To see the other types of publications on this topic, follow the link: Privacy, Right of – Germany.

Dissertations / Theses on the topic 'Privacy, Right of – Germany'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Privacy, Right of – Germany.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Martin, Klaus. "Das allgemeine Persönlichkeitsrecht in seiner historischen Entwicklung." Hamburg : Kovač, 2007. http://www.verlagdrkovac.de/978-3-8300-3172-7.htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zimmer, Martina. "Abortion and the right to life: A case study of South Africa and Germany." University of the Western Cape, 2016. http://hdl.handle.net/11394/6293.

Full text
Abstract:
Magister Legum - LLM (Public Law and Jurisprudence)
The issue of abortion and the protection of the right to life have been discussed by many academics, yet remains an unresolved topic in many countries. The mere fact that abortion is the deliberate termination of a human pregnancy raises the question, whether or not such an act violates the right to life. Abortion has been legalised in South Africa and Germany. This study explores the area of abortion vis a viz the obligation of South Africa and German under the international and regional human rights instruments to protect the right to life. Notably, the right to life is protected under a plethora of international and regional human rights instruments. At international level, the right to life is protected under Article 3 of the Universal declaration of Human Rights and Article 6 of the International Covenant on Civil and Political Rights. At regional level of the right to life is protected by Article 2 of the European Convention on Human Rights and Article 4 of the African Charter on Human and Peoples� Rights. To give a broad understanding of the meaning, nature and content of the right to life, this mini-thesis shall critically analyse the words used under the above Articles which protect the right to life. Then the paper will endeavour on its main objective which is to determine whether or not the legalisation of Abortion in South Africa and Germany violates the right to life?
APA, Harvard, Vancouver, ISO, and other styles
3

Brase, Susanne. "Public figures' right to privacy, private law constraints on the media's rights to access and to publish information : a Canadian-German comparative study." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape15/PQDD_0003/MQ36006.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tao, Ran. "The Right to Privacy." Scholarship @ Claremont, 2019. https://scholarship.claremont.edu/scripps_theses/1338.

Full text
Abstract:
Contemporary debates about the right to privacy were inaugurated by Samuel Warren and Louis Brandeis’ article on the topic. While Warren and Brandeis understand the right to privacy as a stand-alone right, J. J. Thomson interprets it as a cluster of rights that itself intersects with other rights. Despite such disagreement, both accounts point to a deep connection between property rights and one’s right to herself. A close examination of the Lockean and Kantian concepts of property confirms this. In particular, Arthur Ripstein’s Kantian account of innate right and property rights suggests that property rights are derived from the innate right one has in herself. Building on this account, I suggest that one’s innate right and property rights grant one the exclusive control to herself and to her property. Such exclusive control can be conceptualized as the basis for one’s privileged space, any unauthorized access to which and any unauthorized use of what lies within which constitute violation of one’s right to privacy.
APA, Harvard, Vancouver, ISO, and other styles
5

Lander, Angelina M. "Privacy, surveillance and the state a comparison of U.S. and British privacy rights /." Orlando, Fla. : University of Central Florida, 2009. http://purl.fcla.edu/fcla/etd/CFE0002772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wolfson, Susan Ann. "The right to privacy and education." Thesis, University College London (University of London), 1989. http://discovery.ucl.ac.uk/10019704/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gibb, Susan Jennifer. "Privacy and Australian law." Title page, contents and abstract only, 1987. http://web4.library.adelaide.edu.au/theses/09PH/09phg4372.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Al-Rawashdeh, Sami H. "Is privacy brought home? : criminal justice and the right to privacy." Thesis, University of Aberdeen, 2003. http://digitool.abdn.ac.uk/R?func=search-advanced-go&find_code1=WSN&request1=AAIU176274.

