Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Metric for Calculating the Extent of Non-Knowledge (Level) of Personal Privacy
(Articles)
Yair Oppenheim
Open Access Library Journal
Vol.12 No.5
,May 31, 2025
DOI:
10.4236/oalib.1113554
40
Downloads
239
Views
Citations
How Information and Communication Technologies Expose Our Deep Personal Privacy
(Articles)
Yair Oppenheim
Open Access Library Journal
Vol.12 No.4
,April 30, 2025
DOI:
10.4236/oalib.1113066
43
Downloads
315
Views
Citations
Multi-Agent Nash Q-Learning for Node Security in Personal Privacy
(Articles)
Yair Oppenheim
Open Access Library Journal
Vol.12 No.8
,August 26, 2025
DOI:
10.4236/oalib.1113943
36
Downloads
178
Views
Citations
Legal Principles, Difficulties and System Construction of Personal Financial Information Protection
(Articles)
Haoming Huang
Beijing Law Review
Vol.14 No.1
,March 7, 2023
DOI:
10.4236/blr.2023.141006
252
Downloads
942
Views
Citations
Research on Personal Privacy Protection of China in the Era of Big Data
(Articles)
Hui Zhao
,
Haoxin Dong
Open Journal of Social Sciences
Vol.5 No.6
,June 19, 2017
DOI:
10.4236/jss.2017.56012
3,481
Downloads
7,788
Views
Citations
A Method to Improve the Accuracy of Personal Information Detection
(Articles)
Chih-Chieh Chiu
,
Chu-Sing Yang
,
Ce-Kuen Shieh
Journal of Computer and Communications
Vol.11 No.6
,June 30, 2023
DOI:
10.4236/jcc.2023.116010
230
Downloads
1,198
Views
Citations
Economic Models of Using Personal Information as an Economic Resource
(Articles)
Yair Oppenheim
Open Access Library Journal
Vol.12 No.7
,July 21, 2025
DOI:
10.4236/oalib.1113751
38
Downloads
219
Views
Citations
Interpretation of Information Processing Regulations
(Articles)
Sabah Al-Fedaghi
Journal of Software Engineering and Applications
Vol.2 No.2
,July 15, 2009
DOI:
10.4236/jsea.2009.22011
5,706
Downloads
11,142
Views
Citations
Experimentation with Personal Identifiable Information
(Articles)
Sabah Al-Fedaghi
,
Abdul Aziz Rashid Al-Azmi
Intelligent Information Management
Vol.4 No.4
,July 27, 2012
DOI:
10.4236/iim.2012.44019
6,573
Downloads
10,699
Views
Citations
Perspectives for Sharing Personal Information on Online Social Networks
(Articles)
Chi Kin Chan
,
Johanna Virkki
Social Networking
Vol.3 No.1
,January 23, 2014
DOI:
10.4236/sn.2014.31005
6,289
Downloads
11,428
Views
Citations
Data Misuse, Data Theft and Data Protection in Nigeria: A Call for a More Robust and More Effective Legislation
(Articles)
Abiodun Odusote
Beijing Law Review
Vol.12 No.4
,December 29, 2021
DOI:
10.4236/blr.2021.124066
537
Downloads
4,612
Views
Citations
This article belongs to the Special Issue on
Legal Awareness and Legal Culture
Towards Optimizing a Personal Cooling Garment for Hot and Humid Deep Mining Conditions
(Articles)
Chady Al Sayed
,
Ludwig Vinches
,
Stéphane Hallé
Open Journal of Optimization
Vol.5 No.1
,March 11, 2016
DOI:
10.4236/ojop.2016.51005
3,947
Downloads
6,229
Views
Citations
Trading-Off Privacy and Willingness to Share Personal Health Information: A Survey of Municipal Employees in Fukuoka City, Japan
(Articles)
Shuhei Nomura
,
Yasumasa Segawa
,
Cyrus Ghaznavi
,
Takanori Fujita
,
Keiko Maruyama-Sakurai
,
Manae Uchibori
,
Akifumi Eguchi
,
Masaharu Ishigaki
,
Kazuto Fujiwara
,
Masayuki Kido
,
Hiroaki Miyata
,
Takanori Yamashita
,
Naoki Nakashima
Health
Vol.16 No.12
,December 31, 2024
DOI:
10.4236/health.2024.1612091
83
Downloads
494
Views
Citations
A Comparative Analysis of Customer Data Privacy Protection under the European Union’s General Data Protection Regulation and the People’s Republic of China’s Personal Information Protection Law
(Articles)
Oceanus Ming-Ting Kam
Beijing Law Review
Vol.16 No.3
,September 3, 2025
DOI:
10.4236/blr.2025.163086
97
Downloads
661
Views
Citations
Defense against Membership Inference Attack Applying Domain Adaptation with Addictive Noise
(Articles)
Hongwei Huang
Journal of Computer and Communications
Vol.9 No.5
,May 28, 2021
DOI:
10.4236/jcc.2021.95007
553
Downloads
3,010
Views
Citations
Taxonomy for Privacy Policies of Social Networks Sites
(Articles)
Sergio Donizetti Zorzo
,
Rodrigo Pereira Botelho
,
Paulo Muniz de Ávila
Social Networking
Vol.2 No.4
,October 30, 2013
DOI:
10.4236/sn.2013.24015
5,531
Downloads
10,310
Views
Citations
Multi-Dimensional Anonymization for Participatory Sensing Systems
(Articles)
Nafeez Abrar
,
Shaolin Zaman
,
Anindya Iqbal
,
Manzur Murshed
Int'l J. of Communications, Network and System Sciences
Vol.13 No.6
,June 30, 2020
DOI:
10.4236/ijcns.2020.136006
366
Downloads
1,086
Views
Citations
A Systematic Survey for Differential Privacy Techniques in Federated Learning
(Articles)
Yi Zhang
,
Yunfan Lu
,
Fengxia Liu
Journal of Information Security
Vol.14 No.2
,February 28, 2023
DOI:
10.4236/jis.2023.142008
1,024
Downloads
4,796
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
When Corporal Acts Are Labeled Criminal: Lack of Privacy among the Homeless
(Articles)
Matthew R. Taylor
,
Eileen T. Walsh
Sociology Mind
Vol.8 No.2
,April 3, 2018
DOI:
10.4236/sm.2018.82011
1,433
Downloads
5,558
Views
Citations
Utility-Based Anonymization Using Generalization Boundaries to Protect Sensitive Attributes
(Articles)
Abou-el-ela Abdou Hussien
,
Nagy Ramadan Darwish
,
Hesham A. Hefny
Journal of Information Security
Vol.6 No.3
,June 15, 2015
DOI:
10.4236/jis.2015.63019
4,908
Downloads
6,013
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top