Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(information security AND privacy). Showing records 1 – 30 of 688 total matches.

[1] [2] [3] [4] [5] … [23]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


University of Arkansas

1. Moccaro, Matthew Francis. Mobile Banking Security Using GPS and LDPC Codes.

Degree: MSCmpE, 2014, University of Arkansas

  Mobile Banking is becoming a major part of our world's financial system. Being able to manage one's finances on a mobile device can provide… (more)

Subjects/Keywords: Banking; Location; Mobile; Privacy; Security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moccaro, M. F. (2014). Mobile Banking Security Using GPS and LDPC Codes. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/2314

Chicago Manual of Style (16th Edition):

Moccaro, Matthew Francis. “Mobile Banking Security Using GPS and LDPC Codes.” 2014. Masters Thesis, University of Arkansas. Accessed January 23, 2021. https://scholarworks.uark.edu/etd/2314.

MLA Handbook (7th Edition):

Moccaro, Matthew Francis. “Mobile Banking Security Using GPS and LDPC Codes.” 2014. Web. 23 Jan 2021.

Vancouver:

Moccaro MF. Mobile Banking Security Using GPS and LDPC Codes. [Internet] [Masters thesis]. University of Arkansas; 2014. [cited 2021 Jan 23]. Available from: https://scholarworks.uark.edu/etd/2314.

Council of Science Editors:

Moccaro MF. Mobile Banking Security Using GPS and LDPC Codes. [Masters Thesis]. University of Arkansas; 2014. Available from: https://scholarworks.uark.edu/etd/2314


University of Illinois – Urbana-Champaign

2. Gong, Xun. Timing channels in traffic analysis.

Degree: PhD, 1200, 2014, University of Illinois – Urbana-Champaign

 We study two timing channel problems abstracted from practices of network traffic analysis. The first timing channel exists in a router receiving packets from two… (more)

Subjects/Keywords: privacy and anonymity; network security; information theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gong, X. (2014). Timing channels in traffic analysis. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/50541

Chicago Manual of Style (16th Edition):

Gong, Xun. “Timing channels in traffic analysis.” 2014. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed January 23, 2021. http://hdl.handle.net/2142/50541.

MLA Handbook (7th Edition):

Gong, Xun. “Timing channels in traffic analysis.” 2014. Web. 23 Jan 2021.

Vancouver:

Gong X. Timing channels in traffic analysis. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2014. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/2142/50541.

Council of Science Editors:

Gong X. Timing channels in traffic analysis. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2014. Available from: http://hdl.handle.net/2142/50541


University of Arkansas

3. Li, Ang. Privacy-Preserving Photo Taking and Accessing for Mobile Phones.

Degree: PhD, 2018, University of Arkansas

  Today, we are living in environments that are full of cameras embedded in devices such as smart phones and wearables. These mobile devices and… (more)

Subjects/Keywords: Mobile Phone; Photo; Privacy; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, A. (2018). Privacy-Preserving Photo Taking and Accessing for Mobile Phones. (Doctoral Dissertation). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/2915

Chicago Manual of Style (16th Edition):

Li, Ang. “Privacy-Preserving Photo Taking and Accessing for Mobile Phones.” 2018. Doctoral Dissertation, University of Arkansas. Accessed January 23, 2021. https://scholarworks.uark.edu/etd/2915.

MLA Handbook (7th Edition):

Li, Ang. “Privacy-Preserving Photo Taking and Accessing for Mobile Phones.” 2018. Web. 23 Jan 2021.

Vancouver:

Li A. Privacy-Preserving Photo Taking and Accessing for Mobile Phones. [Internet] [Doctoral dissertation]. University of Arkansas; 2018. [cited 2021 Jan 23]. Available from: https://scholarworks.uark.edu/etd/2915.

Council of Science Editors:

Li A. Privacy-Preserving Photo Taking and Accessing for Mobile Phones. [Doctoral Dissertation]. University of Arkansas; 2018. Available from: https://scholarworks.uark.edu/etd/2915


University of Colorado

4. Lobato, Eric Matthew. The Anonymity Engine, Minimizing Quasi-Identifiers to Strengthen K-Anonymity.

Degree: MS, 2017, University of Colorado

 The k-anonymity model has become a standard for anonymizing data. However, almost all applications of k-anonymity are used to anonymize large data sets of personally… (more)

Subjects/Keywords: k-anonymity; network security; privacy; information; web; Computer Sciences; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lobato, E. M. (2017). The Anonymity Engine, Minimizing Quasi-Identifiers to Strengthen K-Anonymity. (Masters Thesis). University of Colorado. Retrieved from https://scholar.colorado.edu/tlen_gradetds/36

Chicago Manual of Style (16th Edition):

Lobato, Eric Matthew. “The Anonymity Engine, Minimizing Quasi-Identifiers to Strengthen K-Anonymity.” 2017. Masters Thesis, University of Colorado. Accessed January 23, 2021. https://scholar.colorado.edu/tlen_gradetds/36.

MLA Handbook (7th Edition):

Lobato, Eric Matthew. “The Anonymity Engine, Minimizing Quasi-Identifiers to Strengthen K-Anonymity.” 2017. Web. 23 Jan 2021.

Vancouver:

Lobato EM. The Anonymity Engine, Minimizing Quasi-Identifiers to Strengthen K-Anonymity. [Internet] [Masters thesis]. University of Colorado; 2017. [cited 2021 Jan 23]. Available from: https://scholar.colorado.edu/tlen_gradetds/36.

