![CAMLearn: Une Architecture de Système de Recommandation Sémantique Sensible au Contexte. Application au Domaine du M-Learning. (CAMLearn: A Context-Aware Mobile Learning Recommender System. Application to M-Learning Domain) | Semantic Scholar CAMLearn: Une Architecture de Système de Recommandation Sémantique Sensible au Contexte. Application au Domaine du M-Learning. (CAMLearn: A Context-Aware Mobile Learning Recommender System. Application to M-Learning Domain) | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/b7debe89c4b78d90345333c26975ebea02925688/69-Figure2.4-1.png)
CAMLearn: Une Architecture de Système de Recommandation Sémantique Sensible au Contexte. Application au Domaine du M-Learning. (CAMLearn: A Context-Aware Mobile Learning Recommender System. Application to M-Learning Domain) | Semantic Scholar
![ISO/IEC 15944-8:2012(en), Information technology — Business Operational View — Part 8: Identification of privacy protection requirements as external constraints on business transactions ISO/IEC 15944-8:2012(en), Information technology — Business Operational View — Part 8: Identification of privacy protection requirements as external constraints on business transactions](https://www.iso.org/obp/graphics/std/iso_std_iso-iec_15944-8_ed-1_v1_en/fig_1.png)
ISO/IEC 15944-8:2012(en), Information technology — Business Operational View — Part 8: Identification of privacy protection requirements as external constraints on business transactions
![PDF) Multi-viewpoint ontological representation of composite concepts: A description logics-based approach PDF) Multi-viewpoint ontological representation of composite concepts: A description logics-based approach](https://i1.rgstatic.net/publication/319477063_Multi-viewpoint_ontological_representation_of_composite_concepts_A_description_logics-based_approach/links/5c5eb78792851c48a9c4e416/largepreview.png)
PDF) Multi-viewpoint ontological representation of composite concepts: A description logics-based approach
![ISO/IEC 15944-8:2012(en), Information technology — Business Operational View — Part 8: Identification of privacy protection requirements as external constraints on business transactions ISO/IEC 15944-8:2012(en), Information technology — Business Operational View — Part 8: Identification of privacy protection requirements as external constraints on business transactions](https://www.iso.org/obp/graphics/std/iso_std_iso-iec_15944-8_ed-1_v1_en/fig_2.png)
ISO/IEC 15944-8:2012(en), Information technology — Business Operational View — Part 8: Identification of privacy protection requirements as external constraints on business transactions
![Memoire Online - La protection de la vie privée dans un système de gestion d'identité - Bahmed et Hassane Boumriga Memoire Online - La protection de la vie privée dans un système de gestion d'identité - Bahmed et Hassane Boumriga](https://www.memoireonline.com/01/14/8693/La-protection-de-la-vie-privee-dans-un-systeme-de-gestion-d-identite2.png)
Memoire Online - La protection de la vie privée dans un système de gestion d'identité - Bahmed et Hassane Boumriga
![The Use of Legal Ontologies in the Development of a System for Continuous Assurance of Privacy Policy Compliance * Bonnie W. Morris, Ph.D. CPA Division. - ppt download The Use of Legal Ontologies in the Development of a System for Continuous Assurance of Privacy Policy Compliance * Bonnie W. Morris, Ph.D. CPA Division. - ppt download](https://images.slideplayer.com/15/4792631/slides/slide_12.jpg)
The Use of Legal Ontologies in the Development of a System for Continuous Assurance of Privacy Policy Compliance * Bonnie W. Morris, Ph.D. CPA Division. - ppt download
![PDF) Analyse de la sécurité et de la protection de la vie privée des systèmes de gestion d'identités PDF) Analyse de la sécurité et de la protection de la vie privée des systèmes de gestion d'identités](https://i1.rgstatic.net/publication/279059702_Analyse_de_la_securite_et_de_la_protection_de_la_vie_privee_des_systemes_de_gestion_d'identites/links/558948cd08ae273b2875c674/largepreview.png)
PDF) Analyse de la sécurité et de la protection de la vie privée des systèmes de gestion d'identités
![The Use of Legal Ontologies in the Development of a System for Continuous Assurance of Privacy Policy Compliance * Bonnie W. Morris, Ph.D. CPA Division. - ppt download The Use of Legal Ontologies in the Development of a System for Continuous Assurance of Privacy Policy Compliance * Bonnie W. Morris, Ph.D. CPA Division. - ppt download](https://slideplayer.com/4792631/15/images/slide_1.jpg)
The Use of Legal Ontologies in the Development of a System for Continuous Assurance of Privacy Policy Compliance * Bonnie W. Morris, Ph.D. CPA Division. - ppt download
![ISO/IEC 15944-20:2015(en), Information technology — Business operational view — Part 20: Linking business operational view to functional service view ISO/IEC 15944-20:2015(en), Information technology — Business operational view — Part 20: Linking business operational view to functional service view](https://www.iso.org/obp/graphics/std/iso_std_iso-iec_15944-20_ed-1_v1_en/fig_1.png)
ISO/IEC 15944-20:2015(en), Information technology — Business operational view — Part 20: Linking business operational view to functional service view
2nd International Congress on INFOethics'98: ethical, legal and societal challenges of cyberspace, Monte Carlo, 1998; final report and proceedings
![Taxonomie des modèles d'attaque de la vie privée Le modèle d'attaque... | Download Scientific Diagram Taxonomie des modèles d'attaque de la vie privée Le modèle d'attaque... | Download Scientific Diagram](https://www.researchgate.net/publication/324938181/figure/fig2/AS:622383392112640@1525399172004/Taxonomie-des-modeles-dattaque-de-la-vie-privee-Le-modele-dattaque-par-liens-sapplique.png)
Taxonomie des modèles d'attaque de la vie privée Le modèle d'attaque... | Download Scientific Diagram
![INTEROPÉRABILITÉ SÉMANTIQUE ET SÉCURITÉ DANS L'INTERNET DES OBJETS : APPLICATION À LA SURVEILLANCE ENVIRONNEMENTALE ET AU SUIVI DES PERSONNES EN PERTES D'AUTONOMIE | Mounir Hemam | 1 updates | 1 publications | Research Project INTEROPÉRABILITÉ SÉMANTIQUE ET SÉCURITÉ DANS L'INTERNET DES OBJETS : APPLICATION À LA SURVEILLANCE ENVIRONNEMENTALE ET AU SUIVI DES PERSONNES EN PERTES D'AUTONOMIE | Mounir Hemam | 1 updates | 1 publications | Research Project](https://www.researchgate.net/profile/Benkhaled-Sihem/publication/359149552/figure/fig1/AS:1133182275592195@1647183116426/The-cross-domain-ontological-model_Q640.jpg)