共 50 条
- [1] Protection Profile of Personal Information Security System Designing a Secure Personal Information Security System TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 806 - 811
- [2] Internet Security Protection in Personal Sensitive Information 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 628 - 632
- [3] The Personal Information Privacy Protection Strategy in Social Security Information System COMMUNICATIONS AND INFORMATION PROCESSING, PT 2, 2012, 289 : 718 - +
- [4] Protection of Personal Information Security in the Age of Big Data PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 586 - 589
- [5] UK DATA PROTECTION ACT - PRINCIPLE OF INFORMATION SECURITY AND SECURITY MEASURES INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2012, 4 (03): : 55 - 66
- [6] Monetization of Personal Identity Information; Technological and Regulatory Framework 2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 80 - 83
- [7] Improving the information security of personal electronic health records to protect a patient's health information 2017 CONFERENCE ON INFORMATION COMMUNICATION TECHNOLOGY AND SOCIETY (ICTAS), 2017,
- [8] The Personal Information Security Assistant 2015 IEEE 23RD INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2015, : 393 - 397
- [9] Evaluation of Online Resources on the Implementation of the Protection of Personal Information Act in South Africa PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 39 - 48
- [10] Examining the applicability of the Protection of Personal Information Act in AI-driven environments SOUTH AFRICAN JOURNAL OF INFORMATION MANAGEMENT, 2024, 26 (01):