How technology affected our privacy
After the recent spread of the Internet, many technology terms appeared like Smartphone, social media and cloud computing. Flexibility in use this technology encourage people to communicate and share their information in all kinds: photos, videos, documents and sometimes sensitive information like b...
| Main Authors: | Sehnaz, Ahmetoglu, Zeki, Akram M. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
International Journal of Science and Research
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/47391/ http://irep.iium.edu.my/47391/1/NOV151933.pdf |
Similar Items
Our privacy: How to be assured in cyberspace
by: Zulhuda, Sonny
Published: (2016)
by: Zulhuda, Sonny
Published: (2016)
Privacy and technology: implications and challenges
by: Shuriye, Abdi Omar, et al.
Published: (2008)
by: Shuriye, Abdi Omar, et al.
Published: (2008)
Attitude towards information privacy issues among students of IIUM
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
Empirical analysis: knowledge management, the human focus and intellectual capital for innovation in smart/future universities
by: Alyami, Nuha, et al.
Published: (2015)
by: Alyami, Nuha, et al.
Published: (2015)
The human focus in KM/IC for innovation in smart/future universities: literature review
by: Ahmetoglu, Sehnaz, et al.
Published: (2015)
by: Ahmetoglu, Sehnaz, et al.
Published: (2015)
Technology and the deterioration of right to privacy
by: Wan Mohd Nor, Murni, et al.
Published: (2011)
by: Wan Mohd Nor, Murni, et al.
Published: (2011)
Photothermal affects our live
by: Zakaria, Azmi
Published: (2013)
by: Zakaria, Azmi
Published: (2013)
How much privacy we still have on social network?
by: Chewae, Mafaisu, et al.
Published: (2015)
by: Chewae, Mafaisu, et al.
Published: (2015)
Technology And The Deterioration Of Right
To Privacy
by: Wan Mohd Nor, Murni, et al.
Published: (2011)
by: Wan Mohd Nor, Murni, et al.
Published: (2011)
Pathogens and residues: how safe is our meat?
by: Abdul Aziz, Saleha
Published: (2007)
by: Abdul Aziz, Saleha
Published: (2007)
The computational view of information privacy enhancing technologies
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Human capital business partner information technology & network technology manpower model
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Privacy and technology: implications and challenges
by: Mohammed Jama, Abdi Risaq, et al.
Published: (2009)
by: Mohammed Jama, Abdi Risaq, et al.
Published: (2009)
Security issues with health care information technology
by: Mahmoud, Ahmed Mohamed, et al.
Published: (2015)
by: Mahmoud, Ahmed Mohamed, et al.
Published: (2015)
Defined by our hierarchy? How hierarchical positions shape our identifications and well-being at work
by: Horton, K., et al.
Published: (2014)
by: Horton, K., et al.
Published: (2014)
How SD-OCT is changing our view of DME
by: Salam, Adzura, et al.
Published: (2010)
by: Salam, Adzura, et al.
Published: (2010)
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
Main frame in our midst
by: M. A., Ameedeen
Published: (2011)
by: M. A., Ameedeen
Published: (2011)
Smartphone usage: how is technology affecting your health?
by: Abdul Hamid, Abd. Malek, et al.
Published: (2019)
by: Abdul Hamid, Abd. Malek, et al.
Published: (2019)
Elastic language: How and why we stretch our words
by: Zhang, Grace
Published: (2015)
by: Zhang, Grace
Published: (2015)
Privacy concern and perceived benefits towards privacy and election in Indonesia
by: Lubis, Muharman, et al.
Published: (2014)
by: Lubis, Muharman, et al.
Published: (2014)
Impersonate affecting users' attitude toward facebook in Egypt
by: Hassan El Hoby, Hany Mohamed, et al.
Published: (2016)
by: Hassan El Hoby, Hany Mohamed, et al.
Published: (2016)
How safe are our children in vehicles on the road? a Malaysian perspective
by: Sambasivam, Sivasankar, et al.