Full text
Abstract:
This thesis is concerned with protection of the right to privacy in the English and Scottish criminal justice systems. The aim of this research is to consider the extent to which privacy has been recognised in both criminal justice systems. It analyses the extent to which the right to privacy is protected by the substantive criminal law of those jurisdictions, as well as in their criminal procedural law. A part of the examination will address the question of whether there should be a criminal offence of violating the privacy of another. The thesis is mainly devoted to addressing whether the right to respect for private life has a place within criminal justice theory and practice. The protection of privacy in the criminal justice system is the predominant subject of this thesis for two main reasons. First, this is an important topic that has been neglected. Prior to this thesis no one had yet addressed this topic at any length as a distinct subject. The protection of privacy in the criminal justice system and the use of substantive criminal law to enforce the privacy rights of victims have received minimal attention in the English jurisprudence. No comprehensive legal and theoretical analysis of the topic could be found in English or Scottish law. Therefore, this topic was crying out for new insights and perspectives. Secondly, the Human Rights Act 1998 incorporates into the UK law certain rights and freedoms set out in the European Convention on Human Rights, including the right to respect for private life enshrined by Article 8. The aim of the Act is to "bring rights home" and give further effect to rights and freedoms guaranteed under the European Convention. The Act requires all public authorities to act in a way which is compatible with the Convention rights. Since the incorporation of the European Convention on Human Rights into United Kingdom law, it is particularly appropriate to ask whether English and Scottish criminal lawyers need to add privacy to their essential lexicon. The Human Rights Act 1998 could be expected to have a profound impact on the right to privacy within the criminal justice system. The European Convention obliges the Contracting States to bring their criminal justice systems into line with the European Convention requirements to protect the fundamental human rights in it. The thesis has the following objectives. First, to address the extent to which the right to privacy is protected by the substantive criminal law and whether privacy rights have been respected in criminal procedure laws. Secondly, to highlight the impact of the Human Rights Act of 1998 on the right to privacy in the criminal justice arena. This thesis shows that although right to privacy has been recognised by the European Convention and incorporated by the Human Rights Act 1998, the criminal justice systems in England and Scotland display little respect for privacy rights. In other words, this study has demonstrated that, as far as privacy is concerned, it is misleading and inaccurate to say that rights have been brought home.
APA, Harvard, Vancouver, ISO, and other styles
9

Mitroff, Melanie. "Privacy : a constitutional right that threatens democracy /." Lynchburg, VA : Liberty University, 2007. http://digitalcommons.liberty.edu.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Heite, Martin. "Privacy, Constitutions and the Law of Torts: a Comparative and Theoretical Analysis of Protecting Personal Information Against Dissemination in New Zealand, the UK and the USA." University of Canterbury. Law, 2008. http://hdl.handle.net/10092/2955.

Full text
Abstract:
The New Zealand Court of Appeal has recently acknowledged the existence of a freestanding tort of invasion of privacy in Hosking v Runting. The tort is in its infancy and the courts are still grappling with essential problems, the most prominent of which is the conflict with countervailing interests in freedom of speech. In need of guidance, the courts turn to overseas authorities, predominantly from the United Kingdom and the United States of America. The commonly found descriptive nature of the comparison invites a broader analysis of these jurisdictions. In this thesis, I offer a theoretically informed comparative law analysis of New Zealand's new tort with the American public disclosure of private facts tort and the British extended breach of confidence action. In all three jurisdictions, the conflict of privacy with individual and societal concerns in freedom of speech has led to an exten-sion of (quasi-) constitutional norms derived, for instance, from the New Zealand Bill of Rights Act 1990 into the common law sphere – the horizontal effect. The horizontal application of constitutional rights poses significant legal problems to the common law, because it has learned to deal with duties rather than rights. The time has come to re-consider the nature of rights in both constitutional and tort law. The comparison shows that New Zealand has effectively adopted two torts – one following the duty-based lead of the United States of America and an alternative modelled along the lines of the more rights-orientated British law. The law of the United Kingdom and the USA differ to a degree that calls their comparability into question. I present the preferable British ap-proach as a 'constitutionalised common law tort of privacy.' The results also show that this model represents a competitive third way to traditional solutions based on common law or statute by means of utilising a statutory human rights instrument as an analytical framework for the common law.
APA, Harvard, Vancouver, ISO, and other styles
11

Johnson, Virginia Wilson. "Architectural correlates of privacy : the dynamics of privacy regulation /." Diss., This resource online, 1990. http://scholar.lib.vt.edu/theses/available/etd-07132007-143142/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Marasinghe, S. C. "A child's right to privacy in international law." Thesis, University of Oxford, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.413108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Skahill, Tina M. "Striking the right balance : fusion centers and privacy." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5243.

Full text
Abstract:
CHDS State/Local
Approved for public release; distribution is unlimited
After the events of 9/11, the number of fusion centers rapidly multiplied. As a result, state and local agencies that operated the centers adopted a myriad of policies. This thesis seeks to answer how fusion centers can implement policies as to operational structure and transparency that simultaneously safeguard against abuse of citizens' privacy while facilitating the collection, maintenance, and dissemination of information. Two methods of research are utilized: policy analysis and policy options analysis. This thesis examines existing federal guidelines, federal case law, and various federal statutes and regulations. Moreover, the thesis explores three policy options as possible decision-making tools for fusion centers: 1) mandatory federal guidelines, 2) imposition of a balancing test and administrative review process, and 3) a compulsory reasonable-suspicion requirement. In the end, this thesis recommends imposition of all three policies.
APA, Harvard, Vancouver, ISO, and other styles
14

Dayan, Michael Oved. "Privacy boundaries : stories of protecting personal autonomy in the information age." Thesis, McGill University, 2004. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=85147.

