Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(enhancing technologies). Showing records 1 – 22 of 22 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of Waterloo

1. Devet, Casey. The Best of Both Worlds: Combining Information-Theoretic and Computational Private Information Retrieval for Communication Efficiency.

Degree: 2014, University of Waterloo

 The goal of Private Information Retrieval (PIR) is the ability to query a database successfully without the operator of the database server discovering which record(s)… (more)

Subjects/Keywords: private information retrieval; privacy enhancing technologies; privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Devet, C. (2014). The Best of Both Worlds: Combining Information-Theoretic and Computational Private Information Retrieval for Communication Efficiency. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/8640

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Devet, Casey. “The Best of Both Worlds: Combining Information-Theoretic and Computational Private Information Retrieval for Communication Efficiency.” 2014. Thesis, University of Waterloo. Accessed July 10, 2020. http://hdl.handle.net/10012/8640.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Devet, Casey. “The Best of Both Worlds: Combining Information-Theoretic and Computational Private Information Retrieval for Communication Efficiency.” 2014. Web. 10 Jul 2020.

Vancouver:

Devet C. The Best of Both Worlds: Combining Information-Theoretic and Computational Private Information Retrieval for Communication Efficiency. [Internet] [Thesis]. University of Waterloo; 2014. [cited 2020 Jul 10]. Available from: http://hdl.handle.net/10012/8640.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Devet C. The Best of Both Worlds: Combining Information-Theoretic and Computational Private Information Retrieval for Communication Efficiency. [Thesis]. University of Waterloo; 2014. Available from: http://hdl.handle.net/10012/8640

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Pretoria

2. Van Staden, W.J.S. (Wynand Johannes Christiaan). A model for compound purposes and reasons as a privacy enhancing technology in a relational database.

Degree: Computer Science, 2011, University of Pretoria

 The protection of privacy related information of the individual is receiving increasing attention. Particular focus is on the protection of user interaction with other users… (more)

Subjects/Keywords: Purposes; Privacy enhancing technologies; Privacy; Compound purposes; Verification; Privacy agreements; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Staden, W. J. S. (. (2011). A model for compound purposes and reasons as a privacy enhancing technology in a relational database. (Doctoral Dissertation). University of Pretoria. Retrieved from http://hdl.handle.net/2263/26818

Chicago Manual of Style (16th Edition):

Van Staden, W J S (Wynand. “A model for compound purposes and reasons as a privacy enhancing technology in a relational database.” 2011. Doctoral Dissertation, University of Pretoria. Accessed July 10, 2020. http://hdl.handle.net/2263/26818.

MLA Handbook (7th Edition):

Van Staden, W J S (Wynand. “A model for compound purposes and reasons as a privacy enhancing technology in a relational database.” 2011. Web. 10 Jul 2020.

Vancouver:

Van Staden WJS(. A model for compound purposes and reasons as a privacy enhancing technology in a relational database. [Internet] [Doctoral dissertation]. University of Pretoria; 2011. [cited 2020 Jul 10]. Available from: http://hdl.handle.net/2263/26818.

Council of Science Editors:

Van Staden WJS(. A model for compound purposes and reasons as a privacy enhancing technology in a relational database. [Doctoral Dissertation]. University of Pretoria; 2011. Available from: http://hdl.handle.net/2263/26818


University of Pretoria

3. [No author]. A model for compound purposes and reasons as a privacy enhancing technology in a relational database .

Degree: 2011, University of Pretoria

 The protection of privacy related information of the individual is receiving increasing attention. Particular focus is on the protection of user interaction with other users… (more)

Subjects/Keywords: Purposes; Privacy enhancing technologies; Privacy; Compound purposes; Verification; Privacy agreements; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2011). A model for compound purposes and reasons as a privacy enhancing technology in a relational database . (Doctoral Dissertation). University of Pretoria. Retrieved from http://upetd.up.ac.za/thesis/available/etd-07292011-094636/

Chicago Manual of Style (16th Edition):

author], [No. “A model for compound purposes and reasons as a privacy enhancing technology in a relational database .” 2011. Doctoral Dissertation, University of Pretoria. Accessed July 10, 2020. http://upetd.up.ac.za/thesis/available/etd-07292011-094636/.

MLA Handbook (7th Edition):

author], [No. “A model for compound purposes and reasons as a privacy enhancing technology in a relational database .” 2011. Web. 10 Jul 2020.

Vancouver:

author] [. A model for compound purposes and reasons as a privacy enhancing technology in a relational database . [Internet] [Doctoral dissertation]. University of Pretoria; 2011. [cited 2020 Jul 10]. Available from: http://upetd.up.ac.za/thesis/available/etd-07292011-094636/.

Council of Science Editors:

author] [. A model for compound purposes and reasons as a privacy enhancing technology in a relational database . [Doctoral Dissertation]. University of Pretoria; 2011. Available from: http://upetd.up.ac.za/thesis/available/etd-07292011-094636/

4. Wang, Tao. Website Fingerprinting: Attacks and Defenses.

Degree: 2016, University of Waterloo

 Website fingerprinting attacks allow a local, passive eavesdropper to determine a client's web activity by leveraging features from her packet sequence. These attacks break the… (more)

Subjects/Keywords: privacy; privacy-enhancing technologies; website fingerprinting; anonymity networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, T. (2016). Website Fingerprinting: Attacks and Defenses. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/10123

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Tao. “Website Fingerprinting: Attacks and Defenses.” 2016. Thesis, University of Waterloo. Accessed July 10, 2020. http://hdl.handle.net/10012/10123.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Tao. “Website Fingerprinting: Attacks and Defenses.” 2016. Web. 10 Jul 2020.

Vancouver:

Wang T. Website Fingerprinting: Attacks and Defenses. [Internet] [Thesis]. University of Waterloo; 2016. [cited 2020 Jul 10]. Available from: http://hdl.handle.net/10012/10123.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang T. Website Fingerprinting: Attacks and Defenses. [Thesis]. University of Waterloo; 2016. Available from: http://hdl.handle.net/10012/10123

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

5. Aïvodji, Ulrich Matchi. Technologies respectueuses de la vie privée pour le covoiturage : Privacy-enhancing technologies for ridesharing.

