Security and density: A paradox of public protection at the expense of personal privacy
| Main Author: | Jonescu, Emil |
|---|---|
| Format: | Book Chapter |
| Published: |
2017
|
| Online Access: | http://hdl.handle.net/20.500.11937/54563 |
Similar Items
Designing urban spaces for sustainable behaviour: Shaping communities and social conditions through surveillance—a paradox of public protection at the expense of personal privacy
by: Jonescu, Emil
Published: (2016)
by: Jonescu, Emil
Published: (2016)
Personal expenses management system
by: Tan, Min Yee
Published: (2024)
by: Tan, Min Yee
Published: (2024)
Smart information system personal expenses advisory system
by: Lew, Wen Xiong
Published: (2018)
by: Lew, Wen Xiong
Published: (2018)
Police custodial design is capricious and arbitrary: Formulating a specialised architectural strategy appropriate to short-term custodial facilities
by: Jonescu, Emil
Published: (2010)
by: Jonescu, Emil
Published: (2010)
Utilizing hippocratic database for personal information privacy protection
by: Mohamed Sidek, Zailani, et al.
Published: (2008)
by: Mohamed Sidek, Zailani, et al.
Published: (2008)
Short-term custodial design is outdated: developing knowledge and initiatives for future research and a specialised strategic architecture for police custodial facilities.
by: Jonescu, Emil
Published: (2013)
by: Jonescu, Emil
Published: (2013)
Strategic and Tactical Architecture: an intellectual instrument of Law Enforcement
by: Jonescu, Emil
Published: (2013)
by: Jonescu, Emil
Published: (2013)
Densification: Globalised tourism shaping urban development and realities of local culture
by: Jonescu, Emil
Published: (2016)
by: Jonescu, Emil
Published: (2016)
The Philosophical History of Punishment and Imprisonment
by: Jonescu, Emil
Published: (2012)
by: Jonescu, Emil
Published: (2012)
Economic perspective analysis of protecting big data security and privacy
by: Tao, Hai, et al.
Published: (2019)
by: Tao, Hai, et al.
Published: (2019)
Privacy and personal data protection in electronic voting: factors and measures
by: Lubis, Muharman, et al.
Published: (2017)
by: Lubis, Muharman, et al.
Published: (2017)
Privacy models for protecting personal medical information: a preliminary study
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Bioinformatics and genetic privacy: the impact of the Personal Data Protection Act 2010
by: Abdul Ghani Azmi, Ida Madieha
Published: (2011)
by: Abdul Ghani Azmi, Ida Madieha
Published: (2011)
User-centered evaluation of privacy models for protecting personal medical information
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Image recognition expense extraction
by: Kok, Wei Jin
Published: (2021)
by: Kok, Wei Jin
Published: (2021)
Should Australian Government websites be taking more steps to protect privacy and security?
by: Thompson, Nik, et al.
Published: (2020)
by: Thompson, Nik, et al.
Published: (2020)
Impact of ICT on privacy and personal data protection in two Malaysian academic libraries
by: Mohd Roni, Nurul Azurah, et al.
Published: (2011)
by: Mohd Roni, Nurul Azurah, et al.
Published: (2011)
Impact of ICT on privacy and personal data protection in two Malaysian academic libraries
by: Mohd Roni, Nurul Azurah, et al.
Published: (2011)
by: Mohd Roni, Nurul Azurah, et al.
Published: (2011)
Privasi vs data peribadi (Privacy To Personal Data Protection: Conceptual and Contextual Landscape)
by: Zulhuda, Sonny
Published: (2017)
by: Zulhuda, Sonny
Published: (2017)
Privacy policy in Indonesia and Malaysia: from digital economy to personal data protection laws
by: Zulhuda, Sonny
Published: (2017)
by: Zulhuda, Sonny
Published: (2017)
Spaces and Flows: Eighth International Conference on Urban and Extra Urban Studies
by: Jonescu, Emil, et al.
Published: (2017)
by: Jonescu, Emil, et al.
Published: (2017)
The state of Australian public relations: professionalisation and paradox
by: De Bussy, Nigel, et al.
Published: (2009)
by: De Bussy, Nigel, et al.
Published: (2009)
Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online
by: Kim, J., et al.
Published: (2018)
by: Kim, J., et al.
Published: (2018)
Cognitive privacy for personal clouds
by: Radenkovic, Milena
Published: (2016)
by: Radenkovic, Milena
Published: (2016)
Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information
by: Anderson, C., et al.
Published: (2017)
by: Anderson, C., et al.
Published: (2017)
Sharpcan and Australia’s Peculiar Treatment of Capital Expenses
by: Allen, Christina, et al.
Published: (2019)
by: Allen, Christina, et al.
Published: (2019)
Direct loss and expense relating to remoteness of damages
by: Lee, Xia Sheng
Published: (2006)
by: Lee, Xia Sheng
Published: (2006)
A web-based system for managing employee's expenses
by: Thanesh, Ram Selva Sunder
Published: (2020)
by: Thanesh, Ram Selva Sunder
Published: (2020)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
Towards privacy protection in smart grid
by: Zeadally, Sherali, et al.
Published: (2012)
by: Zeadally, Sherali, et al.
Published: (2012)
“How and to what extend the premiums of ATE legal expense insurance relate with the value of personal injury cases”
by: Charalambous, Joanna
Published: (2009)
by: Charalambous, Joanna
Published: (2009)
Micro-costing diabetic eye screening: estimation of personal expense, attendance and health care resource use
by: James, Marilyn, et al.
Published: (2016)
by: James, Marilyn, et al.
Published: (2016)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
e-Expense Claims System / Chong Chee Fui
by: Chong , Chee Fui
Published: (2001)
by: Chong , Chee Fui
Published: (2001)
Expenses Claim System (ECS) / Lim Foung Wan
by: Lim, Foung Wan
Published: (2003)
by: Lim, Foung Wan
Published: (2003)
Android Mobile Application – Expenses with Geo-Location Tracking
by: Lee, Theng Hong
Published: (2015)
by: Lee, Theng Hong
Published: (2015)
PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems
by: Luo, Entao, et al.
Published: (2018)
by: Luo, Entao, et al.
Published: (2018)
Similar Items
-
Designing urban spaces for sustainable behaviour: Shaping communities and social conditions through surveillance—a paradox of public protection at the expense of personal privacy
by: Jonescu, Emil
Published: (2016) -
Personal expenses management system
by: Tan, Min Yee
Published: (2024) -
Smart information system personal expenses advisory system
by: Lew, Wen Xiong
Published: (2018) -
Police custodial design is capricious and arbitrary: Formulating a specialised architectural strategy appropriate to short-term custodial facilities
by: Jonescu, Emil
Published: (2010) -
Utilizing hippocratic database for personal information privacy protection
by: Mohamed Sidek, Zailani, et al.
Published: (2008)