Council of Science Editors:

Lobato EM. The Anonymity Engine, Minimizing Quasi-Identifiers to Strengthen K-Anonymity. [Masters Thesis]. University of Colorado; 2017. Available from: https://scholar.colorado.edu/tlen_gradetds/36


University of California – Berkeley

5. Mohan, Prashanth. Protecting User Privacy in Remotely Managed Applications.

Degree: Computer Science, 2013, University of California – Berkeley

 This thesis presents an end-to-end system architecture for online services to provide it's users with a ”privacy guarantee”. The privacy guarantee as described in this… (more)

Subjects/Keywords: Computer science; Computer Security; Data Privacy; Data Security; Differential Privacy; Information Flow Control; Online Services

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mohan, P. (2013). Protecting User Privacy in Remotely Managed Applications. (Thesis). University of California – Berkeley. Retrieved from http://www.escholarship.org/uc/item/29d9g8m5

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mohan, Prashanth. “Protecting User Privacy in Remotely Managed Applications.” 2013. Thesis, University of California – Berkeley. Accessed January 23, 2021. http://www.escholarship.org/uc/item/29d9g8m5.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mohan, Prashanth. “Protecting User Privacy in Remotely Managed Applications.” 2013. Web. 23 Jan 2021.

Vancouver:

Mohan P. Protecting User Privacy in Remotely Managed Applications. [Internet] [Thesis]. University of California – Berkeley; 2013. [cited 2021 Jan 23]. Available from: http://www.escholarship.org/uc/item/29d9g8m5.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mohan P. Protecting User Privacy in Remotely Managed Applications. [Thesis]. University of California – Berkeley; 2013. Available from: http://www.escholarship.org/uc/item/29d9g8m5

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brigham Young University

6. Maxwell, Whitney Nielsen. An Analysis of the Size and Impact of Digital Footprints.

Degree: MS, 2017, Brigham Young University

 Personal information available online is known as a digital footprint. While many have a digital footprint, few if any, know what it encapsulates or how… (more)

Subjects/Keywords: information security; digital footprint; personal information; information privacy; Systems Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Maxwell, W. N. (2017). An Analysis of the Size and Impact of Digital Footprints. (Masters Thesis). Brigham Young University. Retrieved from https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7593&context=etd

Chicago Manual of Style (16th Edition):

Maxwell, Whitney Nielsen. “An Analysis of the Size and Impact of Digital Footprints.” 2017. Masters Thesis, Brigham Young University. Accessed January 23, 2021. https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7593&context=etd.

MLA Handbook (7th Edition):

Maxwell, Whitney Nielsen. “An Analysis of the Size and Impact of Digital Footprints.” 2017. Web. 23 Jan 2021.

Vancouver:

Maxwell WN. An Analysis of the Size and Impact of Digital Footprints. [Internet] [Masters thesis]. Brigham Young University; 2017. [cited 2021 Jan 23]. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7593&context=etd.

Council of Science Editors:

Maxwell WN. An Analysis of the Size and Impact of Digital Footprints. [Masters Thesis]. Brigham Young University; 2017. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7593&context=etd


Virginia Commonwealth University

7. Rashidi, Bahman. Smartphone User Privacy Preserving through Crowdsourcing.

Degree: PhD, Computer Science, 2018, Virginia Commonwealth University

  In current Android architecture, users have to decide whether an app is safe to use or not. Expert users can make savvy decisions to… (more)

Subjects/Keywords: Smartphone; Security; Privacy; Recommendation; Crowdsourcing; Information Security; Theory and Algorithms

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rashidi, B. (2018). Smartphone User Privacy Preserving through Crowdsourcing. (Doctoral Dissertation). Virginia Commonwealth University. Retrieved from https://doi.org/10.25772/N9QZ-JA53 ; https://scholarscompass.vcu.edu/etd/5540

Chicago Manual of Style (16th Edition):

Rashidi, Bahman. “Smartphone User Privacy Preserving through Crowdsourcing.” 2018. Doctoral Dissertation, Virginia Commonwealth University. Accessed January 23, 2021. https://doi.org/10.25772/N9QZ-JA53 ; https://scholarscompass.vcu.edu/etd/5540.

MLA Handbook (7th Edition):

Rashidi, Bahman. “Smartphone User Privacy Preserving through Crowdsourcing.” 2018. Web. 23 Jan 2021.

Vancouver:

Rashidi B. Smartphone User Privacy Preserving through Crowdsourcing. [Internet] [Doctoral dissertation]. Virginia Commonwealth University; 2018. [cited 2021 Jan 23]. Available from: https://doi.org/10.25772/N9QZ-JA53 ; https://scholarscompass.vcu.edu/etd/5540.

Council of Science Editors:

Rashidi B. Smartphone User Privacy Preserving through Crowdsourcing. [Doctoral Dissertation]. Virginia Commonwealth University; 2018. Available from: https://doi.org/10.25772/N9QZ-JA53 ; https://scholarscompass.vcu.edu/etd/5540


Cal Poly

8. Jellen, Isabel. Towards Security and Privacy in Networked Medical Devices and Electronic Healthcare Systems.

Degree: MS, Computer Science, 2020, Cal Poly

  E-health is a growing eld which utilizes wireless sensor networks to enable access to effective and efficient healthcare services and provide patient monitoring to… (more)

Subjects/Keywords: Security; Privacy; E-health; Medical Devices; Medical Data; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jellen, I. (2020). Towards Security and Privacy in Networked Medical Devices and Electronic Healthcare Systems. (Masters Thesis). Cal Poly. Retrieved from https://digitalcommons.calpoly.edu/theses/2141 ; 10.15368/theses.2020.46

Chicago Manual of Style (16th Edition):

Jellen, Isabel. “Towards Security and Privacy in Networked Medical Devices and Electronic Healthcare Systems.” 2020. Masters Thesis, Cal Poly. Accessed January 23, 2021. https://digitalcommons.calpoly.edu/theses/2141 ; 10.15368/theses.2020.46.

MLA Handbook (7th Edition):

Jellen, Isabel. “Towards Security and Privacy in Networked Medical Devices and Electronic Healthcare Systems.” 2020. Web. 23 Jan 2021.

