Academic literature on the topic 'Privacy, Right of Taiwan'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy, Right of Taiwan.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Privacy, Right of Taiwan"

1

Sherstoboeva, Elena, and Valentina Pavlenko. "Trends in East Asian policies on digital surveillance tools during the COVID-19 pandemic." Journal of Digital Media & Policy 12, no. 1 (March 1, 2021): 47–65. http://dx.doi.org/10.1386/jdmp_00047_1.

Full text
Abstract:
This article investigates how digital surveillance tools used by East Asian governments against COVID-19 affect privacy and personal data protection. It applies doctrinal legal analysis and case study to compare national regulations of these tools as well as their implementation in China, Hong Kong, Macau, Taiwan, Japan and South Korea. The approaches range considerably from total (China) to selective surveillance, which, however, seems overly excessive towards privacy of certain social groups, exacerbating social stratification and business disruptions in East Asia. The article argues that selective surveillance models vary across the region from voluntary selective (Japan) to compulsory selective surveillance (Hong Kong, Macau, Taiwan, South Korea) and differ in terms of privacy and related rights. Yet, the increased risks of data misuse and leakages in all the East Asian states and territories need effective legal mechanisms for privacy and data protection that pay sufficient attention to public scrutiny and independent regulators.
APA, Harvard, Vancouver, ISO, and other styles
2

Hsieh, Yi-Ping, Yun-Ju Wang, Ling-Yi Feng, Li-Tzy Wu, and Jih-Heng Li. "Mifepristone (RU-486®) as a Schedule IV Controlled Drug—Implications for a Misleading Drug Policy on Women’s Health Care." International Journal of Environmental Research and Public Health 19, no. 14 (July 8, 2022): 8363. http://dx.doi.org/10.3390/ijerph19148363.

Full text
Abstract:
Background: Mifepristone (RU-486) has been approved for abortion in Taiwan since 2000. Mifepristone was the first non-addictive medicine to be classified as a schedule IV controlled drug. As a case of the “misuse” of “misuse of drugs laws,” the policy and consequences of mifepristone-assisted abortion for pregnant women could be compared with those of illicit drug use for drug addicts. Methods: The rule-making process of mifepristone regulation was analyzed from various aspects of legitimacy, social stigma, women’s human rights, and access to health care. Results and Discussion: The restriction policy on mifepristone regulation in Taiwan has raised concerns over the legitimacy of listing a non-addictive substance as a controlled drug, which may produce stigma and negatively affect women’s reproductive and privacy rights. Such a restriction policy and social stigma may lead to the unwillingness of pregnant women to utilize safe abortion services. Under the threat of the COVID-19 pandemic, the US FDA’s action on mifepristone prescription and dispensing reminds us it is time to consider a change of policy. Conclusions: Listing mifepristone as a controlled drug could impede the acceptability and accessibility of safe mifepristone use and violates women’s right to health care.
APA, Harvard, Vancouver, ISO, and other styles
3

Lee, Tsung-Ling. "The Rise of Technocracy and the COVID-19 Pandemic in Taiwan: Courts, Human Rights, and the Protection of Vulnerable Populations." German Law Journal 22, no. 6 (September 2021): 1115–32. http://dx.doi.org/10.1017/glj.2021.49.

Full text
Abstract:
AbstractDriven by the need to address the immediate public health threats of the COVID-19 pandemic, this has seen a rise of the technocratic mode of governance around the world. A technocratic approach is evidence-based and relies upon the guidance of experts to respond to the public health crisis. The rise of technocracy reflects a utilitarian calculus that seeks to preserve the greater good. Taiwan’s pandemic response exemplifies the strengths and weaknesses of this type of governance. Based on an analysis of the relevant case law of the Taiwan Constitutional Court, legislation, and political developments this Article takes a legal-historical look and traces the current technocratic approach—defined for this Article as an experts-driven and procedural-driven process—which is a hallmark of Taiwan’s pandemic response. Examining Taiwan’s pandemic response through a human rights lens sheds light on a more complex relationship between the collective right to health and life, and the individual rights to health, work, privacy, and liberty during the pandemic.
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Li-Wei, Su-Rong Yan, Shih-Yung Wei, and Yun-Han Zhang. "Exploring the Privacy and Rights of Healthcare Systems - A Healthcare System Based in Taiwan." Saudi Journal of Economics and Finance 4, no. 8 (August 14, 2020): 406–11. http://dx.doi.org/10.36348/sjef.2020.v04i08.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

辛昀浩, 辛昀浩. "我國受僱者心理資訊隱私權保護法制之研究——美國經驗之啟示." 國立中正大學法學集刊 76, no. 76 (July 2022): 117–99. http://dx.doi.org/10.53106/172876182022070076003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Chih-Yao, and Ren-Jye Dzeng. "Evaluating Ancillary Business Scale for PPP-BOT Projects: A Social Housing BOT Case in Taiwan." Sustainability 11, no. 5 (March 7, 2019): 1415. http://dx.doi.org/10.3390/su11051415.

