ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Technology
Law
Computing
Computing
Social Sciences
Education
Architecture and Urbanism
Administration - Business
Economy
Communication
all records (64)

Languages
English
Spanish
Portuguese
German

Countries
USA
Indonesia
Canada
Brazil
Spain
United Kingdom
South Africa
Switzerland
Germany
India
all records (61)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
1.714  Articles
1 of 172 pages  |  10  records  |  more records»
Violation of privacy as a security tool in the stage of crime detection is an issue that needs to be identified and evaluated in the criminal justice system of Afghanistan and Islamic jurisprudence, in the light of international human rights documents and... see more

Social behavioral change about privacy is phenomenon that we concern in internet user, especially in Anti Pelakor Indonesia (API) Facebook Group. This research studied about women managing private information in social media by observing how members of AP... see more

Jakarta Kini (JAKI) is a super-app developed by Jakarta Smart City that offers a one-stop service to help citizens connect and communicate with the Government. It is undeniable that the use of mobile applications can indeed facilitate people's activities,... see more

Artificial intelligence has the potential to address many societal, economic, and environmental challenges, but only if AI-enabled gadgets are kept secure. Many artificial intelligence (AI) models produced in recent years can be hacked by utilizing cuttin... see more

Earth Observation (EO) applications interact with many industries and government practices. When EO applications touch upon data being able to identify individuals or certain groups, the processing methods adopted therein entail the balance between public... see more

Sharing medical data can improve the quality of medical services and reduce costs. However, the current Electronic Medical Records (EMRs) are scattered and easily tampered with, which is not conducive to the sharing of EMRs and is not compatible with thin... see more

People increasingly rely on their mobile devices and use them to store a lot of data. Some of the data are personal and private, whose leakage leads to users' privacy harm. Meanwhile, mobile apps and services over-collect users' data due to the coarse-gra... see more

Privacy is a basic thing inherent in every human being, including students. Laws that apply in every part of the country, including Indonesia, agree to protect human rights and fulfill the rights of every citizen. This study aims to analyze student privac... see more

1 of 172 pages  |  10  records  |  more records»