Academic literature on the topic 'Privacy, Right of Australia'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy, Right of Australia.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Privacy, Right of Australia"

1

Gronow, Alexandra. "Identifying victims of sexual harassment in the age of #MeToo: Time for the media to prioritise a victim’s right to privacy." Alternative Law Journal 46, no. 2 (March 25, 2021): 120–27. http://dx.doi.org/10.1177/1037969x211003681.

Full text
Abstract:
This article explores the practice of the media to unreasonably intrude on victims' privacy in Australia by reference to three women whose sexual harassment grievances were published by the media without their consent. This article argues that the protection of a victim’s privacy is a fundamental human right which should trump competing public interest considerations in the Australian context. In the absence of an established tort of privacy or bill or charter of human rights in Australia, the media must apply ethical journalism standards and abstain from identifying victims of sexual harassment without their consent.
APA, Harvard, Vancouver, ISO, and other styles
2

Sullivan, Clare. "Digital Citizenship and the Right to Identity in Australia." Federal Law Review 41, no. 3 (September 2013): 557–84. http://dx.doi.org/10.22145/flr.41.3.7.

Full text
Abstract:
Australia has announced the need to review the distribution of responsibility among individuals, businesses and governments, as a consequence of the move to digital citizenship. Australia has formally framed the issues in these terms and has opened dialogue between government and citizens regarding responsibilities for the use and protection of digital identity. This article examines digital citizenship in Australia and considers the implications for individuals, government and the private sector of the requirement for an individual to use his/her digital identity for transactions. The features and functions of digital identity are examined, and the consequences for individuals, business and government of system failure are considered. The analysis shows that, while there are consequences for all, individuals are most affected. The author argues that the traditional approach of relying on privacy for protection is inadequate in these circumstances. Privacy, by its nature, cannot adequately protect the part of digital identity which is required for transactions. The argument presented is that, unlike privacy, the right to identity can protect the set of digital information required for transactions. Considering the new system is literally being imposed by government, the inherent vulnerabilities of the system, and the consequences of system failure for individuals, formal recognition of the right to identity is an essential element of accountable and responsible governance. Whilst in time the right to identity in this context may be recognised by the courts, the author argues that legislative recognition and protection of an individual's right to digital identity is needed now as a key component of the distribution of responsibility in this new digital era.
APA, Harvard, Vancouver, ISO, and other styles
3

Nicholls, Rob. "Right to Privacy: Telephone Interception and Access in Australia." IEEE Technology and Society Magazine 31, no. 1 (2012): 42–49. http://dx.doi.org/10.1109/mts.2012.2185274.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

van Dissel, B. M. P. "Social media and the employee's right to privacy in Australia." International Data Privacy Law 4, no. 3 (July 2, 2014): 222–34. http://dx.doi.org/10.1093/idpl/ipu015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dawson, Sophie, and Emma Croft. "Missing (in) Action: Where Are the Australian Data Breach Class Actions?" Global Privacy Law Review 3, Issue 3 (September 1, 2022): 190–94. http://dx.doi.org/10.54648/gplr2022019.

Full text
Abstract:
Data breach class actions have been a feature of the privacy landscape in the US and UK since as early as 2002. While Australia has experienced a surge in regulatory actions brought in respect of data breaches, we have yet to see an uptick in consumer actions in Australia. An action was brought in 2018, however it settled prior to receiving judicial consideration. This article provides some examples of the difficulties of bringing such actions in Australia, both at a substantive and procedural law level. We also highlight some proposed upcoming legislative changes which may have an impact in this space, including the proposed introduction of a tort of privacy and direct right of action in respect of interferences with privacy under the Privacy Act 1988 (Cth) (Privacy Act). Privacy, Data, Breach, Cybersecurity, Australia, Litigation, Court, Class Action, Reform
APA, Harvard, Vancouver, ISO, and other styles
6

Cooper-Boast, Amy, and Brooke Hall-Carney. "Lloyd v. Google LLC, and How Australia Is Tackling Privacy and Data Breach Litigation." Global Privacy Law Review 3, Issue 3 (September 1, 2022): 195–99. http://dx.doi.org/10.54648/gplr2022020.

Full text
Abstract:
The much-anticipated judgment of the UK Supreme Court in Lloyd v. Google LLC [2021] UKSC 50; [2021] 3 WLR 1268 was handed down in November 2021. The decision challenges the notion that one’s data and its loss of control has an inherent value which is actionable in its own right. It is welcomed by Big Tech, other organizations that control data, and their insurers. The decision is a key case in the broader landscape of accountability of technology companies and is indicative of the disparity in data protection and privacy rights across different jurisdictions. This case note examines the key points arising from the case, and the comparable landscape for privacy and data breach litigation in Australia. Lloyd v. Google, Google, Privacy, Data Breach, Data Protection, Litigation, Australia, United Kingdom, Class Action
APA, Harvard, Vancouver, ISO, and other styles
7

Harris, Bede. "Human Rights and the Same-Sex Marriage Debate in Australia." Journal of Politics and Law 10, no. 4 (August 30, 2017): 60. http://dx.doi.org/10.5539/jpl.v10n4p60.