Vancouver:

Jellen I. Towards Security and Privacy in Networked Medical Devices and Electronic Healthcare Systems. [Internet] [Masters thesis]. Cal Poly; 2020. [cited 2021 Jan 23]. Available from: https://digitalcommons.calpoly.edu/theses/2141 ; 10.15368/theses.2020.46.

Council of Science Editors:

Jellen I. Towards Security and Privacy in Networked Medical Devices and Electronic Healthcare Systems. [Masters Thesis]. Cal Poly; 2020. Available from: https://digitalcommons.calpoly.edu/theses/2141 ; 10.15368/theses.2020.46


Eastern Michigan University

9. Wuotinen, Keith A. Personal privacy: A study to determine views on privacy as it relates to technology acceptance.

Degree: PhD, College of Technology, 2016, Eastern Michigan University

  This descriptive correlation study sought to learn the relationships, if any, between a person’s concern for privacy and their acceptance of technology, in conjunction… (more)

Subjects/Keywords: Concern For Information Privacy; Privacy; Technology Acceptance Model; Information Security; Science and Technology Studies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wuotinen, K. A. (2016). Personal privacy: A study to determine views on privacy as it relates to technology acceptance. (Doctoral Dissertation). Eastern Michigan University. Retrieved from https://commons.emich.edu/theses/690

Chicago Manual of Style (16th Edition):

Wuotinen, Keith A. “Personal privacy: A study to determine views on privacy as it relates to technology acceptance.” 2016. Doctoral Dissertation, Eastern Michigan University. Accessed January 23, 2021. https://commons.emich.edu/theses/690.

MLA Handbook (7th Edition):

Wuotinen, Keith A. “Personal privacy: A study to determine views on privacy as it relates to technology acceptance.” 2016. Web. 23 Jan 2021.

Vancouver:

Wuotinen KA. Personal privacy: A study to determine views on privacy as it relates to technology acceptance. [Internet] [Doctoral dissertation]. Eastern Michigan University; 2016. [cited 2021 Jan 23]. Available from: https://commons.emich.edu/theses/690.

Council of Science Editors:

Wuotinen KA. Personal privacy: A study to determine views on privacy as it relates to technology acceptance. [Doctoral Dissertation]. Eastern Michigan University; 2016. Available from: https://commons.emich.edu/theses/690


Queensland University of Technology

10. Siganto, Jean Josephine. Transparent, balanced and vigorous: The exercise of the Australian Privacy Commissioner's powers in relation to National Privacy Principle 4.

Degree: 2015, Queensland University of Technology

 This thesis considers whether the Australian Privacy Commissioner's use of its powers supports compliance with the requirement to 'take reasonable steps' to protect personal information(more)

Subjects/Keywords: National Privacy Principle 4; Information security; Privacy Commisioner's powers; Principle based regulation; Data security principle; Australia Privacy Principle 11; Reasonable security; Responsive regulation; Information security best practice

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Siganto, J. J. (2015). Transparent, balanced and vigorous: The exercise of the Australian Privacy Commissioner's powers in relation to National Privacy Principle 4. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/83792/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Siganto, Jean Josephine. “Transparent, balanced and vigorous: The exercise of the Australian Privacy Commissioner's powers in relation to National Privacy Principle 4.” 2015. Thesis, Queensland University of Technology. Accessed January 23, 2021. https://eprints.qut.edu.au/83792/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Siganto, Jean Josephine. “Transparent, balanced and vigorous: The exercise of the Australian Privacy Commissioner's powers in relation to National Privacy Principle 4.” 2015. Web. 23 Jan 2021.

Vancouver:

Siganto JJ. Transparent, balanced and vigorous: The exercise of the Australian Privacy Commissioner's powers in relation to National Privacy Principle 4. [Internet] [Thesis]. Queensland University of Technology; 2015. [cited 2021 Jan 23]. Available from: https://eprints.qut.edu.au/83792/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Siganto JJ. Transparent, balanced and vigorous: The exercise of the Australian Privacy Commissioner's powers in relation to National Privacy Principle 4. [Thesis]. Queensland University of Technology; 2015. Available from: https://eprints.qut.edu.au/83792/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Arizona

11. Buckman, Joseph. Understanding Changes in Individual and Firm Behavior in Response to Security and Privacy Factors .

Degree: 2018, University of Arizona

 We investigate consumer and firm responses to information privacy and security factors across three unique essays. The first essay uses three experiments across two different… (more)

Subjects/Keywords: Econometrics; Economics of IS; Information Privacy; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Buckman, J. (2018). Understanding Changes in Individual and Firm Behavior in Response to Security and Privacy Factors . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/630179

Chicago Manual of Style (16th Edition):

Buckman, Joseph. “Understanding Changes in Individual and Firm Behavior in Response to Security and Privacy Factors .” 2018. Doctoral Dissertation, University of Arizona. Accessed January 23, 2021. http://hdl.handle.net/10150/630179.

MLA Handbook (7th Edition):

Buckman, Joseph. “Understanding Changes in Individual and Firm Behavior in Response to Security and Privacy Factors .” 2018. Web. 23 Jan 2021.

Vancouver:

Buckman J. Understanding Changes in Individual and Firm Behavior in Response to Security and Privacy Factors . [Internet] [Doctoral dissertation]. University of Arizona; 2018. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10150/630179.