Published: (2017)
by: Sambasivam, Sivasankar, et al.
Published: (2017)
How have retrovirus pseudotypes contributed to our understanding of viral entry?
by: Tarr, Alexander W., et al.
Published: (2017)
by: Tarr, Alexander W., et al.
Published: (2017)
How organizational learning affects innovation in SMEs: the case of information and communication technologies in Malaysia
by: Zandi Pour Joopari, GholamReza, et al.
Published: (2013)
by: Zandi Pour Joopari, GholamReza, et al.
Published: (2013)
Problems relating to the adoption of potentially privacy-invading technologies
by: Dell, Peter, et al.
Published: (2010)
by: Dell, Peter, et al.
Published: (2010)
Our mother, our paradise
by: Abd Razak, Dzulkifli
Published: (2007)
by: Abd Razak, Dzulkifli
Published: (2007)
The wonder of our neuromotor system and the
technological challenges they pose
by: Abdul Rashid, Abdul Hamid
Published: (2005)
by: Abdul Rashid, Abdul Hamid
Published: (2005)
How new media portrays our athletes / Nurfazira Julaihi…[et.al]
by: Julaihi, Nurfazira, et al.
Published: (2016)
by: Julaihi, Nurfazira, et al.
Published: (2016)
The challenges to our future environment: how can a knowledge economy address this?
by: Mohd. Nor, Salleh
Published: (2013)
by: Mohd. Nor, Salleh
Published: (2013)
Progressing work: how spatial approaches change our theories of work and labour
by: McGrath-Champ, S., et al.
Published: (2010)
by: McGrath-Champ, S., et al.
Published: (2010)
Introduction to computer graphics
by: Zeki, Akram M.
Published: (2015)
by: Zeki, Akram M.
Published: (2015)
Application of multimedia in digital watermarking
by: Zeki, Akram M.
Published: (2015)
by: Zeki, Akram M.
Published: (2015)
Meeting scheduler with secured privacy web application
by: Lok, Samantha Tian Wen
Published: (2023)
by: Lok, Samantha Tian Wen
Published: (2023)
Assessing privacy and readiness of electronic voting system in Indonesia
by: Lubis, Muharman, et al.
Published: (2017)
by: Lubis, Muharman, et al.
Published: (2017)
How experience affects technology acceptance: A quest for ICT development strategies in Bangladesh
by: Azam, S., et al.
Published: (2010)
by: Azam, S., et al.
Published: (2010)
How do we know that our patients have benefitted from our ENT/Audiological interventions?: presented at the Annual Meeting of ADANO 2016 in Berlin
by: Hall, Deborah A., et al.
Published: (2018)
by: Hall, Deborah A., et al.
Published: (2018)
Gendered justice: the impact of masculinist leadership models on how justice is dispensed in our communities
by: Harwood, Susan
Published: (2008)
by: Harwood, Susan
Published: (2008)
Information technology usage in the Islamic perspective: a systematic literature review
by: Al-Rahmi, Waleed Mugahed, et al.
Published: (2017)
by: Al-Rahmi, Waleed Mugahed, et al.
Published: (2017)
‘Sustainability in our DNA’
by: Jaayna, Jeevita
Published: (2025)
by: Jaayna, Jeevita
Published: (2025)
Similar Items
-
Our privacy: How to be assured in cyberspace
by: Zulhuda, Sonny
Published: (2016) -
Privacy and technology: implications and challenges
by: Shuriye, Abdi Omar, et al.
Published: (2008) -
Attitude towards information privacy issues among students of IIUM
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016) -
Empirical analysis: knowledge management, the human focus and intellectual capital for innovation in smart/future universities
by: Alyami, Nuha, et al.
Published: (2015) -
The human focus in KM/IC for innovation in smart/future universities: literature review
by: Ahmetoglu, Sehnaz, et al.
Published: (2015)