Full text
Abstract:
Australia is currently confronting the issue of whether to legalise same-sex marriage. Thus far debate has been conducted with little reference to human rights theory. This article draws on the theories of John Rawls and John Stuart Mill and analyses whether, by confining the right to marry to heterosexual couples, the law infringes the right to privacy and, conversely, whether the legalisation of same-sex marriage would infringe religious rights of those who are unwilling to provide goods and services to same-sex couples. In so doing, the article adopts a comparative approach, drawing on case law from the United States. The article examines the way in which political debate on the issue has been conducted by the major parties in Australia, and concludes that both the Liberal-National coalition and the Labor party have been motivated by a desire to appease the religious right within their ranks, at the expense of human rights principles.
APA, Harvard, Vancouver, ISO, and other styles
8

Petrie, Nicholas. "Reforming the Remedy: Getting the Right Remedial Structure to Protect Personal Privacy." Deakin Law Review 17, no. 1 (October 1, 2012): 121. http://dx.doi.org/10.21153/dlr2012vol17no1art71.

Full text
Abstract:
Politicians, journalists and academics have exhausted many hours over the last decade debating the question of whether Australia should have a statutory cause of action for invasion of personal privacy. In the midst of this ongoing debate, a simple question has often been overlooked: what remedies should be available to a person whose privacy been breached? In posing and answering that question, it is argued that a wide range of remedies for intrusions of personal privacy should be available to the courts. Perhaps most controversially, the author asserts that exemplary damages, which aim to punish defendants and deter future breaches of the law, should be available for the most heinous breaches of personal privacy.
APA, Harvard, Vancouver, ISO, and other styles
9

Heemsbergen, Luke, and Angela Daly. "Leaking Boats and Borders: The virtu of surveilling Australia’s refugee population." Surveillance & Society 15, no. 3/4 (June 11, 2017): 389–96. http://dx.doi.org/10.24908/ss.v15i3/4.6629.

Full text
Abstract:
When refugees displaced to Australia’s offshore detention do speak, it is through surveillance upended through publicity and violations of privacy. Weak legal rights to privacy in Australia juxtapose the increasing secrecy under which the Australian state operates its own offshore detention centres (Manus Island and Nauru) while increasing the mandate of data retention at home. Australia’s institutional context offers visibility to these concerns of surveillance whereby we find an acceleration of prohibitive privacy for government and prohibitive transparency for individuals. Our analysis of this country synthesises media-law in practice with theories of mediated visibility (Flyverbom 2016, 2017; Brighenti 2010), to understand Australian privacy, media and immigration law in the context of pervasive surveillance and the radical management of visibility. Our contribution speaks to applicable privacy concerns for states grappling with invasive data collection and its relation to the (prohibiting of the private) voice of the surveilled, which we see as doubly acute for those left vulnerable in Australia’s borderzones.
APA, Harvard, Vancouver, ISO, and other styles
10

Akel, William. "Privacy and the global media in the information age." Pacific Journalism Review : Te Koakoa 13, no. 1 (April 1, 2007): 40–57. http://dx.doi.org/10.24135/pjr.v13i1.883.

Full text
Abstract:
The protection of privacy is being increasingly recognised worldwide by the courts, and media regulators, as a result of what is seen as a more powerful and intrusive media, and the effect of the internet. A right to privacy may even apply in a public place. This article examines the impact this has on the media in the information age? New Zealand now has a tort of interference with privacy. The criminal courts are also considering privacy values in issues ranging from suppression orders to release of court information to the public. The Broadcasting Standards Authority has revised its privacy principles. Codes of conduct with regard to the print media also acknowledge privacy. But the protection of privacy has its genesis in the 1890s and not in the digital age. A seminal article by Warren and Brandeis, ‘The Right to Privacy’ (1890), was a reaction to what was at that time seen as an over-powerful media. United States jurisprudence evolved to the Prosser and Keeton formulation in the 1960s. New Zealand jurisprudence has relied on this formulation to advance privacy rights. The English courts have taken a similar approach in the much publicised Douglas v Hello! and Naomi Campbell cases. The European courts, as a reaction to an overactive paparazzi, have pushed the bounds of privacy in the Peck and Princess Caroline cases. The High Court of Australia considered privacy in Lenah Game Meats Pty Ltd. Finally, the International Covenants and protection of privacy.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Privacy, Right of Australia"

1

Gibb, Susan Jennifer. "Privacy and Australian law." Title page, contents and abstract only, 1987. http://web4.library.adelaide.edu.au/theses/09PH/09phg4372.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sato, Keiko. "Privacy on the internet : Investigation into corporate privacy policy of Australian large private sector organisations on the internet." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2001. https://ro.ecu.edu.au/theses/1032.

Full text
Abstract:
The popularity of the Internet has been dramatically increased over recent years. The rapid growth of this technology and its international use has made it almost impossible to regulate the internet. As a result, the Internet has certainly provided freedoms to people and it has led to some abusing systems. Privacy is one of the major issues in the development of Electronic Commerce using the Internet. As an enormous amount of personal information is transmitted to several hosts connecting to the Internet, the information can be accessed by both authorised and unauthorised people. Although it is certain that there are several existing problems of using the Internet for business activities, many organisations have already started using it. It is believed that the Internet provides efficiency and effectiveness for various activities Although much research has been described the business use of the Internet in many countries, these studies have not specifically investigated Australian organisations. Therefore, this research investigates the current use of the Internet by Australian organisations and their associated privacy policies, as a means of seeking their privacy concerns. Using a benchmark provided by Australian privacy commissioners, it evaluates their privacy policies to see how well they are established to protect privacy of users. The study utilises the top 100 Australian large private sector organisations as the sample. The current practice of the sample organisations on the Internet was observed by exploring their Web sites. Privacy policies were also collected from their Web sites. Moreover, a letter requesting corporate privacy policy was sent to each organisation that collects personal information on the Internet. The result showed that the majority of Australian organisations were using the Internet today, but a surprisingly few organisations showed their privacy policy on the Internet. Also, this research showed that many organisations did not actually have a corporate privacy policy. Many organisations are using the Internet without apparent concern for customers' privacy. The organisations proactively involved in the Internet Commerce are more concerned about security side of the Internet. Hence, they appear to believe that the technology itself protects information sent on the Internet. It has become clear that technology by itself does not provide the security needed for users of the Internet as unethical act of authorised parties could harm privacy of individuals. There is an argument that the Internet needs to be regulated. However, the process of international regulation on the Internet has not been started. Thus, it is ideal that organisations proactively protect clients' personal information accessible by the use of the Internet technology. This study looks at the methods of obtaining privacy of individuals and suggests the ideal conduct of organisations.
APA, Harvard, Vancouver, ISO, and other styles
3