Full text
Abstract:
Due to budgetary constraints, the government releases the right to ancillary business development for private investors to increase profits in PPP projects. However, the ancillary business scale is not specified in the regulations, and there is little relevant research on modeling the scale. Thus, our research aims to create a model with mathematical analysis to evaluate the ancillary business scale. The model is constructed based on the discounted cash flow model to calculate the ancillary business scale attracting private investors with a case study of a social housing project. For this case, the calculated ancillary business minimum scale (ratio of ancillary business to project in total floor area) based on the 7-year (2009–2016) and 17-year (2000–2016) data are 30.81% and 52.79%, respectively; neither is able to meet the scale listed in the tender condition regulated by the government, i.e., 25%. Moreover, this study performs a sensitivity analysis on the expected rate of return and rent discount of the case. The government needs to raise the proportion of ancillary businesses or to increase the rent of social housing to successfully attract private investors.
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Chingning. "Strategic Information Technology Compensation." Journal of Global Information Management 27, no. 4 (October 2019): 16–45. http://dx.doi.org/10.4018/jgim.2019100102.

Full text
Abstract:
The 2008 financial crisis has made many high-tech firms vulnerable. Some non-American firms (e.g. in Taiwan) have even granted their IT professionals a “no-pay break” to reduce firms' financial uncertainty. The crisis leads to a need to re-examine managerial compensation thinking from a cross-cultural perspective. Drawing on cross-cultural case studies in Taiwan, a collectivist culture, and in the United States, an individualist culture, this research explores managerial thinking on how to align strategic IT compensation with personnel's immigrant status and IT sourcing strategies in different industrial and national/cultural contexts. It also explores how firms utilize nonmonetary compensation in different cultures. Compensation for IT professionals in Taiwan are reportedly to be more uniform because of the feature of collectivist culture. Compensation for IT professionals in the United States are reportedly more fluid thanks to a frontier culture and individualism. Therefore, negotiable competitive pay is emphasized. Both Taiwan and the US have suffered from wage stagnation for decades. In Taiwan, this stagnation may be related to a depreciation of higher degrees since the number of university graduates has been increased fivefold in two decades and IT related degrees have been amidst popular majors which lead to oversupply in IT workforce. In the US, this stagnation may be related to economic recession and reduced IT investment/full-time positions, dropping IT enrollment, IT skill/education-job mismatch, and increased reliance on IT contractors in an emerging IT gig economy. From a cultural perspective, “still under employment” in a Confucian society which emphasizes face-saving that has value in its own right and it explains why some firms in Taiwan granted IT professionals a “no-pay break” instead of immediate layoff to cope with the 2008 crisis. Meanwhile, to cope with the challenge of IT skill/education-job mismatch in the United States, using a domestic training program as nonmonetary compensation may be a viable alternative to IT firms whose IT compensation strategies emphasize lucrative pay or poach IT talents rather than nurturing IT talents. Theoretically, economic/organization theories derived from western experiences or ideologies in 1900s, where industrialization, private/hierarchical organizations, and higher education were booming, may not fit non-western countries' experiences or today's world where the trends of outsourcing, IT contracting, gig economy and depreciation of education are emerging.
APA, Harvard, Vancouver, ISO, and other styles
8

Hofmann, Reto. "What's Left of the Right: Nabeyama Sadachika and Anti-communism in Transwar Japan, 1930–1960." Journal of Asian Studies 79, no. 2 (November 12, 2019): 403–27. http://dx.doi.org/10.1017/s0021911819000688.

Full text
Abstract:
This article examines the thought and career of Nabeyama Sadachika (1901–79) from communist militant in 1920s Japan to his conversion to the emperor system in the 1930s and, finally, to his role in shaping the postwar anti-communist movement. Using Nabeyama's recently released private papers, the article shows how he brokered his anti-communist expertise to a range of postwar actors and institutions—the police, the Self-Defense Forces, business circles, politicians—as well as to foreign states, especially the Republic of China (Taiwan). These networks indicate that important sections of Japan's postwar establishment rallied behind anti-communism in the face of reforms that threatened their power at home and their vision for Japan in the world order after 1945. As a transwar history, this article adds to our understanding of Japan's transition from the age of empire to that of liberal democracy by qualifying narratives about the “progressive” nature of postwar Japanese politics. It argues that the vitality of anti-communism is symptomatic of the durability of particular political traditions, and reveals that, despite the significant reforms that Japan underwent after 1945, the Right was able to claim a space in the country's political culture that has been neglected by historians.
APA, Harvard, Vancouver, ISO, and other styles
9

Chou, Hsin-Ju, and Kai-Yu Tseng. "The Experience of Emergency Nurses Caring for Patients with Mental Illness: A Qualitative Study." International Journal of Environmental Research and Public Health 17, no. 22 (November 18, 2020): 8540. http://dx.doi.org/10.3390/ijerph17228540.

