To see the other types of publications on this topic, follow the link: Privacy practices.

Journal articles on the topic 'Privacy practices'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Privacy practices.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Smith, H. Jeff. "Privacy policies and practices." Communications of the ACM 36, no. 12 (December 1993): 104–22. http://dx.doi.org/10.1145/163298.163349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Paasche-Orlow, Michael K., Dan M. Jacob, and Joshua N. Powell. "Notices of Privacy Practices." Medical Care 43, no. 6 (June 2005): 558–64. http://dx.doi.org/10.1097/01.mlr.0000163646.90393.e4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schlueter, John P. "Private Practices." Nineteenth-Century Literature 66, no. 3 (December 1, 2011): 283–306. http://dx.doi.org/10.1525/ncl.2011.66.3.283.

Full text
Abstract:
Abstract This essay uses selected works of Washington Irving and Ralph Waldo Emerson to delineate two different privacies. The first privacy is associated with secreted spaces, whether physical or personal, and is one that has been normalized. The other privacy is under-appreciated and far less understood: it is an unpredictable, speculative flight of what Irving calls “fancy.” The essay argues that each privacy comes with a distinct set of consequences. If we choose to associate privacy with secreted spaces, we ourselves become like texts, able to be read, and we then associate with others as if they can be read as well. If our privacy is “fanciful,” in contrast, we balance the pleasures of being alone with those of being with others. In the end, the essay hopes to dissociate privacy (or a version of it) from privation, and to offer it as a positive, cultural concept. In doing so, it aligns itself with recent explorations of privacy in the context of nineteenth-century American literature.
APA, Harvard, Vancouver, ISO, and other styles
4

Hsu, Chiung‐wen (Julia). "Privacy concerns, privacy practices and web site categories." Online Information Review 30, no. 5 (September 2006): 569–86. http://dx.doi.org/10.1108/14684520610706433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Toy, Alan, David Lau, David Hay, and Gehan Gunasekara. "The views of privacy auditors regarding standards and methodologies." Meditari Accountancy Research 27, no. 3 (June 3, 2019): 366–98. http://dx.doi.org/10.1108/medar-07-2018-0367.

Full text
Abstract:
Purpose This paper aims to uncover the practices of different privacy auditors to reveal the extent of any similarities in such practices. The purpose is to investigate the drivers of practices used by privacy auditors and to identify potential for improvements in the practice of privacy auditing so that privacy audits may better serve stakeholders. Design/methodology/approach Six semi-structured interviews with seven privacy auditors and regulators and an analyst across Australia, Canada, New Zealand and the USA are used as the basis for our analysis. Findings The study shows that some privacy auditors view privacy as an organizational issue, which means that all staff within an organization should understand the privacy issues that are relevant to the organization and to its customers. Because this practice goes beyond a mere compliance approach to privacy auditing, it indicates that there is a way to avoid the approach of merely applying standards from national data privacy laws which is an approach that has been subject to criticism because it is not applicable to the current situation of global applications and cross-border data. The interview themes demonstrate that privacy audits face significant challenges, such as the lack of a privacy auditing profession and the difficulty of raising the awareness of organizations and individuals regarding information privacy rights and duties. Originality/value Privacy auditing is mostly unexplored by academic research and little is known about the drivers behind the practice of privacy auditing. This study is the first to document the views of privacy auditors regarding the practices that they use. It also presents novel results regarding the drivers of the practice of privacy auditing and the interests of the beneficiaries of privacy audits. It builds on research that argues for the existence of best practices for privacy (Toy, 2013; Toy and Hay, 2015) and it extends this argument by providing reasons why privacy auditors may benefit from the use of best practices for privacy.
APA, Harvard, Vancouver, ISO, and other styles
6

Mensch, Scott E., and LeAnn Wilkie. "Smart Phone Security Practices." International Journal of Cyber Behavior, Psychology and Learning 9, no. 3 (July 2019): 1–14. http://dx.doi.org/10.4018/ijcbpl.2019070101.

Full text
Abstract:
Hand-held cell phone technology has been around for quite some time, however when Apple introduced the iPhone in 2007, the widespread adoption of smartphones took off. Smartphones allow users to communicate via talk, text and video; access personal and work e-mail and the Internet; run applications; make purchases; manage bank accounts; take pictures - and for many of us are an integral part of our everyday (The Privacy Rights Clearinghouse, 2018). Smartphones are “essentially tiny computers, we reach for these devices when we first wake up, bring them with us into the car, and often keep them with us during our most private moments (The Privacy Rights Clearinghouse, 2018). Many users rarely turn off their smart phones.
APA, Harvard, Vancouver, ISO, and other styles
7

Han, Ye, and T. Selwyn Ellis. "A Study of User Continuance Behavioral Intentions Toward Privacy-Protection Practices." Information Resources Management Journal 31, no. 2 (April 2018): 24–46. http://dx.doi.org/10.4018/irmj.2018040102.

