Privacy, Right of
Resource Information
The concept Privacy, Right of represents the subject, aboutness, idea or notion of resources found in Missouri University of Science & Technology Library.
The Resource
Privacy, Right of
Resource Information
The concept Privacy, Right of represents the subject, aboutness, idea or notion of resources found in Missouri University of Science & Technology Library.
- Label
- Privacy, Right of
196 Items that share the Concept Privacy, Right of
Context
Context of Privacy, Right ofSubject of
No resources found
No enriched resources found
- Am I my genes? : Confronting fate and family secrets in the age of genetic testing
- America identified : biometric technology and society
- Analyzing and securing social networks
- Anonymization
- Anonymous communication networks : protecting privacy on the web
- Assisted living facilities residents' and relatives' preferences for family access to their medical and personal information
- Big data and privacy rights
- Biometrics, privacy, progress, and government
- Blockchain technology for data privacy management
- Borders in cyberspace : information policy and the global information infrastructure
- Building web apps that respect a user's privacy and security
- Chokepoints : global private regulation on the Internet
- Civic space legal framework : Brazil, Finland, Morocco, Tunisia
- Code and other laws of cyberspace
- Combating identity theft : a strategic plan
- Communication in a wired world : be smart, be safe
- Computational social networks, Security and privacy
- Computer and communications security and privacy : report
- Computers, records and the right to privacy : the record of a conference held on 24 and 25 January 1979, organised by the Institute of Data Processing Management, the National Computing Centre Ltd. and the National Council for Civil Liberties
- Controlling Knowledge : Freedom of Information and Privacy Protection in a Networked World
- Controlling knowledge : freedom of information and privacy protection in a networked world
- Crime, security and surveillance : effects for the surveillant and the surveilled
- Customer data and privacy : the insights you need from Harvard Business Review
- Cybersecurity law : protect yourself and your customers
- Data Love : the Seduction and Betrayal of Digital Technologies
- Data and Goliath : the hidden battles to collect your data and control your world
- Data love : the seduction and betrayal of digital technologies
- Data privacy : principles and practice
- Data protection law for employers
- Datennutzungs- und Datenschutzverträge : Muster, Klauseln, Erläuterungen
- Developing Key Privacy Rights : the Impact of the Human Rights Act 1998
- Die Kunst der Anonymität im Internet : so schützen Sie Ihre Identität und Ihre Daten
- Digital Whoness : Identity, Privacy and Freedom in the Cyberworld
- Digital health information and the threat of cyberattack
- Digital information and the privacy problem
- Digital money : the new era of Internet commerce
- Digitale Souveränität : Bürger, Unternehmen, Staat
- Discrimination and privacy in the information society : data mining and profiling in large databases
- Economics of identity theft : avoidance, causes and possible cures
- Educating data : using data science to improve learning, motivation, and persistence
- Electronic monitoring in the workplace : controversies and solutions
- Ethical issues in journalism and the media
- Ethical issues of information systems
- Exposed : desire and disobedience in the digital age
- Facebook : transparency and use of consumer data : hearing before the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, second session, April 11, 2018
- Facebook : transparency and use of consumer data : hearing before the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, second session, April 11, 2018
- Facebook nation : total information awareness
- Federal Trade Commission : 2006 identity theft survey report
- G3P - Good Privacy Protection Practice in Clinical Research : Principles of Pseudonymization and Anonymization
- Genetic Data and the Law : a Critical Perspective on Privacy Protection
- Genetic Privacy : a Challenge to Medico-Legal Norms
- Genetic privacy : a challenge to medico-legal norms
- Global networks and local values : a comparative look at Germany and the United States
- Governing privacy in knowledge commons
- HCISPP HealthCare Information Security and Privacy Practitioner All-in-One Exam Guide
- Health information technology : early efforts initiated but comprehensive privacy approach needed for national strategy : report to congressional requesters
- Health information technology : early efforts initiated by comprehensive privacy approach needed for national strategy : testimony before the Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia; Committee on Homeland Security and Governmental Affairs, U.S. Senate
- Health information technology : efforts continue but comprehensive privacy approach needed for national strategy : testimony before the Subcommittee on Information Policy, Census, and National Archives, Committee on Oversight and Government Reform, U.S. House of Representatives
- How digital trust drives culture change : privacy is a right, not a privilege : but organizations and leadership often struggle with it comes to adapting their culture toward digital trust and stewardship
- How to build privacy and security into deep learning models
