Academic literature on the topic 'Privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Privacy"
Serwin, Andrew. "Privacy 3.0-The Principle of Proportionality." University of Michigan Journal of Law Reform, no. 42.4 (2009): 869. http://dx.doi.org/10.36646/mjlr.42.4.privacy.
Full textCohen, Julie E. "Turning Privacy Inside Out." Theoretical Inquiries in Law 20, no. 1 (March 16, 2019): 1–31. http://dx.doi.org/10.1515/til-2019-0002.
Full textLemley, Mark. "Privacy, Property, and Publicity." Michigan Law Review, no. 117.6 (2019): 1153. http://dx.doi.org/10.36644/mlr.117.6.privacy.
Full textCulshaw, Helen. "Private sector libraries and privacy." ANZTLA EJournal, no. 49 (April 29, 2019): 10–13. http://dx.doi.org/10.31046/anztla.v0i49.1196.
Full textMunro, Moira, and Ruth Madigan. "Privacy in the private sphere." Housing Studies 8, no. 1 (January 1993): 29–45. http://dx.doi.org/10.1080/02673039308720748.
Full textEtzioni, Amitai. "Privacy and the private realm." Innovation: The European Journal of Social Science Research 25, no. 1 (March 2012): 57–66. http://dx.doi.org/10.1080/13511610.2012.655574.
Full textDarr, Kurt. "Privacy—Private Lives, Public Lives." Hospital Topics 81, no. 3 (January 2003): 29–32. http://dx.doi.org/10.1080/00185860309598025.
Full textBläser, Markus, Andreas Jakoby, Maciej Liśkiewicz, and Bodo Manthey. "Privacy in Non-private Environments." Theory of Computing Systems 48, no. 1 (October 16, 2009): 211–45. http://dx.doi.org/10.1007/s00224-009-9243-1.
Full textNissim, Kobbi, and Alexandra Wood. "Is privacy privacy ?" Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 376, no. 2128 (August 6, 2018): 20170358. http://dx.doi.org/10.1098/rsta.2017.0358.
Full textSari, Putri Widya. "Pengungkapan Diri dalam Perseteruan Youtuber Kembar Tasya Farasya dan Tasyi Athasyia." Jurnal Komunikasi Nusantara 5, no. 1 (June 1, 2023): 67–77. http://dx.doi.org/10.33366/jkn.v5i1.244.
Full textDissertations / Theses on the topic "Privacy"
Loesing, Karsten. "Privacy-enhancing technologies for private services." Bamberg Univ. of Bamberg Press, 2009. http://d-nb.info/994593937/34.
Full textRICCI, STEFANO. "Il global privacy standard: i modelli di tutela della privacy." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2013. http://hdl.handle.net/10281/44620.
Full textThis work proposes an alternative account of data protection in terms of confidentiality: the argument is that confidentiality should have more relevance because it lights up the relationship between those who have information and those to whom the information relates. In fact, I argue that the deficit of understanding in data protection laws is due to an equivocal centrality of the need to safeguard an individualistic and general right of privacy as shield against arbitrary interference instead of a need to protect relationships of trust. Conceptualising data protection through confidentiality serves to point out the breaches of fiduciary duties. In contrast to the classic approach of privacy and data protection, confidentiality focuses on relationships rather than individuals because, far from a right to be let alone, confidentiality is based on the rules of trust within relationships: it is adequate to describe a breach of privacy through confidentiality as a breach of an implicit clause of a fiduciary relationship existing between the data controller (the confidant) and the data subject (the confider). Global Privacy Standard (GPS) and Fair Information Practises (FIPs) show a clearly delineated ground for personal data protection in the form of confidentiality. If GPS are understood not as creating a general right of privacy of personal data, but as carrying out the extremely different duty of confidentiality with respect to data protection, GPS can be seen not as attempting to regulate personal data based on the private nature of that information, but only establish the framework in which such information is exchanged. Data protection should therefore be separated from privacy and should put into a legal frame of confidentiality, so that personal data could be better protected.
Foerster, Marian. "WWW Privacy - P3P Platform of Privacy Preferencers." Universitätsbibliothek Chemnitz, 2000. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200000598.
Full textPurandare, Darshan. "ENHANCING MESSAGE PRIVACY IN WIRED EQUIVALENT PRIVACY." Master's thesis, University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2998.
Full textM.S.
School of Computer Science
Engineering and Computer Science
Computer Science
WITTE, NATHAN ALLAN. "PRIVACY: ARCHITECTURE IN SUPPORT OF PRIVACY REGULATION." University of Cincinnati / OhioLINK, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1053701814.
Full textWitte, Nathan. "Privacy architecture in support of privacy regulation /." Cincinnati, Ohio : University of Cincinnati, 2003. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=ucin1053701814.
