![ISO/IEC 15944-8:2012(en), Information technology — Business Operational View — Part 8: Identification of privacy protection requirements as external constraints on business transactions ISO/IEC 15944-8:2012(en), Information technology — Business Operational View — Part 8: Identification of privacy protection requirements as external constraints on business transactions](https://www.iso.org/obp/graphics/std/iso_std_iso-iec_15944-8_ed-1_v1_en/fig_2.png)
ISO/IEC 15944-8:2012(en), Information technology — Business Operational View — Part 8: Identification of privacy protection requirements as external constraints on business transactions
![The Use of Legal Ontologies in the Development of a System for Continuous Assurance of Privacy Policy Compliance * Bonnie W. Morris, Ph.D. CPA Division. - ppt download The Use of Legal Ontologies in the Development of a System for Continuous Assurance of Privacy Policy Compliance * Bonnie W. Morris, Ph.D. CPA Division. - ppt download](https://slideplayer.com/4792631/15/images/slide_1.jpg)
The Use of Legal Ontologies in the Development of a System for Continuous Assurance of Privacy Policy Compliance * Bonnie W. Morris, Ph.D. CPA Division. - ppt download
![ISO/IEC 15944-12:2020(en), Information technology — Business operational view — Part 12: Privacy protection requirements (PPR) on information life cycle management (ILCM) and EDI of personal information (PI) ISO/IEC 15944-12:2020(en), Information technology — Business operational view — Part 12: Privacy protection requirements (PPR) on information life cycle management (ILCM) and EDI of personal information (PI)](https://www.iso.org/obp/graphics/std/iso_std_iso-iec_15944-12_ed-1_v1_en/fig_2.png)
ISO/IEC 15944-12:2020(en), Information technology — Business operational view — Part 12: Privacy protection requirements (PPR) on information life cycle management (ILCM) and EDI of personal information (PI)
![CAMLearn: Une Architecture de Système de Recommandation Sémantique Sensible au Contexte. Application au Domaine du M-Learning. (CAMLearn: A Context-Aware Mobile Learning Recommender System. Application to M-Learning Domain) | Semantic Scholar CAMLearn: Une Architecture de Système de Recommandation Sémantique Sensible au Contexte. Application au Domaine du M-Learning. (CAMLearn: A Context-Aware Mobile Learning Recommender System. Application to M-Learning Domain) | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/b7debe89c4b78d90345333c26975ebea02925688/69-Figure2.4-1.png)
CAMLearn: Une Architecture de Système de Recommandation Sémantique Sensible au Contexte. Application au Domaine du M-Learning. (CAMLearn: A Context-Aware Mobile Learning Recommender System. Application to M-Learning Domain) | Semantic Scholar
![Memoire Online - La protection de la vie privée dans un système de gestion d'identité - Bahmed et Hassane Boumriga Memoire Online - La protection de la vie privée dans un système de gestion d'identité - Bahmed et Hassane Boumriga](https://www.memoireonline.com/01/14/8693/La-protection-de-la-vie-privee-dans-un-systeme-de-gestion-d-identite83.png)
Memoire Online - La protection de la vie privée dans un système de gestion d'identité - Bahmed et Hassane Boumriga
![How] Can Pluralist Approaches to Computational Cognitive Modeling of Human Needs and Values Save our Democracies? - Persée How] Can Pluralist Approaches to Computational Cognitive Modeling of Human Needs and Values Save our Democracies? - Persée](https://www.persee.fr/renderIssueCoverThumbnail/intel_0769-4113_2019_num_70_1.jpg)
How] Can Pluralist Approaches to Computational Cognitive Modeling of Human Needs and Values Save our Democracies? - Persée
![PDF) Analyse de la sécurité et de la protection de la vie privée des systèmes de gestion d'identités PDF) Analyse de la sécurité et de la protection de la vie privée des systèmes de gestion d'identités](https://i1.rgstatic.net/publication/279059702_Analyse_de_la_securite_et_de_la_protection_de_la_vie_privee_des_systemes_de_gestion_d'identites/links/558948cd08ae273b2875c674/largepreview.png)
PDF) Analyse de la sécurité et de la protection de la vie privée des systèmes de gestion d'identités
![INTEROPÉRABILITÉ SÉMANTIQUE ET SÉCURITÉ DANS L'INTERNET DES OBJETS : APPLICATION À LA SURVEILLANCE ENVIRONNEMENTALE ET AU SUIVI DES PERSONNES EN PERTES D'AUTONOMIE | Mounir Hemam | 1 updates | 1 publications | Research Project INTEROPÉRABILITÉ SÉMANTIQUE ET SÉCURITÉ DANS L'INTERNET DES OBJETS : APPLICATION À LA SURVEILLANCE ENVIRONNEMENTALE ET AU SUIVI DES PERSONNES EN PERTES D'AUTONOMIE | Mounir Hemam | 1 updates | 1 publications | Research Project](https://www.researchgate.net/profile/Benkhaled-Sihem/publication/359149552/figure/fig1/AS:1133182275592195@1647183116426/The-cross-domain-ontological-model_Q640.jpg)