-
1
-
-
33845917764
-
Crossing Privacy, Information, and Ethics
-
Washington, D.C, May 21-24
-
S. Al-Fedaghi, "Crossing Privacy, Information, and Ethics," 17th International Conference Information Resources Management Association (IRMA 2006), Washington, D.C., May 21-24, 2006.
-
(2006)
17th International Conference Information Resources Management Association (IRMA 2006)
-
-
Al-Fedaghi, S.1
-
2
-
-
84883302658
-
How to Calculate the Information Privacy
-
October 12-14, St. Andrews, New Brunswick, Canada
-
S. Al-Fedaghi, "How to Calculate the Information Privacy," Proceedings of the Third Annual Conference on Privacy, Security and Trust, October 12-14, (2005), St. Andrews, New Brunswick, Canada. http://www.lib.unb.ca/Texts/PSI/2005/pdf/fedaghi.pdf
-
(2005)
Proceedings of the Third Annual Conference on Privacy, Security and Trust
-
-
Al-Fedaghi, S.1
-
3
-
-
32044467641
-
Privacy Enhanced Information Systems
-
Tallinn, Estonia
-
S. Al-Fedaghi, Fiedler G., and Thaiheim B., "Privacy Enhanced Information Systems," Proceedings of the 15th European-Japanese Conference on Information Modelling and Knowledge Bases: Tallinn, Estonia, 2005.
-
(2005)
Proceedings of the 15th European-Japanese Conference on Information Modelling and Knowledge Bases
-
-
Al-Fedaghi, S.1
Fiedler, G.2
Thaiheim, B.3
-
6
-
-
34548120261
-
-
R. Clarke, Submission to the Senate Legal and Constitutional Committee re: its Inquiry into the Privacy Act 1988, February 2005, http://www.anu.edu. au/people/Roger.Clarke/DV/SenateReview0502.html
-
R. Clarke, Submission to the Senate Legal and Constitutional Committee re: its Inquiry into the Privacy Act 1988, February 2005, http://www.anu.edu. au/people/Roger.Clarke/DV/SenateReview0502.html
-
-
-
-
8
-
-
66349129374
-
Behind Closed Doors; Big Brother Is Us,
-
September 29
-
J. Gleick, "Behind Closed Doors; Big Brother Is Us," New York Times, September 29, 1996.
-
(1996)
New York Times
-
-
Gleick, J.1
-
9
-
-
0347989497
-
Information Privacy In Cyberspace Transactions, 50
-
April
-
J. Kang, "Information Privacy In Cyberspace Transactions," 50 Stanford Law Review 193, 1212-20, April, 1998.
-
(1998)
Stanford Law Review
, vol.193
, pp. 1212-1220
-
-
Kang, J.1
-
10
-
-
34548140618
-
-
6, Private Life and Public Policy, Demos, London
-
Perri 6, The Future of Privacy, Volume 1: Private Life and Public Policy, Demos, London, 1998.
-
(1998)
The Future of Privacy
, vol.1
-
-
Perri1
-
11
-
-
34548143414
-
-
J. Stoddart, Annual Report to Parliament 2004-2005, Office of the Privacy Commissioner of Canada.
-
J. Stoddart, Annual Report to Parliament 2004-2005, Office of the Privacy Commissioner of Canada.
-
-
-
-
13
-
-
34548137773
-
-
R. Wacks, Privacy in Cyberspace, In: Birks, P. (editor) 1997, Privacy and Loyalty, Clarendon Press, Oxford,New York, p. 91-112.
-
R. Wacks, "Privacy in Cyberspace," In: Birks, P. (editor) 1997, Privacy and Loyalty, Clarendon Press, Oxford,New York, p. 91-112.
-
-
-
-
14
-
-
34548126952
-
How E-Wallet Gets on Your System, 2006
-
Wikipedia
-
Wikipedia, "How E-Wallet Gets on Your System," 2006 http:/en.wikipedia.org/wiki/E-wallet
-
-
-
|