-
2
-
-
84876675786
-
The council of europe convention on cybercrime: Defining crime in digital world
-
J.Clough, "The Council of Europe Convention on Cybercrime: Defining Crime in Digital World," in Criminal Law Forum 2012, pp. 363-391, 2012.
-
(2012)
Criminal Law Forum 2012
, pp. 363-391
-
-
Clough, J.1
-
3
-
-
84856464520
-
Evolutionary computation in computer security and forensics: An overview
-
S.A.Amro, D.A.Elizondo, A.Solanas, "Evolutionary Computation in Computer Security and Forensics: An Overview," in Computational Intelligence for Privacy and Security, SCI 394, pp. 25-34, 2012.
-
(2012)
Computational Intelligence for Privacy and Security, SCI
, vol.394
, pp. 25-34
-
-
Amro, S.A.1
Elizondo, D.A.2
Solanas, A.3
-
4
-
-
84855240039
-
Research on relevant problems of computer crime forensics
-
W.X.Guang, "Research on Relevant Problems of Computer Crime Forensics," in Proc. of ICCE2011, AISC 112, pp. 169-173.
-
Proc. of ICCE2011, AISC 112
, pp. 169-173
-
-
Guang, W.X.1
-
5
-
-
84886588367
-
-
European Parliament-directorate general for internal policies policy department C: citizens' rights and constitutional affairs
-
European Parliament-directorate general for internal policies policy department C: citizens' rights and constitutional affairs, "Fighting Cyber-Crime and Protecting Privacy", 2012.
-
(2012)
Fighting Cyber-Crime and Protecting Privacy
-
-
-
6
-
-
84910042543
-
-
Personvern 2013-"Tilstand OG Trender Tecknologiradet.no, Oslo, Rapport 1/2013, ISBN 978-82-92447-57-4
-
Personvern 2013-"Tilstand OG Trender", Tecknologiradet.no, Oslo, Rapport 1/2013, ISBN 978-82-92447-57-4.
-
-
-
-
8
-
-
84910084043
-
-
EU fights corruption 05-Mar-2013. Report
-
"EU fights corruption", 05-Mar-2013. Report available at: http://www.neurope.eu/article/eu-fights-corruption
-
-
-
-
9
-
-
84910062736
-
-
com Report of Jul
-
Magnir.com Report of Jul 2013 accessible at: http://www.magnir.com/2013/07/digging-for-data-skillsdemand-for-digital-forensics-employees-increasing
-
(2013)
-
-
-
10
-
-
84866347248
-
When digital forensic research meets laws
-
J.Huang, Z.Ling, T.Xiang, J.Wang, X.Fu, "When Digital Forensic Research Meets Laws," in Proc. of ICDCS 2012, pp. 542-551.
-
(2012)
Proc. of ICDCS
, pp. 542-551
-
-
Huang, J.1
Ling, Z.2
Xiang, T.3
Wang, J.4
Fu, X.5
-
11
-
-
84883556196
-
A survey of digital forensic investigator decision processes and measurement of decisions based on enhanced preview
-
J.I.James, P.Gladyshev, "A Survey of Digital Forensic Investigator Decision Processes and Measurement of Decisions based on Enhanced Preview," in Elsevier Journal of Digital Investigation, Volume 10, Issue 2, Pages 148-157, 2013.
-
(2013)
Elsevier Journal of Digital Investigation
, vol.10
, Issue.2
, pp. 148-157
-
-
James, J.I.1
Gladyshev, P.2
-
12
-
-
84910040124
-
Digital forensics trends and future
-
F.N. Dezfouli, A. Dehghantanha, N.I.Udzir, N.F.B.M.Sani, F.Daryabar, "Digital Forensics Trends and Future" in International Journal of Cyber-Security and Digital Forensics, Vol 2, Issue 2, pp. 48-76, 2013.
-
(2013)
International Journal of Cyber-Security and Digital Forensics
, vol.2
, Issue.2
, pp. 48-76
-
-
Dezfouli, F.N.1
Dehghantanha, A.2
Udzir, N.I.3
Sani, N.F.B.M.4
Daryabar, F.5
-
13
-
-
84880905049
-
A survey on privacy issues in digital forensics
-
Asou Aminnezhad, Ali Dehghantanha, Mohd Taufik Abdullah, "A Survey on Privacy Issues in Digital Forensics," International Journal of Cyber-Security and Digital Forensics (IJCSDF), Vol 1, Issue 4, pp. 311-323, 2012.