Full text
Abstract:
Prior research on privacy protective behaviors has found that online users irrationally trade protection for convenience, and so act against their own privacy preferences. The present article uses expectancy-confirmation theory (ECT) models to explain the continuance behavioral intentions of online users toward privacy-protection practices. It redefines convenience to highlight human behaviors involved in various stages of implementing privacy practices processes. The results show that earlier privacy practice experiences impact the present as well as the future protective behaviors of users, and that convenience-orientation is an important aspect of human nature that should not be inhibited by complex privacy practices. Therefore, to serve online users better, both researchers and practitioners should consider the personal perceptions of convenience of online users when constructing their privacy practices.
APA, Harvard, Vancouver, ISO, and other styles
8

Hope, Joan. "Follow best practices for transparency about student privacy practices." Disability Compliance for Higher Education 20, no. 9 (March 17, 2015): 9. http://dx.doi.org/10.1002/dhe.30049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cohen, Julie E. "Turning Privacy Inside Out." Theoretical Inquiries in Law 20, no. 1 (March 16, 2019): 1–31. http://dx.doi.org/10.1515/til-2019-0002.

Full text
Abstract:
Abstract The problem of theorizing privacy moves on two levels, the first consisting of an inadequate conceptual vocabulary and the second consisting of an inadequate institutional grammar. Privacy rights are supposed to protect individual subjects, and so conventional ways of understanding privacy are subject-centered, but subject-centered approaches to theorizing privacy also wrestle with deeply embedded contradictions. And privacy’s most enduring institutional failure modes flow from its insistence on placing the individual and individualized control at the center. Strategies for rescuing privacy from irrelevance involve inverting both established ways of talking about privacy rights and established conventions for designing institutions to protect them. In terms of theory, turning privacy inside out entails focusing on the conditions that are needed to produce sufficiently private and privacy-valuing subjects. Institutionally, turning privacy inside out entails focusing on the design, production, and operational practices most likely to instantiate and preserve those conditions.
APA, Harvard, Vancouver, ISO, and other styles
10

Culnan, Mary J., and Thomas J. Carlin. "Online privacy practices in higher education." Communications of the ACM 52, no. 3 (March 2009): 126–30. http://dx.doi.org/10.1145/1467247.1467277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Lauer, Thomas W., and Xiaodong Deng. "Building online trust through privacy practices." International Journal of Information Security 6, no. 5 (July 3, 2007): 323–31. http://dx.doi.org/10.1007/s10207-007-0028-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

NORD, CATHARINA. "Architectural space as a moulding factor of care practices and resident privacy in assisted living." Ageing and Society 31, no. 6 (March 14, 2011): 934–52. http://dx.doi.org/10.1017/s0144686x10001248.

Full text
Abstract:
ABSTRACTThis article presents an analysis of privacy, care practices and architectural space in assisted living in Sweden. The presented research is a qualitative case study. Observations and personal interviews with staff as well as residents were the major data collection methods. The analysis revealed the evasiveness of a private–public dichotomy; that is, how privacy appears in public spaces and how private spaces became public under certain conditions. During the course of a day, the residents' privacy was qualified and structured by caring activities that took place in various spaces and that associated with variable distance or closeness to the staff. The study shows that individualised care practices improved privacy for the resident, and that although architectural features constrained the staff, they used a number of spatial strategies to promote the residents' privacy, for instance, in the dining room at meal times or when residents were subject to intimate care in their private rooms. Access and control are dimensions of privacy that are relevant to assisted living. The residents had more control of access to their private rooms than control of their personal space in public areas. Individualised care strengthened the residents' agency. Staff supported the residents to lead a private life in the assisted-living facility.
APA, Harvard, Vancouver, ISO, and other styles
13

Charlesworth, Andrew J. "Privacy, Personal Information and Employment." Surveillance & Society 1, no. 2 (September 1, 2002): 217–22. http://dx.doi.org/10.24908/ss.v1i2.3355.

