Journal articles on the topic 'Information privacy'

To see the other types of publications on this topic, follow the link: Information privacy.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Information privacy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

White, Garry L., Francis A. Méndez Mediavilla, and Jaymeen R. Shah. "Information Privacy." International Journal of Information Security and Privacy 5, no. 1 (January 2011): 50–66. http://dx.doi.org/10.4018/jisp.2011010104.

Full text
Abstract:
In the Web dependent world, companies must respect and protect individuals’ information privacy. Companies develop and implement corporate information privacy policies to comply with the domestic and international information privacy laws and regulations. This paper investigates: (a) the approach used by multinational and domestic companies to develop and implement corporate information privacy policies; and (b) the perception of corporate managers/professionals toward information privacy legislation and secondary use of personally identifiable information (PII) that organizations collect. A survey was conducted to collect data from corporate CEOs, managers, and technical professionals of national and multinational companies. Findings indicate the following: 1) Views regarding the practicality and effectiveness of information privacy legislations are similar for respondents from the national and multinational companies. 2) Respondents are undecided about whether the privacy laws of the United States and foreign countries are equally restrictive. 3) Multinational companies do not favor developing and implementing uniform information privacy policies or different information privacy policies across countries of operations. 4) Respondents strongly agreed that unauthorized secondary use of personal information is unacceptable.
APA, Harvard, Vancouver, ISO, and other styles
2

Collier, Graham. "Information privacy." Information Management & Computer Security 3, no. 1 (March 1995): 41–45. http://dx.doi.org/10.1108/09685229510792979.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Camenisch, Jan. "Information privacy?!" Computer Networks 56, no. 18 (December 2012): 3834–48. http://dx.doi.org/10.1016/j.comnet.2012.10.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Litman, Jessica. "Information Privacy/Information Property." Stanford Law Review 52, no. 5 (May 2000): 1283. http://dx.doi.org/10.2307/1229515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Charlesworth, Andrew J. "Privacy, Personal Information and Employment." Surveillance & Society 1, no. 2 (September 1, 2002): 217–22. http://dx.doi.org/10.24908/ss.v1i2.3355.

Full text
Abstract:
It is a widely accepted proposition, reflected in privacy-enhancing legislation and regulations, that individuals will have less privacy in their workplace activities than in their private lives. However, modern technologies and business practices have blurred the boundary between private life and workplace, and a re-evaluation of the traditional legislative and regulatory protections for privacy in employment is required.
APA, Harvard, Vancouver, ISO, and other styles
6

Lai, Jianchang, Yi Mu, Fuchun Guo, Peng Jiang, and Willy Susilo. "Privacy-enhanced attribute-based private information retrieval." Information Sciences 454-455 (July 2018): 275–91. http://dx.doi.org/10.1016/j.ins.2018.04.084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Conger, Sue. "Personal Information Privacy." Journal of Electronic Commerce in Organizations 7, no. 1 (January 2009): 71–82. http://dx.doi.org/10.4018/jeco.2009010106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mancilla, Desla, and Sue Biedermann. "Health Information Privacy." Health Care Manager 28, no. 1 (January 2009): 71–74. http://dx.doi.org/10.1097/hcm.0b013e318196de6c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Muenchinger, Nancy E. "INFORMATION PRIVACY REGULATION:." Computer Law & Security Review 17, no. 6 (November 2001): 390–94. http://dx.doi.org/10.1016/s0267-3649(01)01107-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Low, John. "Information and Privacy." Australian Journal of Hospital Pharmacy 28, no. 1 (February 1998): 2–3. http://dx.doi.org/10.1002/jppr19982812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Halder, Suhasish, V. S. Prakash Attili, and Vivek Gupta. "Information Privacy Assimilation." International Journal of Digital Strategy, Governance, and Business Transformation 12, no. 1 (January 1, 2022): 1–17. http://dx.doi.org/10.4018/ijdsgbt.313954.

