The honest data protection officer's guide to enable citizens to exercise their subject access rights: lessons from a ten-country European study |
L'Hoiry, X. D. and Norris, C. |
2015 |
view article
|
Beyond Privacy, Beyond Rights-Toward a "Systems" Theory of Information Governance |
Mayer-Schonberger, V. |
2010 |
view article
|
Unraveling Different Barriers to Internet Use: Urban Residents and Neighborhood Effects |
Mossberger, K., Tolbert, C. J., Bowen, D. and Jimenez, B. |
2012 |
view article
|
Protecting privacy in an information age: The problem of privacy in public |
Nissenbaum, H. |
1998 |
view article
|
A typology of communicative strategies in online privacy policies: Ethics, power and informed consent |
Pollach, I. |
2005 |
view article
|
Internet of Things: Legal Perspectives |
Weber, R. H. and Weber, R. |
2010 |
view article
|
Information Technology and Hospital Patient Safety: A Cross-Sectional Study of US Acute Care Hospitals |
Appari, A., Johnson, M. E. and Anthony, D. L. |
2014 |
view article
|
A 3-D visualization method for image-guided brain surgery |
Bourbakis, N. G. and Awad, M. |
2003 |
view article
|
Online reporting for malaria surveillance using micro-monetary incentives, in urban India 2010-2011 |
Chunara, R., Chhaya, V., Bane, S., Mekaru, S. R., Chan, E. H., Freifeld, C. C. and Brownstein, J. S. |
2012 |
view article
|
Why We Need Crowdsourced Data in Infectious Disease Surveillance |
Chunara, R., Smolinski, M. S. and Brownstein, J. S. |
2013 |
view article
|