Full text
Abstract:
It is a widely accepted proposition, reflected in privacy-enhancing legislation and regulations, that individuals will have less privacy in their workplace activities than in their private lives. However, modern technologies and business practices have blurred the boundary between private life and workplace, and a re-evaluation of the traditional legislative and regulatory protections for privacy in employment is required.
APA, Harvard, Vancouver, ISO, and other styles
14

Coppens, Paulien, Carina Veeckman, and Laurence Claeys. "Privacy in location-based social networks: privacy scripts & user practices." Journal of Location Based Services 9, no. 1 (January 2, 2015): 1–15. http://dx.doi.org/10.1080/17489725.2015.1017015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Burton, Julian. "Privacy on their terms." Canadian Journal of Children's Rights / Revue canadienne des droits des enfants 5, no. 1 (November 9, 2018): 150–72. http://dx.doi.org/10.22215/cjcr.v5i1.1256.

Full text
Abstract:
Respecting participants' privacy rights is a vital component of research ethics, but conventional practices in this area may falter when research focuses on groups whose experiences and concerns diverge from those deemed normative, or takes place in novel environments where information flows and functions in unexpected ways. This article examines the specific example of research with young people in digital social spaces, discussing how online youth communities construct and maintain privacy and arguing that choices regarding research practices should be made in response to contextualized understandings of the perspectives, practices, and experiences at play in specific digital spaces.
APA, Harvard, Vancouver, ISO, and other styles
16

Charbonneau, Deborah H. "Privacy Practices of Health Social Networking Sites." CIN: Computers, Informatics, Nursing 34, no. 8 (August 2016): 355–59. http://dx.doi.org/10.1097/cin.0000000000000249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Pfleeger, S. L., and C. P. Pfleeger. "Harmonizing privacy with security principles and practices." IBM Journal of Research and Development 53, no. 2 (March 2009): 6:1–6:12. http://dx.doi.org/10.1147/jrd.2009.5429048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Martin, David M., Richard M. Smith, Michael Brittain, Ivan Fetch, and Hailin Wu. "The privacy practices of Web browser extensions." Communications of the ACM 44, no. 2 (February 2001): 45–50. http://dx.doi.org/10.1145/359205.359226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Jin, Haojian, Hong Shen, Mayank Jain, Swarun Kumar, and Jason I. Hong. "Lean Privacy Review: Collecting Users’ Privacy Concerns of Data Practices at a Low Cost." ACM Transactions on Computer-Human Interaction 28, no. 5 (October 31, 2021): 1–55. http://dx.doi.org/10.1145/3463910.

Full text
Abstract:
Today, industry practitioners (e.g., data scientists, developers, product managers) rely on formal privacy reviews (a combination of user interviews, privacy risk assessments, etc.) in identifying potential customer acceptance issues with their organization’s data practices. However, this process is slow and expensive, and practitioners often have to make ad-hoc privacy-related decisions with little actual feedback from users. We introduce Lean Privacy Review (LPR), a fast, cheap, and easy-to-access method to help practitioners collect direct feedback from users through the proxy of crowd workers in the early stages of design. LPR takes a proposed data practice, quickly breaks it down into smaller parts, generates a set of questionnaire surveys, solicits users’ opinions, and summarizes those opinions in a compact form for practitioners to use. By doing so, LPR can help uncover the range and magnitude of different privacy concerns actual people have at a small fraction of the cost and wait-time for a formal review. We evaluated LPR using 12 real-world data practices with 240 crowd users and 24 data practitioners. Our results show that (1) the discovery of privacy concerns saturates as the number of evaluators exceeds 14 participants, which takes around 5.5 hours to complete (i.e., latency) and costs 3.7 hours of total crowd work ( $80 in our experiments); and (2) LPR finds 89% of privacy concerns identified by data practitioners as well as 139% additional privacy concerns that practitioners are not aware of, at a 6% estimated false alarm rate.
APA, Harvard, Vancouver, ISO, and other styles
20

Hartman-Caverly, Sarah, and Alexandria Chisholm. "Privacy literacy instruction practices in academic libraries: Past, present, and possibilities." IFLA Journal 46, no. 4 (August 28, 2020): 305–27. http://dx.doi.org/10.1177/0340035220956804.