Full text
Abstract:
This paper proposes a framework to understand organizations' perspectives while safeguarding customers' information privacy. Following a detailed literature review, a broad conceptual model was developed to build a theory based on a multi-site, multi-case study approach. The current manuscript treats information privacy as distinct from information security. From an organizational standpoint, this research reveals that legal policy, technology, and industry standards drive privacy assimilation. At a detailed level, adherence to compliance, competitive best practices, and data management controls significantly impact an organization's opportunistic perspective, resulting in higher-order assimilation (infusion) of organizational privacy practices. Resistance to compliance, investment cost, and reactive approach results in lower-order assimilation (adaptation) of organizational privacy practices. This study delivers practical implications related to how businesses perceive privacy practices while maintaining the right balance of privacy risks and opportunities.
APA, Harvard, Vancouver, ISO, and other styles
12

Ciocchetti, Corey A. "E-Commerce and Information Privacy: Privacy Policies as Personal Information Protectors." American Business Law Journal 44, no. 1 (March 2007): 55–126. http://dx.doi.org/10.1111/j.1744-1714.2007.00031.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Janger, Edward J. "Genetic Information, Privacy and Insolvency." Journal of Law, Medicine & Ethics 33, no. 1 (2005): 79–88. http://dx.doi.org/10.1111/j.1748-720x.2005.tb00212.x.

Full text
Abstract:
Biobanks hold out the prospect of significant public and private benefit, as genetic information contained in tissue samples is mined for information. However, the storing of human tissue samples and genetic information for research and/or therapeutic purposes raises a number of serious privacy and autonomy concerns. These concerns are compounded when one considers the possibility that a biobank or its owner might go bankrupt. Insolvency impairs the ability of enforcement regimes, and liability-based regimes in particular, to enforce legal norms. The goal of this essay is to develop guideposts for thinking about private and public enforcement of privacy imposed by donors on tissue samples and/or genetic information when a biobank becomes insolvent.
APA, Harvard, Vancouver, ISO, and other styles
14

O’Callaghan, Patrick. "False Privacy and Information Games." Journal of European Tort Law 4, no. 3 (November 1, 2013): 282–305. http://dx.doi.org/10.1515/jetl-2013-0019.

Full text
Abstract:
AbstractThis paper is a critique of false privacy, the proposition that privacy’s protective remit should extend to information that is entirely false. It argues that there are conceptual as well as doctrinal problems associated with such an action in tort law. First, drawing on the work of the American sociologist, Erving Goffman, the paper challenges the idea that the authentic self can be recognised in law. Second, the paper argues that false privacy sits uneasily with tort law’s doctrinal framework. While the paper focuses on English tort law, it pursues its lines of argument in a comparative context, exploring how German and US law give expression to false privacy.
APA, Harvard, Vancouver, ISO, and other styles
15

Gertner, Yael, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. "Protecting Data Privacy in Private Information Retrieval Schemes." Journal of Computer and System Sciences 60, no. 3 (June 2000): 592–629. http://dx.doi.org/10.1006/jcss.1999.1689.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Moreham, N. A. "BEYOND INFORMATION: PHYSICAL PRIVACY IN ENGLISH LAW." Cambridge Law Journal 73, no. 2 (July 2014): 350–77. http://dx.doi.org/10.1017/s0008197314000427.

Full text
Abstract:
AbstractAlthough English privacy law has developed significantly over the past two decades, it continues to focus almost exclusively on the disclosure of private or confidential information. This article argues that if privacy is to be comprehensively protected, then the importance of physical privacy – which is breached when a person is looked at, listened to or recorded against his or her wishes – must also be recognised. After discussing what physical privacy is and why existing protections for it are inadequate, the author contends that a physical privacy action can, and should, be developed from within English common law.
APA, Harvard, Vancouver, ISO, and other styles
17

Fletcher, Sam, and Md Zahidul Islam. "Measuring Information Quality for Privacy Preserving Data Mining." International Journal of Computer Theory and Engineering 7, no. 1 (February 2014): 21–28. http://dx.doi.org/10.7763/ijcte.2015.v7.924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Mondal, Sutapa, Mangesh S. Gharote, and Sachin P. Lodha. "Privacy of Personal Information." Queue 20, no. 3 (June 30, 2022): 41–87. http://dx.doi.org/10.1145/3546934.