Full text
Abstract:
In 1890, lawyers Samuel Warren and Louis Brandeis conceived of a "sacred" right, the right to "be let alone." They argued for this right as a measure of "retreat from the world" for protection of an individual's "inviolate personality." Their argument was born in response to intrusions made possible with technological developments in printing and photography. For over a 100-year period, the concept of privacy has received attention from a multi-disciplinary collection of scholars. Despite this significant attention, however, relatively little consideration has been paid to conceptualizations of privacy in the everyday. My dissertation utilizes the focus group method to access individuals' stories about privacy in everyday lives. The unit of the story is important because it contains rich connotative language, imbued with meaning. My method of analysis is inspired primarily by Michel de Certeau and Clifford Geertz. This analysis reveals four significant themes, all linking back to Warren and Brandeis's original conceptualization in thinking about privacy in the everyday: it is associated with fears, it is considered a defence against surveillance, it is conceived of in metaphorical terms as a protective boundary, and it protects personal information and individual autonomy. This dissertation explores how individuals articulate these themes. It finds that individuals apply the language of space as a framework in which to believe their privacy is protected from surveillance.
APA, Harvard, Vancouver, ISO, and other styles
15

Crounse, Shane. "The fair information principles : a comparison of U.S. and Canadian privacy policy as applied to the private sector /." Online version of thesis, 2009. http://hdl.handle.net/1850/8638.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Lonka, Anna. "Profiling through Ultrasound Technoogy, the Right to Privacy and the Right to Data Protection." Thesis, Stockholms universitet, Juridiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-154902.

Full text
Abstract:
The right to private and family life and the right to the protection of personal data are two fundamental rights of the EU. The protection of these rights is addressed in the new General Data Protection Regulation (GDPR), the Directive on Privacy and Electronic Communications (ePrivacyDirective) and the upcoming new Regulation on Privacy and Electronic Communications (draft ePrivacy Regulation). In this thesis these three legal acts are evaluated in light of profiling through ultrasound tracking technology. Their technology neutrality and their functioning as safeguards of the two fundamental rights against the use of profiling through ultrasound tracking technology is tested. The GDPR is found to differentiate between profiling in the context of automatic decision-making and profiling in other contexts. The process of profiling is described in general terms. It is shown how tracking technologies in general and ultrasound tracking technology in particular have a central role in the profiling process.It is found that ultrasound tracking technology enables far wider tracking and data collection than the other tracking technologies. Differences and similarities between ultrasound tracking technology and other tracking technologies are described. According to the findings, the three legal instruments, the GDPR, the ePrivacy Directive and the draft ePrivacy Regulation, all live up to their aim of technology neutrality on theoretical level, since profiling through ultrasound tracking technology is within the material scope of all of them. An exemption is Article 8(2) of the draft ePrivacy Regulation that, unlike Article 9 of the ePrivacyDirective, does not stretch to cover location tracking through ultrasound technology. However, as will be shown, there are risks related to the practical implementation of these legal frameworks.
APA, Harvard, Vancouver, ISO, and other styles
17

Fischer-Hübner, Simone. "IT-security and privacy : design and use of privacy-enhancing security mechanisms /." Berlin [u.a.] : Springer, 2001. http://www.loc.gov/catdir/enhancements/fy0812/2001034161-d.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Kunz, Thea. "Celebrating Privacy Day: The Right to be forgotten and individual Privacy in the digital Age." Thesis, Uppsala universitet, Medier och kommunikation, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-356108.

Full text
Abstract:
This thesis explores the current status of privacy in the context of the upcoming implementation of the General Data Protection Regulation (GDPR) and, more precisely, focuses on the redefined Right to be forgotten as its most controversial component. Norman Fairclough’s three-dimensional model of critical discourse analysis was deployed to show how the Right to be forgotten is reshaping the privacy discourse in the age of big data, digitalization, surveillance and data driven business. Qualitative content analysis was used to serve critical discourse analysis as the first stage of the three dimensions, which built the foundation for the analysis of the broader discursive and societal practices. The digital age requires a rethinking of privacy in terms of the protection of personal data due to the embeddedness of technology in everyday life, big data, easy retrieval and cheap cloud storage. Forgetting and remembering are two facets that constitute human behavior but within the regime of technological advancements, both have lost, or changed their meaning. The new legislative framework aims to enhance forgetting but seems more of a façade to legitimate remembering. Several online blog posts written by experts in diverse fields of knowledge have shown that the current legislative framework is no longer sufficient due to technological change and unequal hegemonic relations, which contribute to reshaping the privacy discourse. The thesis does not give a final answer to the questions raised but contributes to the debate and to a comprehensive understanding of the new legislation in Europe.
APA, Harvard, Vancouver, ISO, and other styles
19

Boshego, Ngwanathaba Angelinah. "Balancing the right to freedom of expression with the right to privacy for public figures." Diss., University of Pretoria, 2017. http://hdl.handle.net/2263/62559.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Black, Gillian. "Right of publicity in Scots law." Thesis, University of Edinburgh, 2009. http://hdl.handle.net/1842/5943.