Full text
Abstract:
This article explores the past, present, and possibilities of privacy and privacy literacy (PL) instruction in academic libraries. It surveys the scholarship on privacy and privacy literacy from the domains of philosophy, anthropology, history, law, education, and LIS. A privacy conceptual model is proposed demonstrating the zones of informational agency that privacy preserves, and a timeline of privacy and libraries documents key developments in privacy culture in the US. Findings from an original exploratory survey of privacy literacy instruction practices in academic libraries are discussed. The survey identifies the rationales, topics, contexts, methods, and assessments academic librarians use in delivering privacy literacy instruction, as well as barriers against privacy literacy that they encounter. The article concludes with a case study explicating the authors’ own privacy literacy instruction experiences, and specific recommendations for overcoming the barriers to delivering privacy literacy instruction in academic libraries identified in the survey findings.
APA, Harvard, Vancouver, ISO, and other styles
21

Chen, Wenhong, Gejun Huang, Joshua Miller, Kye-Hyoung Lee, Daniel Mauro, Bryan Stephens, and Xiaoqian Li. "“As We Grow, It Will Become a Priority”: American Mobile Start-Ups’ Privacy Practices." American Behavioral Scientist 62, no. 10 (July 12, 2018): 1338–55. http://dx.doi.org/10.1177/0002764218787867.

Full text
Abstract:
Privacy has become a crucial issue of the digital age, with significant social, political, and economic ramifications. A growing body of literature has dedicated to the patterns, causes, and consequences of individuals’ privacy concerns, skills, and practices. Advancing a producer’s perspective, this research draws on in-depth interviews with 45 tech entrepreneurs to examine privacy practices of mobile start-ups in the United States. Results reveal (a) factors that contribute to the problematic status of privacy issues and (b) whether and how entrepreneurs leverage privacy management as a competitive advantage. Results show that data are widely seen by entrepreneurs as a potentially profitable asset. Privacy practices are networked and thus pose challenges for privacy management as different parties may have different privacy practices. Fast-moving technologies often leave government regulations behind, making them look outdated or irrelevant to many entrepreneurs. For most start-ups not specialized in identity, privacy, or anonymity service, privacy is neither a core business strategy nor a top concern. Only a few mobile ventures have leveraged privacy management as a competitive advantage and designed their products from the ground up concerned about privacy. Most entrepreneurs adopt a building-the-plane-while-flying-it approach: as business grows, privacy policies and practices would evolve. Many entrepreneurs fail to recognize the significance of privacy policies and practices as they lack the awareness, bandwidth, and capacity. Growth and monetization pressures from investors are perceived as more urgent and important than privacy and security issues. Offering a richer account of the power structure that shapes mobile entrepreneurs’ privacy practices and their challenges of managing privacy in a data-driven digital economy, our work advances the existing literature dominated by stories of the individual consumers.
APA, Harvard, Vancouver, ISO, and other styles
22

Culnan, Mary J. "Protecting Privacy Online: Is Self-Regulation Working?" Journal of Public Policy & Marketing 19, no. 1 (April 2000): 20–26. http://dx.doi.org/10.1509/jppm.19.1.20.16944.

Full text
Abstract:
The author assesses the extent to which 361 consumer-oriented commercial Web sites post disclosures that describe their information practices and whether these disclosures reflect fair information practices. Although approximately 67% of the sites sampled post a privacy disclosure, only 14% of these disclosures constitute a comprehensive privacy policy. The study was initiated by the private sector as a progress report to the Federal Trade Commission (FTC) and is one in a series of efforts designed to assess whether consumer privacy can be protected through industry self-regulation or whether legislation is required. Although the FTC does not recommend legislation at this time, the study suggests that an effective self-regulatory regime for consumer privacy online has yet to emerge.
APA, Harvard, Vancouver, ISO, and other styles
23

McQuay, Terry, and Ann Cavoukian. "A pragmatic approach to privacy risk optimization: privacy by design for business practices." Identity in the Information Society 3, no. 2 (July 11, 2010): 379–96. http://dx.doi.org/10.1007/s12394-010-0067-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Parsons, Christopher. "Beyond Privacy: Articulating the Broader Harms of Pervasive Mass Surveillance." Media and Communication 3, no. 3 (October 20, 2015): 1–11. http://dx.doi.org/10.17645/mac.v3i3.263.

