Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Digital Age: Surveillance Culture under Artistic Intervention
(Articles)
Yongxin Li
Advances in Journalism and Communication
Vol.11 No.4
,December 26, 2023
DOI:
10.4236/ajc.2023.114028
193
Downloads
1,188
Views
Citations
Breach Notification in the General Data Protection Regulation
(Articles)
M’Bia Hortense De-Yolande
,
Théo Doh-Djanhoundji
,
Gabo Yves Constant
Voice of the Publisher
Vol.9 No.4
,December 26, 2023
DOI:
10.4236/vp.2023.94026
198
Downloads
1,112
Views
Citations
Whispered Tuning: Data Privacy Preservation in Fine-Tuning LLMs through Differential Privacy
(Articles)
Tanmay Singh
,
Harshvardhan Aditya
,
Vijay K. Madisetti
,
Arshdeep Bahga
Journal of Software Engineering and Applications
Vol.17 No.1
,January 23, 2024
DOI:
10.4236/jsea.2024.171001
705
Downloads
3,463
Views
Citations
Statistical Analysis of Abilities to Give Consent to Health Data Processing
(Articles)
Antonella Massari
,
Biagio Solarino
,
Paola Perchinunno
,
Angela Maria D’Uggento
,
Marcello Benevento
,
Viviana D’Addosio
,
Vittoria Claudia De Nicolò
,
Samuela L’Abbate
Applied Mathematics
Vol.15 No.8
,August 19, 2024
DOI:
10.4236/am.2024.158032
88
Downloads
352
Views
Citations
Ensuring Security and Privacy in the Internet of Things: Challenges and Solutions
(Articles)
Nur Mohammad
,
Rabeya Khatoon
,
Sadia Islam Nilima
,
Jahanara Akter
,
Md Kamruzzaman
,
Hasan Mahmud Sozib
Journal of Computer and Communications
Vol.12 No.8
,August 29, 2024
DOI:
10.4236/jcc.2024.128016
173
Downloads
1,299
Views
Citations
Empirical Analysis of Data Privacy Concerns in DEI
(Articles)
Parisasadat Shojaei
,
Rezza Moieni
Open Journal of Social Sciences
Vol.13 No.6
,June 13, 2025
DOI:
10.4236/jss.2025.136006
34
Downloads
194
Views
Citations
Privacy Negotiation in Socio-Technical Systems
(Articles)
Murthy Rallapalli
,
Dinesh Verma
Technology and Investment
Vol.3 No.1
,February 24, 2012
DOI:
10.4236/ti.2012.31003
5,293
Downloads
8,478
Views
Citations
Privacy Policies Considerations in Socio-Technical Systems
(Articles)
Murthy Rallapalli
Technology and Investment
Vol.3 No.2
,May 29, 2012
DOI:
10.4236/ti.2012.32009
4,453
Downloads
7,238
Views
Citations
Privacy Accountability Model and Policy for Security Organizations
(Articles)
Yoel Raban
iBusiness
Vol.4 No.2
,June 20, 2012
DOI:
10.4236/ib.2012.42020
3,790
Downloads
6,346
Views
Citations
Ad Blockers & Online Privacy: A Comparative Analysis of Privacy Enhancing Technologies (PET)
(Articles)
Siddharth M. Madikeri
,
Vijay K. Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 30, 2024
DOI:
10.4236/jsea.2024.175021
227
Downloads
1,828
Views
Citations
How Information and Communication Technologies Expose Our Deep Personal Privacy
(Articles)
Yair Oppenheim
Open Access Library Journal
Vol.12 No.4
,April 30, 2025
DOI:
10.4236/oalib.1113066
24
Downloads
173
Views
Citations
Privacy-Preserving LLM Integration with Scientific NoSQL Repositories: A Differential Privacy Approach
(Articles)
Tanmoy Biswas
World Journal of Engineering and Technology
Vol.13 No.2
,May 27, 2025
DOI:
10.4236/wjet.2025.132021
28
Downloads
144
Views
Citations
Interpretation of Information Processing Regulations
(Articles)
Sabah Al-Fedaghi
Journal of Software Engineering and Applications
Vol.2 No.2
,July 15, 2009
DOI:
10.4236/jsea.2009.22011
5,560
Downloads
10,853
Views
Citations
Sustainable Tourism Using Security Cameras with Privacy Protecting Ability
(Articles)
V. Prashyanusorn
,
Y. Fujii
,
S. Kaviya
,
S. Mitatha
,
P. P. Yupapin
Journal of Information Security
Vol.1 No.2
,October 29, 2010
DOI:
10.4236/jis.2010.12008
4,349
Downloads
9,690
Views
Citations
Public's Trade-off between a New Risk-based Airport Screening and Asserted Terror Risk Impact: A Stated Choice Survey from Norway
(Articles)
Knut Veisten
,
Stefan Flügel
,
Torkel Bjørnskau
Journal of Transportation Technologies
Vol.1 No.2
,April 28, 2011
DOI:
10.4236/jtts.2011.12003
5,113
Downloads
10,873
Views
Citations
A Comparative Study on Consumer Right to Privacy in E-Commerce
(Articles)
Meirong Guo
Modern Economy
Vol.3 No.4
,July 24, 2012
DOI:
10.4236/me.2012.34052
12,618
Downloads
19,412
Views
Citations
Experimentation with Personal Identifiable Information
(Articles)
Sabah Al-Fedaghi
,
Abdul Aziz Rashid Al-Azmi
Intelligent Information Management
Vol.4 No.4
,July 27, 2012
DOI:
10.4236/iim.2012.44019
6,490
Downloads
10,407
Views
Citations
On the Security of Anonymous Authentication Protocol for Mobile Pay-TV
(Articles)
Walid I. Khedr
Journal of Information Security
Vol.4 No.4
,September 30, 2013
DOI:
10.4236/jis.2013.44025
4,357
Downloads
7,692
Views
Citations
The Internet of Things and Next-generation Public Health Information Systems
(Articles)
Robert Steele
,
Andrew Clarke
Communications and Network
Vol.5 No.3B
,October 16, 2013
DOI:
10.4236/cn.2013.53B1002
5,258
Downloads
8,693
Views
Citations
Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation
(Articles)
Sankita J. Patel
,
Ankit Chouhan
,
Devesh C. Jinwala
Journal of Information Security
Vol.5 No.1
,January 17, 2014
DOI:
10.4236/jis.2014.51002
5,588
Downloads
9,476
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top