Full text
Abstract:
This thesis examines publicity exploitation in practice and the possible legal response of Scots law to that exploitation. It argues that the common law in Scotland is not capable of providing a coherent and principled right of publicity for individuals, and that a statutory right is instead required. By examining the nature of publicity exploitation and the activities that constitute publicity, it becomes clear that there are a number of different methods by which an individual’s “persona” – name, image, identity and reputation – can be used to enhance the goods and services of others, and that this enhancement is something for which other parties are willing to pay. The first part of this thesis explores publicity in practice, in order to derive a framework and vocabulary on which to build the subsequent legal analysis. One conclusion reached here is that, whereas much case law and academic commentary focuses on the unauthorised use of persona, authorised exploitation is more common and more lucrative for the individual. Both authorised and unauthorised use therefore need to be represented in a publicity right. The second part explores justifications for establishing a legal right to regulate the exploitation of publicity and to enable the control of such exploitation by the individual in question. These justifications reflect the dual interests at stake in publicity rights, being dignitarian interests in the use and control of one’s persona, and economic interests in the financial value of such use. The third part of the thesis draws upon the findings of the first two parts in order to assess the most appropriate legal classification of a right of publicity. The conclusion reached is that publicity cannot be sufficiently protected through established real rights or personal rights. Instead, the hybrid nature of publicity, comprising dignitarian and economic interests, should most appropriately be protected through a right in the nature of exclusive privilege (a concept already known in Scots law). This right is capable of enabling the necessary control of persona for the individual, subject to appropriate limitations to recognise the competing interests of other parties. These limits include freedom of expression and cultural communication. The final conclusion is that such a statutory right of exclusive privilege would be best placed to give principled and coherent effect to a right of publicity in Scots law.
APA, Harvard, Vancouver, ISO, and other styles
21

Theis, Adriane. "Liberal privacy and women a broken promise /." Diss., Connect to the thesis, 2006. http://hdl.handle.net/10066/726.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Paton, Elizabeth Katrine. "Privacy law and the media." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/28826.

Full text
Abstract:
This thesis explores the issue of how to reconcile the value of individual privacy with that of freedom of speech. It argues that there ought to be legal protection against invasion of privacy by the media, and that such protection should be seen as complementary to a system of free expression rather than opposed to such a system. A definition of privacy is outlined which, it is contended, meets the criteria for a coherent, neutral definition. Various reasons for valuing privacy and in favour of protecting the individual's reasonable expectations of privacy are identified. It is argued that lack of precision in the normative realm, in defining with certainty when privacy is invaded, should not be an excuse for leaving the individual without legal protection. There follows an examination of the protection of privacy against media incursions in English, New Zealand, Australian and Canadian law, other than the coincidental protection afforded by certain common law actions. There has been significant judicial and legislative recognition of the need to safeguard privacy interests, and many interesting developments in recent years are discussed. However, none of the countries considered has yet developed effective recourse for victims of unwarranted and invasive publications. It is argued that the relationship between privacy and free speech has been wrongly conceptualised, and that in fact both interests serve the same underlying set of values. Problems arise when privacy and free speech interests are balanced in the abstract rather than in context, and when a simplistic view of press freedom is adopted in disregard of the realities of the modern mass media. Invasive publications generally do not significantly advance free speech interests unless they help to provide the information needed for public decision-making. Furthermore, this information can in many cases be conveyed without detriment by withholding details which disclose identity. A three-step test is proposed to determine whether privacy and free speech interests can be reconciled without compromise to either of them, or whether it is necessary to balance these interests in the context of the case. It will also be maintained that a contextual approach is preferable to the adoption of categories such as "public figures" and "public places". These concepts tend to be misleading, and should be eschewed as analytical tools, since they confuse important questions which require separate analysis.
Law, Peter A. Allard School of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
23

Hunt, Christopher Douglas Lorne. "Justifying and structuring a principled common law privacy tort." Thesis, University of Cambridge, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.607899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Nam, Hyung Doo. "The right of publicity in the global market : is James Dean a living dead even in Korea? /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/9613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Lukman, Joshua R. "Right to publicity and privacy versus first amendment freedom of speech." Honors in the Major Thesis, University of Central Florida, 2003. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/323.