Full text
Abstract:
Each online interaction with an external service creates data about the user that is digitally recorded and stored. These external services may be credit card transactions, medical consultations, census data collection, voter registration, etc. Although the data is ostensibly collected to provide citizens with better services, the privacy of the individual is inevitably put at risk. With the growing reach of the Internet and the volume of data being generated, data protection and, specifically, preserving the privacy of individuals, have become particularly important. In this article we discuss the data privacy concepts using two fictitious characters, Swara and Betaal, and their interactions with a fictitious entity, namely Asha Hospital.
APA, Harvard, Vancouver, ISO, and other styles
19

Machamer, Peter, and Barbara Boylan. "Freedom, Information and Privacy." Business and Professional Ethics Journal 12, no. 3 (1993): 47–68. http://dx.doi.org/10.5840/bpej19931237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Scoma, Louis. "Protecting Privacy of Information." Journal of Information Systems Management 3, no. 3 (January 1986): 79–80. http://dx.doi.org/10.1080/07399018608965265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Ahmad, Aftab, Preeti Misra, Frank Ono, Cody Priest, Jessica Suarez, and Alexander Urcioli. "The information privacy domain." International Journal of Information Privacy, Security and Integrity 2, no. 4 (2016): 307. http://dx.doi.org/10.1504/ijipsi.2016.082124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Suarez, Jessica, Frank Ono, Aftab Ahmad, Preeti Misra, Alexander Urcioli, and Cody Priest. "The information privacy domain." International Journal of Information Privacy, Security and Integrity 2, no. 4 (2016): 307. http://dx.doi.org/10.1504/ijipsi.2016.10003023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Cassidy, Susan O., and Martin J. Sepulveda. "Health Information Privacy Reform." Journal of Occupational and Environmental Medicine 37, no. 5 (May 1995): 605–14. http://dx.doi.org/10.1097/00043764-199505000-00010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Romanow, Kate. "Patient Information Privacy Basics." ASHA Leader 16, no. 9 (September 2011): 3–46. http://dx.doi.org/10.1044/leader.bml1.16092011.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Sharts-Hopko, Nancy C. "Health Information Privacy Reconsidered." Nurse Leader 12, no. 4 (August 2014): 58–61. http://dx.doi.org/10.1016/j.mnl.2013.10.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Conrad, Deborah. "Consciousness, privacy, and information." Biosystems 38, no. 2-3 (January 1996): 207–10. http://dx.doi.org/10.1016/0303-2647(95)01592-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ismail Al-, Adel, and Eman Ali Hafedh . "Auditing of Information Privacy." Information Technology Journal 5, no. 1 (December 15, 2005): 177–82. http://dx.doi.org/10.3923/itj.2006.177.182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Caloyannides, M. "Privacy vs. information technology." IEEE Security & Privacy 1, no. 1 (January 2003): 100–103. http://dx.doi.org/10.1109/msecp.2003.1177005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Gostin, Lawrence O. "National Health Information Privacy." JAMA 285, no. 23 (June 20, 2001): 3015. http://dx.doi.org/10.1001/jama.285.23.3015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Lucky Stephen, Godwin, and Nwabugwu Mgbodichima Jummai. "Information Ownership and Privacy Control in Information Society." International Journal of Scientific Research and Management 10, no. 06 (June 24, 2022): 25–33. http://dx.doi.org/10.18535/ijsrm/v10i6.lis01.

Full text
Abstract:
Information ownership and privacy control of information are two inter-related aspects of privacy protection that have emerged as essential areas of study for academics, information scientists, businesses, lawyers, and policymakers with the advance of information technology in the information society. Information ownership and privacy control is an essential area of focus in today’s digital world and modern information society where information can so easily be captured, stored, and shared. Multidisciplinary privacy research has been conducted for decades. Yet, information ownership and privacy control remains a complicated subject that still provides fertile ground for further investigation, especially in the modern information society. This paper, therefore, discusses the concept and characteristics of information ownership, information privacy control, and information ownership & privacy control in the information society.
APA, Harvard, Vancouver, ISO, and other styles
31

Sanfilippo, Madelyn R., Yan Shvartzshnaider, Irwin Reyes, Helen Nissenbaum, and Serge Egelman. "Disaster privacy/privacy disaster." Journal of the Association for Information Science and Technology 71, no. 9 (March 13, 2020): 1002–14. http://dx.doi.org/10.1002/asi.24353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Wang, Qiaozhi, Hao Xue, Fengjun Li, Dongwon Lee, and Bo Luo. "#DontTweetThis: Scoring Private Information in Social Networks." Proceedings on Privacy Enhancing Technologies 2019, no. 4 (October 1, 2019): 72–92. http://dx.doi.org/10.2478/popets-2019-0059.