Council of Science Editors:

Buckman J. Understanding Changes in Individual and Firm Behavior in Response to Security and Privacy Factors . [Doctoral Dissertation]. University of Arizona; 2018. Available from: http://hdl.handle.net/10150/630179


University of Kentucky

12. Ibrahim, Ahmed Fouad Shedeed. NEW SECURE SOLUTIONS FOR PRIVACY AND ACCESS CONTROL IN HEALTH INFORMATION EXCHANGE.

Degree: 2016, University of Kentucky

 In the current digital age, almost every healthcare organization (HCO) has moved from storing patient health records on paper to storing them electronically. Health Information(more)

Subjects/Keywords: Health Information Exchange; Security; Privacy; Authentication; Authorization; Integrity; Computer Sciences; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ibrahim, A. F. S. (2016). NEW SECURE SOLUTIONS FOR PRIVACY AND ACCESS CONTROL IN HEALTH INFORMATION EXCHANGE. (Doctoral Dissertation). University of Kentucky. Retrieved from https://uknowledge.uky.edu/cs_etds/47

Chicago Manual of Style (16th Edition):

Ibrahim, Ahmed Fouad Shedeed. “NEW SECURE SOLUTIONS FOR PRIVACY AND ACCESS CONTROL IN HEALTH INFORMATION EXCHANGE.” 2016. Doctoral Dissertation, University of Kentucky. Accessed January 23, 2021. https://uknowledge.uky.edu/cs_etds/47.

MLA Handbook (7th Edition):

Ibrahim, Ahmed Fouad Shedeed. “NEW SECURE SOLUTIONS FOR PRIVACY AND ACCESS CONTROL IN HEALTH INFORMATION EXCHANGE.” 2016. Web. 23 Jan 2021.

Vancouver:

Ibrahim AFS. NEW SECURE SOLUTIONS FOR PRIVACY AND ACCESS CONTROL IN HEALTH INFORMATION EXCHANGE. [Internet] [Doctoral dissertation]. University of Kentucky; 2016. [cited 2021 Jan 23]. Available from: https://uknowledge.uky.edu/cs_etds/47.

Council of Science Editors:

Ibrahim AFS. NEW SECURE SOLUTIONS FOR PRIVACY AND ACCESS CONTROL IN HEALTH INFORMATION EXCHANGE. [Doctoral Dissertation]. University of Kentucky; 2016. Available from: https://uknowledge.uky.edu/cs_etds/47


University of Texas – Austin

13. -6848-2988. Exploiting leakage in privacy-protecting systems.

Degree: PhD, Computer science, 2016, University of Texas – Austin

 Conventional systems store data unencrypted. This allows them to easily access and manipulate their data. However, by not protecting their data, these systems are at… (more)

Subjects/Keywords: Security; Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-6848-2988. (2016). Exploiting leakage in privacy-protecting systems. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/45559

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-6848-2988. “Exploiting leakage in privacy-protecting systems.” 2016. Doctoral Dissertation, University of Texas – Austin. Accessed January 23, 2021. http://hdl.handle.net/2152/45559.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-6848-2988. “Exploiting leakage in privacy-protecting systems.” 2016. Web. 23 Jan 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-6848-2988. Exploiting leakage in privacy-protecting systems. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2016. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/2152/45559.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-6848-2988. Exploiting leakage in privacy-protecting systems. [Doctoral Dissertation]. University of Texas – Austin; 2016. Available from: http://hdl.handle.net/2152/45559

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


University of Illinois – Urbana-Champaign

14. Kairouz, Peter. The fundamental limits of statistical data privacy.

Degree: PhD, Electrical & Computer Engr, 2016, University of Illinois – Urbana-Champaign

 The Internet is shaping our daily lives. On the one hand, social networks like Facebook and Twitter allow people to share their precious moments and… (more)

Subjects/Keywords: Privacy; Information Theory; Data Privacy; Statistics; Multi-Party Computation; Security; Local Differential Privacy; Privacy-Preserving Machine Learning Algorithms; Information Theoretic Utilities; f-Divergence; Mutual Information; Statistical Inference; Hypothesis Testing; Estimation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kairouz, P. (2016). The fundamental limits of statistical data privacy. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/92686

Chicago Manual of Style (16th Edition):

Kairouz, Peter. “The fundamental limits of statistical data privacy.” 2016. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed January 23, 2021. http://hdl.handle.net/2142/92686.

MLA Handbook (7th Edition):

Kairouz, Peter. “The fundamental limits of statistical data privacy.” 2016. Web. 23 Jan 2021.

Vancouver:

Kairouz P. The fundamental limits of statistical data privacy. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2016. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/2142/92686.

Council of Science Editors:

Kairouz P. The fundamental limits of statistical data privacy. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2016. Available from: http://hdl.handle.net/2142/92686


UCLA

15. Chamberland, Kristen. Contextualizing Institutional IT Policy: A Historical Narrative of UCLA’s Policymaking Environment.

Degree: Information Studies, 2016, UCLA

Information technology (IT) policymaking in higher education is often an ad hoc process,responding to crises, rather than taking a proactive approach based on a clear… (more)

Subjects/Keywords: Information science; data governance; data security; information privacy; information technology policy; institutional values; stakeholder relationships

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chamberland, K. (2016). Contextualizing Institutional IT Policy: A Historical Narrative of UCLA’s Policymaking Environment. (Thesis). UCLA. Retrieved from http://www.escholarship.org/uc/item/0160r7kr

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chamberland, Kristen. “Contextualizing Institutional IT Policy: A Historical Narrative of UCLA’s Policymaking Environment.” 2016. Thesis, UCLA. Accessed January 23, 2021. http://www.escholarship.org/uc/item/0160r7kr.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chamberland, Kristen. “Contextualizing Institutional IT Policy: A Historical Narrative of UCLA’s Policymaking Environment.” 2016. Web. 23 Jan 2021.

Vancouver:

Chamberland K. Contextualizing Institutional IT Policy: A Historical Narrative of UCLA’s Policymaking Environment. [Internet] [Thesis]. UCLA; 2016. [cited 2021 Jan 23]. Available from: http://www.escholarship.org/uc/item/0160r7kr.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chamberland K. Contextualizing Institutional IT Policy: A Historical Narrative of UCLA’s Policymaking Environment. [Thesis]. UCLA; 2016. Available from: http://www.escholarship.org/uc/item/0160r7kr

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

16. Grunwell, Daniel K. Designing and implementing an information accountability framework for usable and useful eHealth systems.

