-
1
-
-
84883892066
-
Privacy in E-commerce: Examining user scenarios and privacy preferences
-
Denver, CO. New York: ACM Press
-
Ackerman, M. S., Cranor, L. F., & Reagle, J. (1999). Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences. In Proceedings of the 1st ACM conference on Electronic commerce, Denver, CO. New York: ACM Press.
-
(1999)
Proceedings of the 1st ACM Conference on Electronic Commerce
-
-
Ackerman, M.S.1
Cranor, L.F.2
Reagle, J.3
-
2
-
-
33947623659
-
Social, ethical and legal barriers to EHealth
-
doi:10.1016/j.ijmedinf.2006.09.016
-
Anderson, J. G. (2007). Social, ethical and legal barriers to EHealth. International Journal of Medical Informatics, 76(5-6), 480-483. doi:10.1016/j.ijmedinf.2006.09.016
-
(2007)
International Journal of Medical Informatics
, vol.76
, Issue.5-6
, pp. 480-483
-
-
Anderson, J.G.1
-
3
-
-
39049122747
-
Privacy and security in public health: Maintaining the delicate balance between personal privacy and population safety
-
Washington, DC: IEEE
-
Baker, D. B. (2006). Privacy and Security in Public Health: Maintaining the Delicate Balance between Personal Privacy and Population Safety. In Proceedings of the 22nd Annual Computer Security Applications Conference (Vol. 12, No. 1, pp. 3-22). Washington, DC: IEEE.
-
(2006)
Proceedings of the 22nd Annual Computer Security Applications Conference
, vol.12
, Issue.1
, pp. 3-22
-
-
Baker, D.B.1
-
6
-
-
0033464665
-
Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation
-
doi:10.1287/orsc.10.1.104
-
Culnan, M., & Armstrong, P. (1999). Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organization Science, 10(1), 104-115. doi:10.1287/orsc.10.1.104
-
(1999)
Organization Science
, vol.10
, Issue.1
, pp. 104-115
-
-
Culnan, M.1
Armstrong, P.2
-
8
-
-
7744226711
-
Privacy: A rational context
-
Erman, M. D., Williams, M. B., & Gutierrez, C. (Eds.), New York: Oxford University Press
-
Fried, C. (1990). Privacy: A Rational Context. In Erman, M. D., Williams, M. B., & Gutierrez, C. (Eds.), Computers, Ethics & Society. New York: Oxford University Press.
-
(1990)
Computers, Ethics & Society
-
-
Fried, C.1
-
9
-
-
0037749111
-
-
Harris Interactive Inc, Hackensack, NJ: Privacy & American Business
-
Harris Interactive Inc. (2002). Privacy On and Off the Internet: What Consumers Want. Hackensack, NJ: Privacy & American Business.
-
(2002)
Privacy on and off the Internet: What Consumers Want
-
-
-
11
-
-
33947697872
-
The guideline of the personal health data structure to secure safety healthcare: The balance between use and protection to satisfy the patients' needs
-
doi:10.1016/j.ijmedinf.2006.09.005
-
Ishikawa, K. (2007). The guideline of the personal health data structure to secure safety healthcare: The balance between use and protection to satisfy the patients' needs. International Journal of Medical Informatics, 76(5-6), 480-483. doi:10.1016/j.ijmedinf.2006.09.005
-
(2007)
International Journal of Medical Informatics
, vol.76
, Issue.5-6
, pp. 480-483
-
-
Ishikawa, K.1
-
12
-
-
60049086085
-
Privacy interests in prescription data, Part 1: Prescriber Privacy
-
doi:10.1109/MSP.2009.14
-
Kosseim, P. (2009). Privacy interests in prescription data, Part 1: Prescriber Privacy. IEEE Security & Privacy, 7(1), 72-76. doi:10.1109/MSP.2009.14
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.1
, pp. 72-76
-
-
Kosseim, P.1
-
13
-
-
39449106296
-
A cryptographic key management solution for HIPAA privacy/security regulations
-
doi:10.1109/TITB.2007.906101
-
Lee, W.-B., & Lee, C.-D. (2008). A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations. IEEE Transactions on Information Technology in Biomedicine, 12(1), 34-41. doi:10.1109/TITB.2007. 906101
-
(2008)
IEEE Transactions on Information Technology in Biomedicine
, vol.12
, Issue.1
, pp. 34-41
-
-
Lee, W.-B.1
Lee, C.-D.2
-
14
-
-
34447262334
-
A computational model to protect patient data from location-based re-identification
-
doi:10.1016/j.artmed.2007.04.002
-
Malin, B. (2007). A computational model to protect patient data from location-based re-identification. Artificial Intelligence in Medicine, 40, 223-239. doi:10.1016/j.artmed.2007.04.002
-
(2007)
Artificial Intelligence in Medicine
, vol.40
, pp. 223-239
-
-
Malin, B.1
-
15
-
-
0029381514
-
Data management issues for emerging diseases and new tools for managing,surveillance and laboratory data
-
doi:10.3201/eid0104.950403
-
Martin, S. M., & Bean, N. H. (1995). Data management issues for emerging diseases and new tools for managing,surveillance and laboratory data. Emerging Infectious Diseases, 1(4). doi:10.3201/eid0104.950403
-
(1995)
Emerging Infectious Diseases
, vol.1
, Issue.4
-
-
Martin, S.M.1
Bean, N.H.2
-
16
-
-
34047155030
-
Security and privacy issues with health care information technology
-
Washington, DC: IEEE
-
Meingast, M., Roosta, T., & Sastry, S. (2006). Security and Privacy Issues with Health Care Information Technology. In Proceedings of the 28th Engineering in Medicine and Biology Society, Annual International Conference (pp. 5453-5458). Washington, DC: IEEE.