Full textDe, Montjoye Yves-Alexandre. "Computational privacy : towards privacy-conscientious uses of metadata." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/101850.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 111-127).
The breadcrumbs left behind by our technologies have the power to fundamentally transform the health and development of societies. Metadata about our whereabouts, social lives, preferences, and finances can be used for good but can also be abused. In this thesis, I show that the richness of today's datasets have rendered traditional data protections strategies outdated, requiring us to deeply rethink our approach. First, I show that the concept of anonymization, central to legal and technical data protection frameworks, does not scale. I introduce the concept of unicity to study the risks of re-identification of large-scale metadata datasets given p points. I then use unicity to show that four spatio-temporal points are enough to uniquely identify 95% of people in a mobile phone dataset and 90% of people in a credit card dataset. In both cases, I also show that traditional de-identification strategies such as data generalization are not sufficient to approach anonymity in modern high-dimensional datasets. Second, I argue that the second pillar of data protection, risk assessment, is similarly crumbling as data gets richer. I show, for instance, how standard mobile phone data-information on how and when somebody calls or texts-can be used to predict personality traits up to 1.7 times better than random. The risk of inference in big data will render comprehensive risks assessments increasingly difficult and, moving forward, potentially irrelevant as they will require evaluating what can be inferred now, and in the future, from rich data. However, this data has a great potential for good especially in developing countries. While it is highly unlikely that we will ever find a magic bullet or even a one-size- fits-all approach to data protection, there are ways that exist to use metadata in privacy-conscientious ways. I finish this thesis by discussing technical solutions (incl. privacy-through-security ones) which, when combined with legal and regulatory frameworks, provide a reasonable balance between the imperative of using this data and the legitimate concerns of the individual and society.
by Yves-Alexandre de Montjoye.
Ph. D.
Sato, Keiko. "Privacy on the internet : Investigation into corporate privacy policy of Australian large private sector organisations on the internet." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2001. https://ro.ecu.edu.au/theses/1032.
Full textVéliz, Carissa. "On privacy." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:afb31b0e-f022-48a6-b239-4c704cfd4484.
Full textBruggen, Harry van der. "Patiënt, privaat en privacy de stoelgang als gezondheidswetenschappelijk probleem /." Lochem : Maastricht : De Tijdstroom ; University Library, Maastricht University [Host], 1991. http://arno.unimaas.nl/show.cgi?fid=5616.
Full textBooks on the topic "Privacy"
Akhtar, Salman, and Aisha Abbasi, eds. Privacy. New York : Routledge, 2019.: Routledge, 2019. http://dx.doi.org/10.4324/9780429202278.
Full textFilimowicz, Michael. Privacy. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003173335.
Full textInstitute, Pennsylvania Bar. Privacy. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2005.
Find full textMerino, Noël. Privacy. Detroit: Greenhaven Press, A part of Gale, Cengage Learning, 2014.
Find full textRodriguez, Kenneth. Privacy. Calabasas, CA: Center for Civic Education, 2001.
Find full textAgostino, Clemente, ed. Privacy. Padova: CEDAM, 1999.
Find full textRaymond, Wacks, ed. Privacy. New York, NY: New York University Press, 1993.
Find full textKnopff, Rainer. Privacy. Calgary: The Calgary Institute for the Humanities, The University of Calgary, 1989.
Find full textRodriguez, Kenneth. Privacy. Calabasas, CA: Center for Civic Education, 2001.
Find full textScherer, Lauri S. Privacy. Detroit: Greenhaven Press, 2014.
Find full textBook chapters on the topic "Privacy"
Dannen, Chris, and Christopher White. "Privacy, Privacy, Privacy." In Beginning iOS Apps with Facebook and Twitter APIs, 9–14. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3543-9_2.
Full textKanterian, Edward. "Privacy and Private Language." In A Companion to Wittgenstein, 443–64. Chichester, UK: John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118884607.ch28.
Full textChinwah-Adegbola, Lovette. "Privacy." In Portable Health Records in a Mobile Society, 87–100. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-19937-1_9.
Full textLevesque, Roger J. R. "Privacy." In Encyclopedia of Adolescence, 2161–64. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-1695-2_708.
Full textPosner, Richard A. "Privacy." In The New Palgrave Dictionary of Economics and the Law, 1503–8. London: Palgrave Macmillan UK, 2002. http://dx.doi.org/10.1007/978-1-349-74173-1_287.
Full textHung, Patrick C. K., and Vivying S. Y. Cheng. "Privacy." In Encyclopedia of Database Systems, 1–2. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_274-2.
Full textRosenoer, Jonathan. "Privacy." In CyberLaw, 129–60. New York, NY: Springer New York, 1997. http://dx.doi.org/10.1007/978-1-4612-4064-8_4.
