Search results

From Vigyanwiki
  • ...eckusers will not link accounts to IPs, per the [[m:Privacy policy|privacy policy]].<noinclude>{{documentation|content=
    300 bytes (39 words) - 15:45, 29 December 2022
  • *[[Elliot Schrage]] (VP of Global Communications, Marketing and Public Policy) **[[Privacy concerns with Facebook|Privacy]]
    6 KB (686 words) - 07:07, 19 March 2023
  • * [[Policy-based design|Policy-based]] ** [[Privacy by design|Privacy by]]
    11 KB (1,104 words) - 17:27, 22 December 2022
  • <ref name="N9xNj">{{Cite web|title=Referrer Policy: Default to strict-origin-when-cross-origin - Chrome Platform Status|url=ht
    24 KB (906 words) - 09:32, 22 May 2023
  • ...|url=https://bits.blogs.nytimes.com/2011/06/22/canadian-inquiry-finds-privacy-issues-in-sale-of-used-products-at-staples |title=Data Privacy: Foundations, New Developments and the Big Data Challenge |series=Studies
    75 KB (1,752 words) - 13:07, 29 August 2023
  • ...he RfC: Religion in biographical infoboxes]] and [[Wikipedia:Village pump (policy)/Archive 127#RfC: Ethnicity in infoboxes|the RfC: Ethnicity in infoboxes]] ...as of date}}. For living people [[Wikipedia:Biographies of living persons#Privacy of personal information and using primary sources|supply only the year unle
    64 KB (8,814 words) - 21:25, 24 August 2022
  • ...012|archive-url=https://web.archive.org/web/20121115055603/http://epic.org/privacy/flutrends/EPIC_ltr_FluTrends_11-08.pdf|archive-date=15 November 2012|url-st
    35 KB (1,144 words) - 16:38, 26 September 2023
  • ...ument|url=https://www.rand.org/pubs/papers/P3544.html|title = Security and Privacy in Computer Systems|date = January 1967|last1 = Ware|first1 = Willis H.}}</ * [[Password policy]]
    24 KB (625 words) - 07:36, 27 September 2023
  • ...May 2018}}</ref><ref>{{cite web|title="Black Boxes" in Passenger Vehicles: Policy Issues|url=https://fas.org/sgp/crs/misc/R43651.pdf|access-date=7 May 2018}} ...ttps://www.ncsl.org/research/telecommunications-and-information-technology/privacy-of-data-from-event-data-recorders.aspx |website=National Conference of Stat
    66 KB (1,255 words) - 14:16, 14 December 2023
  • ...l|last=Dagher |display-authors=etal |first=Gaby G.|date=2018|title=Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic
    67 KB (1,137 words) - 14:35, 11 August 2023
  • ...an Explanation' to a 'Right to Better Decisions'?|journal=IEEE Security & Privacy|volume=16|issue=3|pages=46–54|doi=10.1109/MSP.2018.2701152|ssrn=3052831|s ...ficial Intelligence: how might the New Zealand government respond?|journal=Policy Quarterly|volume=13|issue=4|doi=10.26686/pq.v13i4.4619|issn=2324-1101|doi-a
    47 KB (1,898 words) - 10:48, 23 June 2023
  • {{Short description|Technical and Policy systems to give users appropriate access}} ...barchive|url=https://web.archive.org/web/20090428062932/http://www.cdt.org/privacy/issues/pii/ |date=28 April 2009 }}, The Center For Democracy & Technology,
    75 KB (2,012 words) - 16:44, 25 May 2023
  • ...work-post-2020-govt-response-minimum-annual-targets.pdf |title=Smart Meter Policy Framework Post 2020: Government Response to a Consultation on Minimum Annua ...ndation for Information Policy Research|website=Foundation For Information Policy Research}}</ref>
    113 KB (3,745 words) - 12:58, 29 August 2023
  • ...rithmic Governance |url=https://zenodo.org/record/884116 |journal=Data for Policy 2017: Government by Algorithm? Conference, London |doi=10.5281/ZENODO.88411 ...academic.oup.com/idpl/article/11/4/319/6403925 |journal=International Data Privacy Law |language=en |volume=11 |issue=4 |page=320 |doi=10.1093/idpl/ipab020 |i
    68 KB (2,123 words) - 10:58, 1 July 2023
  • ...-content/uploads/2019/06/Privacy-Preserved-Data-Sharing-for-Evidence-Based-Policy-Decisions.pdf {{Bare URL PDF|date=September 2022}}</ref><ref>Galois 2018 Te ...al machine with the capability to run privacy-preserving operations. Has a privacy-preserving programming language for data mining tools. Includes developer t
    95 KB (1,985 words) - 16:59, 25 May 2023
  • ...org/10.1007%2F1-4020-8090-5_3 Ross Anderson, "Cryptography and Competition Policy - Issues with ‘Trusted Computing’ ", in ''Economics of Information Secu ...rchive|url=https://web.archive.org/web/20070927060332/http://iase.disa.mil/policy-guidance/dod-dar-tpm-decree07-03-07.pdf |date=2007-09-27 }}</ref>
    104 KB (2,118 words) - 08:08, 16 July 2023
  • ...भविष्य के हितधारकों के दृष्टिकोण पर बातचीत|journal=Knowledge, Technology & Policy|date=December 2008 |volume=21 |issue=4 |pages=191–203 |doi=10.1007/s12130 ...र्राष्ट्रीय सम्मेलन की कार्यवाही - MobiSYS '04|chapter=An architecture for privacy-sensitive ubiquitous computing|date=June 2004|pages=177=189|doi=10.1145/990
    47 KB (1,095 words) - 16:03, 12 October 2023
  • ...जी कुंजी की सुरक्षा करना| book-title = 2015 IEEE Symposium on Security and Privacy| date = May 2015| isbn = 978-1-4673-6949-7|url = https://www.ieee-security.
    78 KB (2,502 words) - 09:15, 22 December 2022
  • ...t3=Elmar |title=क्लाउड कंप्यूटिंग कमजोरियों को समझना|journal=IEEE Security Privacy |date=March 2011 |volume=9 |issue=2 |pages=50–57 |doi=10.1109/MSP.2010.11
    111 KB (2,237 words) - 19:40, 8 April 2023
  • ...n |first=Garth O. |title=WHOIS Running the Internet: Protocol, Policy, and Privacy |publisher=Wiley |year=2015 |isbn=9781118679555 |edition=1st |page=25}}</re
    49 KB (1,585 words) - 11:17, 28 July 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)