Watt, James Robert. "Electronic workplace surveillance and employee privacy : a comparative analysis of privacy protection in Australia and the United States." Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/26536/1/James_Watt_Thesis.pdf.

Full text
Abstract:
More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D. Brandeis highlighted the challenges posed to individual privacy by advancing technology. Today’s workplace is characterised by its reliance on computer technology, particularly the use of email and the Internet to perform critical business functions. Increasingly these and other workplace activities are the focus of monitoring by employers. There is little formal regulation of electronic monitoring in Australian or United States workplaces. Without reasonable limits or controls, this has the potential to adversely affect employees’ privacy rights. Australia has a history of legislating to protect privacy rights, whereas the United States has relied on a combination of constitutional guarantees, federal and state statutes, and the common law. This thesis examines a number of existing and proposed statutory and other workplace privacy laws in Australia and the United States. The analysis demonstrates that existing measures fail to adequately regulate monitoring or provide employees with suitable remedies where unjustifiable intrusions occur. The thesis ultimately supports the view that enacting uniform legislation at the national level provides a more effective and comprehensive solution for both employers and employees. Chapter One provides a general introduction and briefly discusses issues relevant to electronic monitoring in the workplace. Chapter Two contains an overview of privacy law as it relates to electronic monitoring in Australian and United States workplaces. In Chapter Three there is an examination of the complaint process and remedies available to a hypothetical employee (Mary) who is concerned about protecting her privacy rights at work. Chapter Four provides an analysis of the major themes emerging from the research, and also discusses the draft national uniform legislation. Chapter Five details the proposed legislation in the form of the Workplace Surveillance and Monitoring Act, and Chapter Six contains the conclusion.
APA, Harvard, Vancouver, ISO, and other styles
4

Watt, James Robert. "Electronic workplace surveillance and employee privacy : a comparative analysis of privacy protection in Australia and the United States." Queensland University of Technology, 2009. http://eprints.qut.edu.au/26536/.

Full text
Abstract:
More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D. Brandeis highlighted the challenges posed to individual privacy by advancing technology. Today’s workplace is characterised by its reliance on computer technology, particularly the use of email and the Internet to perform critical business functions. Increasingly these and other workplace activities are the focus of monitoring by employers. There is little formal regulation of electronic monitoring in Australian or United States workplaces. Without reasonable limits or controls, this has the potential to adversely affect employees’ privacy rights. Australia has a history of legislating to protect privacy rights, whereas the United States has relied on a combination of constitutional guarantees, federal and state statutes, and the common law. This thesis examines a number of existing and proposed statutory and other workplace privacy laws in Australia and the United States. The analysis demonstrates that existing measures fail to adequately regulate monitoring or provide employees with suitable remedies where unjustifiable intrusions occur. The thesis ultimately supports the view that enacting uniform legislation at the national level provides a more effective and comprehensive solution for both employers and employees. Chapter One provides a general introduction and briefly discusses issues relevant to electronic monitoring in the workplace. Chapter Two contains an overview of privacy law as it relates to electronic monitoring in Australian and United States workplaces. In Chapter Three there is an examination of the complaint process and remedies available to a hypothetical employee (Mary) who is concerned about protecting her privacy rights at work. Chapter Four provides an analysis of the major themes emerging from the research, and also discusses the draft national uniform legislation. Chapter Five details the proposed legislation in the form of the Workplace Surveillance and Monitoring Act, and Chapter Six contains the conclusion.
APA, Harvard, Vancouver, ISO, and other styles
5

Schindeler, Emily Martha. "A genealogy of the problematic of homelessness and the homeless in Australia." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/32068/1/Emily_Schindeler_Thesis.pdf.

Full text
Abstract:
The homeless have been subject to considerable scrutiny, historically and within current social, political and public discourse. The aetiology of homelessness has been the focus of a large body of economic, sociological, historical and political investigation. Importantly, efforts to conceptualise, explain and measure, the phenomenon of homelessness and homeless people has occurred largely within the context of defining “the problem of the homeless” and the generation of solutions to the ‘problem’. There has been little consideration of how and why homelessness has come to be seen, or understood, as a problem, or how this can change across time and/or place. This alternative stream of research has focused on tracing and analysing the relationship between how people experiencing homeless have become a matter of government concern and the manner in which homelessness itself has been problematised. With this in mind this study has analysed the discourses - political, social and economic rationalities and knowledges - which have provided the conditions of possibility for the identification of the homeless and homelessness as a problem needing to be governed and the means for translating these discourses into the applied domain. The aim of this thesis has been to contribute to current knowledge by developing a genealogy of the conditions and rationalities that have underpinned the problematisation of homelessness and the homeless. The outcome of this analysis has been to open up the opportunity to consider alternative governmental possibilities arising from the exposure of the way in which contemporary problematisation and responses have been influenced by the past. An understanding of this process creates an ability to appreciate the intended and unintended consequences for the future direction of public policy and contemporary research.
APA, Harvard, Vancouver, ISO, and other styles
6

Tao, Ran. "The Right to Privacy." Scholarship @ Claremont, 2019. https://scholarship.claremont.edu/scripps_theses/1338.