Full text
Abstract:
This article begins by recounting a series of mass surveillance practices conducted by members of the “Five Eyes” spying alliance. While boundary- and intersubjectivity-based theories of privacy register some of the harms linked to such practices I demonstrate how neither are holistically capable of registering these harms. Given these theories’ deficiencies I argue that critiques of signals intelligence surveillance practices can be better grounded on why the practices intrude on basic communicative rights, including those related to privacy. The crux of the argument is that pervasive mass surveillance erodes essential boundaries between public and private spheres by compromising populations’ abilities to freely communicate with one another and, in the process, erodes the integrity of democratic processes and institutions. Such erosions are captured as privacy violations but, ultimately, are more destructive to the fabric of society than are registered by theories of privacy alone. After demonstrating the value of adopting a communicative rights approach to critique signals intelligence surveillance I conclude by arguing that this approach also lets us clarify the international normative implications of such surveillance, that it provides a novel way of conceptualizing legal harm linked to the surveillance, and that it showcases the overall value of focusing on the implications of interfering with communications first, and as such interferences constituting privacy violations second. Ultimately, by adopting this Habermasian inspired mode of analysis we can develop more holistic ways of conceptualizing harms associated with signals intelligence practices than are provided by either boundary- or intersubjective-based theories of privacy.
APA, Harvard, Vancouver, ISO, and other styles
25

Hosseini, Henry, Martin Degeling, Christine Utz, and Thomas Hupperich. "Unifying Privacy Policy Detection." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (July 23, 2021): 480–99. http://dx.doi.org/10.2478/popets-2021-0081.

Full text
Abstract:
Abstract Privacy policies have become a focal point of privacy research. With their goal to reflect the privacy practices of a website, service, or app, they are often the starting point for researchers who analyze the accuracy of claimed data practices, user understanding of practices, or control mechanisms for users. Due to vast differences in structure, presentation, and content, it is often challenging to extract privacy policies from online resources like websites for analysis. In the past, researchers have relied on scrapers tailored to the specific analysis or task, which complicates comparing results across different studies. To unify future research in this field, we developed a toolchain to process website privacy policies and prepare them for research purposes. The core part of this chain is a detector module for English and German, using natural language processing and machine learning to automatically determine whether given texts are privacy or cookie policies. We leverage multiple existing data sets to refine our approach, evaluate it on a recently published longitudinal corpus, and show that it contains a number of misclassified documents. We believe that unifying data preparation for the analysis of privacy policies can help make different studies more comparable and is a step towards more thorough analyses. In addition, we provide insights into common pitfalls that may lead to invalid analyses.
APA, Harvard, Vancouver, ISO, and other styles
26

Barbosa, Natã M., Joon S. Park, Yaxing Yao, and Yang Wang. "“What if?” Predicting Individual Users’ Smart Home Privacy Preferences and Their Changes." Proceedings on Privacy Enhancing Technologies 2019, no. 4 (October 1, 2019): 211–31. http://dx.doi.org/10.2478/popets-2019-0066.

Full text
Abstract:
Abstract Smart home devices challenge a long-held notion that the home is a private and protected place. With this in mind, many developers market their products with a focus on privacy in order to gain user trust, yet privacy tensions arise with the growing adoption of these devices and the risk of inappropriate data practices in the smart home (e.g., secondary use of collected data). Therefore, it is important for developers to consider individual user preferences and how they would change under varying circumstances, in order to identify actionable steps towards developing user trust and exercising privacy-preserving data practices. To help achieve this, we present the design and evaluation of machine learning models that predict (1) personalized allow/deny decisions for different information flows involving various attributes, purposes, and devices (AUC .868), (2) what circumstances may change original decisions (AUC .899), and (3) how much (US dollars) one may be willing to pay or receive in exchange for smart home privacy (RMSE 12.459). We show how developers can use our models to derive actionable steps toward privacy-preserving data practices in the smart home.
APA, Harvard, Vancouver, ISO, and other styles
27

Odella, Francesca. "Privacy Awareness and the Networking Generation." International Journal of Technoethics 9, no. 1 (January 2018): 51–70. http://dx.doi.org/10.4018/ijt.2018010105.

Full text
Abstract:
The article discusses the social and privacy implications of children's access to the internet and to information technologies of communication (ITCS) services. The growing rate of children online represents an epochal change for issues related to their personal safety and protection, as well as for their privacy rights and chances of improved life. In order to better understand the long term privacy implications of these phenomena the discussion reviews sociological studies that have investigated the structure of friendships networks among adolescents, and describes theoretical frames adopted in analysing social practices concerning the private sphere. Results of these studies provide clues on how interpersonal online relations are structured and how attitudes and practices circulate across and inside different social settings. Finally, implications for privacy issues related to the upcoming Internet of Things (IoT) are debated using the case of ethical design in engineering as an alternative option to the control option exercised by governments and companies.
APA, Harvard, Vancouver, ISO, and other styles
28