Full text
Abstract:
Abstract With the growing popularity of online social networks, a large amount of private or sensitive information has been posted online. In particular, studies show that users sometimes reveal too much information or unintentionally release regretful messages, especially when they are careless, emotional, or unaware of privacy risks. As such, there exist great needs to be able to identify potentially-sensitive online contents, so that users could be alerted with such findings. In this paper, we propose a context-aware, text-based quantitative model for private information assessment, namely PrivScore, which is expected to serve as the foundation of a privacy leakage alerting mechanism. We first solicit diverse opinions on the sensitiveness of private information from crowdsourcing workers, and examine the responses to discover a perceptual model behind the consensuses and disagreements. We then develop a computational scheme using deep neural networks to compute a context-free PrivScore (i.e., the “consensus” privacy score among average users). Finally, we integrate tweet histories, topic preferences and social contexts to generate a personalized context-aware PrivScore. This privacy scoring mechanism could be employed to identify potentially-private messages and alert users to think again before posting them to OSNs.
APA, Harvard, Vancouver, ISO, and other styles
33

Kemp, Randy, and Adam D. Moore. "Privacy." Library Hi Tech 25, no. 1 (March 13, 2007): 58–78. http://dx.doi.org/10.1108/07378830710735867.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Pawestri, Firamia Dyah, and Jumino Jumino. "Analisis Hubungan Information Privacy Concern dan Perilaku Perlindungan Privasi Pengguna Twitter di Indonesia." Anuva: Jurnal Kajian Budaya, Perpustakaan, dan Informasi 5, no. 2 (June 6, 2021): 221–36. http://dx.doi.org/10.14710/anuva.5.2.221-236.

Full text
Abstract:
Privasi adalah sesuatu yang penting di era ini. Namun, kasus kejahatan dunia maya yang mengancam privasi pengguna internet yang jumlahnya semakin banyak, termasuk pengguna layanan jejaring sosial seperti Twitter. Tujuan dari penelitian ini adalah untuk memahami hubungan information privacy concern dan perilaku perlindungan privasi serta hubungan antara komponen-komponen Protection Motivation Theory, yaitu perceived severity, perceived vulnerability, response efficacy, self-efficacy, rewards, dan response costs, dan information privacy concern pengguna Twitter di Indonesia. Dengan menggunakan simple random sampling, kuesioner dibagikan secara daring di Twitter pada tanggal 13 November 2020 sampai 15 November 2020. Dalam rentang waktu tersebut didapatkan 156 data. Data yang terkumpul lalu dianalisis dengan menggunakan Structural Equation Modeling. Hasil menunjukkan information privacy concern berpengaruh positif dan signifikan terhadap perilaku perlindungan privasi. Perceived seveerity, perceived vulnerability, response efficacy, dan self-efficacy memiliki pengaruh positif serta signifikan terhadap information privacy concern. Sedangkan rewards secara negatif dan signifikan mempengaruhi information privacy concern. Response costs tidak memiliki pengaruh yang signifikan terhadap information privacy concern.
APA, Harvard, Vancouver, ISO, and other styles
35

Ye, Fangwei, and Salim El Rouayheb. "Intermittent Private Information Retrieval With Application to Location Privacy." IEEE Journal on Selected Areas in Communications 40, no. 3 (March 2022): 927–39. http://dx.doi.org/10.1109/jsac.2022.3142301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Bernardini, Cesar, Samuel Marchal, Muhammad Rizwan Asghar, and Bruno Crispo. "PrivICN: Privacy-preserving content retrieval in information-centric networking." Computer Networks 149 (February 2019): 13–28. http://dx.doi.org/10.1016/j.comnet.2018.11.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Tavani, Herman T., and James H. Moor. "Privacy protection, control of information, and privacy-enhancing technologies." ACM SIGCAS Computers and Society 31, no. 1 (March 2001): 6–11. http://dx.doi.org/10.1145/572277.572278.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Martin, Kirsten. "Information technology and privacy: conceptual muddles or privacy vacuums?" Ethics and Information Technology 14, no. 4 (September 15, 2012): 267–84. http://dx.doi.org/10.1007/s10676-012-9300-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Abdulhameed, Islam Sami, Intisar Al-Mejibli, and Jolan Rokan Naif. "Improving Security and Privacy for Health Information and Images." Webology 19, no. 1 (January 20, 2022): 2435–57. http://dx.doi.org/10.14704/web/v19i1/web19164.