Full text
Abstract:
Contemporary debates about the right to privacy were inaugurated by Samuel Warren and Louis Brandeis’ article on the topic. While Warren and Brandeis understand the right to privacy as a stand-alone right, J. J. Thomson interprets it as a cluster of rights that itself intersects with other rights. Despite such disagreement, both accounts point to a deep connection between property rights and one’s right to herself. A close examination of the Lockean and Kantian concepts of property confirms this. In particular, Arthur Ripstein’s Kantian account of innate right and property rights suggests that property rights are derived from the innate right one has in herself. Building on this account, I suggest that one’s innate right and property rights grant one the exclusive control to herself and to her property. Such exclusive control can be conceptualized as the basis for one’s privileged space, any unauthorized access to which and any unauthorized use of what lies within which constitute violation of one’s right to privacy.
APA, Harvard, Vancouver, ISO, and other styles
7

Lander, Angelina M. "Privacy, surveillance and the state a comparison of U.S. and British privacy rights /." Orlando, Fla. : University of Central Florida, 2009. http://purl.fcla.edu/fcla/etd/CFE0002772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wolfson, Susan Ann. "The right to privacy and education." Thesis, University College London (University of London), 1989. http://discovery.ucl.ac.uk/10019704/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Rawashdeh, Sami H. "Is privacy brought home? : criminal justice and the right to privacy." Thesis, University of Aberdeen, 2003. http://digitool.abdn.ac.uk/R?func=search-advanced-go&find_code1=WSN&request1=AAIU176274.

Full text
Abstract:
This thesis is concerned with protection of the right to privacy in the English and Scottish criminal justice systems. The aim of this research is to consider the extent to which privacy has been recognised in both criminal justice systems. It analyses the extent to which the right to privacy is protected by the substantive criminal law of those jurisdictions, as well as in their criminal procedural law. A part of the examination will address the question of whether there should be a criminal offence of violating the privacy of another. The thesis is mainly devoted to addressing whether the right to respect for private life has a place within criminal justice theory and practice. The protection of privacy in the criminal justice system is the predominant subject of this thesis for two main reasons. First, this is an important topic that has been neglected. Prior to this thesis no one had yet addressed this topic at any length as a distinct subject. The protection of privacy in the criminal justice system and the use of substantive criminal law to enforce the privacy rights of victims have received minimal attention in the English jurisprudence. No comprehensive legal and theoretical analysis of the topic could be found in English or Scottish law. Therefore, this topic was crying out for new insights and perspectives. Secondly, the Human Rights Act 1998 incorporates into the UK law certain rights and freedoms set out in the European Convention on Human Rights, including the right to respect for private life enshrined by Article 8. The aim of the Act is to "bring rights home" and give further effect to rights and freedoms guaranteed under the European Convention. The Act requires all public authorities to act in a way which is compatible with the Convention rights. Since the incorporation of the European Convention on Human Rights into United Kingdom law, it is particularly appropriate to ask whether English and Scottish criminal lawyers need to add privacy to their essential lexicon. The Human Rights Act 1998 could be expected to have a profound impact on the right to privacy within the criminal justice system. The European Convention obliges the Contracting States to bring their criminal justice systems into line with the European Convention requirements to protect the fundamental human rights in it. The thesis has the following objectives. First, to address the extent to which the right to privacy is protected by the substantive criminal law and whether privacy rights have been respected in criminal procedure laws. Secondly, to highlight the impact of the Human Rights Act of 1998 on the right to privacy in the criminal justice arena. This thesis shows that although right to privacy has been recognised by the European Convention and incorporated by the Human Rights Act 1998, the criminal justice systems in England and Scotland display little respect for privacy rights. In other words, this study has demonstrated that, as far as privacy is concerned, it is misleading and inaccurate to say that rights have been brought home.
APA, Harvard, Vancouver, ISO, and other styles
10

Mitroff, Melanie. "Privacy : a constitutional right that threatens democracy /." Lynchburg, VA : Liberty University, 2007. http://digitalcommons.liberty.edu.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Privacy, Right of Australia"

1

Tucker, Greg. Information privacy law in Australia. Melbourne, Australia: Longman Professional, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1949-, Pieprzyk Josef, and Seberry Jennifer 1944-, eds. Information security and privacy: First Australian Conference, ACISP '96, Wollongong, NSW, Australia, June 24-26, 1996 : proceedings. Berlin: Springer, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vijay, Varadharajan, Pieprzyk Josef 1949-, and Mu Yi, eds. Information security and privacy: Second Australian Conference, ACISP '97, Sydney, NSW, Australia, June 7-9, 1997 : proceedings. Berlin: Springer, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Douglas-Stewart, Jeremy. Annotated national privacy principles. 2nd ed. Adelaide, SA: Presidian Legal Publications, c2005., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Douglas-Stewart, Jeremy. Annotated national privacy principles. Adelaide: Presidian Legal Publications, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