-
(2012)
International Journal of Cyber-Security and Digital Forensics (IJCSDF
, vol.1
, Issue.4
, pp. 311-323
-
-
Aminnezhad, A.1
Dehghantanha, A.2
Abdullah, M.T.3
-
15
-
-
84910084041
-
The legal protection of privacy in international practices: Potential as models for a chinese privacy protection regime
-
Chapter 4, Sprigner-Verlag
-
H.Wang, "The Legal Protection of Privacy in International Practices: Potential as Models for a Chinese Privacy Protection Regime," Protecting Privacy in China, Chapter 4, Sprigner-Verlag, 2011.
-
(2011)
Protecting Privacy in China
-
-
Wang, H.1
-
17
-
-
77954503972
-
-
Senate Banking Committee(Gramm-Leach-Bliley act)-disclosure of non-public personal information"
-
Senate Banking Committee, "Financial modernization act of 1999, (Gramm-Leach-Bliley act)-disclosure of non-public personal information".
-
(1999)
Financial Modernization Act of
-
-
-
18
-
-
79958003794
-
A conceptual model for privacy policies with consent and revocation requirements
-
M.C.Mont, S.Pearson, S. Creese, M.Goldsmith, N.Papanikolaou, "A Conceptual Model for Privacy Policies with Consent and Revocation Requirements," in Privacy and Identity Management for Life 2010, IFIP AICT 352, pp. 258-270.
-
Privacy and Identity Management for Life 2010, IFIP AICT 352
, pp. 258-270
-
-
Mont, M.C.1
Pearson, S.2
Creese, S.3
Goldsmith, M.4
Papanikolaou, N.5
-
19
-
-
0345977514
-
Directive 95/46/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
European Union (EU) Tech. Rep
-
European Union (EU), "Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data," European Community(EU), Tech. Rep., 1995.
-
(1995)
European Community(EU)
-
-
-
20
-
-
84865103441
-
Effects of data anonymization on the data mining results
-
Croatia
-
I. Buratovic, M.Milicevic, K.Zubrinic, "Effects of Data Anonymization on the Data Mining Results," in Proc. of MIPRO 2012, pp. 1619-1623, Croatia.
-
(2012)
Proc. of MIPRO
, pp. 1619-1623
-
-
Buratovic, I.1
Milicevic, M.2
Zubrinic, K.3
-
21
-
-
84869451504
-
Comparing random-based and k-naonymity-based algorithms for graph anonymization
-
J. Casas-Roma, J.Herrerra-Joancomarti, V.Torra. "Comparing Random-Based and k-Naonymity-Based Algorithms for Graph Anonymization," in Proc. of MDAI 2012, LNAI 7647, pp. 197-209.
-
Proc. of MDAI 2012, LNAI 7647
, pp. 197-209
-
-
Casas-Roma, J.1
Herrerra-Joancomarti, J.2
Torra, V.3
-
22
-
-
84910042541
-
Understanding privacy policies-A study in empirical analysis of language usage
-
Special Issue, Mar
-
R.Lammel, E. Pek, "Understanding Privacy Policies-A Study in Empirical Analysis of Language Usage," Empirical Software Engineering, Special Issue, Mar 2012.
-
(2012)
Empirical Software Engineering
-
-
Lammel, R.1
Pek, E.2
-
23
-
-
78650047205
-
Logical methods in security and privacy
-
A.Datta, "Logical Methods in Security and Privacy," in Security and Privacy, Vol.8, Issue 6, pp. 86-89, 2010.
-
(2010)
Security and Privacy
, vol.8
, Issue.6
, pp. 86-89
-
-
Datta, A.1
-
24
-
-
77958494457
-
A logic of privacy
-
S.Barker, V.Genovese, "A Logic of Privacy," in Data and Applications Security XXIV, LNCS 6166, pp. 17-32, 2010.
