Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,167,471 papers from all fields of science
Search
Sign In
Create Free Account
Privacy law
Known as:
Breach of privacy
, Australian privacy law
, Privacy breach
Expand
Privacy law refers to the laws that deal with the regulation of personal information about individuals, which can be collected by governments and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Canadian privacy law
Confidentiality
Data Protection Act 1998
Data Protection Directive
Expand
Broader (1)
Privacy
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
An approach for prevention of privacy breach and information leakage in sensitive data mining
M. Prakash
,
G. Singaravel
Computers & electrical engineering
2015
Corpus ID: 27129934
2015
2015
The Internet of Things and the Fourth Amendment of Effects
A. Ferguson
2015
Corpus ID: 140955272
By 2020 there will be billions of “things” connected through the “Internet of Things.” These smart devices built within our homes…
Expand
2014
2014
Detection of Malicious Android Mobile Applications Based on Aggregated System Call Events
Y. Ham
,
Hyung-Woo Lee
2014
Corpus ID: 18410307
Abstract —The diverse types of mobile applications are used regardless of time and place, as a number of Android mobile device…
Expand
2011
2011
Enabling Privacy in Provenance-Aware Workflow Systems
S. Davidson
,
S. Khanna
,
+4 authors
Julia Stoyanovich
Conference on Innovative Data Systems Research
2011
Corpus ID: 182305
A new paradigm for creating and correcting scientific analyses is emerging, that of provenance-aware workflow systems. In such…
Expand
Highly Cited
2011
Highly Cited
2011
UPS: efficient privacy protection in personalized web search
Gang Chen
,
He Bai
,
Lidan Shou
,
Ke Chen
,
Yunjun Gao
Annual International ACM SIGIR Conference on…
2011
Corpus ID: 15833309
In recent years, personalized web search (PWS) has demonstrated effectiveness in improving the quality of search service on the…
Expand
2011
2011
Pervasive Image Capture and the First Amendment: Memory, Discourse, and the Right to Record
Seth F. Kreimer
2011
Corpus ID: 28087262
As digital image technology proliferates in camera phones, iPhones, and PDAs, almost any image we observe can be costlessly…
Expand
2008
2008
(p+, α)-sensitive k-anonymity: A new enhanced privacy protection model
Xiaoxun Sun
,
Hua Wang
,
Jiuyong Li
,
Traian Marius Truta
,
Ping Li
8th IEEE International Conference on Computer and…
2008
Corpus ID: 7557899
Publishing data for analysis from a microdata table containing sensitive attributes, while maintaining individual privacy, is a…
Expand
2006
2006
Anonymity Metrics Revisited
Claudia Díaz
Anonymous Communication and its Applications
2006
Corpus ID: 3796853
In 2001, two information theoretic anonymity metrics were proposed: the "effective anonymity set size" and the "degree of…
Expand
2004
2004
Transitional Injustice? Criteria for Conformity of Lustration to the Right to Political Expression
R. David
2004
Corpus ID: 154870494
IN ORDER TO PROMOTE DEMOCRATIC CONSOLIDATION, countries undergoing the transition from repressive regimes often attempt to…
Expand
Review
2002
Review
2002
The Legal Regulation of CCTV in Europe
Marianne L. Gras
2002
Corpus ID: 15878941
This paper explores the recent history of CCTV system regulation in England and Wales questioning whether recent additions to the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE