Search Results for Data protection - Narrowed by: Privacy, Right ofSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dData$002bprotection$0026qf$003dSUBJECT$002509Subject$002509Privacy$00252C$002bRight$002bof$002509Privacy$00252C$002bRight$002bof$0026ic$003dtrue$0026ps$003d300?dt=list2024-05-26T20:24:14ZPersonal data and privacy protectionent://SD_ILS/0/SD_ILS:4839942024-05-26T20:24:14Z2024-05-26T20:24:14Zby Abdul Raman Saad<br/>Author Abdul Raman Saad<br/>Format: Books<br/>Call Number K3263 A72 2005<br/>Publisher Malayan Law Journal,<br/>Publication Date 2005<br/>ISBN 9789679626544<br/>CONCEPTUAL PRIVACY RISK ASSESSMENT MODEL FOR PERSONAL DATA PROTECTION IN AN INSURANCE SYSTEMent://SD_ILS/0/SD_ILS:8395402024-05-26T20:24:14Z2024-05-26T20:24:14Zby Muhammad Aniq Eastrarulkhair Mohmad Hairin, 1986-, author<br/>Author Muhammad Aniq Eastrarulkhair Mohmad Hairin, 1986-, author, Zailani Mohamed Sidek, Assoc.Prof.Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.D314 M84 2012 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>Privacy impact assessment (PIA) guideline for securing personal dataent://SD_ILS/0/SD_ILS:8111702024-05-26T20:24:14Z2024-05-26T20:24:14Zby Fauziah Abdul Razak @ Lapochik, 1983-<br/>Author Fauziah Abdul Razak @ Lapochik, 1983-, Norafida Ithnin, Fakulti Komputeran<br/>Format: Books<br/>Call Number K3264.C65 F38 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Privacy impact assessment (PIA) guideline for securing personal dataent://SD_ILS/0/SD_ILS:8111752024-05-26T20:24:14Z2024-05-26T20:24:14Zby Fauziah Abdul Razak @ Lapochik, 1983-<br/>Author Fauziah Abdul Razak @ Lapochik, 1983-<br/>Format: Books<br/>Call Number CP 032627 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Information assurance and security ethics in complex systems : interdisciplinary perspectivesent://SD_ILS/0/SD_ILS:6304272024-05-26T20:24:14Z2024-05-26T20:24:14Zby Dark, Melissa Jane, 1961-<br/>Author Dark, Melissa Jane, 1961-<br/>Format: Books<br/>Call Number QA76.9.A25 I545 2011 f<br/>Publisher Information Science Reference,<br/>Publication Date 2011<br/>ISBN 9781616922450 9781616922467<br/>Privacy protection for e-servicesent://SD_ILS/0/SD_ILS:1079012024-05-26T20:24:14Z2024-05-26T20:24:14Zby Yee, George<br/>Author Yee, George<br/>Format: Books<br/>Call Number HF5548.37 P74 2006<br/>Publisher Idea Group Publishing,<br/>Publication Date 2006<br/>ISBN 9781591409144<br/>Security in computingent://SD_ILS/0/SD_ILS:3401732024-05-26T20:24:14Z2024-05-26T20:24:14Zby Pfleeger, Charles P.<br/>Author Pfleeger, Charles P., Pfleeger, Shari Lawrence<br/>Format: Books<br/>Call Number QA76.9.A25 P44 2003<br/>Edition 3rd ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2003<br/>ISBN 9780130355485 9780131201996<br/>Making it personal : how to profit from personalization without invading privacyent://SD_ILS/0/SD_ILS:3721802024-05-26T20:24:14Z2024-05-26T20:24:14Zby Kasanoff, Bruce<br/>Author Kasanoff, Bruce<br/>Format: Books<br/>Call Number HF5415.55 K37 2001<br/>Publisher John Wiley,<br/>Publication Date 2001<br/>ISBN 9780470843963<br/>Security in computingent://SD_ILS/0/SD_ILS:4575992024-05-26T20:24:14Z2024-05-26T20:24:14Zby Pfleeger, Charles P.<br/>Author Pfleeger, Charles P.<br/>Format: Books<br/>Call Number QA76.9.A25 P44 1996<br/>Edition 2nd ed.<br/>Publisher Prentice-Hall,<br/>Publication Date 1997<br/>ISBN 9780131857940 9780133374865<br/>Borders in cyberspace : information policy and the global information infrastructureent://SD_ILS/0/SD_ILS:4617972024-05-26T20:24:14Z2024-05-26T20:24:14Zby Kahin, Brian<br/>Author Kahin, Brian, Nesson, Charles R.<br/>Format: Books<br/>Call Number K4305.4 B67 1997<br/>Publisher MIT Pr.,<br/>Publication Date 1997<br/>ISBN 9780262611268<br/>Borders in cyberspace : information policy and the global information infrastructureent://SD_ILS/0/SD_ILS:4675762024-05-26T20:24:14Z2024-05-26T20:24:14Zby Kahin, Brian<br/>Author Kahin, Brian, Nesson, Charles R.<br/>Format: Books<br/>Call Number K4305.4 B67 1997<br/>Publisher MIT Press,<br/>Publication Date 1997<br/>ISBN 9780262611268<br/>Security in computingent://SD_ILS/0/SD_ILS:2364252024-05-26T20:24:14Z2024-05-26T20:24:14Zby Peleeger, Charles P.<br/>Author Peleeger, Charles P.<br/>Format: Books<br/>Call Number QA76.9.A25 P44 1989<br/>Publisher Prentice-Hall,<br/>Publication Date 1989<br/>ISBN 9780137989430<br/>INFORMATION PRIVACY CONCERNS MODEL FOR INTERNET USERS IN MARITIME ENVIRONMENTent://SD_ILS/0/SD_ILS:8609512024-05-26T20:24:14Z2024-05-26T20:24:14Zby Yat, Guo Quan, 1985-, author<br/>Author Yat, Guo Quan, 1985-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035021 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/>INFORMATION PRIVACY CONCERNS MODEL FOR INTERNET USERS IN MARITIME ENVIRONMENTent://SD_ILS/0/SD_ILS:8605692024-05-26T20:24:14Z2024-05-26T20:24:14Zby Yat, Guo Quan, 1985-, author<br/>Author Yat, Guo Quan, 1985-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5105.8855 Y38 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/>