Degree: Docteur es, Sureté de logiciel et calcul de haute performance, 2018, Université Toulouse III – Paul Sabatier

L'émergence des téléphones mobiles et objets connectés a profondément changé notre vie quotidienne. Ces dispositifs, grâce à la multitude de capteurs qu'ils embarquent, permettent l'accès… (more)

Subjects/Keywords: Vie privée; Covoiturage; Technologies renforçant la vie privée; Privacy; Ridesharing; Privacy enhancing technologies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aïvodji, U. M. (2018). Technologies respectueuses de la vie privée pour le covoiturage : Privacy-enhancing technologies for ridesharing. (Doctoral Dissertation). Université Toulouse III – Paul Sabatier. Retrieved from http://www.theses.fr/2018TOU30017

Chicago Manual of Style (16th Edition):

Aïvodji, Ulrich Matchi. “Technologies respectueuses de la vie privée pour le covoiturage : Privacy-enhancing technologies for ridesharing.” 2018. Doctoral Dissertation, Université Toulouse III – Paul Sabatier. Accessed July 10, 2020. http://www.theses.fr/2018TOU30017.

MLA Handbook (7th Edition):

Aïvodji, Ulrich Matchi. “Technologies respectueuses de la vie privée pour le covoiturage : Privacy-enhancing technologies for ridesharing.” 2018. Web. 10 Jul 2020.

Vancouver:

Aïvodji UM. Technologies respectueuses de la vie privée pour le covoiturage : Privacy-enhancing technologies for ridesharing. [Internet] [Doctoral dissertation]. Université Toulouse III – Paul Sabatier; 2018. [cited 2020 Jul 10]. Available from: http://www.theses.fr/2018TOU30017.

Council of Science Editors:

Aïvodji UM. Technologies respectueuses de la vie privée pour le covoiturage : Privacy-enhancing technologies for ridesharing. [Doctoral Dissertation]. Université Toulouse III – Paul Sabatier; 2018. Available from: http://www.theses.fr/2018TOU30017


University of Waterloo

6. Mazmudar, Miti. Mitigator: Privacy policy compliance using Intel SGX.

Degree: 2019, University of Waterloo

 Privacy policies have been known to be hard to read and understand by internet users and yet users are obliged to accept these one-sided terms… (more)

Subjects/Keywords: Intel SGX; Privacy policies; Privacy-enhancing technologies; Trusted hardware platforms; source-code compliance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mazmudar, M. (2019). Mitigator: Privacy policy compliance using Intel SGX. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/14765

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mazmudar, Miti. “Mitigator: Privacy policy compliance using Intel SGX.” 2019. Thesis, University of Waterloo. Accessed July 10, 2020. http://hdl.handle.net/10012/14765.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mazmudar, Miti. “Mitigator: Privacy policy compliance using Intel SGX.” 2019. Web. 10 Jul 2020.

Vancouver:

Mazmudar M. Mitigator: Privacy policy compliance using Intel SGX. [Internet] [Thesis]. University of Waterloo; 2019. [cited 2020 Jul 10]. Available from: http://hdl.handle.net/10012/14765.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mazmudar M. Mitigator: Privacy policy compliance using Intel SGX. [Thesis]. University of Waterloo; 2019. Available from: http://hdl.handle.net/10012/14765

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

7. Henry, Ryan. Efficient Zero-Knowledge Proofs and Applications.

Degree: 2014, University of Waterloo

 Zero-knowledge proofs provide a means for a prover to convince a verifier that some claim is true and nothing more. The ability to prove statements… (more)

Subjects/Keywords: Batch zero-knowledge proofs; efficiency; privacy enhancing technologies; applied cryptography; lattice attacks; cryptanalysis; anonymous blacklisting

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Henry, R. (2014). Efficient Zero-Knowledge Proofs and Applications. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/8621

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Henry, Ryan. “Efficient Zero-Knowledge Proofs and Applications.” 2014. Thesis, University of Waterloo. Accessed July 10, 2020. http://hdl.handle.net/10012/8621.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Henry, Ryan. “Efficient Zero-Knowledge Proofs and Applications.” 2014. Web. 10 Jul 2020.

Vancouver:

Henry R. Efficient Zero-Knowledge Proofs and Applications. [Internet] [Thesis]. University of Waterloo; 2014. [cited 2020 Jul 10]. Available from: http://hdl.handle.net/10012/8621.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Henry R. Efficient Zero-Knowledge Proofs and Applications. [Thesis]. University of Waterloo; 2014. Available from: http://hdl.handle.net/10012/8621

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

8. Henry, Ryan. Nymbler: Privacy-enhanced Protection from Abuses of Anonymity.

Degree: 2011, University of Waterloo

 Anonymous communications networks help to solve the real and important problem of enabling users to communicate privately over the Internet. However, by doing so, they… (more)

Subjects/Keywords: Privacy; privacy enhancing technologies; PETs; anonymity; authentication; anonymous blacklisting; anonymous revocation; privacy-enhanced revocation; zero-knowledge proofs; anonymous credentials; restricted blind signatures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Henry, R. (2011). Nymbler: Privacy-enhanced Protection from Abuses of Anonymity. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/5699

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Henry, Ryan. “Nymbler: Privacy-enhanced Protection from Abuses of Anonymity.” 2011. Thesis, University of Waterloo. Accessed July 10, 2020. http://hdl.handle.net/10012/5699.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Henry, Ryan. “Nymbler: Privacy-enhanced Protection from Abuses of Anonymity.” 2011. Web. 10 Jul 2020.