- I know what you're thinking : brain imaging and mental privacy
- I know who you are and I saw what you did : social networks and the death of privacy
- IAPP CIPP/US Certified Information Privacy Professional study guide : United States exam
- IBM Spectrum Scale functionality to support GDPR requirements
- IDs--not that easy : questions about nationwide identity systems
- ISO/IEC 27701:2019: An introduction to privacy information management
- IT-security and privacy : design and use of privacy-enhancing security mechanisms
- Imagining New Legalities : Privacy and Its Possibilities in the 21st Century
- Improving access to and confidentiality of research data : report of a workshop
- Information Security Theory and Practice : Security and Privacy of Mobile Devices in Wireless Communication : 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011, Proceedings
- Information and communications protection
- Information ethics : privacy and intellectual property
- Information ethics : privacy, property, and power
- Information privacy engineering and privacy by design : understanding privacy threats, technology, and regulations based on standards and best practices
- Intellectual Privacy
- International data flows : promoting digital trade in the 21st century : hearing before the Subcommittee on Courts, Intellectual Property, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Fourteenth Congress, first session, November 3, 2015
- Internet Privacy : options for adequate realisation
- Internet and surveillance : the challenges of Web 2.0 and social media
- Internet of Things : hearing before the Subcommittee on Courts, Intellectual Property, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Fourteenth Congress, first session, July 29, 2015
- Introduction to surveillance studies
- Journalism Professor Robert Hernandez on Google Glass, Journalism and Privacy
- L'accertamento sintetico e il nuovo redditometro
- Laws on erasure of online information
- Legal, privacy, and marketing issues with big data
- Lessons from the identity trail : anonymity, privacy, and identity in a networked society
- Loving Big Brother : Surveillance Culture and Performance Space
- Media circus : a look at private tragedy in the public eye
- Mobile apps for kids : disclosures still not making the grade
- Mobile privacy disclosures : building trust through transparency
- Monitored : business and surveillance in a time of big data
- Multinational computer systems : an introduction to transnational data flow and data regulation
- My online privacy for seniors
- NCHS staff manual on confidentiality
- Net privacy : a guide to developing and implementing an ironclad ebusiness privacy plan
- Net privacy : how we can be free in an age of surveillance
- Net privacy : how we can be free in an age of surveillance
- Network publicy governance : on privacy and the informational self
- No place to hide
- Of Privacy and Power : The Transatlantic Struggle over Freedom and Security
- Online privacy law (2017 update : Australia, Canada, France, Germany, Israel, Italy, Japan, Netherlands, Portugal, Spain, Sweden, and the United Kingdom
- Opportunities and challenges in the IoT : a conversation with Tim O'Reilly and Cory Doctorow
- PRIVACY RISK ANALYSIS OF ONLINE SOCIAL NETWORKS
- Pax technica : how the internet of things may set us free or lock us up
- Pax technica : how the internet of things may set us free or lock us up
- Personal freedom through human rights law? : autonomy, identity and integrity under the European Convention on Human Rights
- Perspectives on Privacy : Increasing Regulation in the USA, Canada, Australia and European Countries
- Police visibility : privacy, surveillance, and the false promise of body-worn cameras
- Posthumous interests : legal and ethical perspectives
- Privacy : defending an illusion
- Privacy Optimization Meets Pandemic Tracking
- Privacy Violation Tracking System (PVTS)
- Privacy act systems of records
- Privacy and Big Data
- Privacy and anonymity in information management systems : new techniques for new practical problems
- Privacy and anonymity in the digital era
- Privacy and identity mangement [sic] for life
- Privacy and information rights
- Privacy and the Internet of Things
- Privacy attitudes, employer surveillance practices, and worker behavioral intentions
- Privacy enhancing technologies : 5th international workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005 : revised selected papers
- Privacy in Peril : How We are Sacrificing a Fundamental Right in Exchange for Security and Convenience
- Privacy in electronic communications : hearing before the Subcommittee on Courts and Intellectual Property of the Committee on the Judiciary, House of Representatives, One Hundred Fifth Congress, second session, March 26, 1998
- Privacy in peril
- Privacy in the 21st Century
- Privacy risk analysis of online social networks
- Privacy-preserving friend recommendations in online social networks
- Private health records : privacy implications of the federal government's Health Information Technology Initiative : hearing before the Oversight of Government Management, the Federal Workforce, and the District of Columbia Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Tenth Congress, first session, February 1, 2007
- Problemas jurÃdico penales asociados a las nuevas técnicas de prevención y persecución del crimen mediante inteligencia artificial