Full text
Abstract:
Recently, the wireless devices and information technology have been evolved greatly and used in many sectors such as health and military. Employing these technologies in health system require to transmitting the patient’s information over the Internet. Hence, there is an urgent need to provide a high degree of security and privacy for patient information. This paper presents new encryption method to protect the information that are transmitted and stored in electronic health records (EHR) with maintaining its privacy. The proposal employs AES and ECC algorithms for security purpose and HMAC-SHA3 algorithm for privacy purpose. The suggested strategy was applied in different stages. ECC algorithm had been used to provides very fast key generation, and fast key agreement. A different key is generated for each session where both sender and receiver has the ability to generate the same private key. The obtained results show high level of security in both ends(Sender & receiver) as they have the role of encryption and decoding according to the query. The results were analyzed and tested according to the NIST test group and thirteen steps have been successfully passed.
APA, Harvard, Vancouver, ISO, and other styles
40

Wang, Le, Zao Sun, Xiaoyong Dai, Yixin Zhang, and Hai-hua Hu. "Retaining users after privacy invasions." Information Technology & People 32, no. 6 (December 2, 2019): 1679–703. http://dx.doi.org/10.1108/itp-01-2018-0020.

Full text
Abstract:
Purpose The purpose of this paper is to facilitate understanding of how to mitigate the privacy concerns of users who have experienced privacy invasions. Design/methodology/approach Drawing on the communication privacy management theory, the authors developed a model suggesting that privacy concerns form through a cognitive process involving threat-coping appraisals, institutional privacy assurances and privacy experiences. The model was tested using data from an empirical survey with 913 randomly selected social media users. Findings Privacy concerns are jointly determined by perceived privacy risks and privacy self-efficacy. The perceived effectiveness of institutional privacy assurances in terms of established privacy policies and privacy protection technology influences the perceptions of privacy risks and privacy self-efficacy. More specifically, privacy invasion experiences are negatively associated with the perceived effectiveness of institutional privacy assurances. Research limitations/implications Privacy concerns are conceptualized as general concerns that reflect an individual’s worry about the possible loss of private information. The specific types of private information were not differentiated. Originality/value This paper is among the first to clarify the specific mechanisms through which privacy invasion experiences influence privacy concerns. Privacy concerns have long been viewed as resulting from individual actions. The study contributes to literature by linking privacy concerns with institutional privacy practice.
APA, Harvard, Vancouver, ISO, and other styles
41

Chesnokova, Lesya. "Information privacy: protecting freedom and individual autonomy." Digital Scholar Philosopher s Lab 4, no. 2 (2021): 145–57. http://dx.doi.org/10.32326/2618-9267-2021-4-2-145-157.

Full text
Abstract:
The article examines the individual’s right to information privacy as an opportunity to have a non-public area of life. It is argued that a person, being a vulnerable creature, feels the need for secrecy, closeness and opacity of his or her personality. The right to information privacy does not mean complete concealment of private life, but the possibility of regulating access, when individuals can choose whom, when and to what extent to reveal the details of their lives. This presupposes both a person who feels him or herself to be an autonomous person and a society that respects his or her rights and freedoms. There is a duty of restraint and tact, which prohibits violating someone else’s privacy. As one of the aspects of privacy, in addition to the inviolability of the body and home, the human right to information protection is recognized. The theoretical foundation of the right to privacy is the philosophy of liberalism, which protects the individual from unwanted interference from the state and society. The need for private space has evolved in human history along with the growth of individualism. Currently, the right to information privacy is gaining special relevance in connection with the development of digital technologies that allow collecting, storing and processing large amounts of data. As a result, a person, on the one hand, does not know who, when and for what purpose collects his or her data, and, on the other hand, he or she often voluntarily, in connection with the need for social recognition, leaves information about him or herself on social networks. As a result of such actions, the loss of control over personal information can lead to undesirable consequences.
APA, Harvard, Vancouver, ISO, and other styles
42

Regan, Priscilla M. "Privacy, Government Information, and Technology." Public Administration Review 46, no. 6 (November 1986): 629. http://dx.doi.org/10.2307/976229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Kang, Jerry. "Information Privacy in Cyberspace Transactions." Stanford Law Review 50, no. 4 (April 1998): 1193. http://dx.doi.org/10.2307/1229286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Jiang, Bo, Mohamed Seif, Ravi Tandon, and Ming Li. "Context-Aware Local Information Privacy." IEEE Transactions on Information Forensics and Security 16 (2021): 3694–708. http://dx.doi.org/10.1109/tifs.2021.3087350.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Serohin, Vitalii. "INFORMATION PRIVACY: A CONCEPTUAL APPROACH." Constitutional and legal academic studies, no. 2 (July 16, 2021): 52–60. http://dx.doi.org/10.24144/2663-5399.2020.2.06.

