Interagency data exchange, privacy protection and governance architecture for Information sharing across domains

Artificial Intelligence and Law (forthcoming)
  Copy   BIBTEX

Abstract

This article has no associated abstract. (fix it)

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 76,264

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

A persistent data tracking mechanism for user-centric identity governance.Hidehito Gomi - 2010 - Identity in the Information Society 3 (3):639-656.
Inaccuracy as a privacy-enhancing tool.Gloria González Fuster - 2010 - Ethics and Information Technology 12 (1):87-95.
Privacy by design: delivering the promises. [REVIEW]Peter Hustinx - 2010 - Identity in the Information Society 3 (2):253-255.
Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
Privacy in (mobile) telecommunications services.Jacques Penders - 2004 - Ethics and Information Technology 6 (4):247-260.
Privacy by Design.Peter Schaar - 2010 - Identity in the Information Society 3 (2):267-274.

Analytics

Added to PP
2013-12-14

Downloads
14 (#732,866)

6 months
1 (#449,844)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Burkhard Schafer
University of Edinburgh

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references