Degree: 2017, Queensland University of Technology

 This research examined the design and implementation of an Information Accountability Framework for eHealth with the aim of enabling the creation of more useful eHealth… (more)

Subjects/Keywords: eHealth; Access control; information accountability; information security; information privacy; electronic health records

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Grunwell, D. K. (2017). Designing and implementing an information accountability framework for usable and useful eHealth systems. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/103323/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Grunwell, Daniel K. “Designing and implementing an information accountability framework for usable and useful eHealth systems.” 2017. Thesis, Queensland University of Technology. Accessed January 23, 2021. https://eprints.qut.edu.au/103323/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Grunwell, Daniel K. “Designing and implementing an information accountability framework for usable and useful eHealth systems.” 2017. Web. 23 Jan 2021.

Vancouver:

Grunwell DK. Designing and implementing an information accountability framework for usable and useful eHealth systems. [Internet] [Thesis]. Queensland University of Technology; 2017. [cited 2021 Jan 23]. Available from: https://eprints.qut.edu.au/103323/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Grunwell DK. Designing and implementing an information accountability framework for usable and useful eHealth systems. [Thesis]. Queensland University of Technology; 2017. Available from: https://eprints.qut.edu.au/103323/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Temple University

17. Chang, Wei. Security and Privacy Issues in Social Information-Assisted Application Design.

Degree: PhD, 2016, Temple University

Computer and Information Science

In recent years, social networks and their related theories and applications attract widespread attentions in computer science. Many applications are designed… (more)

Subjects/Keywords: Computer science;

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chang, W. (2016). Security and Privacy Issues in Social Information-Assisted Application Design. (Doctoral Dissertation). Temple University. Retrieved from http://digital.library.temple.edu/u?/p245801coll10,406720

Chicago Manual of Style (16th Edition):

Chang, Wei. “Security and Privacy Issues in Social Information-Assisted Application Design.” 2016. Doctoral Dissertation, Temple University. Accessed January 23, 2021. http://digital.library.temple.edu/u?/p245801coll10,406720.

MLA Handbook (7th Edition):

Chang, Wei. “Security and Privacy Issues in Social Information-Assisted Application Design.” 2016. Web. 23 Jan 2021.

Vancouver:

Chang W. Security and Privacy Issues in Social Information-Assisted Application Design. [Internet] [Doctoral dissertation]. Temple University; 2016. [cited 2021 Jan 23]. Available from: http://digital.library.temple.edu/u?/p245801coll10,406720.

Council of Science Editors:

Chang W. Security and Privacy Issues in Social Information-Assisted Application Design. [Doctoral Dissertation]. Temple University; 2016. Available from: http://digital.library.temple.edu/u?/p245801coll10,406720


University of Toronto

18. Goldberg, Adina Rebecca. The Privacy/Security Tradeoff for Multiple Secure Sketch Biometric Authentication Systems.

Degree: 2015, University of Toronto

When designing multiple biometric authentication systems, there is tension between minimizing privacy leakage and maximizing security. This work studies the tradeoff between the two measures… (more)

Subjects/Keywords: Biometrics; Coding Theory; Information Theory; Optimization; Privacy; Security; 0544

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Goldberg, A. R. (2015). The Privacy/Security Tradeoff for Multiple Secure Sketch Biometric Authentication Systems. (Masters Thesis). University of Toronto. Retrieved from http://hdl.handle.net/1807/70408

Chicago Manual of Style (16th Edition):

Goldberg, Adina Rebecca. “The Privacy/Security Tradeoff for Multiple Secure Sketch Biometric Authentication Systems.” 2015. Masters Thesis, University of Toronto. Accessed January 23, 2021. http://hdl.handle.net/1807/70408.

MLA Handbook (7th Edition):

Goldberg, Adina Rebecca. “The Privacy/Security Tradeoff for Multiple Secure Sketch Biometric Authentication Systems.” 2015. Web. 23 Jan 2021.

Vancouver:

Goldberg AR. The Privacy/Security Tradeoff for Multiple Secure Sketch Biometric Authentication Systems. [Internet] [Masters thesis]. University of Toronto; 2015. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/1807/70408.

Council of Science Editors:

Goldberg AR. The Privacy/Security Tradeoff for Multiple Secure Sketch Biometric Authentication Systems. [Masters Thesis]. University of Toronto; 2015. Available from: http://hdl.handle.net/1807/70408


University of South Africa

19. Tekle, Solomon Mekonnen. A Privacy-Preserving, Context-Aware, Insider Threat prevention and prediction model (PPCAITPP).

Degree: 2018, University of South Africa

 The insider threat problem is extremely challenging to address, as it is committed by insiders who are trusted and authorized to access the information resources… (more)

Subjects/Keywords: Insider threat; Fraud diamond; Context-aware system; Information security; Privacy preservation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tekle, S. M. (2018). A Privacy-Preserving, Context-Aware, Insider Threat prevention and prediction model (PPCAITPP). (Doctoral Dissertation). University of South Africa. Retrieved from http://hdl.handle.net/10500/25968

Chicago Manual of Style (16th Edition):

Tekle, Solomon Mekonnen. “A Privacy-Preserving, Context-Aware, Insider Threat prevention and prediction model (PPCAITPP).” 2018. Doctoral Dissertation, University of South Africa. Accessed January 23, 2021. http://hdl.handle.net/10500/25968.

MLA Handbook (7th Edition):

Tekle, Solomon Mekonnen. “A Privacy-Preserving, Context-Aware, Insider Threat prevention and prediction model (PPCAITPP).” 2018. Web. 23 Jan 2021.