Full text
Abstract:
The paper attempts to expose the basic concepts of informational privacy reflected in Western jurisprudence, as well as to outline the author's vision of the content and scope of informational privacy, to distinguish the relevant powers from which this right consists, to reveal its place and role from the standpoint of system-structural approach. It is noted that in the modern scientific literature, dedicated to ensuring the privacy and respect for his / her privacy, clearly distinguishes two main approaches to understanding the informational advantage - broad and narrow. Proponents of the narrow approach consider the primes solely in the informational aspect, and other constituents (physical, visual, phonetic privacy, etc.) tend to relate to the content of other fundamental rights. However, one group of authors interprets information privacy as the right of the person to control their personal data, while the second group considers it more rational and efficient to consider information pricing as the right of ownership of personal data. Attempting to unite both camps of supporters of a narrow interpretation of the information front is the Restricted Access / Limited Control (RALC) theory. Proponents of the broad-based approach view information primacy as important, but only one of the many substantive elements of constitutional law in favor. At the same time, the authors' exit beyond the information sphere when considering the content of the precedence can be considered progressive and more consistent with the essence of this right and its purpose in ensuring personal freedom and autonomy. In view of the author, revealing the content of the right to privacy, it should be borne in mind that the object of this right includes several areas (aspects), in each of which a person may be in different states of privacy, and the privacy itself has certain measurements. On this basis, information is regarded by the author as an element of the constitutional right of privacy, distinguished by the aspects of privacy and the form (method) of its objectification. Unlike other aspects of privacy, the informational aspect is detached from the physical body of the individual and exists independently, and relevant information continues to exist even after the death of the individual. Therefore, even the death of a person does not make sense of the information associated with that person, and sometimes even enhances its value and significance. It is noted that unlike other aspects of the case, information privacy has no states (such as loneliness, intimacy, anonymity, etc.); it merely provides information protection for such states and does not allow them to be disclosed without the consent of the entity itself.
APA, Harvard, Vancouver, ISO, and other styles
46

LANGENDERFER, JEFF, and ANTHONY D. MIYAZAKI. "Privacy in the Information Economy." Journal of Consumer Affairs 43, no. 3 (September 2009): 380–88. http://dx.doi.org/10.1111/j.1745-6606.2009.01152.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Auerbach, Isaac L. "Professional Responsibility for Information Privacy." Journal of Information Systems Management 2, no. 1 (January 1985): 77–81. http://dx.doi.org/10.1080/07399018508967744.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

van Harten, Dirk, and Rinie van Est. "Privacy in an Information Society." Journal of Contingencies and Crisis Management 11, no. 1 (March 2003): 1. http://dx.doi.org/10.1111/1468-5973.1101001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Bar-Yehuda, R., B. Chor, E. Kushilevitz, and A. Orlitsky. "Privacy, additional information and communication." IEEE Transactions on Information Theory 39, no. 6 (1993): 1930–43. http://dx.doi.org/10.1109/18.265501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

McGraw, Deven. "Privacy and Health Information Technology." Journal of Law, Medicine & Ethics 37, S2 (2009): 121–49. http://dx.doi.org/10.1111/j.1748-720x.2009.00424.x.

Full text
Abstract:
In discussions of health reform, the increased use of health information technology (health IT) is a common element of nearly every serious proposal on the table. Health IT includes electronic health records kept by providers, personal health records offered by health insurance plans or owned by consumers, and electronic health information exchanges. Although health reform initiatives being discussed contain little detail regarding health IT, in general they promote health IT to facilitate the electronic sharing of health information to improve individual and population health. During the 2008 presidential campaign, the health care proposals of both President Obama and Senator McCain discussed health IT. President Obama’s proposal invests $50 billion over the next five years to promote the adoption of health IT with privacy safeguards. Senator McCain’s plan also encouraged the adoption of health IT, with an emphasis on coordination.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography