Columbia University; 2020. [cited 2020 Dec 05]. Available from: https://doi.org/10.7916/d8-3xvj-xa75.

Council of Science Editors:

Spahn RB. New Data Protection Abstractions for Emerging Mobile and Big Data Workloads. [Doctoral Dissertation]. Columbia University; 2020. Available from: https://doi.org/10.7916/d8-3xvj-xa75


University of Vienna

27. Pehrsson, Emily. Protecting consumers from data breaches.

Degree: 2019, University of Vienna

In dieser Arbeit werden die geforderten Sicherheitsanforderungen in drei Datenschutzgesetzen in der Europäischen Union, den USA und Indien analysiert: der Datenschutz-Grundverordnung (DSGVO), dem kalifornischen Verbraucherschutzgesetz… (more)

Subjects/Keywords: 70.99 Sozialwissenschaften allgemein: Sonstiges; Data Protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pehrsson, E. (2019). Protecting consumers from data breaches. (Thesis). University of Vienna. Retrieved from http://othes.univie.ac.at/57714/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pehrsson, Emily. “Protecting consumers from data breaches.” 2019. Thesis, University of Vienna. Accessed December 05, 2020. http://othes.univie.ac.at/57714/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pehrsson, Emily. “Protecting consumers from data breaches.” 2019. Web. 05 Dec 2020.

Vancouver:

Pehrsson E. Protecting consumers from data breaches. [Internet] [Thesis]. University of Vienna; 2019. [cited 2020 Dec 05]. Available from: http://othes.univie.ac.at/57714/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pehrsson E. Protecting consumers from data breaches. [Thesis]. University of Vienna; 2019. Available from: http://othes.univie.ac.at/57714/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

28. Stevens, Leslie Anne. A public interest approach to data protection law : the meaning, value and utility of the public interest for research uses of data.

Degree: PhD, 2017, University of Edinburgh

 Due to legal uncertainty surrounding the application of key provisions of European and UK data protection law, the public interest in protecting individuals’ informational privacy… (more)

Subjects/Keywords: 342.08; public interest; privacy; data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stevens, L. A. (2017). A public interest approach to data protection law : the meaning, value and utility of the public interest for research uses of data. (Doctoral Dissertation). University of Edinburgh. Retrieved from http://hdl.handle.net/1842/25772

Chicago Manual of Style (16th Edition):

Stevens, Leslie Anne. “A public interest approach to data protection law : the meaning, value and utility of the public interest for research uses of data.” 2017. Doctoral Dissertation, University of Edinburgh. Accessed December 05, 2020. http://hdl.handle.net/1842/25772.

MLA Handbook (7th Edition):

Stevens, Leslie Anne. “A public interest approach to data protection law : the meaning, value and utility of the public interest for research uses of data.” 2017. Web. 05 Dec 2020.

Vancouver:

Stevens LA. A public interest approach to data protection law : the meaning, value and utility of the public interest for research uses of data. [Internet] [Doctoral dissertation]. University of Edinburgh; 2017. [cited 2020 Dec 05]. Available from: http://hdl.handle.net/1842/25772.

Council of Science Editors:

Stevens LA. A public interest approach to data protection law : the meaning, value and utility of the public interest for research uses of data. [Doctoral Dissertation]. University of Edinburgh; 2017. Available from: http://hdl.handle.net/1842/25772


Rutgers University

29. Kim, Jeong Hyun, 1960-. Information theft within different organizational types: a rational choice analysis.

Degree: PhD, Criminal Justice, 2015, Rutgers University

As the world becomes more connected through technology and the internet, words “identity theft” and “data breach” become part of everyday conversation, signaling the rise… (more)

Subjects/Keywords: Data protection; Computer security; Identity theft

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kim, Jeong Hyun, 1. (2015). Information theft within different organizational types: a rational choice analysis. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/47683/

Chicago Manual of Style (16th Edition):

Kim, Jeong Hyun, 1960-. “Information theft within different organizational types: a rational choice analysis.” 2015. Doctoral Dissertation, Rutgers University. Accessed December 05, 2020. https://rucore.libraries.rutgers.edu/rutgers-lib/47683/.

MLA Handbook (7th Edition):

Kim, Jeong Hyun, 1960-. “Information theft within different organizational types: a rational choice analysis.” 2015. Web. 05 Dec 2020.

Vancouver:

Kim, Jeong Hyun 1. Information theft within different organizational types: a rational choice analysis. [Internet] [Doctoral dissertation]. Rutgers University; 2015. [cited 2020 Dec 05]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/47683/.

Council of Science Editors:

Kim, Jeong Hyun 1. Information theft within different organizational types: a rational choice analysis. [Doctoral Dissertation]. Rutgers University; 2015. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/47683/


Rutgers University

30. Kar, Gorkem, 1987-. Enhancing vehicle data availability and privacy for connected cars.

Degree: PhD, Electrical and Computer Engineering, 2017, Rutgers University

 With the evolution of technology, vehicles are becoming increasingly connected and automated. They have evolved into rich sensing platforms with a plethora of diverse sensors,… (more)

Subjects/Keywords: Automotive computers; Automotive sensors; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kar, Gorkem, 1. (2017). Enhancing vehicle data availability and privacy for connected cars. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/53656/

Chicago Manual of Style (16th Edition):

Kar, Gorkem, 1987-. “Enhancing vehicle data availability and privacy for connected cars.” 2017. Doctoral Dissertation, Rutgers University. Accessed December 05, 2020. https://rucore.libraries.rutgers.edu/rutgers-lib/53656/.

MLA Handbook (7th Edition):

Kar, Gorkem, 1987-. “Enhancing vehicle data availability and privacy for connected cars.” 2017. Web. 05 Dec 2020.

Vancouver:

Kar, Gorkem 1. Enhancing vehicle data availability and privacy for connected cars. [Internet] [Doctoral dissertation]. Rutgers University; 2017. [cited 2020 Dec 05]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/53656/.

Council of Science Editors:

Kar, Gorkem 1. Enhancing vehicle data availability and privacy for connected cars. [Doctoral Dissertation]. Rutgers University; 2017. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/53656/

[1] [2] [3] [4] [5] … [26]

.