共 50 条
- [41] INFORMATION PROTECTION OF PERSONAL DATA: THE THREAT DOMINANT SOURCE BIZNES INFORMATIKA-BUSINESS INFORMATICS, 2012, 20 (02): : 71 - 76
- [42] Study of Information System Security of Government Data Center Based on the Classified Protection PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 1315 - 1319
- [43] Study on the application of digital certificates in the protection of network information security and data integrity Li, H. (493885444@qq.com), 1600, Academy Publisher, P.O.Box 40,, OULU, 90571, Finland (08):
- [45] Comparative Study of the Protection of Personal Credit Information PROCEEDINGS OF 2011 INTERNATIONAL CONFERENCE ON PUBLIC ADMINISTRATION (7TH), VOL I, 2011, : 628 - 635
- [46] Implementation of Personal Information Security Protection Technology Based on Block Chain 2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 243 - 246
- [47] UK DATA PROTECTION ACT - PRINCIPLE OF INFORMATION SECURITY AND SECURITY MEASURES INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2012, 4 (03): : 55 - 66
- [48] Cyber Security and Habeas Data:The Latin American Response to Information Security and Data Protection OASIS-OBSERVATORIO DE ANALISIS DE LOS SISTEMAS INTERNACIONALES, 2016, (24): : 109 - 128
- [49] Economics of Personal Data Management: Fair Personal Information Trades NEXT GENERATION SOCIETY: TECHNOLOGICAL AND LEGAL ISSUES, 2010, 26 : 151 - +
- [50] The future of personal information management in the age of ubiquitous personal data HUMAN-COMPUTER INTERACTION, 2025,