ACISP '98 (1998 Brisbane, Qld.). Information security and privacy: Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings. Berlin: Springer, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vijay, Varadharajan, and Mu Yi, eds. Information security and privacy: 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001 : proceedings. New York: Springer, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Colin, Boyd, Clark Andrew 1971-, and Dawson Ed, eds. Information security and privacy: 5th Australasian Conference, ACISP '2000, Brisbane, Australia, July 10-12, 2000 : proceedings. New York: Springer, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Western Australia. Office of the Attorney General. Privacy legislation for Western Australia policy research paper. Perth, , WA: Privacy Working Group, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Perspectives on privacy: Increasing regulation in the USA, Canada, Australia and European countries. Berlin: Boston, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Privacy, Right of Australia"

1

Bartlett, Peter. "Australia." In International Libel and Privacy Handbook, 129–47. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118653784.ch7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Harkiolakis, Nicholas. "Right to Privacy." In Encyclopedia of Corporate Social Responsibility, 2082–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-28036-8_453.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Moore, Roy L., Michael D. Murray, and Kyu Ho Youm. "Right of Privacy." In Media Law and Ethics, 180–227. 6th ed. New York: Routledge, 2021. http://dx.doi.org/10.4324/9781003166870-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Moore, Roy L., Michael D. Murray, J. Michael Farrell, and Kyu Ho Youm. "Right of Privacy." In Media Law and Ethics, 402–50. 5th edition. | New York : Routledge, [2018] |: Routledge, 2017. http://dx.doi.org/10.4324/9781315270746-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Macleod, Alistair M. "Privacy: Concept, Value, Right?" In Core Concepts and Contemporary Issues in Privacy, 31–45. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74639-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hill, B. Jessie. "Right to Decisional Privacy." In Laws of Medicine, 471–78. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08162-0_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Stefkovich, Jacqueline A., and William C. Frick. "The Right to Privacy." In Best Interests of the Student, 152–70. 3rd ed. 3rd edition. | New York, NY : Routledge, 2021.: Routledge, 2021. http://dx.doi.org/10.4324/9780367816032-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ahmad, Ahmad Atif. "The Right to Privacy." In Islam, Modernity, Violence, and Everyday Life, 169–82. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230619562_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Penney, Jonathon. "The right to privacy." In Human Rights, Digital Society and the Law, 44–57. Abingdon, Oxon [UK] ; New York, NY : Routledge, 2019.: Routledge, 2019. http://dx.doi.org/10.4324/9781351025386-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sheaff, Mike. "A Right to Privacy and a Right to Know." In Secrecy, Privacy and Accountability, 33–59. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11686-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Privacy, Right of Australia"

1

Deane, Saul. "The Sandstone Squarehouses of Macarthur: The Ultra Vires Blockhouses of Sydney Basin’s Dispossession." In The 38th Annual Conference of the Society of Architectural Historians Australia and New Zealand. online: SAHANZ, 2022. http://dx.doi.org/10.55939/a3997pwac2.

Full text
Abstract:
South of Campbelltown, wedged between Sydney’s two great rivers, where the Georges and the Nepean almost meet is Macarthur. In the early 1810s, to go beyond Campbelltown was to leave the authority of colonial Sydney - a colonial ultra vires frontier. Here are squarehouses that date from the mid-1810s, some were built during the height of Sydney’s frontier wars, before the 1816 Appin Massacre, which secured colonial control over all of Macarthur. These squarehouses are archaeologically intriguing as they are almost square, not large, have thick sandstone walls, some have ‘slot openings’ and others small openings. Were these squarehouses built with a defensive premise in mind, the openings for use as ‘gunloops’ as much as ventilation? If so they would be architectural evidence of the frontier wars. The suggestion is that these small squarehouses, often overlooked as just an outbuilding in the homestead aggregation, were among the first buildings built on a property. If built on contested land, its presence would have acted as notification of a land claim, while its physical structure provided a bolthole from which one could defend life and property - a private blockhouse. Blockhouses existed right across the British settler empire, with common standards constructed for defence in frontier areas from South Africa to New Zealand, Canada and the United States. So it should be no surprise to find them at the beginning of colonial NSW and yet it is, and this raises questions as to why this distinctive colonial structure is missing in Australia. The placement of these squarehouses and the prospect of their loops - their surveillance isovists over creeks and valleys, would provide historical insight into the colonial consolidation of these landscapes.
APA, Harvard, Vancouver, ISO, and other styles
2

Uzra, Mehbuba Tune, and Peter Scrivener. "Designing Post-colonial Domesticity: Positions and Polarities in the Feminine Reception of New Residential Patterns in Modernising East Pakistan and Bangladesh." In The 38th Annual Conference of the Society of Architectural Historians Australia and New Zealand. online: SAHANZ, 2022. http://dx.doi.org/10.55939/a4027pcwf6.