Full text
Abstract:
Background: The medical burden of psychiatric disorders continues to increase and has caused a major impact on health, society, human rights, and economy in the world. Patients with mental illness have a higher ratio of emergency department visits than non-psychiatric patients. Psychiatric disorder-related emergency department care is a stress-causing factor in emergency department work. Therefore, the purpose of this study was to explore the experience of emergency department nurses in caring for patients with mental illness. Methods: A descriptive qualitative research design with purposive sampling was adopted. A total of 17 nurses working in the emergency department in central Taiwan were recruited. In-depth semi-structured interviews were conducted and thematic content analysis was performed. Results: Four themes and six sub-themes emerged that described the experiences of emergency nurse caring for patients with mental illness: (1) Mindset; (2) The predicament of psychiatric care: Violence and isolation and helplessness, and lack of therapeutic communication skills; (3) The influence of open space: insufficient safety and privacy; and (4) The educational needs of psychiatric nursing: improving cognition in psychiatric patients and changing negative thinking into positive thinking. Conclusions: The results revealed the experience of emergency nurses in caring for patients with mental illness. Emergency psychiatric nursing training related to foundational psychiatric knowledge, communication skill, concept of recovery, coping with violence restraining are needed for nurses who work in emergency departments.
APA, Harvard, Vancouver, ISO, and other styles
10

Aung, Myo Nyein, Claire Stein, Wei-Ti Chen, Vandana Garg, Monika Saraswati Sitepu, Nguyen Thi Dang Thu, Carlos Primero D. Gundran, et al. "Community responses to COVID-19 pandemic first wave containment measures: a multinational study." Journal of Infection in Developing Countries 15, no. 08 (August 31, 2021): 1107–16. http://dx.doi.org/10.3855/jidc.15254.

Full text
Abstract:
Introduction: National strategies to control COVID-19 pandemic consisted mostly of social distancing measures such as lockdowns, curfews, and stay-home guidelines, personal protection such as hand hygiene and mask wearing, as well as contact tracing, isolation and quarantine. Whilst policy interventions were broadly similar across the globe, there were some differences in individual and community responses. This study explored community responses to COVID-19 containment measures in different countries and synthesized a model. This exaplains the community response to pandemic containment measures in the local context, so as to be suitably prepared for future interventions and research. Methodology: A mutlinational study was conducted from April-June 2020 involving researchers from 12 countries (Japan, Austria, U.S., Taiwan, India, Sudan, Indonesia, Malaysia, Philippines, Myanmar, Vietnam and Thailand). Steps in this research consisted of carrying out open-ended questionnaires, qualitative analyses in NVivo, and a multinational meeting to reflect, exchange, and validate results. Lastly, a commuinty response model was synthesized from multinational experiences. Results: Effective communication is key in promoting collective action for preventing virus transmission. Health literacy, habits and social norms in different populations are core components of public health interventions. To enable people to stay home while sustaining livelihoods, economic and social support are essential. Countries could benefit from previous pandemic experience in their community response. Whilst contact tracing and isolation are crucial intervention components, issues of privacy and human rights need to be considered. Conclusions: Understanding community responses to containment policies will help in ending current and future pandemics in the world.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Privacy, Right of Taiwan"

1

Tao, Ran. "The Right to Privacy." Scholarship @ Claremont, 2019. https://scholarship.claremont.edu/scripps_theses/1338.

Full text
Abstract:
Contemporary debates about the right to privacy were inaugurated by Samuel Warren and Louis Brandeis’ article on the topic. While Warren and Brandeis understand the right to privacy as a stand-alone right, J. J. Thomson interprets it as a cluster of rights that itself intersects with other rights. Despite such disagreement, both accounts point to a deep connection between property rights and one’s right to herself. A close examination of the Lockean and Kantian concepts of property confirms this. In particular, Arthur Ripstein’s Kantian account of innate right and property rights suggests that property rights are derived from the innate right one has in herself. Building on this account, I suggest that one’s innate right and property rights grant one the exclusive control to herself and to her property. Such exclusive control can be conceptualized as the basis for one’s privileged space, any unauthorized access to which and any unauthorized use of what lies within which constitute violation of one’s right to privacy.
APA, Harvard, Vancouver, ISO, and other styles
2

Lander, Angelina M. "Privacy, surveillance and the state a comparison of U.S. and British privacy rights /." Orlando, Fla. : University of Central Florida, 2009. http://purl.fcla.edu/fcla/etd/CFE0002772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wolfson, Susan Ann. "The right to privacy and education." Thesis, University College London (University of London), 1989. http://discovery.ucl.ac.uk/10019704/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gibb, Susan Jennifer. "Privacy and Australian law." Title page, contents and abstract only, 1987. http://web4.library.adelaide.edu.au/theses/09PH/09phg4372.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Al-Rawashdeh, Sami H. "Is privacy brought home? : criminal justice and the right to privacy." Thesis, University of Aberdeen, 2003. http://digitool.abdn.ac.uk/R?func=search-advanced-go&find_code1=WSN&request1=AAIU176274.