-
(2010)
Data and Applications Security XXIV, LNCS 6166
, pp. 17-32
-
-
Barker, S.1
Genovese, V.2
-
26
-
-
81855218018
-
Understanding and protecting privacy: Formal semantics and principled audit mechanisms
-
A.Datta, J.Blocki, N.Christin, H.D.Young,D.Garg, L.Jia, D.Kaynar, A.Sinha, " Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms," in Proc. of ICISS 2011, LNCS 7093, pp. 1-27.
-
Proc. of ICISS 2011, LNCS 7093
, pp. 1-27
-
-
Datta, A.1
Blocki, J.2
Christin, N.3
Young, H.D.4
Garg, D.5
Jia, L.6
Kaynar, D.7
Sinha, A.8
-
28
-
-
77249085149
-
How internet users' privacy concerns have evolved since
-
A.I.Anton, J. B. Earp, J.D. Young, "How Internet Users' Privacy Concerns Have Evolved Since 2002," In IEEE J. of Security and Privacy, Vol 8, Issue 1, pp. 21-27.
-
(2002)
IEEE J. of Security and Privacy
, vol.8
, Issue.1
, pp. 21-27
-
-
Anton, A.I.1
Earp, J.B.2
Young, J.D.3
-
29
-
-
77957911953
-
A framework for privacy policy management in service aggregation
-
Shanghai, China
-
P.Wang, L.Dong, Y.Mu, W.Susilo, and J.Yan, "A Framework for Privacy Policy Management in Service Aggregation," in Proc. of CSCWD2010, pp. 166-171, Shanghai, China.
-
Proc. of CSCWD2010
, pp. 166-171
-
-
Wang, P.1
Dong, L.2
Mu, Y.3
Susilo, W.4
Yan, J.5
-
30
-
-
80052754612
-
Quantifying privacy violations
-
M.Banerjee, R.K.Adl, L.Wu,K.Barker, "Quantifying Privacy Violations," in Proc. of SDM 2011, LNCS 6933, pp. 1-17.
-
Proc. of SDM 2011, LNCS 6933
, pp. 1-17
-
-
Banerjee, M.1
Adl, R.K.2
Wu, L.3
Barker, K.4
-
31
-
-
79958010219
-
Applying formal methods to detect and resolve ambiguities in privacy requirements
-
I.Agrafiotis, S.Creese, M.Goldsmith, N.Papanikolaou, "Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements," in Proc. of Privacy and Identity Management for Life 2010, IFIP AICT 352, pp. 271-282, 2011.
-
(2011)
Proc. of Privacy and Identity Management for Life 2010, IFIP AICT 352
, pp. 271-282
-
-
Agrafiotis, I.1
Creese, S.2
Goldsmith, M.3
Papanikolaou, N.4
-
33
-
-
79951929550
-
Policy-based data downgrading: Toward a semantic framework and automated tools to balance need-to-protect and need-to-share policies
-
G.Denker, A.Gehani, M.Kim, D.Hanz, "Policy-Based Data Downgrading: Toward a Semantic Framework and Automated Tools to Balance Need-To-Protect and Need-To-Share Policies," in Proc. of POLICY 2010, pp. 120-128.
-
(2010)
Proc. of POLICY
, pp. 120-128
-
-
Denker, G.1
Gehani, A.2
Kim, M.3
Hanz, D.4
-
34
-
-
77954389787
-
Model checking based security policy verification and validation
-
J.Ma, D.Zhang, G.Xu, Y.Yang, "Model Checking Based Security Policy Verification and Validation," in the Proc. of ISA 2010, pp 18-22.
-
(2010)
The Proc. of ISA
, pp. 18-22
-
-
Ma, J.1
Zhang, D.2
Xu, G.3
Yang, Y.4
-
35
-
-
84874580410
-
Technical, legal and ethical dilemmas: Distinguishing risks arising from malware and cyber-attack tools in the 'cloud'-A forensic computing perspective
-
V.Broucek, P.Turner, " Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the 'cloud'-A forensic computing perspective," in Computer Virology, DOI 10.1007/s11416-012-0173-0, 2012.
-
(2012)
Computer Virology
-
-
Broucek, V.1
Turner, P.2
-
36
-
-
77952413466
-
A framework to guide the implementation of proactive digital forensics in organizations
-
C.P.Grobler, C.P.Louwrens, S.H.Solms, "A Framework to Guide the Implementation of Proactive Digital Forensics in Organizations," in Proc. of ARES 2010, pp. 677-682.
