Cited By
View all- HSIAO DKERR DMADNICK S(1979)PRIVACY AND ITS TECHNICAL IMPLICATIONS ON SECURITYComputer Security10.1016/B978-0-12-357650-7.50009-0(17-41)Online publication date: 1979
Internet of Things applications have the potential to derive sensitive information about individuals. Therefore, developers must exercise due diligence to make sure that data are managed according to the privacy regulations and data protection laws. ...
Like many nations, Australia is currently weighing numerous options regarding privacy legislation. The Australian Law Reform Commission (ALRC) has released a 2,000-page review of Australian privacy law, in which it proposes several changes that would ...
When people sign-up to new online services, privacy notices are the initial means by which data handling practices are communicated. Yet, their design seldom ensures users' privacy comprehension or provides people with privacy choices, resulting in ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in