Vancouver:

Tekle SM. A Privacy-Preserving, Context-Aware, Insider Threat prevention and prediction model (PPCAITPP). [Internet] [Doctoral dissertation]. University of South Africa; 2018. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10500/25968.

Council of Science Editors:

Tekle SM. A Privacy-Preserving, Context-Aware, Insider Threat prevention and prediction model (PPCAITPP). [Doctoral Dissertation]. University of South Africa; 2018. Available from: http://hdl.handle.net/10500/25968


Hong Kong University of Science and Technology

20. Fung, King Hong CSE. Combining differential privacy and PIR for efficient strong location privacy.

Degree: 2015, Hong Kong University of Science and Technology

 Data privacy is a huge concern nowadays. In the context of location based services, a very important issue regards protecting the position of users issuing… (more)

Subjects/Keywords: Location-based services ; Security measures ; Information storage and retrieval systems ; Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fung, K. H. C. (2015). Combining differential privacy and PIR for efficient strong location privacy. (Thesis). Hong Kong University of Science and Technology. Retrieved from http://repository.ust.hk/ir/Record/1783.1-94420 ; https://doi.org/10.14711/thesis-b1487523 ; http://repository.ust.hk/ir/bitstream/1783.1-94420/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fung, King Hong CSE. “Combining differential privacy and PIR for efficient strong location privacy.” 2015. Thesis, Hong Kong University of Science and Technology. Accessed January 23, 2021. http://repository.ust.hk/ir/Record/1783.1-94420 ; https://doi.org/10.14711/thesis-b1487523 ; http://repository.ust.hk/ir/bitstream/1783.1-94420/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fung, King Hong CSE. “Combining differential privacy and PIR for efficient strong location privacy.” 2015. Web. 23 Jan 2021.

Vancouver:

Fung KHC. Combining differential privacy and PIR for efficient strong location privacy. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2015. [cited 2021 Jan 23]. Available from: http://repository.ust.hk/ir/Record/1783.1-94420 ; https://doi.org/10.14711/thesis-b1487523 ; http://repository.ust.hk/ir/bitstream/1783.1-94420/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fung KHC. Combining differential privacy and PIR for efficient strong location privacy. [Thesis]. Hong Kong University of Science and Technology; 2015. Available from: http://repository.ust.hk/ir/Record/1783.1-94420 ; https://doi.org/10.14711/thesis-b1487523 ; http://repository.ust.hk/ir/bitstream/1783.1-94420/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

21. Łęcka, Agnieszka (author). Information security in offshoring business processes: Design and implementation of controls guidelines.

Degree: 2018, Delft University of Technology

In the times of emerging technologies and rising individuals’ awareness more light is shed on privacy and associated risks. This does not go unnoticed by… (more)

Subjects/Keywords: ISMS; information security management system; privacy; offshoring; bank; financial institution

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Łęcka, A. (. (2018). Information security in offshoring business processes: Design and implementation of controls guidelines. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:c6cebb62-f7be-4694-bbaf-712b857067e6

Chicago Manual of Style (16th Edition):

Łęcka, Agnieszka (author). “Information security in offshoring business processes: Design and implementation of controls guidelines.” 2018. Masters Thesis, Delft University of Technology. Accessed January 23, 2021. http://resolver.tudelft.nl/uuid:c6cebb62-f7be-4694-bbaf-712b857067e6.

MLA Handbook (7th Edition):

Łęcka, Agnieszka (author). “Information security in offshoring business processes: Design and implementation of controls guidelines.” 2018. Web. 23 Jan 2021.

Vancouver:

Łęcka A(. Information security in offshoring business processes: Design and implementation of controls guidelines. [Internet] [Masters thesis]. Delft University of Technology; 2018. [cited 2021 Jan 23]. Available from: http://resolver.tudelft.nl/uuid:c6cebb62-f7be-4694-bbaf-712b857067e6.

Council of Science Editors:

Łęcka A(. Information security in offshoring business processes: Design and implementation of controls guidelines. [Masters Thesis]. Delft University of Technology; 2018. Available from: http://resolver.tudelft.nl/uuid:c6cebb62-f7be-4694-bbaf-712b857067e6


Michigan Technological University

22. Arney, Todd O. A LITERATURE REVIEW ON THE CURRENT STATE OF SECURITY AND PRIVACY OF MEDICAL DEVICES AND SENSORS WITH BLUETOOTH LOW ENERGY.

Degree: MS, School of Technology, 2018, Michigan Technological University

  Technology use in healthcare is an integral part of diagnosis and treatment. The use of technology in medical devices and sensors is growing. These… (more)

Subjects/Keywords: bluetooth low energy; medical sensors; security; privacy; Health Information Technology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Arney, T. O. (2018). A LITERATURE REVIEW ON THE CURRENT STATE OF SECURITY AND PRIVACY OF MEDICAL DEVICES AND SENSORS WITH BLUETOOTH LOW ENERGY. (Masters Thesis). Michigan Technological University. Retrieved from https://digitalcommons.mtu.edu/etdr/644

Chicago Manual of Style (16th Edition):

Arney, Todd O. “A LITERATURE REVIEW ON THE CURRENT STATE OF SECURITY AND PRIVACY OF MEDICAL DEVICES AND SENSORS WITH BLUETOOTH LOW ENERGY.” 2018. Masters Thesis, Michigan Technological University. Accessed January 23, 2021. https://digitalcommons.mtu.edu/etdr/644.

MLA Handbook (7th Edition):

Arney, Todd O. “A LITERATURE REVIEW ON THE CURRENT STATE OF SECURITY AND PRIVACY OF MEDICAL DEVICES AND SENSORS WITH BLUETOOTH LOW ENERGY.” 2018. Web. 23 Jan 2021.

