Item request has been placed!
×
Item request cannot be made.
×

Processing Request
Item request has been placed!
×
Item request cannot be made.
×

Processing Request
-
Source:
Wu , Q , Tang , J , Dang , S & Chen , G 2022 , ' Data Privacy and Utility Trade-off Based on Mutual Information Neural Estimator ' ,
-
Record details
Subjects: /dk/atira/pure/core/keywords/cyber_security; name=Cyber Security; wearable computing
-
Source:
Van Der Linden , D , Zamansky , A , Hadar , I , Craggs , B & Rashid , A 2019 , ' Buddy's Wearable Is Not Your Buddy : Privacy Implications of Pet Wearables ' , IEEE
-
Record details
Subjects: AMASED; DataSHIELD; D2K
-
Source:
Wilson , R & Burton , P 2015 , ' AMASED Second Phase (Jisc Data Spring Sandpit 2). ' , Paper presented at Jisc Data Spring: Sandpit 2 ,
Record details
Subjects: DataSHIELD; D2K; data privacy
-
Source:
Wilson , R & Burton , P 2015 , ' JISC Research Data Spring Project 3.8 (AMASED) ' , Paper presented at Jisc Data Spring: Sand pit 1 ,
Record details
-
Source:
Iwaya , L H , Babar , M A , Rashid , A & Wijayarathna , C 2023 , ' On the privacy of mental health apps : An empirical investigation and its implications for app
Record details
-
Source:
Wallace , A , Beer , D , Burrows , R , Ciocănel , A & Cussens , J 2025 , ' Algorithmic tenancies and the ordinal tenant : digital risk-profiling in England’s private rented sector ' , Housing
Record details