Vancouver:

Henry R. Nymbler: Privacy-enhanced Protection from Abuses of Anonymity. [Internet] [Thesis]. University of Waterloo; 2011. [cited 2020 Jul 10]. Available from: http://hdl.handle.net/10012/5699.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Henry R. Nymbler: Privacy-enhanced Protection from Abuses of Anonymity. [Thesis]. University of Waterloo; 2011. Available from: http://hdl.handle.net/10012/5699

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


RMIT University

9. Madani, S. Improving security and efficiency of mix-based anonymous communication systems.

Degree: 2015, RMIT University

 The communication layer leaks important private information even in the presence of encryption, which makes anonymous communication a fundamental element of systems that protect the… (more)

Subjects/Keywords: Fields of Research; Anonymous Communication Systems; Privacy Enhancing Technologies; Multi-Binomial Shared-Pool Mix; Multi-Binomial Independent-Pool Mix; Communication Metadata; Anti-Censorship

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Madani, S. (2015). Improving security and efficiency of mix-based anonymous communication systems. (Thesis). RMIT University. Retrieved from http://researchbank.rmit.edu.au/view/rmit:161447

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Madani, S. “Improving security and efficiency of mix-based anonymous communication systems.” 2015. Thesis, RMIT University. Accessed July 10, 2020. http://researchbank.rmit.edu.au/view/rmit:161447.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Madani, S. “Improving security and efficiency of mix-based anonymous communication systems.” 2015. Web. 10 Jul 2020.

Vancouver:

Madani S. Improving security and efficiency of mix-based anonymous communication systems. [Internet] [Thesis]. RMIT University; 2015. [cited 2020 Jul 10]. Available from: http://researchbank.rmit.edu.au/view/rmit:161447.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Madani S. Improving security and efficiency of mix-based anonymous communication systems. [Thesis]. RMIT University; 2015. Available from: http://researchbank.rmit.edu.au/view/rmit:161447

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

10. Huang, Hsiao-Ying. Examining older users’ online privacy-enhancing experience from a human-computer interaction perspective.

Degree: PhD, Informatics, 2019, University of Illinois – Urbana-Champaign

 The advancement of Internet technologies, including instant and unlimited access to information and services, has been an excellent source of support for older adults. However,… (more)

Subjects/Keywords: Human-Computer Interaction; Privacy-enhancing technologies; Information privacy; Empirical study

…Privacy-Enhancing Technologies (PETs) to protect users' information privacy. In… …Privacy-Enhancing Technologies (PETs) (Goldberg et al., 1997). In order to… …Internet technologies becomes an excellent source of support for healthy aging among older adults… …convenience offered by Internet technologies is a double-edged sword, because its pervasive and… …above, online privacy is a critical aspect to consider when introducing Internet technologies… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, H. (2019). Examining older users’ online privacy-enhancing experience from a human-computer interaction perspective. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/104761

Chicago Manual of Style (16th Edition):

Huang, Hsiao-Ying. “Examining older users’ online privacy-enhancing experience from a human-computer interaction perspective.” 2019. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed July 10, 2020. http://hdl.handle.net/2142/104761.

MLA Handbook (7th Edition):

Huang, Hsiao-Ying. “Examining older users’ online privacy-enhancing experience from a human-computer interaction perspective.” 2019. Web. 10 Jul 2020.

Vancouver:

Huang H. Examining older users’ online privacy-enhancing experience from a human-computer interaction perspective. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2019. [cited 2020 Jul 10]. Available from: http://hdl.handle.net/2142/104761.

Council of Science Editors:

Huang H. Examining older users’ online privacy-enhancing experience from a human-computer interaction perspective. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2019. Available from: http://hdl.handle.net/2142/104761

11. Grahn, Christian. Implementing Transparency Logging for an Issue Tracking System.

Degree: Computer Science, 2012, Karlstad University

  On the Internet today, users are accustomed to disclosing personal information when accessing a new service. When a user does so, there is rarely… (more)

Subjects/Keywords: logging; transparency; PET; privacy enhancing technologies; Computer Sciences; Datavetenskap (datalogi)

…them may be collected and used. Our work in this thesis builds on another Privacy Enhancing… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Grahn, C. (2012). Implementing Transparency Logging for an Issue Tracking System. (Thesis). Karlstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-13616

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Grahn, Christian. “Implementing Transparency Logging for an Issue Tracking System.” 2012. Thesis, Karlstad University. Accessed July 10, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-13616.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Grahn, Christian. “Implementing Transparency Logging for an Issue Tracking System.” 2012. Web. 10 Jul 2020.

Vancouver:

Grahn C. Implementing Transparency Logging for an Issue Tracking System. [Internet] [Thesis]. Karlstad University; 2012. [cited 2020 Jul 10]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-13616.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Grahn C. Implementing Transparency Logging for an Issue Tracking System. [Thesis]. Karlstad University; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-13616

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Kent State University

12. Othman, Salem. Autonomous Priority Based Routing for Online Social Networks.

Degree: PhD, College of Arts and Sciences / Department of Computer Science, 2018, Kent State University

 Social Routing in Online Social Networks (OSNs) is very challenging, as it must handle privacy and performance. This study proposes a Social Online Routing (SOR)… (more)

Subjects/Keywords: Computer Science; Online social networks; Social Priority based Routing; SOR Protocol; Social routing and forwarding; Simulation; Social requests; Anonymization; Privacy leakage; Privacy Enhancing Technologies; Social based Routing; Request Dissemination; Human dynamics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Othman, S. (2018). Autonomous Priority Based Routing for Online Social Networks. (Doctoral Dissertation). Kent State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=kent1526481500145998

Chicago Manual of Style (16th Edition):

Othman, Salem. “Autonomous Priority Based Routing for Online Social Networks.” 2018. Doctoral Dissertation, Kent State University. Accessed July 10, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=kent1526481500145998.

MLA Handbook (7th Edition):

Othman, Salem. “Autonomous Priority Based Routing for Online Social Networks.” 2018. Web. 10 Jul 2020.