Full text
Abstract:
This thesis is concerned with protection of the right to privacy in the English and Scottish criminal justice systems. The aim of this research is to consider the extent to which privacy has been recognised in both criminal justice systems. It analyses the extent to which the right to privacy is protected by the substantive criminal law of those jurisdictions, as well as in their criminal procedural law. A part of the examination will address the question of whether there should be a criminal offence of violating the privacy of another. The thesis is mainly devoted to addressing whether the right to respect for private life has a place within criminal justice theory and practice. The protection of privacy in the criminal justice system is the predominant subject of this thesis for two main reasons. First, this is an important topic that has been neglected. Prior to this thesis no one had yet addressed this topic at any length as a distinct subject. The protection of privacy in the criminal justice system and the use of substantive criminal law to enforce the privacy rights of victims have received minimal attention in the English jurisprudence. No comprehensive legal and theoretical analysis of the topic could be found in English or Scottish law. Therefore, this topic was crying out for new insights and perspectives. Secondly, the Human Rights Act 1998 incorporates into the UK law certain rights and freedoms set out in the European Convention on Human Rights, including the right to respect for private life enshrined by Article 8. The aim of the Act is to "bring rights home" and give further effect to rights and freedoms guaranteed under the European Convention. The Act requires all public authorities to act in a way which is compatible with the Convention rights. Since the incorporation of the European Convention on Human Rights into United Kingdom law, it is particularly appropriate to ask whether English and Scottish criminal lawyers need to add privacy to their essential lexicon. The Human Rights Act 1998 could be expected to have a profound impact on the right to privacy within the criminal justice system. The European Convention obliges the Contracting States to bring their criminal justice systems into line with the European Convention requirements to protect the fundamental human rights in it. The thesis has the following objectives. First, to address the extent to which the right to privacy is protected by the substantive criminal law and whether privacy rights have been respected in criminal procedure laws. Secondly, to highlight the impact of the Human Rights Act of 1998 on the right to privacy in the criminal justice arena. This thesis shows that although right to privacy has been recognised by the European Convention and incorporated by the Human Rights Act 1998, the criminal justice systems in England and Scotland display little respect for privacy rights. In other words, this study has demonstrated that, as far as privacy is concerned, it is misleading and inaccurate to say that rights have been brought home.
APA, Harvard, Vancouver, ISO, and other styles
6

Mitroff, Melanie. "Privacy : a constitutional right that threatens democracy /." Lynchburg, VA : Liberty University, 2007. http://digitalcommons.liberty.edu.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Heite, Martin. "Privacy, Constitutions and the Law of Torts: a Comparative and Theoretical Analysis of Protecting Personal Information Against Dissemination in New Zealand, the UK and the USA." University of Canterbury. Law, 2008. http://hdl.handle.net/10092/2955.

Full text
Abstract:
The New Zealand Court of Appeal has recently acknowledged the existence of a freestanding tort of invasion of privacy in Hosking v Runting. The tort is in its infancy and the courts are still grappling with essential problems, the most prominent of which is the conflict with countervailing interests in freedom of speech. In need of guidance, the courts turn to overseas authorities, predominantly from the United Kingdom and the United States of America. The commonly found descriptive nature of the comparison invites a broader analysis of these jurisdictions. In this thesis, I offer a theoretically informed comparative law analysis of New Zealand's new tort with the American public disclosure of private facts tort and the British extended breach of confidence action. In all three jurisdictions, the conflict of privacy with individual and societal concerns in freedom of speech has led to an exten-sion of (quasi-) constitutional norms derived, for instance, from the New Zealand Bill of Rights Act 1990 into the common law sphere – the horizontal effect. The horizontal application of constitutional rights poses significant legal problems to the common law, because it has learned to deal with duties rather than rights. The time has come to re-consider the nature of rights in both constitutional and tort law. The comparison shows that New Zealand has effectively adopted two torts – one following the duty-based lead of the United States of America and an alternative modelled along the lines of the more rights-orientated British law. The law of the United Kingdom and the USA differ to a degree that calls their comparability into question. I present the preferable British ap-proach as a 'constitutionalised common law tort of privacy.' The results also show that this model represents a competitive third way to traditional solutions based on common law or statute by means of utilising a statutory human rights instrument as an analytical framework for the common law.
APA, Harvard, Vancouver, ISO, and other styles
8

Johnson, Virginia Wilson. "Architectural correlates of privacy : the dynamics of privacy regulation /." Diss., This resource online, 1990. http://scholar.lib.vt.edu/theses/available/etd-07132007-143142/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Marasinghe, S. C. "A child's right to privacy in international law." Thesis, University of Oxford, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.413108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Skahill, Tina M. "Striking the right balance : fusion centers and privacy." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5243.

Full text
Abstract:
CHDS State/Local
Approved for public release; distribution is unlimited
After the events of 9/11, the number of fusion centers rapidly multiplied. As a result, state and local agencies that operated the centers adopted a myriad of policies. This thesis seeks to answer how fusion centers can implement policies as to operational structure and transparency that simultaneously safeguard against abuse of citizens' privacy while facilitating the collection, maintenance, and dissemination of information. Two methods of research are utilized: policy analysis and policy options analysis. This thesis examines existing federal guidelines, federal case law, and various federal statutes and regulations. Moreover, the thesis explores three policy options as possible decision-making tools for fusion centers: 1) mandatory federal guidelines, 2) imposition of a balancing test and administrative review process, and 3) a compulsory reasonable-suspicion requirement. In the end, this thesis recommends imposition of all three policies.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Privacy, Right of Taiwan"

1

editor, Chen Haifan, and Zhao Guoqiang editor, eds. Ge ren zi liao de fa lü bao hu: Fang yan Zhongguo nei di, Xianggang, Aomen ji Taiwan = Legal protection of personal data : perspectives from mainland China, Hong Kong, Macau and Taiwan. Beijing Shi: She hui ke xue wen xian chu ban she, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Raymond, Wacks, ed. Privacy. New York, NY: New York University Press, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nancy, Porteous, Beauchamp Patrick, Ekos Research Associates, and Canada Communications Canada, eds. Privacy revealed: The Canadian privacy survey. [Ottawa: Communications Canada, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hoobler, Dorothy. Your right to privacy. Edited by Hoobler Thomas and Morris Richard Brandon 1904-. New York: F. Watts, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

1957-, Kennedy Caroline, ed. The right to privacy. New York: Knopf, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Privacy: The lost right. Oxford [UK]: Oxford University Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Alderman, Ellen. The right to privacy. New York: Vintage Books, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Alderman, Ellen. The right to privacy. New York: Vintage Books, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

The right to privacy. Philadelphia: National Catholic Bioethics Center, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

The right to privacy. New York: Chelsea House, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Privacy, Right of Taiwan"

1

Ho, Chih-hsing. "Configuration of the Notion of Privacy as a Fundamental Right in Taiwan—A Comparative Study of International Treaties and EU Rules." In Economics, Law, and Institutions in Asia Pacific, 423–36. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-0350-0_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Harkiolakis, Nicholas. "Right to Privacy." In Encyclopedia of Corporate Social Responsibility, 2082–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-28036-8_453.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Moore, Roy L., Michael D. Murray, and Kyu Ho Youm. "Right of Privacy." In Media Law and Ethics, 180–227. 6th ed. New York: Routledge, 2021. http://dx.doi.org/10.4324/9781003166870-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Moore, Roy L., Michael D. Murray, J. Michael Farrell, and Kyu Ho Youm. "Right of Privacy." In Media Law and Ethics, 402–50. 5th edition. | New York : Routledge, [2018] |: Routledge, 2017. http://dx.doi.org/10.4324/9781315270746-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Macleod, Alistair M. "Privacy: Concept, Value, Right?" In Core Concepts and Contemporary Issues in Privacy, 31–45. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74639-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hill, B. Jessie. "Right to Decisional Privacy." In Laws of Medicine, 471–78. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08162-0_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Stefkovich, Jacqueline A., and William C. Frick. "The Right to Privacy." In Best Interests of the Student, 152–70. 3rd ed. 3rd edition. | New York, NY : Routledge, 2021.: Routledge, 2021. http://dx.doi.org/10.4324/9780367816032-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ahmad, Ahmad Atif. "The Right to Privacy." In Islam, Modernity, Violence, and Everyday Life, 169–82. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230619562_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Penney, Jonathon. "The right to privacy." In Human Rights, Digital Society and the Law, 44–57. Abingdon, Oxon [UK] ; New York, NY : Routledge, 2019.: Routledge, 2019. http://dx.doi.org/10.4324/9781351025386-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sheaff, Mike. "A Right to Privacy and a Right to Know." In Secrecy, Privacy and Accountability, 33–59. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11686-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Privacy, Right of Taiwan"