Sheehan, Kim Bartel, and Timothy W. Gleason. "Online Privacy: Internet Advertising Practitioners' Knowledge and Practices." Journal of Current Issues & Research in Advertising 23, no. 1 (March 2001): 31–41. http://dx.doi.org/10.1080/10641734.2001.10505112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Dowling, Thomas. "Protecting patron privacy: Safe practices for public computers." Technical Services Quarterly 33, no. 2 (March 21, 2016): 214–15. http://dx.doi.org/10.1080/07317131.2016.1135018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Dewi, Sinta. "Balancing privacy rights and legal enforcement: Indonesian practices." International Journal of Liability and Scientific Enquiry 5, no. 3/4 (2012): 232. http://dx.doi.org/10.1504/ijlse.2012.051961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Weber, R. H. "Privacy management practices in the proposed EU regulation." International Data Privacy Law 4, no. 4 (September 4, 2014): 290–97. http://dx.doi.org/10.1093/idpl/ipu018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Smith, H. Jeff, Sandra J. Milberg, and Sandra J. Burke. "Information Privacy: Measuring Individuals' Concerns about Organizational Practices." MIS Quarterly 20, no. 2 (June 1996): 167. http://dx.doi.org/10.2307/249477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Schellenberg, Kathryn. "Police Information Systems, Information Practices and Individual Privacy." Canadian Public Policy / Analyse de Politiques 23, no. 1 (March 1997): 23. http://dx.doi.org/10.2307/3552129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Millar, Sheila A. "Privacy and security: Best practices for global security." Journal of International Trade Law and Policy 5, no. 1 (May 31, 2006): 36–49. http://dx.doi.org/10.1108/14770020680000539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

ROTFELD, HERBERT JACK. "Privacy Crimes, Annoyances and Self-Defeating Business Practices." Journal of Consumer Affairs 43, no. 3 (September 2009): 538–42. http://dx.doi.org/10.1111/j.1745-6606.2009.01154.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Wang, Shu-Ching, and Jen-Her Wu. "Proactive privacy practices in transition: Toward ubiquitous services." Information & Management 51, no. 1 (January 2014): 93–103. http://dx.doi.org/10.1016/j.im.2013.09.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Karyda, Maria, Stefanos Gritzalis, Jong Hyuk Park, and Spyros Kokolakis. "Privacy and fair information practices in ubiquitous environments." Internet Research 19, no. 2 (April 3, 2009): 194–208. http://dx.doi.org/10.1108/10662240910952346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Schwaig, Kathy Stewart, Gerald C. Kane, and Veda C. Storey. "Privacy, fair information practices and the fortune 500." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 36, no. 1 (February 7, 2005): 49–63. http://dx.doi.org/10.1145/1047070.1047075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Bui, Duc, Kang G. Shin, Jong-Min Choi, and Junbum Shin. "Automated Extraction and Presentation of Data Practices in Privacy Policies." Proceedings on Privacy Enhancing Technologies 2021, no. 2 (January 29, 2021): 88–110. http://dx.doi.org/10.2478/popets-2021-0019.

Full text
Abstract:
Abstract Privacy policies are documents required by law and regulations that notify users of the collection, use, and sharing of their personal information on services or applications. While the extraction of personal data objects and their usage thereon is one of the fundamental steps in their automated analysis, it remains challenging due to the complex policy statements written in legal (vague) language. Prior work is limited by small/generated datasets and manually created rules. We formulate the extraction of fine-grained personal data phrases and the corresponding data collection or sharing practices as a sequence-labeling problem that can be solved by an entity-recognition model. We create a large dataset with 4.1k sentences (97k tokens) and 2.6k annotated fine-grained data practices from 30 real-world privacy policies to train and evaluate neural networks. We present a fully automated system, called PI-Extract, which accurately extracts privacy practices by a neural model and outperforms, by a large margin, strong rule-based baselines. We conduct a user study on the effects of data practice annotation which highlights and describes the data practices extracted by PI-Extract to help users better understand privacy-policy documents. Our experimental evaluation results show that the annotation significantly improves the users’ reading comprehension of policy texts, as indicated by a 26.6% increase in the average total reading score.
APA, Harvard, Vancouver, ISO, and other styles
40

LaMonica, Haley M., Anna E. Roberts, Grace Yeeun Lee, Tracey A. Davenport, and Ian B. Hickie. "Privacy Practices of Health Information Technologies: Privacy Policy Risk Assessment Study and Proposed Guidelines." Journal of Medical Internet Research 23, no. 9 (September 16, 2021): e26317. http://dx.doi.org/10.2196/26317.