Full text
Abstract:
When Paul Rudolph was commissioned to design a new university campus for East Pakistan in the mid-1960s, the project was among the first to introduce the expressionist brutalist lexicon of late-modernism into the changing architectural language of postcolonial South and Southeast Asia. Beyond the formal and tectonic ruptures with established colonial-modern norms that these designs represented, they also introduced equally radical challenges to established patterns of domestic space-use. Principles of open-planning and functional zoning employed by Rudolf in the design of academic staff accommodation, for example, evidently reflected a socially progressive approach – in light of the contemporary civil rights movement back in America – to the accommodation of domestic servants within the household of the modern nuclear family. As subsequent residents would recount, however, these same planning principles could have very different and even opposite implications for the privacy and sense of security of Bangladeshi academics and their families. The paper explores and interprets the post-occupancy experience of living in such novel ‘ultra-modern’ patterns of a new domesticity in postcolonial Bangladesh, and their reception and adaptation into the evolving norms of everyday residential development over the decades since. Specifically, it examines the reception of and responses to these radically new residential patterns by female members of the evolving modern Bengali Muslim middle class who were becoming progressively more liberal in their outlook and lifestyles, whilst retaining consciousness and respect for the abiding significance in their personal and family lives of traditional cultural practices and religious affinities. Drawing from the case material and methods of an on-going PhD study, the paper will offer a contrapuntal analysis of architectural and ethnological evidence of how the modern Bengali woman negotiates, adapts to and calibrates these received architectural patterns of domesticity whilst simultaneously crafting a reembraced cultural concept of femininity, in a fluid dialogical process of refashioning both space and self.
APA, Harvard, Vancouver, ISO, and other styles
3

Vilić, Vida, and Ivan Radenković. "The Right to Privacy, Informational Privacy and the Right to Information in the Cyberspace." In Sinteza 2017. Belgrade, Serbia: Singidunum University, 2017. http://dx.doi.org/10.15308/sinteza-2017-74-78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bernardes, Marciele Berger, Francisco Pacheco de Andrade, and Paulo Novais. "Smart Cities, data and right to privacy." In ICEGOV '18: 11th International Conference on Theory and Practice of Electronic Governance. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3209415.3209451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sobolev, N. S. "Restricting the right to privacy of public employees." In SCIENCE OF RUSSIA: GOALS AND OBJECTIVES. LJournal, 2020. http://dx.doi.org/10.18411/sr-10-06-2020-48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Antoniou, Giannakis, Udaya Parampalli, and Lynn Batten. "Monitoring Employees' Emails without Violating Their Privacy Right." In Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007). IEEE, 2007. http://dx.doi.org/10.1109/pdcat.2007.4420140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Antoniou, Giannakis, Udaya Parampalli, and Lynn Batten. "Monitoring Employees' Emails without Violating Their Privacy Right." In Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007). IEEE, 2007. http://dx.doi.org/10.1109/pdcat.2007.49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chatfield, Craig, and René Hexel. "Privacy and community connectedness." In the 2007 conference of the computer-human interaction special interest group (CHISIG) of Australia. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1324892.1324950.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Tae Wan, and Bryan R. Routledge. "Informational Privacy, A Right to Explanation, and Interpretable AI." In 2018 IEEE Symposium on Privacy-Aware Computing (PAC). IEEE, 2018. http://dx.doi.org/10.1109/pac.2018.00013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Irwin, Keith, and Ting Yu. "Determining user privacy preferences by asking the right questions." In the 2005 ACM workshop. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1102199.1102209.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Privacy, Right of Australia"

1

Davey, Jacob, Mario Peucker, Cécile Simmons, and Thomas J. Fisher. A Snapshot of Far-Right Activity on Gab in Australia. Centre for Resilient and Inclusive Societies, May 2021. http://dx.doi.org/10.56311/cuyw3894.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vincent, Charles, Madjid Tavana, and Tatiana Gherman. The Right To Be Forgotten – Is Privacy Sold Out in the Big Data Age? CENTRUM Catolica Graduate Business School, February 2014. http://dx.doi.org/10.7835/ccwp-2014-02-0006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Davey, Jacob, Mario Peucker, and Cécile Simmons. The Far-Left and Far-Right in Australia - Equivalent Threats? Key findings and Policy Implications. Centre for Resilient and Inclusive Societies, February 2022. http://dx.doi.org/10.56311/qiul3563.

Full text
Abstract:
This briefing paper is the fourth and final output in ‘Symbiotic Radicalisation’, a project in our ‘Dynamics of Violent Extremism’ research stream. Symbiotic Radicalisation is a collaboration between researchers at the Institute for Strategic Dialogue (ISD) and the Institute for Sustainable Industries & Liveable Cities at Victoria University (VU). This paper provides an overview of key trends identified throughout this research program, which examines the online interplay between the far-left and far-right in Australia (with a focus on the State of Victoria) and considers the policy implications of this work.
APA, Harvard, Vancouver, ISO, and other styles
4

Cachalia, Firoz, and Jonathan Klaaren. Digitalisation, the ‘Fourth Industrial Revolution’ and the Constitutional Law of Privacy in South Africa: Towards a public law perspective on constitutional privacy in the era of digitalisation. Digital Pathways at Oxford, July 2021. http://dx.doi.org/10.35489/bsg-dp-wp_2021/04.