-
(2010)
Proc. of ARES
, pp. 677-682
-
-
Grobler, C.P.1
Louwrens, C.P.2
Solms, S.H.3
-
37
-
-
39749163072
-
Privacy and forensics investigation process: The ERPINA protocol
-
G.Antoniou, L.Sterling, S.Gritzalis, P.Udaya, "Privacy and forensics investigation process: The ERPINA protocol," Computer Standards &Interfaces, pp. 229-236, Vol. 30, Issue 4, 2008.
-
(2008)
Computer Standards &Interfaces
, vol.30
, Issue.4
, pp. 229-236
-
-
Antoniou, G.1
Sterling, L.2
Gritzalis, S.3
Udaya, P.4
-
38
-
-
79961078119
-
A system for the proactive, continuous, and efficient collection of digital forensic evidence
-
C.Shields, O. Frieder, M. Maloof, "A System for the Proactive, Continuous, and Efficient Collection of Digital Forensic Evidence" in Journal of Digital Investigation, Vol. 8, Special Issue for 11th Annual Digital Forensics Research Conference, pp S3-S13, 2013.
-
(2013)
Journal of Digital Investigation 8 Special Issue for 11th Annual Digital Forensics Research Conference
, pp. S3-S13
-
-
Shields, C.1
Frieder, O.2
Maloof, M.3
-
39
-
-
84858719292
-
Protecting digital data privacy in computer forensics examination
-
F.Y.W. Law, P.P.F. Chan, S.M.Yiu, K.P.Chow, M.Y.K.Kwan, H.K.S.Tse, P.K.Y.Lai, "Protecting Digital Data Privacy in Computer Forensics Examination," in Proc. of SADFE 2011, pp.1-6.
-
(2011)
Proc. of SADFE
, pp. 1-6
-
-
Law, F.Y.W.1
Chan, P.P.F.2
Yiu, S.M.3
Chow, K.P.4
Kwan, M.Y.K.5
Tse, H.K.S.6
Lai, P.K.Y.7
-
40
-
-
84885890357
-
Research and review on computer forensics
-
H.Guo, B.Jin, and D.Huang, "Research and Review on Computer Forensics," in Proc. of the E-Forensics, LNICST 56, pp. 224-233, 2011.
-
(2011)
Proc. of the E-Forensics, LNICST
, vol.56
, pp. 224-233
-
-
Guo, H.1
Jin, B.2
Huang, D.3
-
41
-
-
77955860747
-
The importance of corporate forensics readiness in the information security framework
-
G.Pangalos, C. Iliodis, I.Pagkalos, "The Importance of Corporate Forensics Readiness in the Information Security Framework," in Proc. of WETICE 2010 pp. 12-16.
-
(2010)
Proc. of WETICE
, pp. 12-16
-
-
Pangalos, G.1
Iliodis, C.2
Pagkalos, I.3
-
42
-
-
79955849415
-
Privacy models and languages: Assurance checking policies
-
S.Pearson, "Privacy Models and Languages: Assurance Checking Policies," in Digital Privacy, LNCS 6545, pp. 363-375, 2011.
-
(2011)
Digital Privacy, LNCS 6545
, pp. 363-375
-
-
Pearson, S.1
-
43
-
-
84869219608
-
A conceptual model for digital forensic readiness
-
A. Pooe, L.Labuschagne, "A Conceptual Model for Digital Forensic Readiness," in Proc. of ISSA 2012, pp. 1-8.
-
(2012)
Proc. of ISSA
, pp. 1-8
-
-
Pooe, A.1
Labuschagne, L.2
-
44
-
-
84943538687
-
A forensic framework for handling information privacy incidents
-
Orlando, Florida, USA
-
K.Reddy and H.Venter, " A Forensic Framework for Handling Information Privacy Incidents," in IFIP WG 11.9 International Conference on Digital Forensics, pp. 143-159, Orlando, Florida, USA, 2009.
-
(2009)
IFIP WG 11.9 International Conference on Digital Forensics
, pp. 143-159
-
-
Reddy, K.1
Venter, H.2
-
45
-
-
84855646451
-
Privacy preserving multiple keyword search for confidential investigation of remote forensics
-
S.Hou, T.Uehara, S.M.Yiu, L.C.K.Hui, K.P.Chow, "Privacy Preserving Multiple Keyword Search for Confidential Investigation of Remote Forensics ", in Proc. of MINES 2011, pp. 595-599.