Vancouver:

Arney TO. A LITERATURE REVIEW ON THE CURRENT STATE OF SECURITY AND PRIVACY OF MEDICAL DEVICES AND SENSORS WITH BLUETOOTH LOW ENERGY. [Internet] [Masters thesis]. Michigan Technological University; 2018. [cited 2021 Jan 23]. Available from: https://digitalcommons.mtu.edu/etdr/644.

Council of Science Editors:

Arney TO. A LITERATURE REVIEW ON THE CURRENT STATE OF SECURITY AND PRIVACY OF MEDICAL DEVICES AND SENSORS WITH BLUETOOTH LOW ENERGY. [Masters Thesis]. Michigan Technological University; 2018. Available from: https://digitalcommons.mtu.edu/etdr/644


Boston University

23. Meng, Xianrui. Privacy-preserving queries on encrypted databases.

Degree: PhD, Computer Science, 2016, Boston University

 In today's Internet, with the advent of cloud computing, there is a natural desire for enterprises, organizations, and end users to outsource increasingly large amounts… (more)

Subjects/Keywords: Computer science; Cryptography; Database security; Data management; Graph theory; Information security/privacy; Query processing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Meng, X. (2016). Privacy-preserving queries on encrypted databases. (Doctoral Dissertation). Boston University. Retrieved from http://hdl.handle.net/2144/19739

Chicago Manual of Style (16th Edition):

Meng, Xianrui. “Privacy-preserving queries on encrypted databases.” 2016. Doctoral Dissertation, Boston University. Accessed January 23, 2021. http://hdl.handle.net/2144/19739.

MLA Handbook (7th Edition):

Meng, Xianrui. “Privacy-preserving queries on encrypted databases.” 2016. Web. 23 Jan 2021.

Vancouver:

Meng X. Privacy-preserving queries on encrypted databases. [Internet] [Doctoral dissertation]. Boston University; 2016. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/2144/19739.

Council of Science Editors:

Meng X. Privacy-preserving queries on encrypted databases. [Doctoral Dissertation]. Boston University; 2016. Available from: http://hdl.handle.net/2144/19739


Brunel University

24. Gamagedara Arachchilage, Nalin Asanka. Security awareness of computer users : a game based learning approach.

Degree: PhD, 2012, Brunel University

 The research reported in this thesis focuses on developing a framework for game design to protect computer users against phishing attacks. A comprehensive literature review… (more)

Subjects/Keywords: 005.8; Usable security; Game based learning; Information security and privacy; Human computer interaction; E-learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gamagedara Arachchilage, N. A. (2012). Security awareness of computer users : a game based learning approach. (Doctoral Dissertation). Brunel University. Retrieved from http://bura.brunel.ac.uk/handle/2438/7620 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.575664

Chicago Manual of Style (16th Edition):

Gamagedara Arachchilage, Nalin Asanka. “Security awareness of computer users : a game based learning approach.” 2012. Doctoral Dissertation, Brunel University. Accessed January 23, 2021. http://bura.brunel.ac.uk/handle/2438/7620 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.575664.

MLA Handbook (7th Edition):

Gamagedara Arachchilage, Nalin Asanka. “Security awareness of computer users : a game based learning approach.” 2012. Web. 23 Jan 2021.

Vancouver:

Gamagedara Arachchilage NA. Security awareness of computer users : a game based learning approach. [Internet] [Doctoral dissertation]. Brunel University; 2012. [cited 2021 Jan 23]. Available from: http://bura.brunel.ac.uk/handle/2438/7620 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.575664.

Council of Science Editors:

Gamagedara Arachchilage NA. Security awareness of computer users : a game based learning approach. [Doctoral Dissertation]. Brunel University; 2012. Available from: http://bura.brunel.ac.uk/handle/2438/7620 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.575664


University of Western Ontario

25. Ramachandran, Karthick. Trust based Privacy Policy Enforcement in Cloud Computing.

Degree: 2015, University of Western Ontario

 Cloud computing offers opportunities for organizations to reduce IT costs by using the computation and storage of a remote provider. Despite the benefits offered by… (more)

Subjects/Keywords: Trust; Privacy; Security; Cloud Computing; Distributed Systems; Information Security; OS and Networks; Systems Architecture

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ramachandran, K. (2015). Trust based Privacy Policy Enforcement in Cloud Computing. (Thesis). University of Western Ontario. Retrieved from https://ir.lib.uwo.ca/etd/2728

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ramachandran, Karthick. “Trust based Privacy Policy Enforcement in Cloud Computing.” 2015. Thesis, University of Western Ontario. Accessed January 23, 2021. https://ir.lib.uwo.ca/etd/2728.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ramachandran, Karthick. “Trust based Privacy Policy Enforcement in Cloud Computing.” 2015. Web. 23 Jan 2021.

Vancouver:

Ramachandran K. Trust based Privacy Policy Enforcement in Cloud Computing. [Internet] [Thesis]. University of Western Ontario; 2015. [cited 2021 Jan 23]. Available from: https://ir.lib.uwo.ca/etd/2728.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ramachandran K. Trust based Privacy Policy Enforcement in Cloud Computing. [Thesis]. University of Western Ontario; 2015. Available from: https://ir.lib.uwo.ca/etd/2728

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


The Ohio State University

26. Basciftci, Yuksel O, Basciftci. Private and Secure Data Communication: Information Theoretic Approach.

Degree: PhD, Electrical and Computer Engineering, 2016, The Ohio State University

 Wireless networks flourishing worldwide enable online services, such as social networks and search engines to serve huge number of users and to collect large amount… (more)

Subjects/Keywords: Electrical Engineering; Data privacy, data security, information theory, physical layer security, wireless communiation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Basciftci, Yuksel O, B. (2016). Private and Secure Data Communication: Information Theoretic Approach. (Doctoral Dissertation). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1469137249

Chicago Manual of Style (16th Edition):

Basciftci, Yuksel O, Basciftci. “Private and Secure Data Communication: Information Theoretic Approach.” 2016. Doctoral Dissertation, The Ohio State University. Accessed January 23, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=osu1469137249.