-
(2006)
Proceedings of the 28th Engineering in Medicine and Biology Society, Annual International Conference
, pp. 5453-5458
-
-
Meingast, M.1
Roosta, T.2
Sastry, S.3
-
17
-
-
84976793562
-
Values, personal information privacy, and regulatory approaches
-
doi:10.1145/219663.219683
-
Milberg, S. J., Burke, S. J., Smith, H. J., & Kallman, E. A. (1995). Values, Personal Information Privacy, and Regulatory Approaches. Communications of the ACM, 38, 65-74. doi:10.1145/219663.219683
-
(1995)
Communications of the ACM
, vol.38
, pp. 65-74
-
-
Milberg, S.J.1
Burke, S.J.2
Smith, H.J.3
Kallman, E.A.4
-
18
-
-
52149101990
-
-
LNCS, 5183, EC-Web
-
Moloney, M., & Bannister, F. (2008). Online Privacy: Measuring Individuals' Concerns. LNCS, 5183, 21-30. EC-Web.
-
(2008)
Online Privacy: Measuring Individuals' Concerns
, pp. 21-30
-
-
Moloney, M.1
Bannister, F.2
-
19
-
-
0042923706
-
Towards a theory of privacy in the information age
-
doi:10.1145/270858.270866
-
Moor, J. H. (1997). Towards a theory of privacy in the information age. ACM SIGCAS Computers and Society, 27, 27-32. doi:10.1145/270858.270866
-
(1997)
ACM SIGCAS Computers and Society
, vol.27
, pp. 27-32
-
-
Moor, J.H.1
-
21
-
-
0008144259
-
Anonymity, unobservability and pseudonymity: A Proposal for Terminology
-
Federrath, H. (Ed.), New York: Springer Verlag
-
Pfitzmann, A., & Hansen, M. (2000). Anonymity, unobservability and pseudonymity: A Proposal for Terminology. In Federrath, H. (Ed.), Designing Privacy enhancing technologies. New York: Springer Verlag.
-
(2000)
Designing Privacy Enhancing Technologies
-
-
Pfitzmann, A.1
Hansen, M.2
-
23
-
-
50049112171
-
Applying a Threshold Scheme to the Pseudonymization of Health Data
-
Riedl, B., Grascher, V., & Neubauer, T. (2007). Applying a Threshold Scheme to the Pseudonymization of Health Data. In Proceedings of the IEEE Dependable Computing, PRDC 13th Pacific Rim International Symposium (pp. 397-400).
-
(2007)
Proceedings of the IEEE Dependable Computing, PRDC 13th Pacific Rim International Symposium
, pp. 397-400
-
-
Riedl, B.1
Grascher, V.2
Neubauer, T.3
-
24
-
-
68749118482
-
Are electronic health records ready for genomic medicine?
-
doi:10.1097/GIM.0b013e3181a53331
-
Scheuner, M. T. (2009). Are electronic health records ready for genomic medicine? Genetics in Medicine, 11(7), 510-517. doi:10.1097/GIM.0b013e3181a53331
-
(2009)
Genetics in Medicine
, vol.11
, Issue.7
, pp. 510-517
-
-
Scheuner, M.T.1
-
25
-
-
52149113254
-
Philosophical theories of privacy: Implications for an adequate online privacy policy
-
doi:10.1111/j.1467-9973.2006.00474.x
-
Tavani, H. T. (2007). Philosophical theories of privacy: Implications for an adequate online privacy policy. Metaphilosophy, 38(1), 1-11. doi:10.1111/j.1467-9973.2006.00474.x
-
(2007)
Metaphilosophy
, vol.38
, Issue.1
, pp. 1-11
-
-
Tavani, H.T.1
|