-
(2011)
Proc. of MINES
, pp. 595-599
-
-
Hou, S.1
Uehara, T.2
Yiu, S.M.3
Hui, L.C.K.4
Chow, K.P.5
-
46
-
-
35448997405
-
Threats to privacy in the forensic analysis of database systems
-
Beijing, China
-
P.Stahlberg, G.Miklau,and B.NeilLevine, "Threats to Privacy in the Forensic Analysis of Database Systems," in the SIGMOD 2007, Beijing, China, 2007.
-
(2007)
The SIGMOD 2007
-
-
Stahlberg, P.1
Miklau, G.2
Neillevine, B.3
-
47
-
-
49049112899
-
Detecting suspicious relational database queries
-
Barcelona, Spain
-
S.Böttcher, R.Hartel, M.Kirschner, "Detecting Suspicious Relational Database Queries," in the ARES 2008, Barcelona, Spain, 2008.
-
(2008)
The ARES 2008
-
-
Böttcher, S.1
Hartel, R.2
Kirschner, M.3
-
48
-
-
78449264295
-
Sequenced release of privacy-accurate information in a forensic investigation
-
N.J.Croft, M.S.Olivier, "Sequenced release of privacy-accurate information in a forensic investigation," in Digital Investigation, Vol.1, Issue 2, 2010.
-
(2010)
Digital Investigation
, vol.1
, Issue.2
-
-
Croft, N.J.1
Olivier, M.S.2
-
49
-
-
83455164517
-
Privacy preserving confidential forensic investigation for shared or remote servers
-
S.Hou, T. Uehara, S.M. Yiu, L.C.K.Hui, K.P.Chow, "Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers," in Proc. of IIHMSP 2011, pp.378-383.
-
(2011)
Proc. of IIHMSP
, pp. 378-383
-
-
Hou, S.1
Uehara, T.2
Yiu, S.M.3
Hui, L.C.K.4
Chow, K.P.5
-
50
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
Article 14
-
B.C.M.Fung, K.Wang,R.Chen, P.S.Yu, "Privacy-Preserving Data Publishing: A Survey of Recent Developments," in ACM Computing Surveys, Vol.42, No.4, Article 14, 2010.
-
(2010)
ACM Computing Surveys
, vol.42
, Issue.4
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
51
-
-
84885891567
-
An efficient searchable encryption scheme and its application in network forensics
-
X. Lin, R.Lu, K.Foxton,X.Shen, "An Efficient Searchable Encryption Scheme and Its Application in Network Forensics," in Proc. of E-Forensics 2010, LNICST 56, pp. 66-78,2011.
-
(2011)
Proc. of E-Forensics 2010, LNICST
, vol.56
, pp. 66-78
-
-
Lin, X.1
Lu, R.2
Foxton, K.3
Shen, X.4
-
52
-
-
79961039951
-
Privacy-preserving network flow recording
-
Bilal Shebaro, Jedidiah R. Crandall, " Privacy-preserving network flow recording," in Digital Investigation Journal, Issue 8, doi:10.1016/j.diin.2011.05.011, 2011.
-
(2011)
Digital Investigation Journal
, Issue.8
-
-
Shebaro, B.1
Crandall, J.R.2
-
53
-
-
84910071642
-
A kind of privacy-preserving data mining algorithm oriented to data user
-
AISC 129
-
L.Cai, J.Y.Su, "A Kind of Privacy-Preserving Data Mining Algorithm Oriented to Data User," in Advances in MSEC, Vol. 2. AISC 129, pp. 25-30, 2011.
-
(2011)
Advances in MSEC
, vol.2
, pp. 25-30
-
-
Cai, L.1
Su, J.Y.2
-
54
-
-
80455173555
-
Optimized two party privacy preserving association rule mining using fully homomorphic encryption
-
M.G.Koasar, R.Paulet, X.Yi, "Optimized Two Party Privacy Preserving Association Rule Mining Using Fully Homomorphic Encryption," in Proc. of ICA3PP 2011, pp. 360-370, 2011.
