Threats to privacy

被引:0
|
作者
Nesson, C [1 ]
机构
[1] Harvard Univ, Sch Law, Cambridge, MA 02138 USA
来源
SOCIAL RESEARCH | 2001年 / 68卷 / 01期
关键词
D O I
暂无
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
引用
收藏
页码:105 / 113
页数:9
相关论文
共 50 条
  • [1] Threats to privacy protection
    Barash, Carol Isaacson
    [J]. SCIENCE, 2007, 318 (5852) : 913 - 914
  • [2] Privacy threats in intimate relationships
    Levy, Karen
    Schneier, Bruce
    [J]. Journal of Cybersecurity, 2021, 6 (01): : 1 - 13
  • [3] Privacy threats in intimate relationships
    Levy, Karen
    Schneier, Bruce
    [J]. JOURNAL OF CYBERSECURITY, 2020, 6 (01):
  • [4] Threats to biomedical research and privacy
    Wechsler, J
    [J]. BIOPHARM-THE APPLIED TECHNOLOGIES OF BIOPHARMACEUTICAL DEVELOPMENT, 1997, 10 (06): : 20 - +
  • [5] Privacy threats and issues in mobile RFID
    Lee, Hyangjin
    Kim, Jeeyeon
    [J]. First International Conference on Availability, Reliability and Security, Proceedings, 2006, : 510 - 514
  • [6] Privacy: Personal information, threats, and technologies
    Beckwith, R
    Mainwaring, S
    [J]. 2005 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGY AND SOCIETY (ISTAS), PROCEEDINGS: WEAPONS AND WIRES: PREVENTION AND SAFETY IN A TIME OF FEAR, 2005, : 9 - 16
  • [7] Privacy Threats in E-Shopping
    Diaz, Jesus
    Choi, Seung Geol
    Arroyo, David
    Keromytis, Angelos D.
    Rodriguez, Francisco B.
    Yung, Moti
    [J]. DATA PRIVACY MANAGEMENT, AND SECURITY ASSURANCE, 2016, 9481 : 217 - 225
  • [8] Hardware Security and Privacy: Threats and Opportunities
    John, Lizy Kurian
    [J]. IEEE MICRO, 2023, 43 (05) : 4 - 5
  • [9] A Taxonomy of IoT: Security and Privacy Threats
    Alsamani, Badr
    Lahza, Husam
    [J]. CONFERENCE PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT), 2018, : 72 - 77
  • [10] Privacy in Crowdsourcing: a Review of the Threats and Challenges
    Xia, Huichuan
    McKernan, Brian
    [J]. COMPUTER SUPPORTED COOPERATIVE WORK-THE JOURNAL OF COLLABORATIVE COMPUTING AND WORK PRACTICES, 2020, 29 (03): : 263 - 301