Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/61982
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Brankovic, Ljiljana | en |
dc.contributor.author | Miller, Mirka | en |
dc.contributor.author | Steketee, Chris | en |
dc.date.accessioned | 2024-08-07T01:00:18Z | - |
dc.date.available | 2024-08-07T01:00:18Z | - |
dc.date.issued | 2008-08 | - |
dc.identifier.citation | Journal of Research and Practice in Information Technology, 40(3), p. 149-150 | en |
dc.identifier.issn | 2204-2326 | en |
dc.identifier.issn | 1443-458X | en |
dc.identifier.uri | https://hdl.handle.net/1959.11/61982 | - |
dc.description.abstract | <p>The explosion of computer, networking and mobile technologies has invigorated threats to individual privacy. Both public and private sectors now have the capacity not only to collect and store extraordinary amounts of personal data, but also to monitor and record people's activities. Many emerging applications require anonymity for their successful execution, including electronic voting, anonymous e-mail, e-commerce and private information retrieval.</p> | en |
dc.language | en | en |
dc.publisher | Australian Computer Society | en |
dc.relation.ispartof | Journal of Research and Practice in Information Technology | en |
dc.title | Guest Editorial - Special Collection: Privacy | en |
dc.type | Journal Article | en |
local.contributor.firstname | Ljiljana | en |
local.contributor.firstname | Mirka | en |
local.contributor.firstname | Chris | en |
local.profile.school | School of Science and Technology | en |
local.profile.email | lbrankov@une.edu.au | en |
local.output.category | C4 | en |
local.record.place | au | en |
local.record.institution | University of New England | en |
local.publisher.place | Australia | en |
local.format.startpage | 149 | en |
local.format.endpage | 150 | en |
local.identifier.volume | 40 | en |
local.identifier.issue | 3 | en |
local.title.subtitle | Privacy | en |
local.contributor.lastname | Brankovic | en |
local.contributor.lastname | Miller | en |
local.contributor.lastname | Steketee | en |
dc.identifier.staff | une-id:lbrankov | en |
local.profile.orcid | 0000-0002-5056-4627 | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.identifier.unepublicationid | une:1959.11/61982 | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
local.title.maintitle | Guest Editorial - Special Collection | en |
local.output.categorydescription | C4 Letter of Note | en |
local.relation.url | https://50years.acs.org.au/content/dam/acs/50years/journals/jrpit/JRPIT40.3.149.pdf | en |
local.search.author | Brankovic, Ljiljana | en |
local.search.author | Miller, Mirka | en |
local.search.author | Steketee, Chris | en |
local.uneassociation | No | en |
local.atsiresearch | No | en |
local.sensitive.cultural | No | en |
local.year.published | 2008 | en |
local.fileurl.closedpublished | https://rune.une.edu.au/web/retrieve/f8508cbe-aa42-43c3-ba00-0524a5cccdac | en |
local.subject.for2020 | 460402 Data and information privacy | en |
local.subject.seo2020 | 220405 Cybersecurity | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
Appears in Collections: | Journal Article School of Science and Technology |
Files in This Item:
File | Size | Format |
---|
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.