-
(2011)
Proc. of ICA3PP 2011
, pp. 360-370
-
-
Koasar, M.G.1
Paulet, R.2
Yi, X.3
-
55
-
-
78650181766
-
Efficient generalized selective private function evaluation with applications in biometric authentication
-
H. Lipmaa, B.Zhang, "Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication," in Proc. of Inscrypt 2010, pp.154-16.
-
(2010)
Proc. of Inscrypt
, pp. 154-216
-
-
Lipmaa, H.1
Zhang, B.2
-
56
-
-
80051555814
-
Privacy preserving keyword search over encrypted cloud data
-
S.Anathi, M.S.Sendil, S.Karthik, "Privacy Preserving Keyword Search over Encrypted Cloud Data," in Proc. of ACC 2011, pp. 480-487.
-
(2011)
Proc. of ACC
, pp. 480-487
-
-
Anathi, S.1
Sendil, M.S.2
Karthik, S.3
-
57
-
-
3843098978
-
-
(2000/C364/01),. Accessed on 13th Feb 2014
-
Charter of Fundamental Rights of the European Union 2000 (2000/C364/01),Available:http://www.europarl.europa.eu/charte r/pdf/text-en.pdf. Accessed on 13th Feb 2014.
-
(2000)
Charter of Fundamental Rights of the European Union
-
-
-
58
-
-
84859028488
-
Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications
-
Rachel L. Finn, David Wright, "Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications" in Computer Law &Security Review Vol. 28, 2012, pp.184-194
-
(2012)
Computer Law &Security Review
, vol.28
, pp. 184-194
-
-
Finn, R.L.1
Wright, D.2
-
59
-
-
84910084038
-
Protecting privacy in china-chapter 4: The legal protection of privacy in international practices: Potential as models for a chinese privacy protection regimen
-
Springer-Verlag Berlin Heidelberg
-
H. Wang, "Protecting Privacy in China-Chapter 4: The Legal Protection of Privacy in International Practices: Potential as Models for a Chinese Privacy Protection Regimen," in International Standards, Springer-Verlag Berlin Heidelberg 2011.
-
(2011)
International Standards
-
-
Wang, H.1
-
60
-
-
84885380116
-
There's more to it than data protection-Fundamental rights, privacy and the personal/household exemption in the digital age
-
Z.Warso, " There's more to it than data protection-Fundamental rights, privacy and the personal/household exemption in the digital age," in Computer Law &Security Review, Vol.29, pp. 676-688, 2013.
-
(2013)
Computer Law &Security Review
, vol.29
, pp. 676-688
-
-
Warso, Z.1
-
61
-
-
84910104741
-
-
Safe Harbor Agreement 2000. Accessed on 13 Feb
-
Safe Harbor Agreement 2000, Available at: http://export.gov/safeharbor/eu/eg-main-018476.asp. Accessed on 13 Feb 2014.
-
(2014)
-
-
-
63
-
-
84859050184
-
Comment: We've got our eyes on you: When surveillance by unmanned aircraft systems constitutes a Fourth amendment search
-
Dunlap Travis, "Comment: we've got our eyes on you: when surveillance by unmanned aircraft systems constitutes a Fourth amendment search," in South Texas Law Review Fall 2009; Vol. 51, Issue 1.
-
(2009)
South Texas Law Review Fall
, vol.51
, Issue.1
-
-
Travis, D.1
-
64
-
-
84892755097
-
Beyond Orwell: The application of unmanned aircraft systems in domestic surveillance operations
-
McBride Paul, "Beyond Orwell: The application of unmanned aircraft systems in domestic surveillance operations," in Journal of Air Law and Commerce Summer 2009; Vol.74, Issue 3, pp. 627-628.
-
(2009)
Journal of Air Law and Commerce Summer
, vol.74
, Issue.3
, pp. 627-628
-
-
McBride, P.1
-
65
-
-
59049095530
-
APEC's privacy framework: A new low standard
-
G. Greenleaf, "APEC's privacy framework: a new low standard," in Privacy Law and Policy Reporter, Vol.11, issue 5, 2005.
-
(2005)
Privacy Law and Policy Reporter
, vol.11
, Issue.5
-
-
Greenleaf, G.1
|