Full text
Abstract:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf.edu/Systems/DigitalInitiatives/DigitalCollections/InternetDistributionConsentAgreementForm.pdf You may also contact the project coordinator, Kerri Bottorff, at kerri.bottorff@ucf.edu for more information.
Bachelors
Health and Public Affairs
Legal Studies
APA, Harvard, Vancouver, ISO, and other styles
26

Hedefine, Eeva Kaarina. "Personal Privacy Protection within Pervasive RFID Environments." Fogler Library, University of Maine, 2006. http://www.library.umaine.edu/theses/pdf/HedefineEK2006.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Moody, Daniel. "Framing the New Right: An Analysis of News Media Representations of Right-Wing Extremism in Germany." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1554215327432474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Janz, Linda, and University of Lethbridge Faculty of Arts and Science. "Privacy and the internet : differences in perspectives." Thesis, Lethbridge, Alta. : University of Lethbridge, Faculty of Arts and Science, 1997, 1997. http://hdl.handle.net/10133/64.

Full text
Abstract:
This study examined results of a World Wide Web survey that used the framework of domain theory of moral development to examine attitudes of Internet users assuming perspectives of victims, aggressors and bystanders toward privacy issues. The effect of a monetary incentive was tested on two perspectives; effects of three moderating variables, employment status, newsgroup/mailing list membership and culture, were also tested. In the process of examing interactions, an evaluation determined if changes in attitudes indicated movement along a morality continuum. Results show that victims are more concerned than aggressors, and bystanders take a moralizing stance regardless of domain. Results of the monetary incentive test suggest that privacy is for sale. Employed respondents are more concerned than non-employed respondents; membership has little effect. Effects of culture do not support the hypotheses. Implications are that moral judgements are a function of perspective and domain, allowing flexibility along a morality continuum due to situational deviations.
xii, 112 leaves ; 28 cm.
APA, Harvard, Vancouver, ISO, and other styles
29

Bhaduri, Anuket. "User Controlled Privacy Protection in Location-Based Services." Fogler Library, University of Maine, 2003. http://www.library.umaine.edu/theses/pdf/BhaduriA2003.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Ophoff, Jacobus Albertus. "WSP3: a web service model for personal privacy protection." Thesis, Port Elizabeth Technikon, 2003. http://hdl.handle.net/10948/272.

Full text
Abstract:
The prevalent use of the Internet not only brings with it numerous advantages, but also some drawbacks. The biggest of these problems is the threat to the individual’s personal privacy. This privacy issue is playing a growing role with respect to technological advancements. While new service-based technologies are considerably increasing the scope of information flow, the cost is a loss of control over personal information and therefore privacy. Existing privacy protection measures might fail to provide effective privacy protection in these new environments. This dissertation focuses on the use of new technologies to improve the levels of personal privacy. In this regard the WSP3 (Web Service Model for Personal Privacy Protection) model is formulated. This model proposes a privacy protection scheme using Web Services. Having received tremendous industry backing, Web Services is a very topical technology, promising much in the evolution of the Internet. In our society privacy is highly valued and a very important issue. Protecting personal privacy in environments using new technologies is crucial for their future success. These facts, combined with the detail that the WSP3 model focusses on Web Service environments, lead to the following realizations for the model: The WSP3 model provides users with control over their personal information and allows them to express their desired level of privacy. Parties requiring access to a user’s information are explicitly defined by the user, as well as the information available to them. The WSP3 model utilizes a Web Services architecture to provide privacy protection. In addition, it integrates security techniques, such as cryptography, into the architecture as required. The WSP3 model integrates with current standards to maintain their benefits. This allows the implementation of the model in any environment supporting these base technologies. In addition, the research involves the development of a prototype according to the model. This prototype serves to present a proof-of-concept by illustrating the WSP3 model and all the technologies involved. The WSP3 model gives users control over their privacy and allows everyone to decide their own level of protection. By incorporating Web Services, the model also shows how new technologies can be used to offer solutions to existing problem areas.
APA, Harvard, Vancouver, ISO, and other styles
31

Moller, Kerry. "The Right to Digital Privacy: Advancing the Jeffersonian Vision of Adaptive Change." Scholarship @ Claremont, 2014. http://scholarship.claremont.edu/cmc_theses/936.

Full text
Abstract:
The relationship between privacy, technology, and law is complex. Thomas Jefferson’s prescient nineteenth century observation that laws and institutions must keep pace with the times offers a vision for change. Statutory law and court precedents help to define our right to privacy, however, the development of new technologies has complicated the application of old precedents and statutes. Third party organizations, such as Google, facilitate new methods of communication, and the government can often collect the information that third parties receive with a subpoena or court order, rather than a Fourth Amendment-mandated warrant. Privacy promotes fundamental democratic freedoms, however, under current law, the digital age has diminished the right to privacy in our electronic communications data. This work explores the statutory and constitutional law protecting our right to privacy, as well as the inadequacies that have developed with the digital revolution. With commonplace use of third parties to facilitate electronic communication, our courts and lawmakers must amend current laws and doctrines to protect the privacy of communications in the digital age. To provide clarity and appropriate data privacy protections, the following clarifications and amendments should be made to the third party doctrine and the Stored Communications Act (SCA): 1) third party doctrine should only apply to context data, 2) content data should be protected by the Fourth Amendment, 3) the SCA should eliminate the distinction between Remote Computing Services (RCS) data and Electronic Communication Services (ECS) data, and 4) the SCA should require warrants for all content data acquisition.
APA, Harvard, Vancouver, ISO, and other styles
32

O'REILLY, JOSEPH MATTHEW. "LEGAL PRIVACY AND PSYCHOLOGICAL PRIVACY: AN EVALUATION OF COURT ORDERED DESIGN STANDARDS (ENVIRONMENTAL, PSYCHIATRIC HOSPITALS, ARCHITECTURE)." Diss., The University of Arizona, 1985. http://hdl.handle.net/10150/187916.

Full text
Abstract:
The legal system and the social sciences share an interest in privacy but have developed separate conceptualizations of the concept. The result is two similar but conflicting theories of privacy that make different assumptions about how people behave and how that behavior can be controlled. The purpose of this study was to begin testing these theories by examining the operationalization of privacy through mandated standards intended to ensure privacy for the mentally ill. Specifically, the standards set in Wyatt v. Stickney, which reflect the idea that privacy is a sphere of space free from outside intrusion, were examined to see if they did indeed ensure privacy. Using two units in a facility that met the standards mandated by the court in Wyatt v. Stickney, the research examined staff and patient perceptions of privacy. Thirty-five patients were interviewed and twenty-four staff completed questionnaires on the overall habitability of the unit and patient privacy. Results indicated that the Wyatt court's operationalization of privacy as primarily a visual phenomena was inadequate and although the specific standards ordered to ensure privacy were reported to be effective by a simple majority of patients, overall patients reported a lack of privacy. Staff responses were generally in agreement with patients but they tended to use more extreme or stronger ratings. The present study also has implications for the legal conceptualization of privacy. It was found that privacy was perceived as important by patients; that autonomy as evidenced by control was an important issue for a minority of patients; and, the right of selective disclosure was not a major concern of patients. Needed future areas of research that were identified included: comparing privacy ratings across a variety of group living situations, comparing the mentally ill's conceptualizations of privacy from others, determining the effect of privacy on the therapeutic goals of an institution and therapeutic outcome and, determine the relative importance of privacy to the mentally ill.
APA, Harvard, Vancouver, ISO, and other styles
33

Andonie, Luisa. "Whistleblower protection programs compromise the reported taxpayer's privacy." Universitätsbibliothek Leipzig, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-224035.

Full text
Abstract:
The United States Whistleblower Program’s inadequate protections have placed the privacy and confidentiality rights of United States taxpayers in a vulnerable state. By using the United States Whistleblower Program as an example, this paper seeks to illustrate the risk of eroding the confidentiality and privacy rights of the taxpayer, which is a risk that other national and international governments should likewise attempt to mitigate in their own whistleblower protection programs.
APA, Harvard, Vancouver, ISO, and other styles
34

Wagner, Sylke. "Das Websurfen und der Datenschutz : ein Rechtsvergleich unter besonderer Berücksichtigung der Zulässigkeit sogenannter Cookies und Web Bugs am Beispiel des deutschen und U.S.-amerikanischen Rechts /." Frankfurt am Main [u.a.] : Lang, 2006. http://www.gbv.de/dms/ilmenau/toc/511997450.PDF.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Hutchins, Travis Zane. "A familiar danger: The reemergence of the far right eastern Germany." Connect to online resource, 2007. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1442963.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Barclay, Courtney Anne. "Balancing the right to privacy and the right of access access to child-abuse records in the 50 states /." [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0002305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Kan, Chi-keung. "A review of the implementation of the personal data (privacy) ordinance in the Hong Kong Correctional Services Department." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B1971015X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Simsek, Yilmaz. "New Surveillance Technologies and the Invasion of Privacy Rights." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4252/.

Full text
Abstract:
Definition of privacy has changed by the changes and improvements in information and surveillance technologies. These changes and improvement need new legal decisions for new kinds of privacy invasions. This study explores the scope of privacy right, particularly when a technological surveillance has occurred by law enforcement agencies. It focuses in particular on increasing law enforcements' surveillance technologies and devices that have the potential to impact citizens' information privacy. These increasing changes in surveillance technologies have important implications both for law enforcements and citizens. This study also discusses increasing law enforcement surveillance for the public's security, changes of the laws that allow law enforcements to use new surveillance powers as a war on terrorism, and the citizens concerns of information privacy. A particular attention is given to the recent public opinion surveys which show citizens' increasing privacy concerns. Finally, a set of recommendations to figure out security-privacy debate and reduce the privacy concerns of the citizens is offered.
APA, Harvard, Vancouver, ISO, and other styles
39

Sinkovits, Angela M. "Glass houses: the end of privacy." Honors in the Major Thesis, University of Central Florida, 2000. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/206.

Full text
Abstract:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf.edu/Systems/DigitalInitiatives/DigitalCollections/InternetDistributionConsentAgreementForm.pdf You may also contact the project coordinator, Kerri Bottorff, at kerri.bottorff@ucf.edu for more information.
Bachelors
Arts and Sciences
Liberal Arts
APA, Harvard, Vancouver, ISO, and other styles
40

Sun, Zhendong 1978. "Balancing freedom of the press and the right to privacy : lessons for China." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99152.

Full text
Abstract:
The conflict inherent in balancing freedom of the press and the right to privacy invariably presents some controversial legal issues. In addressing the legal dilemmas posed by these competing interests, an in-depth analysis of the conceptual value of these two equally important rights becomes a preliminary starting point. Through its exploration of the history and development of the press and privacy laws in both the United States and Canada, this thesis examines the fundamental values enshrined in these two rights. The author holds that the freedom of the press contains no privilege under the law, but that it serves as the means to promote the public's right to know in a democratic society, while the right to privacy offers an individual the autonomy to regulate his private affairs. By analyzing arguments of "pubic interest," "public figure," and "public privacy," the author compares the theoretical approaches to and practical attempts at striking a balance between the interests of the press and the privacy of the individual in the United States and Canada. Finally, the essay proposes how these experiences may contribute to the construction of relevant Chinese laws.
APA, Harvard, Vancouver, ISO, and other styles
41

Craig, John D. R. "Legal principles for the protection of the right of privacy in the workplace." Thesis, University of Oxford, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.286833.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Weston, Mindy. "The Right to Be Forgotten: Analyzing Conflicts Between Free Expression and Privacy Rights." BYU ScholarsArchive, 2017. https://scholarsarchive.byu.edu/etd/6453.

Full text
Abstract:
As modern technology continues to affect civilization, the issue of electronic rights grows in a global conversation. The right to be forgotten is a data protection regulation specific to the European Union but its consequences are creating an international stir in the fields of mass communication and law. Freedom of expression and privacy rights are both founding values of the United States which are protected by constitutional amendments written before the internet also changed those fields. In a study that analyzes the legal process of when these two fundamental values collide, this research offers insight into both personal and judicial views of informational priority. This thesis conducts a legal analysis of cases that cite the infamous precedents of Melvin v. Reid and Sidis v. F-R Pub. Corp., to examine the factors on which U.S. courts of law determinewhether freedom or privacy rules.
APA, Harvard, Vancouver, ISO, and other styles
43

Lam, Wai-hong, and 林偉雄. "Review on effectiveness of policy on privacy protection." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B46757740.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Givens, Lynn Marie, and Jesse Ornelas. "Degree of privacy afforded in long-term care." CSUSB ScholarWorks, 2008. https://scholarworks.lib.csusb.edu/etd-project/3335.

Full text
Abstract:
The purpose of this study was to assess the level of privacy among the elderly living in long-term nursing and communal facilities. The data was collected through a probability sampling at the Veterans Home of California in Barstow.
APA, Harvard, Vancouver, ISO, and other styles
45

Moreno, Brandon Alexander. "Images in the Rhetoric of the Far-Right in France and Germany." Thesis, Northern Arizona University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13421845.

Full text
Abstract:

The purpose of this research is to explore the shifts in the rhetoric utilized by the European Far-Right political parties in response to terror attacks. The subjects of study are the National Front and Alternative for Germany within France and Germany respectively with both states having experienced attacks by Muslim terrorists within recent years. This study was conducted through the employment of Image Theory through a content analysis, specifically through the lens of the Barbarian and Enemy Images and if they can be observed in either party’s rhetoric. This shift in rhetoric can be seen expressed by both parties as they acted and reacted through their policy platforms over the years of observation.

APA, Harvard, Vancouver, ISO, and other styles
46

Le, Poire Beth Ann 1964. "Communication strategies to restore or preserve informational and psychological privacy; the effects of privacy invasive questions in the health care context." Thesis, The University of Arizona, 1988. http://hdl.handle.net/10150/276798.