Vancouver:

Othman S. Autonomous Priority Based Routing for Online Social Networks. [Internet] [Doctoral dissertation]. Kent State University; 2018. [cited 2020 Jul 10]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=kent1526481500145998.

Council of Science Editors:

Othman S. Autonomous Priority Based Routing for Online Social Networks. [Doctoral Dissertation]. Kent State University; 2018. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=kent1526481500145998

13. Tasidou, Aimilia. Personal data utilization and protection through algorithms and protocols for privacy-preserving electronic transactions.

Degree: 2015, Democritus University of Thrace (DUTH); Δημοκρίτειο Πανεπιστήμιο Θράκης (ΔΠΘ)

 The widespread use of information and communication technologies and electronic transactions today leads to vast amounts of personal data being gathered and stored, making the… (more)

Subjects/Keywords: Ιδιωτικότητα; Προστασία ιδιωτικότητας; Τεχνολογίες προάσπισης ιδιωτικότητας; Ανταλλαγή και προστασία προσωπικών δεδομένων; Ασφάλεια δεδομένων; Οικονομική διάσταση ιδιωτικότητας; Διαχείριση προσωπικών δεδομένων; Privacy; Privacy protection; Privacy enhancing technologies; Exchange & protection of personal data; Data security; Economics of privacy; Personal data management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tasidou, A. (2015). Personal data utilization and protection through algorithms and protocols for privacy-preserving electronic transactions. (Thesis). Democritus University of Thrace (DUTH); Δημοκρίτειο Πανεπιστήμιο Θράκης (ΔΠΘ). Retrieved from http://hdl.handle.net/10442/hedi/36413

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tasidou, Aimilia. “Personal data utilization and protection through algorithms and protocols for privacy-preserving electronic transactions.” 2015. Thesis, Democritus University of Thrace (DUTH); Δημοκρίτειο Πανεπιστήμιο Θράκης (ΔΠΘ). Accessed July 10, 2020. http://hdl.handle.net/10442/hedi/36413.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tasidou, Aimilia. “Personal data utilization and protection through algorithms and protocols for privacy-preserving electronic transactions.” 2015. Web. 10 Jul 2020.

Vancouver:

Tasidou A. Personal data utilization and protection through algorithms and protocols for privacy-preserving electronic transactions. [Internet] [Thesis]. Democritus University of Thrace (DUTH); Δημοκρίτειο Πανεπιστήμιο Θράκης (ΔΠΘ); 2015. [cited 2020 Jul 10]. Available from: http://hdl.handle.net/10442/hedi/36413.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tasidou A. Personal data utilization and protection through algorithms and protocols for privacy-preserving electronic transactions. [Thesis]. Democritus University of Thrace (DUTH); Δημοκρίτειο Πανεπιστήμιο Θράκης (ΔΠΘ); 2015. Available from: http://hdl.handle.net/10442/hedi/36413

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Queensland

14. Caro Beveridge, Fernanda. Enhancing seed-based restoration in south-east Queensland using Australian native species.

Degree: School of Agriculture and Food Sciences, 2020, University of Queensland

Subjects/Keywords: Direct seeding; germination ecology; seed dormancy; seed pre-treatments; seed-enhancing technologies; 0502 Environmental Science and Management; 0607 Plant Biology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Caro Beveridge, F. (2020). Enhancing seed-based restoration in south-east Queensland using Australian native species. (Thesis). University of Queensland. Retrieved from https://espace.library.uq.edu.au/view/UQ:b459617/thumbnail_s4342662_final_thesis_pdf_t.jpg ; https://espace.library.uq.edu.au/view/UQ:b459617/s4342662_final_thesis_pdf.pdf ; https://espace.library.uq.edu.au/view/UQ:b459617

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Caro Beveridge, Fernanda. “Enhancing seed-based restoration in south-east Queensland using Australian native species.” 2020. Thesis, University of Queensland. Accessed July 10, 2020. https://espace.library.uq.edu.au/view/UQ:b459617/thumbnail_s4342662_final_thesis_pdf_t.jpg ; https://espace.library.uq.edu.au/view/UQ:b459617/s4342662_final_thesis_pdf.pdf ; https://espace.library.uq.edu.au/view/UQ:b459617.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Caro Beveridge, Fernanda. “Enhancing seed-based restoration in south-east Queensland using Australian native species.” 2020. Web. 10 Jul 2020.

Vancouver:

Caro Beveridge F. Enhancing seed-based restoration in south-east Queensland using Australian native species. [Internet] [Thesis]. University of Queensland; 2020. [cited 2020 Jul 10]. Available from: https://espace.library.uq.edu.au/view/UQ:b459617/thumbnail_s4342662_final_thesis_pdf_t.jpg ; https://espace.library.uq.edu.au/view/UQ:b459617/s4342662_final_thesis_pdf.pdf ; https://espace.library.uq.edu.au/view/UQ:b459617.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Caro Beveridge F. Enhancing seed-based restoration in south-east Queensland using Australian native species. [Thesis]. University of Queensland; 2020. Available from: https://espace.library.uq.edu.au/view/UQ:b459617/thumbnail_s4342662_final_thesis_pdf_t.jpg ; https://espace.library.uq.edu.au/view/UQ:b459617/s4342662_final_thesis_pdf.pdf ; https://espace.library.uq.edu.au/view/UQ:b459617

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

15. Kolivodiakos, Paraskevas. Evaluating End Users’ Online Privacy Preferences and Identifying PET Design Requirements: A Literature Review.

Degree: Computer Science, 2018, Luleå University of Technology

  In this research end user privacy preferences regarding online resources web and mobile applications and websites are investigated and design requirements needed for the… (more)

Subjects/Keywords: Evaluating Privacy Preferences; privacy enhancing tools technologies design requirements; privacy in web apps; privacy in android; Computer Systems; Datorsystem

enhancing technologies and tools, understand how they function and how do they handle end user… …technologies) though? As stated (PISA Consortium, 2003), Privacy Enhancing… …x29;- Privacy Enhancing Tool(s) RQ – Research Question Sub RQ – Sub research… …avoid and how to tackle with problems they, face. What are PET‟s (privacy enhancing tools… …Technologies (PET‟s) came as a response to the ever growing need for end user privacy… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kolivodiakos, P. (2018). Evaluating End Users’ Online Privacy Preferences and Identifying PET Design Requirements: A Literature Review. (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-67720

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kolivodiakos, Paraskevas. “Evaluating End Users’ Online Privacy Preferences and Identifying PET Design Requirements: A Literature Review.” 2018. Thesis, Luleå University of Technology. Accessed July 10, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-67720.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kolivodiakos, Paraskevas. “Evaluating End Users’ Online Privacy Preferences and Identifying PET Design Requirements: A Literature Review.” 2018. Web. 10 Jul 2020.

Vancouver:

Kolivodiakos P. Evaluating End Users’ Online Privacy Preferences and Identifying PET Design Requirements: A Literature Review. [Internet] [Thesis]. Luleå University of Technology; 2018. [cited 2020 Jul 10]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-67720.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kolivodiakos P. Evaluating End Users’ Online Privacy Preferences and Identifying PET Design Requirements: A Literature Review. [Thesis]. Luleå University of Technology; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-67720

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

16. Purra, Joel. Swedes Online: You Are More Tracked Than You Think.

Degree: The Institute of Technology, 2015, Linköping UniversityLinköping University

When you are browsing websites, third-party resources record your online habits; such tracking can be considered an invasion of privacy. It was previously unknown how many… (more)

Subjects/Keywords: measurement; security; privacy; internet; web; http; https; tracking; domains; web browser; website retrieval; redirects; privacy enhancing technologies; online advertising; web analytics; content blocking; google; facebook; twitter; adblock; disconnect.me; pjantomjs; http archive; alexa; sweden; Computer Sciences; Datavetenskap (datalogi); Media and Communication Technology; Medieteknik; Information Systems; Systemvetenskap, informationssystem och informatik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Purra, J. (2015). Swedes Online: You Are More Tracked Than You Think. (Thesis). Linköping UniversityLinköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-117075

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Purra, Joel. “Swedes Online: You Are More Tracked Than You Think.” 2015. Thesis, Linköping UniversityLinköping University. Accessed July 10, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-117075.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Purra, Joel. “Swedes Online: You Are More Tracked Than You Think.” 2015. Web. 10 Jul 2020.

Vancouver:

Purra J. Swedes Online: You Are More Tracked Than You Think. [Internet] [Thesis]. Linköping UniversityLinköping University; 2015. [cited 2020 Jul 10]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-117075.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Purra J. Swedes Online: You Are More Tracked Than You Think. [Thesis]. Linköping UniversityLinköping University; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-117075

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

17. Kelkboom, E.J.C. On the performance of helper data template protection schemes.

Degree: 2010, University of Twente

 The use of biometrics looks promising as it is already being applied in elec- tronic passports, ePassports, on a global scale. Because the biometric data… (more)

Subjects/Keywords: IR-73272; METIS-271061; helper data systems (HDS); privacy enhancing technologies (PET); EWI-18568; EC Grant Agreement nr.: FP6/026845; bit extraction; Template Protection; Biometrics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kelkboom, E. J. C. (2010). On the performance of helper data template protection schemes. (Doctoral Dissertation). University of Twente. Retrieved from https://research.utwente.nl/en/publications/on-the-performance-of-helper-data-template-protection-schemes(fec39188-dab8-4242-be9a-0e3bfa448000).html ; urn:nbn:nl:ui:28-73272 ; fec39188-dab8-4242-be9a-0e3bfa448000 ; 10.3990/1.9789036530743 ; urn:isbn:978-90-365-3074-3 ; urn:nbn:nl:ui:28-73272 ; https://research.utwente.nl/en/publications/on-the-performance-of-helper-data-template-protection-schemes(fec39188-dab8-4242-be9a-0e3bfa448000).html

Chicago Manual of Style (16th Edition):

Kelkboom, E J C. “On the performance of helper data template protection schemes.” 2010. Doctoral Dissertation, University of Twente. Accessed July 10, 2020. https://research.utwente.nl/en/publications/on-the-performance-of-helper-data-template-protection-schemes(fec39188-dab8-4242-be9a-0e3bfa448000).html ; urn:nbn:nl:ui:28-73272 ; fec39188-dab8-4242-be9a-0e3bfa448000 ; 10.3990/1.9789036530743 ; urn:isbn:978-90-365-3074-3 ; urn:nbn:nl:ui:28-73272 ; https://research.utwente.nl/en/publications/on-the-performance-of-helper-data-template-protection-schemes(fec39188-dab8-4242-be9a-0e3bfa448000).html.

MLA Handbook (7th Edition):

Kelkboom, E J C. “On the performance of helper data template protection schemes.” 2010. Web. 10 Jul 2020.

Vancouver:

Kelkboom EJC. On the performance of helper data template protection schemes. [Internet] [Doctoral dissertation]. University of Twente; 2010. [cited 2020 Jul 10]. Available from: https://research.utwente.nl/en/publications/on-the-performance-of-helper-data-template-protection-schemes(fec39188-dab8-4242-be9a-0e3bfa448000).html ; urn:nbn:nl:ui:28-73272 ; fec39188-dab8-4242-be9a-0e3bfa448000 ; 10.3990/1.9789036530743 ; urn:isbn:978-90-365-3074-3 ; urn:nbn:nl:ui:28-73272 ; https://research.utwente.nl/en/publications/on-the-performance-of-helper-data-template-protection-schemes(fec39188-dab8-4242-be9a-0e3bfa448000).html.

Council of Science Editors:

Kelkboom EJC. On the performance of helper data template protection schemes. [Doctoral Dissertation]. University of Twente; 2010. Available from: https://research.utwente.nl/en/publications/on-the-performance-of-helper-data-template-protection-schemes(fec39188-dab8-4242-be9a-0e3bfa448000).html ; urn:nbn:nl:ui:28-73272 ; fec39188-dab8-4242-be9a-0e3bfa448000 ; 10.3990/1.9789036530743 ; urn:isbn:978-90-365-3074-3 ; urn:nbn:nl:ui:28-73272 ; https://research.utwente.nl/en/publications/on-the-performance-of-helper-data-template-protection-schemes(fec39188-dab8-4242-be9a-0e3bfa448000).html


University of Vienna

18. Lang, Barbara. Risks and state of the art in privacy and trust.

Degree: 2009, University of Vienna

Diese Arbeit befasst sich mit Datenschutz im Allgemeinen und der Änderung des Stellenwerts nach den Ereignissen des 11. Septembers 2001. Dabei wird besonderes Augenmerk auf… (more)

Subjects/Keywords: 54.08 Informatik in Beziehung zu Mensch und Gesellschaft; 54.38 Computersicherheit; 86.55 Datenschutzrecht; Datenschutz / 11.September 2001 / Risiken / Schutzmaßnahmen; privacy / trust / September 11, 2001 / threats / privacy enhancing technologies / PETs

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lang, B. (2009). Risks and state of the art in privacy and trust. (Thesis). University of Vienna. Retrieved from http://othes.univie.ac.at/4200/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lang, Barbara. “Risks and state of the art in privacy and trust.” 2009. Thesis, University of Vienna. Accessed July 10, 2020. http://othes.univie.ac.at/4200/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lang, Barbara. “Risks and state of the art in privacy and trust.” 2009. Web. 10 Jul 2020.

Vancouver:

Lang B. Risks and state of the art in privacy and trust. [Internet] [Thesis]. University of Vienna; 2009. [cited 2020 Jul 10]. Available from: http://othes.univie.ac.at/4200/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lang B. Risks and state of the art in privacy and trust. [Thesis]. University of Vienna; 2009. Available from: http://othes.univie.ac.at/4200/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

19. Μουλίνος, Κωνσταντίνος. Τεχνολογική υποδομή προστασίας δεδομένων στο διαδίκτυο.

Degree: 2003, Athens University Economics and Business (AUEB); Οικονομικό Πανεπιστήμιο Αθηνών

 The subject of this doctoral thesis is related with Privacy Enhancing Technologies (PETs) aiming to support a functional model which is not depended on any… (more)

Subjects/Keywords: Προστασία δεδομένων; Ιδιωτικότητα; Τεχνολογίες ασφαλείας πληροφοριών και επικοινωνιών; Τεχνολογίες προάσπισης ιδιωτικότητας; Αρχές προστασίας δεδομένων; Υποδομή δημόσιου κλειδιού; Πολιτική προστασίας δεδομένων; Ψηφιακή σφραγίδα; Data protection; Privacy; Information and communication security technologies; Privacy enhancing technologies; Data protection principles; Public key infrastructures; Privacy policy; Digital seal

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Μουλίνος, . . (2003). Τεχνολογική υποδομή προστασίας δεδομένων στο διαδίκτυο. (Thesis). Athens University Economics and Business (AUEB); Οικονομικό Πανεπιστήμιο Αθηνών. Retrieved from http://hdl.handle.net/10442/hedi/17694

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Μουλίνος, Κωνσταντίνος. “Τεχνολογική υποδομή προστασίας δεδομένων στο διαδίκτυο.” 2003. Thesis, Athens University Economics and Business (AUEB); Οικονομικό Πανεπιστήμιο Αθηνών. Accessed July 10, 2020. http://hdl.handle.net/10442/hedi/17694.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Μουλίνος, Κωνσταντίνος. “Τεχνολογική υποδομή προστασίας δεδομένων στο διαδίκτυο.” 2003. Web. 10 Jul 2020.

Vancouver:

Μουλίνος . Τεχνολογική υποδομή προστασίας δεδομένων στο διαδίκτυο. [Internet] [Thesis]. Athens University Economics and Business (AUEB); Οικονομικό Πανεπιστήμιο Αθηνών; 2003. [cited 2020 Jul 10]. Available from: http://hdl.handle.net/10442/hedi/17694.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Μουλίνος . Τεχνολογική υποδομή προστασίας δεδομένων στο διαδίκτυο. [Thesis]. Athens University Economics and Business (AUEB); Οικονομικό Πανεπιστήμιο Αθηνών; 2003. Available from: http://hdl.handle.net/10442/hedi/17694

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

20. Borking, J.J.F.M. Privacyrecht is code. Over het gebruik van Privacy Enhancing Technologies.

Degree: 2010, Kluwer

 Omgevingsanalyse van onze samenleving toont aan dat door de toenemende informatisering privacyproblemen (identiteitsfraude, datalekken) zullen toenemen. Door gegevensontdekkende-, gegevensvolgende- en gegevenskoppelende technologieën erodeert de privacy… (more)

Subjects/Keywords: Privacy law; Privacy enhancing technologies; Legal specifications; Surveillance state; Privacy risk analysis, Privacy ontologies, Identity protector; Obligation management system, Data track; Sticky policies; Pseudo-identities; Adoption factors; Organizational maturity, Return on investment for privacy investments; S-curves, Ambient intelligence; Privacy law; Privacy enhancing technologies; Legal specifications; Surveillance state; Privacy risk analysis, Privacy ontologies, Identity protector; Obligation management system, Data track; Sticky policies; Pseudo-identities; Adoption factors; Organizational maturity, Return on investment for privacy investments; S-curves, Ambient intelligence

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Borking, J. J. F. M. (2010). Privacyrecht is code. Over het gebruik van Privacy Enhancing Technologies. (Doctoral Dissertation). Kluwer. Retrieved from http://hdl.handle.net/1887/15660

Chicago Manual of Style (16th Edition):

Borking, J J F M. “Privacyrecht is code. Over het gebruik van Privacy Enhancing Technologies.” 2010. Doctoral Dissertation, Kluwer. Accessed July 10, 2020. http://hdl.handle.net/1887/15660.

