Call Number (LC) Title Results
K3264.C65 P753 2014 Privacy, big data, and the public good : frameworks for engagement / 1
K3264.C65 P7534 2017 Comparative perspectives on privacy in an Internet era / 1
K3264.C65 P755 2017 Privacy in a digital age : perspectives from two continents / 1
K3264.C65 P756 2012 Privacy : management, legal issues and security aspects / 1
K3264.C65 P757 2023 Privacy Symposium 2023 : Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT) / 1
K3264.C65 P765 2014 Protection of information and the right to privacy-- a new equilibrium? / 1
K3264.C65 R47 2021 Research handbook on information law and governance / 1
K3264.C65 R47 2021i Research handbook on information law and governance 1
K3264.C65 R47 2022i Research handbook on privacy and data protection law values, norms and global politics / 1
K3264.C65 S428 2015 Security and privacy / 1
K3264.C65 S43 2008 Securing privacy in the Internet age / 2
K3264.C65 S433 2015 Security and privacy / 1
K3264.C65 S49 2020 National security, personal privacy and the law : surveying electronic surveillance and data acquisition / 2
K3264.C65 S56 2017 Privacy as virtue : moving beyond the individual in the age of Big Data / 2
K3264.C65 S65 2007 The future of reputation : gossip, rumor, and privacy on the Internet / 2
K3264.C65 S65 2007eb The future of reputation : gossip, rumor, and privacy on the Internet /
The Future of Reputation : Gossip, Rumor, and Privacy on the Internet /
2
K3264.C65 T36 2018 Designing for privacy and its legal framework : data protection by design and default for the internet of things /
Designing for privacy and its legal framework : data protection by design and default for the Internet of Things /
2
K3264.C65 T73 2018 International cybersecurity and privacy law in practice / 1
K3264.C65 T93 2017 The fundamental right to data protection : normative value in the context of counter-terrorism surveillance / 1
K3264.C65 T936 2017 The Fundamental Right to Data Protection : Normative Value in the Context of Counter-Terrorism Surveillance. 1