Full text
Abstract:
Background Along with the proliferation of health information technologies (HITs), there is a growing need to understand the potential privacy risks associated with using such tools. Although privacy policies are designed to inform consumers, such policies have consistently been found to be confusing and lack transparency. Objective This study aims to present consumer preferences for accessing privacy information; develop and apply a privacy policy risk assessment tool to assess whether existing HITs meet the recommended privacy policy standards; and propose guidelines to assist health professionals and service providers with understanding the privacy risks associated with HITs, so that they can confidently promote their safe use as a part of care. Methods In phase 1, participatory design workshops were conducted with young people who were attending a participating headspace center, their supportive others, and health professionals and service providers from the centers. The findings were knowledge translated to determine participant preferences for the presentation and availability of privacy information and the functionality required to support its delivery. Phase 2 included the development of the 23-item privacy policy risk assessment tool, which incorporated material from international privacy literature and standards. This tool was then used to assess the privacy policies of 34 apps and e-tools. In phase 3, privacy guidelines, which were derived from learnings from a collaborative consultation process with key stakeholders, were developed to assist health professionals and service providers with understanding the privacy risks associated with incorporating HITs as a part of clinical care. Results When considering the use of HITs, the participatory design workshop participants indicated that they wanted privacy information to be easily accessible, transparent, and user-friendly to enable them to clearly understand what personal and health information will be collected and how these data will be shared and stored. The privacy policy review revealed consistently poor readability and transparency, which limited the utility of these documents as a source of information. Therefore, to enable informed consent, the privacy guidelines provided ensure that health professionals and consumers are fully aware of the potential for privacy risks in using HITs to support health and well-being. Conclusions A lack of transparency in privacy policies has the potential to undermine consumers’ ability to trust that the necessary measures are in place to secure and protect the privacy of their personal and health information, thus precluding their willingness to engage with HITs. The application of the privacy guidelines will improve the confidence of health professionals and service providers in the privacy of consumer data, thus enabling them to recommend HITs to provide or support care.
APA, Harvard, Vancouver, ISO, and other styles
41

Shipp, Laura, and Jorge Blasco. "How private is your period?: A systematic analysis of menstrual app privacy policies." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (October 1, 2020): 491–510. http://dx.doi.org/10.2478/popets-2020-0083.

Full text
Abstract:
AbstractMenstruapps are mobile applications that can track a user’s reproductive cycle, sex life and health in order to provide them with algorithmically derived insights into their body. These apps are now hugely popular, with the most favoured boasting over 100 million downloads. In this study, we investigate the privacy practices of a set of 30 Android menstruapps, a set which accounts for nearly 200 million downloads.We measured how the apps present information and behave on a number of privacy related topics, such as the complexity of the language used, the information collected by them, the involvement of third parties and how they describe user rights. Our results show that while common pieces of personal data such as name, email, etc. are treated appropriately by most applications, reproductive-related data is not covered by the privacy policies and in most cases, completely disregarded, even when it is required for the apps to work. We have informed app developers of our findings and have tried to engage them in dialogue around improving their privacy practices.
APA, Harvard, Vancouver, ISO, and other styles
42

Hollenbaugh, Erin E. "Privacy Management Among Social Media Natives: An Exploratory Study of Facebook and Snapchat." Social Media + Society 5, no. 3 (April 2019): 205630511985514. http://dx.doi.org/10.1177/2056305119855144.

Full text
Abstract:
Guided by communication privacy management theory, this study tested network size, network diversity, privacy concerns, and privacy management practices in and between Facebook and Snapchat for social media natives. A cross-sectional survey of 273 college students (predominately Caucasian, female, 18- to 20 years old) showed that audiences were larger and more diverse in Facebook than Snapchat. Snapchat users with larger friend lists and lower privacy concerns reported more shared boundary ownership, whereas those with more diverse networks reportedly used more open friending practices to expand their connections. Higher privacy concerns were related to more restrictive privacy management practices in both mediums, and participants were overall more open on Snapchat than on Facebook. Theoretical and practical implications were presented in efforts to inform future research.
APA, Harvard, Vancouver, ISO, and other styles
43

König, Katharina, and Florence Oloff. "Mobile Medienpraktiken im Spannungsfeld von Öffentlichkeit, Privatheit und Anonymität." Journal für Medienlinguistik 2, no. 2 (September 27, 2019): 1–27. http://dx.doi.org/10.21248/jfml.2019.9.

