Zobrazeno 1 - 10
of 5 528
pro vyhledávání: '"privacy policy"'
Autor:
Yuniar, Ananda Dwitha
Publikováno v:
International Journal of Social Economics, 2024, Vol. 51, Issue 9, pp. 1182-1194.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/IJSE-11-2022-0740
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-37 (2024)
Abstract The processing of personal data gives a rise to many privacy concerns, and one of them is to ensure the transparency of data processing to end users. Usually this information is communicated to them using privacy policies. In this paper, the
Externí odkaz:
https://doaj.org/article/505a8f32240642c48eb3dacfe0b7b118
Publikováno v:
Information & Computer Security, 2023, Vol. 32, Issue 1, pp. 1-37.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-02-2023-0015
Publikováno v:
网络与信息安全学报, Vol 9, Pp 127-139 (2023)
The implementation of the EU’s General Data Protection Regulation (GDPR) has resulted in the imposition of over 300 fines since its inception in 2018.These fines include significant penalties for prominent companies like Google, which were penalize
Externí odkaz:
https://doaj.org/article/1eeab9e2ff1f49b6828c2350d3b9528c
Autor:
Neethu Mohan, K. A. Zakkariya
Publikováno v:
Colombo Business Journal, Vol 14, Iss 2, Pp 132-156 (2023)
FemTech stands for female technology, which encompasses a wide range of software, products, and services designed to improve women’s health through technology. Personal data used in this type of app are intimate, which highlights the importance of
Externí odkaz:
https://doaj.org/article/557043016c7243efbb195e9c4a0f4969
Publikováno v:
ISPRS International Journal of Geo-Information, Vol 13, Iss 9, p 321 (2024)
Satellite service systems transfer data from satellite providers to the big data industry, which includes data traders and data analytics companies. This system needs to provide access to numerous users whose specific identities are unknown. Cipherte
Externí odkaz:
https://doaj.org/article/083a2a9e167b454185dc41d75f9c23cb
Publikováno v:
Entropy, Vol 26, Iss 7, p 561 (2024)
A user’s devices such as their phone and computer are constantly bombarded by IoT devices and associated applications seeking connection to the user’s devices. These IoT devices may or may not seek explicit user consent, thus leaving the users co
Externí odkaz:
https://doaj.org/article/548461aa435a4d5fb7fbf3e41cfa0295
Publikováno v:
Heliyon, Vol 9, Iss 10, Pp e20648- (2023)
Privacy policies, intended to provide information to individuals regarding how their personal data is processed, are often complex and challenging for users to understand. Businesses often demonstrate non-compliance with personal data protection laws
Externí odkaz:
https://doaj.org/article/2a56df41d8ee4626b39a4f159abab337
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 1, Pp 514-525 (2023)
Personal data have become the key to data-driven services and applications whereas privacy requirements are now strongly imposed by regulations. Meanwhile, people find it difficult to understand whether the services and applications handle personal d
Externí odkaz:
https://doaj.org/article/8b0c48d7ebb54b86b6b09227e8dd77d2
Autor:
Gharib, Mohamad
Publikováno v:
Information & Computer Security, 2022, Vol. 30, Issue 4, pp. 549-561.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-12-2021-0209