- Profiling machines : mapping the personal information economy
- Protecting Americans' sensitive data from foreign adversaries : communication from the President of the United States transmitting an executive order that elaborates upon the national emergency declared in Executive Order 13873 of May 15, 2019, pursuant to 50 U.S.C. 1703(b); Public Law 95-223, Sec. 204(b); (91 Stat. 1627) and 50 U.S.C. 1641(b); Public Law 94-412, Sec. 401(b); (90 Stat. 1257)
- Protecting Data Privacy Beyond the Trusted System of Record
- Protecting Data Privacy in Health Services Research
- Protecting data privacy in health services research
- Protecting privacy in two-way electronic services
- Protecting privacy in video surveillance
- Rights and Responsibilities of Participants in Networked Communities
- Rites of privacy and the privacy trade : on the limits of protection for the sacred self
- Routledge Handbook of Surveillance Studies
- Secrecy, a cross-cultural perspective
- Security and Privacy : 1996 IEEE Symposium On
- Security and privacy from a legal, ethical, and technical perspective
- Security in computing
- Security in computing
- Security in computing
- Security over personally identifiable information
- Security unbound : enacting democratic limits
- Social Media as Surveillance : Rethinking Visibility in a Converging World
- Software Agents, Surveillance, and the Right to Privacy : a Legislative Framework for Agent-enabled Surveillance
- Software agents, surveillance, and the right to privacy : a legislative framework for agent-enabled surveillance
- Spyware
- Spyware : what you don't know can hurt you : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Eighth Congress, second session, April 29, 2004
- Statistical confidentiality : principles and practice
- Student data privacy : managing vendor relationships
- Surveillance : power, problems, and politics
- Surveillance As Social Sorting : Privacy, Risk And Automated Discrimination
- Surveillance studies : a reader
- Surveillance valley : the secret military history of the Internet
- Surveillance, capital and resistance : theorizing the surveillance subject
- Take Control of Your Online Privacy, 4th Edition
- Take control of your online privacy
- Taking charge : what to do if your identity is stolen
- Technocreep : the surrender of privacy and the capitalization of intimacy
- Technology and Privacy : the New Landscape
- The Cambridge handbook of consumer privacy
- The Glass Consumer : Life in a Surveillance Society
- The Glen Park Library : a fairy tale of disruption
- The Governance of Genetic Information : Who Decides?
- The Intensification of surveillance : crime, terrorism and warfare in the information age
- The Library Juice Press handbook of intellectual freedom : concepts, cases and theories
- The Philosophy of Law meets the Philosophy of Technology
- The Surveillance Machine : America's Surveillance State, Part 1
- The U.S. Should Adopt the "Right to Be Forgotten" Online : A Debate
- The case against socialism
- The cloud : understanding the security, privacy and trust challenges
- The future of reputation : gossip, rumor, and privacy on the Internet
- The future of reputation : gossip, rumor, and privacy on the Internet
- The handbook of privacy studies : an interdisciplinary introduction
- The inspection house : an impertinent field guide to modern surveillance
- The intruders : the invasion of privacy by government and industry
- The privacy advocates : resisting the spread of surveillance
- The privacy engineer's manifesto : getting from policy to code to QA to value
- The private I : privacy in a public world
- The right of privacy in the computer age
- The right to privacy in the light of media convergence : perspectives from three continents
- The smart girl's guide to privacy : practical tips for staying safe online
- The spy in the coffee machine : the end of privacy as we know it
- The spy in the corporate structure : and the right to privacy
- The threat to Americans' personal information : a look into the security and reliability of the health exchange data hub : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, September 11, 2013
- The visible employee : using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust
- To see or not to see : privacy and disclosure of personnel records
- To the cloud : big data in a turbulent world
- Twitter : transparency and accountability : hearing before the Committee On Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, second session, September 5, 2018
- Unauthorized access : the crisis in online privacy and security
- Unmanned aircraft systems : measuring progress and mitigating potential privacy concerns would facilitate integration into the National Airspace System : report to Congressional requesters
- Virtual shadows : your privacy in the information society
- WHOIS running the Internet : protocol, policy, and privacy
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/resource/gKEc6Cpt-r8/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/resource/gKEc6Cpt-r8/">Privacy, Right of</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Privacy, Right of
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/resource/gKEc6Cpt-r8/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/resource/gKEc6Cpt-r8/">Privacy, Right of</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>