Full text
Abstract:
This contribution aims to describe privacy, publicness and anonymity as essential dimensions for doing media linguistics. These dimensions are not inherent in and predetermined by the technical features and forms of communication, but are used by the participants as an orientation grid for shaping their online and offline practices in and with mobile media. Considering both mobile media use in the public realm and the dissemination of increasingly private content in social media (which is said to lead to ‘blurred boundaries’ between the private and the public), this paper provides a brief overview of the main developments in mobile media research. Studies adopting various approaches – e.g. sociological-ethnographic, linguistic and media studies – illustrate how privacy, publicness and anonymity are actively shaped and brought about by mobile media users. These observations indicate that the concepts of privacy and publicness have not lost their meaning but media linguistics should study the emergence of new multimodal practices by which they are framed and accomplished.
APA, Harvard, Vancouver, ISO, and other styles
44

König, Katharina, and Florence Oloff. "Mobile Medienpraktiken im Spannungsfeld von Öffentlichkeit, Privatheit und Anonymität." Journal für Medienlinguistik 2, no. 2 (September 27, 2019): 1–27. http://dx.doi.org/10.21248/jfml.2019.9.

Full text
Abstract:
This contribution aims to describe privacy, publicness and anonymity as essential dimensions for doing media linguistics. These dimensions are not inherent in and predetermined by the technical features and forms of communication, but are used by the participants as an orientation grid for shaping their online and offline practices in and with mobile media. Considering both mobile media use in the public realm and the dissemination of increasingly private content in social media (which is said to lead to ‘blurred boundaries’ between the private and the public), this paper provides a brief overview of the main developments in mobile media research. Studies adopting various approaches – e.g. sociological-ethnographic, linguistic and media studies – illustrate how privacy, publicness and anonymity are actively shaped and brought about by mobile media users. These observations indicate that the concepts of privacy and publicness have not lost their meaning but media linguistics should study the emergence of new multimodal practices by which they are framed and accomplished.
APA, Harvard, Vancouver, ISO, and other styles
45

Kitsos, Panagiotis, and Aikaterini Yannoukakou. "Privacy in the 21st Century." International Journal of E-Politics 4, no. 3 (July 2013): 15–29. http://dx.doi.org/10.4018/jep.2013070102.

Full text
Abstract:
The events of 9/11 along with the bombarding in Madrid and London forced governments to resort to new structures of privacy safeguarding and electronic surveillance under the common denominator of terrorism and transnational crime fighting. Legislation as US PATRIOT Act and EU Data Retention Directive altered fundamentally the collection, processing and sharing methods of personal data, while it granted increased powers to police and law enforcement authorities concerning their jurisdiction in obtaining and processing personal information to an excessive degree. As an aftermath of the resulted opacity and the public outcry, a shift is recorded during the last years towards a more open governance by the implementation of open data and cloud computing practices in order to enhance transparency and accountability from the side of governments, restore the trust between the State and the citizens, and amplify the citizens' participation to the decision-making procedures. However, privacy and personal data protection are major issues in all occasions and, thus, must be safeguarded without sacrificing national security and public interest on one hand, but without crossing the thin line between protection and infringement on the other. Where this delicate balance stands, is the focal point of this paper trying to demonstrate that it is better to be cautious with open practices than hostage of clandestine practices.
APA, Harvard, Vancouver, ISO, and other styles
46

Adorjan, Michael, and Rosemary Ricciardelli. "A New Privacy Paradox? Youth Agentic Practices of Privacy Management Despite “Nothing to Hide” Online." Canadian Review of Sociology/Revue canadienne de sociologie 56, no. 1 (January 15, 2019): 8–29. http://dx.doi.org/10.1111/cars.12227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Barhamgi, Mahmoud, Arosha K. Bandara, Yijun Yu, Khalid Belhajjame, and Bashar Nuseibeh. "Protecting Privacy in the Cloud: Current Practices, Future Directions." Computer 49, no. 2 (February 2016): 68–72. http://dx.doi.org/10.1109/mc.2016.59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Dias, Gonçalo Paiva, Hélder Gomes, and André Zúquete. "Privacy policies and practices in Portuguese local e-government." Electronic Government, an International Journal 12, no. 4 (2016): 301. http://dx.doi.org/10.1504/eg.2016.080430.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Zúquete, André, Gonçalo Paiva Dias, and Hélder Gomes. "Privacy policies and practices in Portuguese local e-government." Electronic Government, an International Journal 12, no. 4 (2016): 301. http://dx.doi.org/10.1504/eg.2016.10001404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Kemp, Katharine. "Concealed data practices and competition law: why privacy matters." European Competition Journal 16, no. 2-3 (September 1, 2020): 628–72. http://dx.doi.org/10.1080/17441056.2020.1839228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography