Publisher
Springer Science and Business Media LLC
Subject
Library and Information Sciences,Computer Science Applications
Reference70 articles.
1. Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze, M., Diffie, W., et al. Weitzner, D. J. (2015). Keys under doormats: Mandating insecurity by requiring government access to all data and communications. Journal of Cybersecurity, 1(1), 69–79.
https://doi.org/10.1093/cybsec/tyv009
.
2. Acquisti, A., Adjerid, I., & Brandimarte, L. (2013). Gone in 15s: The limits of privacy transparency and control. IEEE Security Privacy, 11(4), 72–74.
https://doi.org/10.1109/MSP.2013.86
.
3. Adjerid, I., Acquisti, A., Brandimarte, L., & Loewenstein, G. (2013). Sleights of privacy: framing, disclosures, and the limits of transparency. In Proceedings of the ninth symposium on usable privacy and security (pp. 9:1–9:11). New York, NY: ACM.
https://doi.org/10.1145/2501604.2501613
.
4. Art. 5 GDPR—Principles relating to processing of personal data. (n.d.). Retrieved December 13, 2018 from
https://gdpr-info.eu/art-5-gdpr/
.
5. Art. 12 GDPR. (n.d.). Retrieved February 6, 2018 from
https://gdpr-info.eu/art-12-gdpr/
.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献