MLA Handbook (7th Edition):

Borking, J J F M. “Privacyrecht is code. Over het gebruik van Privacy Enhancing Technologies.” 2010. Web. 10 Jul 2020.

Vancouver:

Borking JJFM. Privacyrecht is code. Over het gebruik van Privacy Enhancing Technologies. [Internet] [Doctoral dissertation]. Kluwer; 2010. [cited 2020 Jul 10]. Available from: http://hdl.handle.net/1887/15660.

Council of Science Editors:

Borking JJFM. Privacyrecht is code. Over het gebruik van Privacy Enhancing Technologies. [Doctoral Dissertation]. Kluwer; 2010. Available from: http://hdl.handle.net/1887/15660

21. Muriithi, Paul Mutuanyingi. A Case for Memory Enhancement: Ethical, Social, Legal, and Policy Implications for Enhancing the Memory.

Degree: 2014, University of Manchester

 The desire to enhance and make ourselves better is not a new one and it has continued to intrigue throughout the ages. Individuals have continued… (more)

Subjects/Keywords: adderall; ampakines; amphetamine; appeal to empathy; aricept; Aristotle; Baddeley; benzodiazepines; bioethics; Bostrom; brain stimulation; brain-computer interface; brain-machine interface; Brunet; Buchanan; caffeine; Cahil; Caplan; case; coercion; computers; confidentiality; consent; consequentialist; consistency; consolidation; conventional; criminal; damages; d-amphetamine; declarative memory; deep brain stimulation; Degrazia; deontological; diazepam; discrimination; donepezil; Douglas; drug mongering; duty; duty to remember; Dworkin; electroconvulsive therapy; Elliott; emotional distress; emotions; encoding; enhancement; enhancing technologies; epistemic knowledge; equality; ethical; evidence; exelon; explicit memory; eyewitness; eyewitness evidence; eyewitness testimony; Facebook; Farah; forget; Fukuyama; galantamine; gatekeepers; Ghetti; ginkgo biloba; Glover; glucocorticoids; glucose; greater good; Habermas; Harris; health; human dignity; human diversity; human enhancement; human nature; human rights; Hunter; identity; implicit memory; inauthentic; individual autonomy; inevitable; informed consent; internet; Jackson; justice; Kamm; Kass; Kolber; laissez faire; learning; legal; legal approach; lifelogging; living authentically; Loftus; long-term memory; Lynch; malleability of memory; mastery; McKibben; medicalization; meditation; Mehlman; Meilaender; memantine; Memory; memory dampening; memory enhancement; memory manipulation; memory processes; memory retention; memory retrieval; memory storage; methylphenidate; midazalom; misidentification of witnesses; mistaken identifications; mitigation; mnemonics; modafinil; moratorium; music; negative emotions; negligence; nondeclarative memory; non-pharmacological memory enhancement; nutrition; obligation; obstruction of justice; omega-3; optimum memory; Parens; person identity; personality; perverting justice; pharmacological means; philosophical approach; photographic; physical exercise; Pitman; policy; poly unsaturated fatty acids; precautionary approach; precautionary principle; preserving memories; President’s Council; primary memory; privacy; procedural memory; propofol; propranolol; provigil; razadyne; recall; recording audio; reference memory; regulation; regulatory authorities; regulatory bodies; relational memory; remembering; remembering fitly; remembering truly; risks; ritalin; rites; rituals; rivastigmine; safety; Sahakian; Sandberg; Sandel; Savulescu; Schacter; secondary memory; short-term memory; sleep; slippery slope; social; societies' interests; species-typical; society interests; species-typical functioning; Squire; Stanton; Strange; technological means; testimony; therapeutic; therapy; therapy-enhancement distinction; traditional; transcrannial direct current stimulation; transcrannial magnetic stimulation; traumatic memories; Tulving; ultimate prize; unnatural; unnatural means; Vaiva; video devices; virtual social networking; virtue ethics; Wagenaar; well-being; Wells; working memory; wrongful; wrongful acquittals; wrongful convictions; yoga; Kahane; Giordano; Bennett; Holm; Mental Capacity Act

…x28;eds.) Performance-enhancing technologies in sports: ethical, conceptual, and… …enhancement and human enhancing technologies in a European context. They reject a total ban and a… …Implications for Enhancing the Memory October 2013 The desire to enhance and make ourselves better is… …neuroscience, and information technologies, present a wide variety of technologies to enhance many… …about all enhancement processes and technologies are unwise and they should instead be… 

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Muriithi, P. M. (2014). A Case for Memory Enhancement: Ethical, Social, Legal, and Policy Implications for Enhancing the Memory. (Doctoral Dissertation). University of Manchester. Retrieved from http://www.manchester.ac.uk/escholar/uk-ac-man-scw:220498

Chicago Manual of Style (16th Edition):

Muriithi, Paul Mutuanyingi. “A Case for Memory Enhancement: Ethical, Social, Legal, and Policy Implications for Enhancing the Memory.” 2014. Doctoral Dissertation, University of Manchester. Accessed July 10, 2020. http://www.manchester.ac.uk/escholar/uk-ac-man-scw:220498.

MLA Handbook (7th Edition):

Muriithi, Paul Mutuanyingi. “A Case for Memory Enhancement: Ethical, Social, Legal, and Policy Implications for Enhancing the Memory.” 2014. Web. 10 Jul 2020.

Vancouver:

Muriithi PM. A Case for Memory Enhancement: Ethical, Social, Legal, and Policy Implications for Enhancing the Memory. [Internet] [Doctoral dissertation]. University of Manchester; 2014. [cited 2020 Jul 10]. Available from: http://www.manchester.ac.uk/escholar/uk-ac-man-scw:220498.