Full text
Abstract:
This investigation explored the role of informational and psychological privacy in the health context by examining the relationship between type of relationship (physician versus acquaintance), type of observation (self-report versus observation), and communication strategies used to restore or preserve privacy (interaction control, dyadic strategies, expressions of negative arousal, blocking and avoidance, distancing, and confrontation). It was hypothesized and confirmed that individuals report exhibiting more behaviors to restore or preserve informational privacy in response to an informationally privacy-invasive question posed by an acquaintance than by a physician. The hypothesis that presentation of an informationally privacy invasive question by the physician causes patients to exhibit more communication strategies after the privacy invasive question than before, was unsupported. Finally, the hypothesis that individuals actually exhibit more privacy restoration behaviors than they report using in a similar situation with their physician was also unsupported. Patients reported using more communication strategies than they actually exhibited. One confound to the self reports was that videotaped participants reported the use of fewer direct privacy restoring communication strategies than non-videotaped.
APA, Harvard, Vancouver, ISO, and other styles
47

Mangwanda, Nigel. "The impact of the right to be forgotten on privacy and online information disclosure." Diss., University of Pretoria, 2015. http://hdl.handle.net/2263/52439.

Full text
Abstract:
The question of how much control individuals have over their data online has taken centre stage with the introduction of the European Union s right to be forgotten (RTBF) principle. However, this principle does not explain the impact and possible consequences that this right has on an individual s willingness to disclose information online. This research examines how an individual s privacy calculus is affected if he or she discloses person ally identifiable information online to service providers. Two hypotheses, the first which, related to the influence the right to be forgotten has on the privacy calculus and, secondly, dealing with the impact of such on information disclosure are assessed using quantitative approach based on an online survey (n=502). The results were analysed using nonparametric tests, which included Spearman s Correlation, Krusal Wallis and the Mann-Whitney U tests. The findings show that the RTBF principle does influence an individual s thought process prior to he or she disclosing information online. Furthermore, the findings indicated individuals with a medium and high degree of information disclosure would disclose more personally identifiable information if they were convinced that information they provided was not discernible. Some of the findings in this research could be of significance in the areas of information technology, international and criminal law, psychology, politics and human rights. Additionally, this study could be used to address individual privacy through amendments to privacy policies, laws and changes in software engineering practices.
Mini Dissertation (MBA)--University of Pretoria, 2015.
sn2016
Gordon Institute of Business Science (GIBS)
MBA
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
48

McGoldrick, Albert W. "Confidentiality of tribunal acts the civil law implications in the U.S.A. of canon 1598, [par.] 1 /." Theological Research Exchange Network (TREN), 2005. http://www.tren.com.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Harrysson, Alexandra, and Julia Olsson. "Personalization paradox: the wish to be remembered and the right to be forgotten : A qualitative study of how companies balance being personal while protecting consumers’ right to privacy." Thesis, Uppsala universitet, Företagsekonomiska institutionen, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-387611.

Full text
Abstract:
Many argue that personalization is needed in a modern marketing strategy. Whilst there are several positive aspects of personalization, e.g. improved customer satisfaction rates, it can also lead to firms being perceived as intrusive and elicit privacy concerns. This dilemma describes the personalization paradox, which refers to the two-sided results of using personalized communication by collecting and analyzing consumer data. To address the issue of how firms balance the need for personalization while still respecting consumers’ privacy, previous researchers have mainly investigated the issue from the consumer perspective. However, the consumer is believed to display a paradoxical behavior in regards to personalization. Therefore, we have addressed this issue through interviewing 12 company representatives from 7 companies. Our findings indicate that companies are mindful when creating personalized content and do acknowledge the issues with privacy and the risk of being perceived as intrusive. To overcome the personalization paradox, firms are not explicit about their data analysis in their personalized communication as this can lead to consumers feeling discomfort. Finally, an essential way that firms can prevent privacy concerns is to create relevant content as this outweighs feelings of discomfort. These findings to a certain extent do not reflect the empirical research on the topic, however the discrepancies may exist as previous studies were conducted from the consumer side.
APA, Harvard, Vancouver, ISO, and other styles
50

Beltran, Veda Elizabeth. "Xenophobia, Populism, and the Rise of the Far-Right in France and Germany." Scholarship @ Claremont, 2017. http://scholarship.claremont.edu/cmc_theses/1478.

Full text
Abstract:
The purpose of this study is to further examine the populist wave that has struck the West, with specific regards to France and Germany. The growing anti-immigrant sentiment, the discontent with “establishment” politics, and fear-mongering tactics has given rise to far-right political parties such as the National Front and the Alternative for Germany. These political parties prove threatening to the democratic institutions in place, for they wish to limit the liberties of those who seem too different. Through delving into the core values of these countries and specific events revolving around foreigners, I explain how xenophobic ideology has been allowed to permeate through France and Germany’s society and has increased the legitimacy of political leaders like Marine Le Pen and Frauke Petry.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography