Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
How Information and Communication Technologies Expose Our Deep Personal Privacy
(Articles)
Yair Oppenheim
Open Access Library Journal
Vol.12 No.4
,April 30, 2025
DOI:
10.4236/oalib.1113066
13
Downloads
110
Views
Citations
Research on Personal Privacy Protection of China in the Era of Big Data
(Articles)
Hui Zhao
,
Haoxin Dong
Open Journal of Social Sciences
Vol.5 No.6
,June 19, 2017
DOI:
10.4236/jss.2017.56012
3,383
Downloads
7,398
Views
Citations
A Method to Improve the Accuracy of Personal Information Detection
(Articles)
Chih-Chieh Chiu
,
Chu-Sing Yang
,
Ce-Kuen Shieh
Journal of Computer and Communications
Vol.11 No.6
,June 30, 2023
DOI:
10.4236/jcc.2023.116010
181
Downloads
999
Views
Citations
Legal Principles, Difficulties and System Construction of Personal Financial Information Protection
(Articles)
Haoming Huang
Beijing Law Review
Vol.14 No.1
,March 7, 2023
DOI:
10.4236/blr.2023.141006
192
Downloads
706
Views
Citations
Interpretation of Information Processing Regulations
(Articles)
Sabah Al-Fedaghi
Journal of Software Engineering and Applications
Vol.2 No.2
,July 15, 2009
DOI:
10.4236/jsea.2009.22011
5,553
Downloads
10,835
Views
Citations
Experimentation with Personal Identifiable Information
(Articles)
Sabah Al-Fedaghi
,
Abdul Aziz Rashid Al-Azmi
Intelligent Information Management
Vol.4 No.4
,July 27, 2012
DOI:
10.4236/iim.2012.44019
6,473
Downloads
10,350
Views
Citations
Perspectives for Sharing Personal Information on Online Social Networks
(Articles)
Chi Kin Chan
,
Johanna Virkki
Social Networking
Vol.3 No.1
,January 23, 2014
DOI:
10.4236/sn.2014.31005
6,175
Downloads
11,014
Views
Citations
Data Misuse, Data Theft and Data Protection in Nigeria: A Call for a More Robust and More Effective Legislation
(Articles)
Abiodun Odusote
Beijing Law Review
Vol.12 No.4
,December 29, 2021
DOI:
10.4236/blr.2021.124066
452
Downloads
4,230
Views
Citations
This article belongs to the Special Issue on
Legal Awareness and Legal Culture
Towards Optimizing a Personal Cooling Garment for Hot and Humid Deep Mining Conditions
(Articles)
Chady Al Sayed
,
Ludwig Vinches
,
Stéphane Hallé
Open Journal of Optimization
Vol.5 No.1
,March 11, 2016
DOI:
10.4236/ojop.2016.51005
3,855
Downloads
5,925
Views
Citations
Trading-Off Privacy and Willingness to Share Personal Health Information: A Survey of Municipal Employees in Fukuoka City, Japan
(Articles)
Shuhei Nomura
,
Yasumasa Segawa
,
Cyrus Ghaznavi
,
Takanori Fujita
,
Keiko Maruyama-Sakurai
,
Manae Uchibori
,
Akifumi Eguchi
,
Masaharu Ishigaki
,
Kazuto Fujiwara
,
Masayuki Kido
,
Hiroaki Miyata
,
Takanori Yamashita
,
Naoki Nakashima
Health
Vol.16 No.12
,December 31, 2024
DOI:
10.4236/health.2024.1612091
51
Downloads
258
Views
Citations
Tribonacci Quantum Cosmology: Optimal Non-Antipodal Spherical Codes & Graphs
(Articles)
Angus McCoss
Journal of Quantum Information Science
Vol.9 No.1
,March 29, 2019
DOI:
10.4236/jqis.2019.91004
1,010
Downloads
2,648
Views
Citations
Defense against Membership Inference Attack Applying Domain Adaptation with Addictive Noise
(Articles)
Hongwei Huang
Journal of Computer and Communications
Vol.9 No.5
,May 28, 2021
DOI:
10.4236/jcc.2021.95007
478
Downloads
2,599
Views
Citations
Toward Artificial General Intelligence: Deep Reinforcement Learning Method to AI in Medicine
(Articles)
Daniel Schilling Weiss Nguyen
,
Richard Odigie
Journal of Computer and Communications
Vol.11 No.9
,September 28, 2023
DOI:
10.4236/jcc.2023.119006
187
Downloads
791
Views
Citations
An Empirical Investigation into the Effect of Financial Sector Development on Consumption and Inflation in Nigeria: 1986-2012
(Articles)
M. N. G. Omofa
Open Journal of Business and Management
Vol.5 No.1
,December 1, 2016
DOI:
10.4236/ojbm.2017.51002
1,573
Downloads
2,693
Views
Citations
Taxonomy for Privacy Policies of Social Networks Sites
(Articles)
Sergio Donizetti Zorzo
,
Rodrigo Pereira Botelho
,
Paulo Muniz de Ávila
Social Networking
Vol.2 No.4
,October 30, 2013
DOI:
10.4236/sn.2013.24015
5,453
Downloads
10,075
Views
Citations
Multi-Dimensional Anonymization for Participatory Sensing Systems
(Articles)
Nafeez Abrar
,
Shaolin Zaman
,
Anindya Iqbal
,
Manzur Murshed
Int'l J. of Communications, Network and System Sciences
Vol.13 No.6
,June 30, 2020
DOI:
10.4236/ijcns.2020.136006
314
Downloads
904
Views
Citations
A Systematic Survey for Differential Privacy Techniques in Federated Learning
(Articles)
Yi Zhang
,
Yunfan Lu
,
Fengxia Liu
Journal of Information Security
Vol.14 No.2
,February 28, 2023
DOI:
10.4236/jis.2023.142008
862
Downloads
3,780
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
When Corporal Acts Are Labeled Criminal: Lack of Privacy among the Homeless
(Articles)
Matthew R. Taylor
,
Eileen T. Walsh
Sociology Mind
Vol.8 No.2
,April 3, 2018
DOI:
10.4236/sm.2018.82011
1,368
Downloads
5,295
Views
Citations
Utility-Based Anonymization Using Generalization Boundaries to Protect Sensitive Attributes
(Articles)
Abou-el-ela Abdou Hussien
,
Nagy Ramadan Darwish
,
Hesham A. Hefny
Journal of Information Security
Vol.6 No.3
,June 15, 2015
DOI:
10.4236/jis.2015.63019
4,840
Downloads
5,788
Views
Citations
Predicting Users Mobile App Privacy Preferences
(Articles)
Aziz Alshehri
,
Fayez Alotaibi
Journal of Computer and Communications
Vol.7 No.10
,October 22, 2019
DOI:
10.4236/jcc.2019.710014
545
Downloads
1,568
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top