Please use this identifier to cite or link to this item: https://hdl.handle.net/1959.11/61982
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBrankovic, Ljiljanaen
dc.contributor.authorMiller, Mirkaen
dc.contributor.authorSteketee, Chrisen
dc.date.accessioned2024-08-07T01:00:18Z-
dc.date.available2024-08-07T01:00:18Z-
dc.date.issued2008-08-
dc.identifier.citationJournal of Research and Practice in Information Technology, 40(3), p. 149-150en
dc.identifier.issn2204-2326en
dc.identifier.issn1443-458Xen
dc.identifier.urihttps://hdl.handle.net/1959.11/61982-
dc.description.abstract<p>The explosion of computer, networking and mobile technologies has invigorated threats to individual privacy. Both public and private sectors now have the capacity not only to collect and store extraordinary amounts of personal data, but also to monitor and record people's activities. Many emerging applications require anonymity for their successful execution, including electronic voting, anonymous e-mail, e-commerce and private information retrieval.</p>en
dc.languageenen
dc.publisherAustralian Computer Societyen
dc.relation.ispartofJournal of Research and Practice in Information Technologyen
dc.titleGuest Editorial - Special Collection: Privacyen
dc.typeJournal Articleen
local.contributor.firstnameLjiljanaen
local.contributor.firstnameMirkaen
local.contributor.firstnameChrisen
local.profile.schoolSchool of Science and Technologyen
local.profile.emaillbrankov@une.edu.auen
local.output.categoryC4en
local.record.placeauen
local.record.institutionUniversity of New Englanden
local.publisher.placeAustraliaen
local.format.startpage149en
local.format.endpage150en
local.identifier.volume40en
local.identifier.issue3en
local.title.subtitlePrivacyen
local.contributor.lastnameBrankovicen
local.contributor.lastnameMilleren
local.contributor.lastnameSteketeeen
dc.identifier.staffune-id:lbrankoven
local.profile.orcid0000-0002-5056-4627en
local.profile.roleauthoren
local.profile.roleauthoren
local.profile.roleauthoren
local.identifier.unepublicationidune:1959.11/61982en
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
local.title.maintitleGuest Editorial - Special Collectionen
local.output.categorydescriptionC4 Letter of Noteen
local.relation.urlhttps://50years.acs.org.au/content/dam/acs/50years/journals/jrpit/JRPIT40.3.149.pdfen
local.search.authorBrankovic, Ljiljanaen
local.search.authorMiller, Mirkaen
local.search.authorSteketee, Chrisen
local.uneassociationNoen
local.atsiresearchNoen
local.sensitive.culturalNoen
local.year.published2008en
local.fileurl.closedpublishedhttps://rune.une.edu.au/web/retrieve/f8508cbe-aa42-43c3-ba00-0524a5cccdacen
local.subject.for2020460402 Data and information privacyen
local.subject.seo2020220405 Cybersecurityen
local.profile.affiliationtypeExternal Affiliationen
local.profile.affiliationtypeExternal Affiliationen
local.profile.affiliationtypeExternal Affiliationen
Appears in Collections:Journal Article
School of Science and Technology
Files in This Item:
1 files
File SizeFormat 
Show simple item record
Google Media

Google ScholarTM

Check


Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.