MLA Handbook (7th Edition):

Basciftci, Yuksel O, Basciftci. “Private and Secure Data Communication: Information Theoretic Approach.” 2016. Web. 23 Jan 2021.

Vancouver:

Basciftci, Yuksel O B. Private and Secure Data Communication: Information Theoretic Approach. [Internet] [Doctoral dissertation]. The Ohio State University; 2016. [cited 2021 Jan 23]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1469137249.

Council of Science Editors:

Basciftci, Yuksel O B. Private and Secure Data Communication: Information Theoretic Approach. [Doctoral Dissertation]. The Ohio State University; 2016. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1469137249


University of Arkansas

27. Katla, Srinidhi. DPWeka: Achieving Differential Privacy in WEKA.

Degree: MS, 2017, University of Arkansas

  Organizations belonging to the government, commercial, and non-profit industries collect and store large amounts of sensitive data, which include medical, financial, and personal information.… (more)

Subjects/Keywords: Pure sciences; Communication and the arts; Applied sciences; Data mining; Data privacy; Differential privacy; Databases and Information Systems; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Katla, S. (2017). DPWeka: Achieving Differential Privacy in WEKA. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/1934

Chicago Manual of Style (16th Edition):

Katla, Srinidhi. “DPWeka: Achieving Differential Privacy in WEKA.” 2017. Masters Thesis, University of Arkansas. Accessed January 23, 2021. https://scholarworks.uark.edu/etd/1934.

MLA Handbook (7th Edition):

Katla, Srinidhi. “DPWeka: Achieving Differential Privacy in WEKA.” 2017. Web. 23 Jan 2021.

Vancouver:

Katla S. DPWeka: Achieving Differential Privacy in WEKA. [Internet] [Masters thesis]. University of Arkansas; 2017. [cited 2021 Jan 23]. Available from: https://scholarworks.uark.edu/etd/1934.

Council of Science Editors:

Katla S. DPWeka: Achieving Differential Privacy in WEKA. [Masters Thesis]. University of Arkansas; 2017. Available from: https://scholarworks.uark.edu/etd/1934


NSYSU

28. Huang, Yen-Lin. Userâs Risk Management for the Personal Data of the Cloud Computing Service Industires.

Degree: Master, Public Affairs Management, 2012, NSYSU

 With the rapid development of Information Technology, âCloud Computingâ is becoming increasingly popular in the industry as it is accessible to various data processing services… (more)

Subjects/Keywords: Personal Information; Information Security; Stakeholder Theory; Cloud Computing; Privacy; Risk Management; Personal Data Protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, Y. (2012). Userâs Risk Management for the Personal Data of the Cloud Computing Service Industires. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0806112-192729

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Yen-Lin. “Userâs Risk Management for the Personal Data of the Cloud Computing Service Industires.” 2012. Thesis, NSYSU. Accessed January 23, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0806112-192729.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Yen-Lin. “Userâs Risk Management for the Personal Data of the Cloud Computing Service Industires.” 2012. Web. 23 Jan 2021.

Vancouver:

Huang Y. Userâs Risk Management for the Personal Data of the Cloud Computing Service Industires. [Internet] [Thesis]. NSYSU; 2012. [cited 2021 Jan 23]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0806112-192729.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang Y. Userâs Risk Management for the Personal Data of the Cloud Computing Service Industires. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0806112-192729

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

29. Burdon, Mark. The conceptual and operational compatibility of data breach notification and information privacy laws.

Degree: 2011, Queensland University of Technology

 Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have… (more)

Subjects/Keywords: data breach notification law; information privacy law; data protection; contextualisation; information security law; ODTA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Burdon, M. (2011). The conceptual and operational compatibility of data breach notification and information privacy laws. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/47512/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Burdon, Mark. “The conceptual and operational compatibility of data breach notification and information privacy laws.” 2011. Thesis, Queensland University of Technology. Accessed January 23, 2021. https://eprints.qut.edu.au/47512/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Burdon, Mark. “The conceptual and operational compatibility of data breach notification and information privacy laws.” 2011. Web. 23 Jan 2021.

Vancouver:

Burdon M. The conceptual and operational compatibility of data breach notification and information privacy laws. [Internet] [Thesis]. Queensland University of Technology; 2011. [cited 2021 Jan 23]. Available from: https://eprints.qut.edu.au/47512/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Burdon M. The conceptual and operational compatibility of data breach notification and information privacy laws. [Thesis]. Queensland University of Technology; 2011. Available from: https://eprints.qut.edu.au/47512/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linnaeus University

30. Liu, XiaoTong. Privacy exposure on WeChat from users' perspective : A study among the university  students in China.

Degree: Informatics, 2019, Linnaeus University

  In 21st century, social media has become one necessary part in people’s life, different kinds of social media emerge in endlessly. In younger generation,… (more)

Subjects/Keywords: SNS; WeChat; Security awareness; Information privacy; Risk perception; Information Systems; Systemvetenskap, informationssystem och informatik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, X. (2019). Privacy exposure on WeChat from users' perspective : A study among the university  students in China. (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-80610

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, XiaoTong. “Privacy exposure on WeChat from users' perspective : A study among the university  students in China.” 2019. Thesis, Linnaeus University. Accessed January 23, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-80610.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, XiaoTong. “Privacy exposure on WeChat from users' perspective : A study among the university  students in China.” 2019. Web. 23 Jan 2021.

Vancouver:

Liu X. Privacy exposure on WeChat from users' perspective : A study among the university  students in China. [Internet] [Thesis]. Linnaeus University; 2019. [cited 2021 Jan 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-80610.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu X. Privacy exposure on WeChat from users' perspective : A study among the university  students in China. [Thesis]. Linnaeus University; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-80610

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [23]

.