1

Wang, Ya-Chih, and Nan-Ching Tai. "Right Light at the Right Time: Development of Innovative To-Do List Mobile Application to Optimize Circadian Lighting." In 2020 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan). IEEE, 2020. http://dx.doi.org/10.1109/icce-taiwan49838.2020.9258041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chang, Che-Chia, Jian-Feng Lin, Song-Yi Hsu, and Yu-Chi Chen. "Privacy-Preserving Delegation of Decision Tree Classification." In 2020 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan). IEEE, 2020. http://dx.doi.org/10.1109/icce-taiwan49838.2020.9258197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vilić, Vida, and Ivan Radenković. "The Right to Privacy, Informational Privacy and the Right to Information in the Cyberspace." In Sinteza 2017. Belgrade, Serbia: Singidunum University, 2017. http://dx.doi.org/10.15308/sinteza-2017-74-78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ong, Hiap L., and Yung-Hsun Wu. "New two-domain TN/LCD with identical, symmetrical, and ±80-deg. viewing cone in left-, right-, up-, and down-viewing zones." In Photonics Taiwan, edited by I.-Wei Wu and Heiju Uchiike. SPIE, 2000. http://dx.doi.org/10.1117/12.389403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mishima, Seitaro, Kazuhisa Nakasho, Kousuke Takeuchi, Naohiro Hayaishi, Yuuki Takano, and Atsuko Miyaji. "Development and Application of Privacy-preserving Distributed Medical Data Integration System." In 2020 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan). IEEE, 2020. http://dx.doi.org/10.1109/icce-taiwan49838.2020.9258160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bernardes, Marciele Berger, Francisco Pacheco de Andrade, and Paulo Novais. "Smart Cities, data and right to privacy." In ICEGOV '18: 11th International Conference on Theory and Practice of Electronic Governance. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3209415.3209451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sobolev, N. S. "Restricting the right to privacy of public employees." In SCIENCE OF RUSSIA: GOALS AND OBJECTIVES. LJournal, 2020. http://dx.doi.org/10.18411/sr-10-06-2020-48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Antoniou, Giannakis, Udaya Parampalli, and Lynn Batten. "Monitoring Employees' Emails without Violating Their Privacy Right." In Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007). IEEE, 2007. http://dx.doi.org/10.1109/pdcat.2007.4420140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Antoniou, Giannakis, Udaya Parampalli, and Lynn Batten. "Monitoring Employees' Emails without Violating Their Privacy Right." In Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007). IEEE, 2007. http://dx.doi.org/10.1109/pdcat.2007.49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Aulakh, Kudratdeep, and Ramkumar Ketti Ramachandran. "A Detailed Survey of Fully Homomorphic Encryption Standards to Preserve Privacy over Cloud Communications." In 2020 Indo-Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN). IEEE, 2020. http://dx.doi.org/10.1109/indo-taiwanican48429.2020.9181325.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Privacy, Right of Taiwan"

1

Parker, Christopher J. U.S. Policy Concerning Taiwan: Do We Have It Right. Fort Belvoir, VA: Defense Technical Information Center, April 2001. http://dx.doi.org/10.21236/ada394514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rodrik, Dani. Getting Interventions Right: How South Korea and Taiwan Grew Rich. Cambridge, MA: National Bureau of Economic Research, December 1994. http://dx.doi.org/10.3386/w4964.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vincent, Charles, Madjid Tavana, and Tatiana Gherman. The Right To Be Forgotten – Is Privacy Sold Out in the Big Data Age? CENTRUM Catolica Graduate Business School, February 2014. http://dx.doi.org/10.7835/ccwp-2014-02-0006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cachalia, Firoz, and Jonathan Klaaren. Digitalisation, the ‘Fourth Industrial Revolution’ and the Constitutional Law of Privacy in South Africa: Towards a public law perspective on constitutional privacy in the era of digitalisation. Digital Pathways at Oxford, July 2021. http://dx.doi.org/10.35489/bsg-dp-wp_2021/04.

Full text
Abstract:
In this working paper, our focus is on the constitutional debates and case law regarding the right to privacy, adopting a method that is largely theoretical. In an accompanying separate working paper, A South African Public Law Perspective on Digitalisation in the Health Sector, we employ the analysis developed here and focus on the specific case of digital technologies in the health sector. The topic and task of these papers lie at the confluence of many areas of contemporary society. To demonstrate and apply the argument of this paper, it would be possible and valuable to extend its analysis into any of numerous spheres of social life, from energy to education to policing to child care. In our accompanying separate paper, we focus on only one policy domain – the health sector. Our aim is to demonstrate our argument about the significance of a public law perspective on the constitutional right to privacy in the age of digitalisation, and attend to several issues raised by digitalisation’s impact in the health sector. For the most part, we focus on technologies that have health benefits and privacy costs, but we also recognise that certain technologies have health costs and privacy benefits. We also briefly outline the recent establishment (and subsequent events) in South Africa of a contact tracing database responding to the COVID-19 pandemic – the COVID-19 Tracing Database – a development at the interface of the law enforcement and health sectors. Our main point in this accompanying paper is to demonstrate the value that a constitutional right to privacy can bring to the regulation of digital technologies in a variety of legal frameworks and technological settings – from public to private, and from the law of the constitution to the ‘law’ of computer coding.
APA, Harvard, Vancouver, ISO, and other styles
5

Eastman, Brittany. Legal Issues Facing Automated Vehicles, Facial Recognition, and Privacy Rights. SAE International, July 2022. http://dx.doi.org/10.4271/epr2022016.

Full text
Abstract:
Facial recognition software (FRS) is a form of biometric security that detects a face, analyzes it, converts it to data, and then matches it with images in a database. This technology is currently being used in vehicles for safety and convenience features, such as detecting driver fatigue, ensuring ride share drivers are wearing a face covering, or unlocking the vehicle. Public transportation hubs can also use FRS to identify missing persons, intercept domestic terrorism, deter theft, and achieve other security initiatives. However, biometric data is sensitive and there are numerous remaining questions about how to implement and regulate FRS in a way that maximizes its safety and security potential while simultaneously ensuring individual’s right to privacy, data security, and technology-based equality. Legal Issues Facing Automated Vehicles, Facial Recognition, and Individual Rights seeks to highlight the benefits of using FRS in public and private transportation technology and addresses some of the legitimate concerns regarding its use by private corporations and government entities, including law enforcement, in public transportation hubs and traffic stops. Constitutional questions, including First, Forth, and Ninth Amendment issues, also remain unanswered. FRS is now a permanent part of transportation technology and society; with meaningful legislation and conscious engineering, it can make future transportation safer and more convenient.
APA, Harvard, Vancouver, ISO, and other styles
6

Durovic, Mateja, and Franciszek Lech. A Consumer Law Perspective on the Commercialization of Data. Universitätsbibliothek J. C. Senckenberg, Frankfurt am Main, 2021. http://dx.doi.org/10.21248/gups.64577.