Full text
Abstract:
In this working paper, our focus is on the constitutional debates and case law regarding the right to privacy, adopting a method that is largely theoretical. In an accompanying separate working paper, A South African Public Law Perspective on Digitalisation in the Health Sector, we employ the analysis developed here and focus on the specific case of digital technologies in the health sector. The topic and task of these papers lie at the confluence of many areas of contemporary society. To demonstrate and apply the argument of this paper, it would be possible and valuable to extend its analysis into any of numerous spheres of social life, from energy to education to policing to child care. In our accompanying separate paper, we focus on only one policy domain – the health sector. Our aim is to demonstrate our argument about the significance of a public law perspective on the constitutional right to privacy in the age of digitalisation, and attend to several issues raised by digitalisation’s impact in the health sector. For the most part, we focus on technologies that have health benefits and privacy costs, but we also recognise that certain technologies have health costs and privacy benefits. We also briefly outline the recent establishment (and subsequent events) in South Africa of a contact tracing database responding to the COVID-19 pandemic – the COVID-19 Tracing Database – a development at the interface of the law enforcement and health sectors. Our main point in this accompanying paper is to demonstrate the value that a constitutional right to privacy can bring to the regulation of digital technologies in a variety of legal frameworks and technological settings – from public to private, and from the law of the constitution to the ‘law’ of computer coding.
APA, Harvard, Vancouver, ISO, and other styles
5

Eastman, Brittany. Legal Issues Facing Automated Vehicles, Facial Recognition, and Privacy Rights. SAE International, July 2022. http://dx.doi.org/10.4271/epr2022016.

Full text
Abstract:
Facial recognition software (FRS) is a form of biometric security that detects a face, analyzes it, converts it to data, and then matches it with images in a database. This technology is currently being used in vehicles for safety and convenience features, such as detecting driver fatigue, ensuring ride share drivers are wearing a face covering, or unlocking the vehicle. Public transportation hubs can also use FRS to identify missing persons, intercept domestic terrorism, deter theft, and achieve other security initiatives. However, biometric data is sensitive and there are numerous remaining questions about how to implement and regulate FRS in a way that maximizes its safety and security potential while simultaneously ensuring individual’s right to privacy, data security, and technology-based equality. Legal Issues Facing Automated Vehicles, Facial Recognition, and Individual Rights seeks to highlight the benefits of using FRS in public and private transportation technology and addresses some of the legitimate concerns regarding its use by private corporations and government entities, including law enforcement, in public transportation hubs and traffic stops. Constitutional questions, including First, Forth, and Ninth Amendment issues, also remain unanswered. FRS is now a permanent part of transportation technology and society; with meaningful legislation and conscious engineering, it can make future transportation safer and more convenient.
APA, Harvard, Vancouver, ISO, and other styles
6

Tyson, Paul. Australia: Pioneering the New Post-Political Normal in the Bio-Security State. Mέta | Centre for Postcapitalist Civilisation, 2021. http://dx.doi.org/10.55405/mwp10en.

Full text
Abstract:
This paper argues that liberal democratic politics in Australia is in a life-threatening crisis. Australia is on the verge of slipping into a techno-feudal (post-capitalist) and post-political (new Centrist) state of perpetual emergency. Citizens in Australia, be they of the Left or Right, must make an urgent attempt to wrest power from an increasingly non-political Centrism. Within this Centrism, government is deeply captured by the international corporate interests of Big Tech, Big Natural Resources, Big Media, and Big Pharma, as beholden to the economic necessities of the neoliberal world order (Big Finance). Australia now illustrates what the post-political ‘new normal’ of a high-tech enabled bio-security state actually looks like. It may even be that the liberal democratic state is now little more than a legal fiction in Australia. This did not happen over-night, but Australia has been sliding in this direction for the past three decades. The paper outlines that slide and shows how the final bump down (covid) has now positioned Australia as a world leader among post-political bio-security states.
APA, Harvard, Vancouver, ISO, and other styles
7

Droogan, Julian, Lise Waldek, Brian Ballsun-Stanton, and Jade Hutchinson. Mapping a Social Media Ecosystem: Outlinking on Gab & Twitter Amongst the Australian Far-right Milieu. RESOLVE Network, September 2022. http://dx.doi.org/10.37805/remve2022.6.

Full text
Abstract:
Attention to the internet and the online spaces in which violent extremists interact and spread content has increased over the past decades. More recently, that attention has shifted from understanding how groups like the self-proclaimed Islamic State use the internet to spread propaganda to understanding the broader internet environment and, specifically, far-right violent extremist activities within it. This focus on how far right violent extremist—including far-right racially and ethnically motivated violent extremists (REMVEs) within them—create, use, and exploit the online networks in which they exist to promote their hateful ideology and reach has largely focused on North America and Europe. However, in recent years, examinations of those online dynamics elsewhere, including in Australia, is increasing. Far right movements have been active in Australia for decades. While these movements are not necessarily extremist nor violent, understanding how violent far right extremists and REMVEs interact within or seek to exploit these broader communities is important in further understanding the tactics, reach, and impact of REMVEs in Australia. This is particularly important in the online space access to broader networks of individuals and ideas is increasingly expanding. Adding to a steadily expanding body of knowledge examining online activities and networks of both broader far right as well as violent extremist far right populations in Australia, this paper presents a data-driven examination of the online ecosystems in which identified Australian far-right violent extremists exist and interact,1 as mapped by user generated uniform resource locators (URL), or ‘links’, to internet locations gathered from two online social platforms—Twitter and Gab. This link-based analysis has been used in previous studies of online extremism to map the platforms and content shared in online spaces and provide further detail on the online ecosystems in which extremists interact. Data incorporating the links was automatically collected from Twitter and Gab posts from users existing within the online milieu in which those identified far right extremists were connected. The data was collected over three discrete one-month periods spanning 2019, the year in which an Australian far right violent extremist carried out the Christchurch attack. Networks of links expanding out from the Twitter and Gab accounts were mapped in two ways to explore the extent and nature of the online ecosystems in which these identified far right Australian violent extremists are connected, including: To map the extent and nature of these ecosystems (e.g., the extent to which other online platforms are used and connected to one another), the project mapped where the most highly engaged links connect out to (i.e., website domain names), and To explore the nature of content being spread within those ecosystems, what sorts of content is found at the end of the most highly engaged links. The most highly engaged hashtags from across this time are also presented for additional thematic analysis. The mapping of links illustrated the interconnectedness of a social media ecosystem consisting of multiple platforms that were identified as having different purposes and functions. Importantly, no links to explicitly violent or illegal activity were identified among the top-most highly engaged sites. The paper discusses the implications of the findings in light of this for future policy, practice, and research focused on understanding the online ecosystems in which identified REMVE actors are connected and the types of thematic content shared and additional implications in light of the types of non-violent content shared within them.
APA, Harvard, Vancouver, ISO, and other styles
8

Durovic, Mateja, and Franciszek Lech. A Consumer Law Perspective on the Commercialization of Data. Universitätsbibliothek J. C. Senckenberg, Frankfurt am Main, 2021. http://dx.doi.org/10.21248/gups.64577.

Full text
Abstract:
Commercialization of consumers’ personal data in the digital economy poses serious, both conceptual and practical, challenges to the traditional approach of European Union (EU) Consumer Law. This article argues that mass-spread, automated, algorithmic decision-making casts doubt on the foundational paradigm of EU consumer law: consent and autonomy. Moreover, it poses threats of discrimination and under- mining of consumer privacy. It is argued that the recent legislative reaction by the EU Commission, in the form of the ‘New Deal for Consumers’, was a step in the right direction, but fell short due to its continued reliance on consent, autonomy and failure to adequately protect consumers from indirect discrimination. It is posited that a focus on creating a contracting landscape where the consumer may be properly informed in material respects is required, which in turn necessitates blending the approaches of competition, consumer protection and data protection laws.
APA, Harvard, Vancouver, ISO, and other styles
9

Cachalia, Firoz, and Jonathan Klaaren. A South African Public Law Perspective on Digitalisation in the Health Sector. Digital Pathways at Oxford, July 2021. http://dx.doi.org/10.35489/bsg-dp-wp_2021/05.

Full text
Abstract:
We explored some of the questions posed by digitalisation in an accompanying working paper focused on constitutional theory: Digitalisation, the ‘Fourth Industrial Revolution’ and the Constitutional Law of Privacy in South Africa. In that paper, we asked what legal resources are available in the South African legal system to respond to the risk and benefits posed by digitalisation. We argued that this question would be best answered by developing what we have termed a 'South African public law perspective'. In our view, while any particular legal system may often lag behind, the law constitutes an adaptive resource that can and should respond to disruptive technological change by re-examining existing concepts and creating new, more adequate conceptions. Our public law perspective reframes privacy law as both a private and a public good essential to the functioning of a constitutional democracy in the era of digitalisation. In this working paper, we take the analysis one practical step further: we use our public law perspective on digitalisation in the South African health sector. We do so because this sector is significant in its own right – public health is necessary for a healthy society – and also to further explore how and to what extent the South African constitutional framework provides resources at least roughly adequate for the challenges posed by the current 'digitalisation plus' era. The theoretical perspective we have developed is certainly relevant to digitalisation’s impact in the health sector. The social, economic and political progress that took place in the 20th century was strongly correlated with technological change of the first three industrial revolutions. The technological innovations associated with what many are terming ‘the fourth industrial revolution’ are also of undoubted utility in the form of new possibilities for enhanced productivity, business formation and wealth creation, as well as the enhanced efficacy of public action to address basic needs such as education and public health.
APA, Harvard, Vancouver, ISO, and other styles
10

Perdigão, Rui A. P. Beyond Quantum Security with Emerging Pathways in Information Physics and Complexity. Synergistic Manifolds, June 2022. http://dx.doi.org/10.46337/220602.

Full text
Abstract:
Information security and associated vulnerabilities have long been a pressing challenge, from the fundamental scientific backstage to the frontline across the most diverse sectors of society. At the tip of the iceberg of this problem, the citizens immediately feel that the reservation of privacy and the degradation of the quality and security of the information and communication on which they depend for the day-to-day activities, already of crucial relevance, are at stake. Naturally though, the challenges do not end there. There is a whole infrastructure for storing information, processing and communication, whose security and reliability depend on key sectors gearing modern society – such as emergency communication systems (medical, civil and environmental protection, among others), transportation and geographic information, the financial communications systems at the backbone of day-to-day transactions, the information and telecommunications systems in general. And crucially the entire defence ecosystem that in essence is a stalwart in preventing our civilisation to self-annihilate in full fulfilment of the second principle of thermodynamics. The relevance of the problem further encompasses the preservation of crucial values such as the right to information, security and integrity of democratic processes, internal administration, justice, defence and sovereignty, ranging from the well-being of the citizen to the security of the nation and beyond. In the present communication, we take a look at how to scientifically and technically empower society to address these challenges, with the hope and pragmatism enabled by our emerging pathways in information physics and complexity. Edging beyond classical and quantum frontiers and their vulnerabilities to unveil new principles, methodologies and technologies at the core of the next generation system dynamic intelligence and security. To illustrate the concepts and tools, rather than going down the road of engineered systems that we can ultimately control, we take aim at the bewildering complexity of nature, deciphering new secrets in the mathematical codex underlying its complex coevolutionary phenomena that so heavily impact our lives, and ultimately bringing out novel insights, methods and technologies that propel information physics and security beyond quantum frontiers.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography