Information technology and dataveillance
Communications of the ACM
Computer ethics (2nd ed.)
Computers, ethics & social values
Computers, ethics & social values
Computer matching and personal privacy: can they be compatible?
Proceedings of the symposium on Computers and the quality of life
The World-Wide Web: quagmire or gold mine?
Communications of the ACM
Towards a theory of privacy in the information age
ACM SIGCAS Computers and Society
ACM SIGCAS Computers and Society
Consumer privacy concerns about Internet marketing
Communications of the ACM
AI watch: data mining and the Web
ACM SIGCAS Computers and Society
Communications of the ACM
Communications of the ACM
TRUSTe: an online privacy seal program
Communications of the ACM
Internet privacy concerns confirm the case for intervention
Communications of the ACM
Anonymous Web transactions with Crowds
Communications of the ACM
Legislating Privacy: Technology, Social Values, and Public Policy
Legislating Privacy: Technology, Social Values, and Public Policy
Informational privacy, data mining, and theInternet
Ethics and Information Technology
Privacy protection, control of information, and privacy-enhancing technologies
ACM SIGCAS Computers and Society
Preserving privacy when preference searching in e-commerce
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Towards a Hippocratic log file architecture
SAICSIT '04 Proceedings of the 2004 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Controlling and disclosing your personal information
WSEAS Transactions on Information Science and Applications
Privacy issues in educational systems
International Journal of Internet Technology and Secured Transactions
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
Hi-index | 0.00 |