Full text
Abstract:
Commercialization of consumers’ personal data in the digital economy poses serious, both conceptual and practical, challenges to the traditional approach of European Union (EU) Consumer Law. This article argues that mass-spread, automated, algorithmic decision-making casts doubt on the foundational paradigm of EU consumer law: consent and autonomy. Moreover, it poses threats of discrimination and under- mining of consumer privacy. It is argued that the recent legislative reaction by the EU Commission, in the form of the ‘New Deal for Consumers’, was a step in the right direction, but fell short due to its continued reliance on consent, autonomy and failure to adequately protect consumers from indirect discrimination. It is posited that a focus on creating a contracting landscape where the consumer may be properly informed in material respects is required, which in turn necessitates blending the approaches of competition, consumer protection and data protection laws.
APA, Harvard, Vancouver, ISO, and other styles
7

Cachalia, Firoz, and Jonathan Klaaren. A South African Public Law Perspective on Digitalisation in the Health Sector. Digital Pathways at Oxford, July 2021. http://dx.doi.org/10.35489/bsg-dp-wp_2021/05.

Full text
Abstract:
We explored some of the questions posed by digitalisation in an accompanying working paper focused on constitutional theory: Digitalisation, the ‘Fourth Industrial Revolution’ and the Constitutional Law of Privacy in South Africa. In that paper, we asked what legal resources are available in the South African legal system to respond to the risk and benefits posed by digitalisation. We argued that this question would be best answered by developing what we have termed a 'South African public law perspective'. In our view, while any particular legal system may often lag behind, the law constitutes an adaptive resource that can and should respond to disruptive technological change by re-examining existing concepts and creating new, more adequate conceptions. Our public law perspective reframes privacy law as both a private and a public good essential to the functioning of a constitutional democracy in the era of digitalisation. In this working paper, we take the analysis one practical step further: we use our public law perspective on digitalisation in the South African health sector. We do so because this sector is significant in its own right – public health is necessary for a healthy society – and also to further explore how and to what extent the South African constitutional framework provides resources at least roughly adequate for the challenges posed by the current 'digitalisation plus' era. The theoretical perspective we have developed is certainly relevant to digitalisation’s impact in the health sector. The social, economic and political progress that took place in the 20th century was strongly correlated with technological change of the first three industrial revolutions. The technological innovations associated with what many are terming ‘the fourth industrial revolution’ are also of undoubted utility in the form of new possibilities for enhanced productivity, business formation and wealth creation, as well as the enhanced efficacy of public action to address basic needs such as education and public health.
APA, Harvard, Vancouver, ISO, and other styles
8

Perdigão, Rui A. P. Beyond Quantum Security with Emerging Pathways in Information Physics and Complexity. Synergistic Manifolds, June 2022. http://dx.doi.org/10.46337/220602.

Full text
Abstract:
Information security and associated vulnerabilities have long been a pressing challenge, from the fundamental scientific backstage to the frontline across the most diverse sectors of society. At the tip of the iceberg of this problem, the citizens immediately feel that the reservation of privacy and the degradation of the quality and security of the information and communication on which they depend for the day-to-day activities, already of crucial relevance, are at stake. Naturally though, the challenges do not end there. There is a whole infrastructure for storing information, processing and communication, whose security and reliability depend on key sectors gearing modern society – such as emergency communication systems (medical, civil and environmental protection, among others), transportation and geographic information, the financial communications systems at the backbone of day-to-day transactions, the information and telecommunications systems in general. And crucially the entire defence ecosystem that in essence is a stalwart in preventing our civilisation to self-annihilate in full fulfilment of the second principle of thermodynamics. The relevance of the problem further encompasses the preservation of crucial values such as the right to information, security and integrity of democratic processes, internal administration, justice, defence and sovereignty, ranging from the well-being of the citizen to the security of the nation and beyond. In the present communication, we take a look at how to scientifically and technically empower society to address these challenges, with the hope and pragmatism enabled by our emerging pathways in information physics and complexity. Edging beyond classical and quantum frontiers and their vulnerabilities to unveil new principles, methodologies and technologies at the core of the next generation system dynamic intelligence and security. To illustrate the concepts and tools, rather than going down the road of engineered systems that we can ultimately control, we take aim at the bewildering complexity of nature, deciphering new secrets in the mathematical codex underlying its complex coevolutionary phenomena that so heavily impact our lives, and ultimately bringing out novel insights, methods and technologies that propel information physics and security beyond quantum frontiers.
APA, Harvard, Vancouver, ISO, and other styles
9

Kira, Beatriz, Rutendo Tavengerwei, and Valary Mumbo. Points à examiner à l'approche des négociations de Phase II de la ZLECAf: enjeux de la politique commerciale numérique dans quatre pays d'Afrique subsaharienne. Digital Pathways at Oxford, March 2022. http://dx.doi.org/10.35489/bsg-dp-wp_2022/01.