Council of Science Editors:

Muriithi PM. A Case for Memory Enhancement: Ethical, Social, Legal, and Policy Implications for Enhancing the Memory. [Doctoral Dissertation]. University of Manchester; 2014. Available from: http://www.manchester.ac.uk/escholar/uk-ac-man-scw:220498

22. Muriithi, Paul Mutuanyingi. A case for memory enhancement : ethical, social, legal, and policy implications for enhancing the memory.

Degree: PhD, 2014, University of Manchester

 The desire to enhance and make ourselves better is not a new one and it has continued to intrigue throughout the ages. Individuals have continued… (more)

Subjects/Keywords: 174; adderall; ampakines; amphetamine; appeal to empathy; aricept; Aristotle; Baddeley; benzodiazepines; bioethics; Bostrom; brain stimulation; brain-computer interface; brain-machine interface; Brunet; Buchanan; caffeine; Cahil; Caplan; case; coercion; computers; confidentiality; consent; consequentialist; consistency; consolidation; conventional; criminal; damages; d-amphetamine; declarative memory; deep brain stimulation; Degrazia; deontological; diazepam; discrimination; donepezil; Douglas; drug mongering; duty; duty to remember; Dworkin; electroconvulsive therapy; Elliott; emotional distress; emotions; encoding; enhancement; enhancing technologies; epistemic knowledge; equality; ethical; evidence; exelon; explicit memory; eyewitness; eyewitness evidence; eyewitness testimony; Facebook; Farah; forget; Fukuyama; galantamine; gatekeepers; Ghetti; ginkgo biloba; Glover; glucocorticoids; glucose; greater good; Habermas; Harris; health; human dignity; human diversity; human enhancement; human nature; human rights; Hunter; identity; implicit memory; inauthentic; individual autonomy; inevitable; informed consent; internet; Jackson; justice; Kamm; Kass; Kolber; laissez faire; learning; legal; legal approach; lifelogging; living authentically; Loftus; long-term memory; Lynch; malleability of memory; mastery; McKibben; medicalization; meditation; Mehlman; Meilaender; memantine; Memory; memory dampening; memory enhancement; memory manipulation; memory processes; memory retention; memory retrieval; memory storage; methylphenidate; midazalom; misidentification of witnesses; mistaken identifications; mitigation; mnemonics; modafinil; moratorium; music; negative emotions; negligence; nondeclarative memory; non-pharmacological memory enhancement; nutrition; obligation; obstruction of justice; omega-3; optimum memory; Parens; person identity; personality; perverting justice; pharmacological means; philosophical approach; photographic; physical exercise; Pitman; policy; poly unsaturated fatty acids; precautionary approach; precautionary principle; preserving memories; President’s Council; primary memory; privacy; procedural memory; propofol; propranolol; provigil; razadyne; recall; recording audio; reference memory; regulation; regulatory authorities; regulatory bodies; relational memory; remembering; remembering fitly; remembering truly; risks; ritalin; rites; rituals; rivastigmine; safety; Sahakian; Sandberg; Sandel; Savulescu; Schacter; secondary memory; short-term memory; sleep; slippery slope; social; societies' interests; species-typical; society interests; species-typical functioning; Squire; Stanton; Strange; technological means; testimony; therapeutic; therapy; therapy-enhancement distinction; traditional; transcrannial direct current stimulation; transcrannial magnetic stimulation; traumatic memories; Tulving; ultimate prize; unnatural; unnatural means; Vaiva; video devices; virtual social networking; virtue ethics; Wagenaar; well-being; Wells; working memory; wrongful; wrongful acquittals; wrongful convictions; yoga; Kahane; Giordano; Bennett; Holm; Mental Capacity Act

…x28;eds.) Performance-enhancing technologies in sports: ethical, conceptual, and… …enhancement and human enhancing technologies in a European context. They reject a total ban and a… …Implications for Enhancing the Memory October 2013 The desire to enhance and make ourselves better is… …neuroscience, and information technologies, present a wide variety of technologies to enhance many… …about all enhancement processes and technologies are unwise and they should instead be… 

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Muriithi, P. M. (2014). A case for memory enhancement : ethical, social, legal, and policy implications for enhancing the memory. (Doctoral Dissertation). University of Manchester. Retrieved from https://www.research.manchester.ac.uk/portal/en/theses/a-case-for-memory-enhancement-ethical-social-legal-and-policy-implications-for-enhancing-the-memory(bf11d09d-6326-49d2-8ef3-a40340471acf).html ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.603223

Chicago Manual of Style (16th Edition):

Muriithi, Paul Mutuanyingi. “A case for memory enhancement : ethical, social, legal, and policy implications for enhancing the memory.” 2014. Doctoral Dissertation, University of Manchester. Accessed July 10, 2020. https://www.research.manchester.ac.uk/portal/en/theses/a-case-for-memory-enhancement-ethical-social-legal-and-policy-implications-for-enhancing-the-memory(bf11d09d-6326-49d2-8ef3-a40340471acf).html ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.603223.

MLA Handbook (7th Edition):

Muriithi, Paul Mutuanyingi. “A case for memory enhancement : ethical, social, legal, and policy implications for enhancing the memory.” 2014. Web. 10 Jul 2020.

Vancouver:

Muriithi PM. A case for memory enhancement : ethical, social, legal, and policy implications for enhancing the memory. [Internet] [Doctoral dissertation]. University of Manchester; 2014. [cited 2020 Jul 10]. Available from: https://www.research.manchester.ac.uk/portal/en/theses/a-case-for-memory-enhancement-ethical-social-legal-and-policy-implications-for-enhancing-the-memory(bf11d09d-6326-49d2-8ef3-a40340471acf).html ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.603223.

Council of Science Editors:

Muriithi PM. A case for memory enhancement : ethical, social, legal, and policy implications for enhancing the memory. [Doctoral Dissertation]. University of Manchester; 2014. Available from: https://www.research.manchester.ac.uk/portal/en/theses/a-case-for-memory-enhancement-ethical-social-legal-and-policy-implications-for-enhancing-the-memory(bf11d09d-6326-49d2-8ef3-a40340471acf).html ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.603223

.