User Needs and Confidentiality
User Needs and Confidentiality
Main Author: | Erika von Brunken |
---|---|
Format: | Article |
Language: | English |
Published: |
International Association for Social Science Information Service and Technology
1979-10-01
|
Series: | IASSIST Quarterly |
Online Access: | https://iassistquarterly.com/index.php/iassist/article/view/245 |
Similar Items
-
Confidentiality of Users’ Data in Modern Messengers
by: Olexandr Tkachenko, et al.
Published: (2019-12-01) -
Donor confidentiality and privacy: Need of the hour in this era of digitalization
by: Shivaram Chandrashekar
Published: (2023-01-01) -
ONE-TIME GRAPHICAL AUTHENTICATION SCHEME TO PROTECT USER'S CONFIDENTIALITY /
by: Touraj Khodadadi, author 654570, et al.
Published: (2018) -
ONE-TIME GRAPHICAL AUTHENTICATION SCHEME TO PROTECT USER'S CONFIDENTIALITY /
by: Touraj Khodadadi, author 654570, et al.
Published: (2018) -
VRS-DB: preserve confidentiality of users’ data using encryption approach
by: J.S. Rauthan, et al.
Published: (2021-02-01)