Full textCofone, Ignacio N. "Privacy." In Encyclopedia of Law and Economics, 1644–48. New York, NY: Springer New York, 2019. http://dx.doi.org/10.1007/978-1-4614-7753-2_751.
Full textCofone, Ignacio N. "Privacy." In Encyclopedia of Law and Economics, 1–4. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-7883-6_751-1.
Full textSchreck, Jörg. "Privacy." In Security and Privacy in User Modeling, 17–25. Dordrecht: Springer Netherlands, 2003. http://dx.doi.org/10.1007/978-94-017-0377-2_3.
Full textConference papers on the topic "Privacy"
Shani, Guy. "Advances and Challenges in Privacy Preserving Planning." In Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. California: International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/816.
Full textZhao, Wenhao, Shaoyang Song, and Chunlai Zhou. "Generate Synthetic Text Approximating the Private Distribution with Differential Privacy." In Thirty-Third International Joint Conference on Artificial Intelligence {IJCAI-24}. California: International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/ijcai.2024/735.
Full text"THE PRIVACY ADVOCATE (PRIVAD) - A Framework for Negotiating Individual Privacy Contracts." In 3rd International Conference on Web Information Systems and Technologies. SciTePress - Science and and Technology Publications, 2007. http://dx.doi.org/10.5220/0001282100880095.
Full textLiu, Hongbin, Jinyuan Jia, and Neil Zhenqiang Gong. "On the Intrinsic Differential Privacy of Bagging." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/376.
Full textGu, He. "Towards Guaranteed Privacy in Stream Processing: Differential Privacy for Private Pattern Protection." In DEBS '23: 17th ACM International Conference on Distributed and Event-based Systems. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3583678.3603284.
Full textGajera, Hardik, and Manik Lal Das. "Privc: Privacy Preserving Verifiable Computation." In 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS). IEEE, 2020. http://dx.doi.org/10.1109/comsnets48256.2020.9027488.
Full textInan, Ali, Murat Kantarcioglu, Gabriel Ghinita, and Elisa Bertino. "Private record matching using differential privacy." In the 13th International Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1739041.1739059.
Full textA. Hayek, Frederic, Mirko Koscina, Pascal Lafourcade, and Charles Olivier-Anclin. "Generic Privacy Preserving Private Permissioned Blockchains." In SAC '23: 38th ACM/SIGAPP Symposium on Applied Computing. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3555776.3577735.
Full textTran, Cuong, Ferdinando Fioretto, Pascal Van Hentenryck, and Zhiyan Yao. "Decision Making with Differential Privacy under a Fairness Lens." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/78.
Full textChaves, Iago, and Javam Machado. "Differentially Private Group-by Data Releasing Algorithm." In XXXIV Simpósio Brasileiro de Banco de Dados. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbbd.2019.8835.
Full textReports on the topic "Privacy"
Popovic, Ales, H. Jeff Smith, James Y. L. Thong, and Sunil Wattal. Information Privacy. MIS Quarterly, May 2017. http://dx.doi.org/10.25300/misq/2019/curations/05292017.
Full textKakulla, Brittne. Topical Spotlight: Digital Privacy — Privacy Concerns Remain a Barrier. Washington, DC: AARP Research, August 2021. http://dx.doi.org/10.26419/res.00420.007.
Full textGoldfarb, Avi, and Catherine Tucker. Privacy and Innovation. Cambridge, MA: National Bureau of Economic Research, June 2011. http://dx.doi.org/10.3386/w17124.
Full textBortzmeyer, S. DNS Privacy Considerations. RFC Editor, August 2015. http://dx.doi.org/10.17487/rfc7626.
Full textWicinski, T., ed. DNS Privacy Considerations. RFC Editor, July 2021. http://dx.doi.org/10.17487/rfc9076.
Full textLefkovitz, Naomi. NIST Privacy Framework:. Gaithersburg, MD: National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.cswp.10.may.
Full textKissner, Lea, and Dawn Song. Privacy-Preserving Set Operations. Fort Belvoir, VA: Defense Technical Information Center, June 2005. http://dx.doi.org/10.21236/ada457144.
Full textSeybold, Patricia. DuckDuckGo Respects Our Privacy. Boston, MA: Patricia Seybold Group, June 2013. http://dx.doi.org/10.1571/pp06-28-13cc.
Full textJiang, S., S. Krishnan, and T. Mrugalski. Privacy Considerations for DHCP. RFC Editor, April 2016. http://dx.doi.org/10.17487/rfc7819.
Full textKrishnan, S., T. Mrugalski, and S. Jiang. Privacy Considerations for DHCPv6. RFC Editor, May 2016. http://dx.doi.org/10.17487/rfc7824.
Full text