Secondary Uses of Personal Identity Information: Policies, Technologies and Regulatory Framework
Year of publication: |
2012
|
---|---|
Authors: | ADJEI, Joseph K. ; OLESEN, Henning |
Published in: |
Communications & Strategies. - IDATE. - Vol. 1.2012, 88, p. 79-98
|
Publisher: |
IDATE |
Subject: | identity | identity management | personal information | secondary use | trust | privacy |
-
Gu, Yiquan, (2019)
-
Gu, Yiquan, (2019)
-
Prüfer, Jens, (2014)
- More ...
-
Cybersecurity in SMEs in the Baltic Sea Region
Falch, Morten, (2022)
-
Beacon-Based Cluster Framework for Internet of People, Things, and Services (IoPTS)
Shinde, Gitanjali Rahul, (2018)
- More ...