Full text
Abstract:
Realities such as the COVID-19 pandemic have expedited the move to online operations, highlighting the undeniable fact that the world is continuing to go digital. This emphasises the need for policymakers to regulate in a manner that allows them to harness digital trade benefits while also avoiding associated risk. However, given that digital trade remains unco-ordinated globally, with countries adopting different approaches to policy issues, national regulatory divergence on the matter continues, placing limits on the benefits that countries can obtain from digital trade. Given these disparities, ahead of the African Continental Free Trade Area (AfCFTA) Phase II Negotiations, African countries have been considering the best way to harmonise regulations on issues related to digital trade. To do this effectively, AfCFTA members need to identify where divergencies exist in their domestic regulatory systems. This will allow AfCFTA members to determine where harmonisation is possible, as well as what is needed to achieve such harmonisation. This report analyses the domestic regulations and policies of four focus countries – South Africa, Nigeria, Kenya and Senegal – comparing their regulatory approaches to five policy issues: i) regulation of online transactions; ii) cross-border data flows, data localisation, and personal data protection; iii) access to source code and technology transfer; iv) intermediary liability; and v) customs duties on electronic transmissions. The study highlights where divergencies exist in adopted approaches, indicating the need for the four countries – and AfCFTA members in general – to carefully consider the implications of the divergences, and determine where it is possible and beneficial to harmonise approaches. This was intended to encourage AfCFTA member states to take ownership of these issues and reflect on the reforms needed. As seen in Table 1 below, the study shows that the four countries diverge on most of the five policy issues. There are differences in how all four countries regulate online transactions – that is, e-signatures and online consumer protection. Nigeria was the only country out of the four to recognise all types of e-signatures as legally equivalent. Kenya and Senegal only recognise specific e-signatures, which are either issued or validated by a recognised institution, while South Africa adopts a mixed approach, where it recognises all e-signatures as legally valid, but provides higher evidentiary weight to certain types of e-signatures. Only South Africa and Senegal have specific regulations relating to online consumer protection, while Nigeria and Kenya do not have any clear rules. With regards to cross border data flows, data localisation, and personal data protection, the study shows that all four focus countries have regulations that consist of elements borrowed from the European Union (EU) General Data Protection Regulation (GDPR). In particular, this was regarding the need for the data subject's consent, and also the adequacy requirement. Interestingly, the study also shows that South Africa, Kenya and Nigeria also adopt data localisation measures, although at different levels of strictness. South Africa’s data localisation laws are mostly imposed on data that is considered critical – which is then required to be processed within South African borders – while Nigeria requires all data to be processed and stored locally, using local servers. Kenya imposes data localisation measures that are mostly linked to its priority for data privacy. Out of the four focus countries, Senegal is the only country that does not impose any data localisation laws. Although the study shows that all four countries share a position on customs duties on electronic transmissions, it is also interesting to note that none of the four countries currently have domestic regulations or policies on the subject. The report concludes by highlighting that, as the AfCFTA Phase II Negotiations aim to arrive at harmonisation and to improve intra-African trade and international trade, AfCFTA members should reflect on their national policies and domestic regulations to determine where harmonisation is needed, and whether AfCFTA is the right platform for achieving this efficiently.
APA, Harvard, Vancouver, ISO, and other styles
10

Counseling the husbands of postabortion patients in Egypt: Effects on husband involvement, patient recovery and contraceptive use. Population Council, 1997. http://dx.doi.org/10.31899/rh1997.1017.

Full text
Abstract:
An ANE OR/TA Project qualitative study conducted in 1995 probed into women’s perceptions of abortion in Egypt, and the stress that postabortion patients experience during recovery. That study drew attention to the important role husbands can play in their wives’ recovery and subsequent use of contraception. This study was designed to test the effects of involving husbands in the postabortion medical-care process. Overall, the study indicates that providing counseling to husbands of postabortion patients is feasible, as the majority of husbands either accompanied their wife on admission or at discharge from the hospital. However, administrative changes are needed to enhance the effects of counseling and encourage greater husband involvement. Family planning services should be offered on the postabortion ward. Moreover, the physical setup at the ob/gyn ward may need to be changed to allow for the presence of husbands without causing inconvenience to other women. As this report states, counseling of husbands is acceptable to both postabortion patients and their husbands. With due consideration to procedures that ensure the patient’s right to privacy, counseling husbands of postabortion patients should be considered as an element of other postabortion-care services.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography