Dissertations / Theses on the topic 'Privacy, Right of Taiwan'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Privacy, Right of Taiwan.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Tao, Ran. "The Right to Privacy." Scholarship @ Claremont, 2019. https://scholarship.claremont.edu/scripps_theses/1338.
Full textLander, Angelina M. "Privacy, surveillance and the state a comparison of U.S. and British privacy rights /." Orlando, Fla. : University of Central Florida, 2009. http://purl.fcla.edu/fcla/etd/CFE0002772.
Full textWolfson, Susan Ann. "The right to privacy and education." Thesis, University College London (University of London), 1989. http://discovery.ucl.ac.uk/10019704/.
Full textGibb, Susan Jennifer. "Privacy and Australian law." Title page, contents and abstract only, 1987. http://web4.library.adelaide.edu.au/theses/09PH/09phg4372.pdf.
Full textAl-Rawashdeh, Sami H. "Is privacy brought home? : criminal justice and the right to privacy." Thesis, University of Aberdeen, 2003. http://digitool.abdn.ac.uk/R?func=search-advanced-go&find_code1=WSN&request1=AAIU176274.
Full textMitroff, Melanie. "Privacy : a constitutional right that threatens democracy /." Lynchburg, VA : Liberty University, 2007. http://digitalcommons.liberty.edu.
Full textHeite, Martin. "Privacy, Constitutions and the Law of Torts: a Comparative and Theoretical Analysis of Protecting Personal Information Against Dissemination in New Zealand, the UK and the USA." University of Canterbury. Law, 2008. http://hdl.handle.net/10092/2955.
Full textJohnson, Virginia Wilson. "Architectural correlates of privacy : the dynamics of privacy regulation /." Diss., This resource online, 1990. http://scholar.lib.vt.edu/theses/available/etd-07132007-143142/.
Full textMarasinghe, S. C. "A child's right to privacy in international law." Thesis, University of Oxford, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.413108.
Full textSkahill, Tina M. "Striking the right balance : fusion centers and privacy." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5243.
Full textApproved for public release; distribution is unlimited
After the events of 9/11, the number of fusion centers rapidly multiplied. As a result, state and local agencies that operated the centers adopted a myriad of policies. This thesis seeks to answer how fusion centers can implement policies as to operational structure and transparency that simultaneously safeguard against abuse of citizens' privacy while facilitating the collection, maintenance, and dissemination of information. Two methods of research are utilized: policy analysis and policy options analysis. This thesis examines existing federal guidelines, federal case law, and various federal statutes and regulations. Moreover, the thesis explores three policy options as possible decision-making tools for fusion centers: 1) mandatory federal guidelines, 2) imposition of a balancing test and administrative review process, and 3) a compulsory reasonable-suspicion requirement. In the end, this thesis recommends imposition of all three policies.
Dayan, Michael Oved. "Privacy boundaries : stories of protecting personal autonomy in the information age." Thesis, McGill University, 2004. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=85147.
Full textCrounse, Shane. "The fair information principles : a comparison of U.S. and Canadian privacy policy as applied to the private sector /." Online version of thesis, 2009. http://hdl.handle.net/1850/8638.
Full textLonka, Anna. "Profiling through Ultrasound Technoogy, the Right to Privacy and the Right to Data Protection." Thesis, Stockholms universitet, Juridiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-154902.
Full textFischer-Hübner, Simone. "IT-security and privacy : design and use of privacy-enhancing security mechanisms /." Berlin [u.a.] : Springer, 2001. http://www.loc.gov/catdir/enhancements/fy0812/2001034161-d.html.
Full textKunz, Thea. "Celebrating Privacy Day: The Right to be forgotten and individual Privacy in the digital Age." Thesis, Uppsala universitet, Medier och kommunikation, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-356108.
Full textBoshego, Ngwanathaba Angelinah. "Balancing the right to freedom of expression with the right to privacy for public figures." Diss., University of Pretoria, 2017. http://hdl.handle.net/2263/62559.
Full textBlack, Gillian. "Right of publicity in Scots law." Thesis, University of Edinburgh, 2009. http://hdl.handle.net/1842/5943.
Full textTheis, Adriane. "Liberal privacy and women a broken promise /." Diss., Connect to the thesis, 2006. http://hdl.handle.net/10066/726.
Full textPaton, Elizabeth Katrine. "Privacy law and the media." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/28826.
Full textLaw, Peter A. Allard School of
Graduate
Hunt, Christopher Douglas Lorne. "Justifying and structuring a principled common law privacy tort." Thesis, University of Cambridge, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.607899.
Full textNam, Hyung Doo. "The right of publicity in the global market : is James Dean a living dead even in Korea? /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/9613.
Full textLukman, Joshua R. "Right to publicity and privacy versus first amendment freedom of speech." Honors in the Major Thesis, University of Central Florida, 2003. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/323.
Full textBachelors
Health and Public Affairs
Legal Studies
Hedefine, Eeva Kaarina. "Personal Privacy Protection within Pervasive RFID Environments." Fogler Library, University of Maine, 2006. http://www.library.umaine.edu/theses/pdf/HedefineEK2006.pdf.
Full textJanz, Linda, and University of Lethbridge Faculty of Arts and Science. "Privacy and the internet : differences in perspectives." Thesis, Lethbridge, Alta. : University of Lethbridge, Faculty of Arts and Science, 1997, 1997. http://hdl.handle.net/10133/64.
Full textxii, 112 leaves ; 28 cm.
Bhaduri, Anuket. "User Controlled Privacy Protection in Location-Based Services." Fogler Library, University of Maine, 2003. http://www.library.umaine.edu/theses/pdf/BhaduriA2003.pdf.
Full textOphoff, Jacobus Albertus. "WSP3: a web service model for personal privacy protection." Thesis, Port Elizabeth Technikon, 2003. http://hdl.handle.net/10948/272.
Full textMoller, Kerry. "The Right to Digital Privacy: Advancing the Jeffersonian Vision of Adaptive Change." Scholarship @ Claremont, 2014. http://scholarship.claremont.edu/cmc_theses/936.
Full textO'REILLY, JOSEPH MATTHEW. "LEGAL PRIVACY AND PSYCHOLOGICAL PRIVACY: AN EVALUATION OF COURT ORDERED DESIGN STANDARDS (ENVIRONMENTAL, PSYCHIATRIC HOSPITALS, ARCHITECTURE)." Diss., The University of Arizona, 1985. http://hdl.handle.net/10150/187916.
Full textAndonie, Luisa. "Whistleblower protection programs compromise the reported taxpayer's privacy." Universitätsbibliothek Leipzig, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-224035.
Full textWagner, Sylke. "Das Websurfen und der Datenschutz : ein Rechtsvergleich unter besonderer Berücksichtigung der Zulässigkeit sogenannter Cookies und Web Bugs am Beispiel des deutschen und U.S.-amerikanischen Rechts /." Frankfurt am Main [u.a.] : Lang, 2006. http://www.gbv.de/dms/ilmenau/toc/511997450.PDF.
Full textBarclay, Courtney Anne. "Balancing the right to privacy and the right of access access to child-abuse records in the 50 states /." [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0002305.
Full textKan, Chi-keung. "A review of the implementation of the personal data (privacy) ordinance in the Hong Kong Correctional Services Department." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B1971015X.
Full textSimsek, Yilmaz. "New Surveillance Technologies and the Invasion of Privacy Rights." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4252/.
Full textSinkovits, Angela M. "Glass houses: the end of privacy." Honors in the Major Thesis, University of Central Florida, 2000. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/206.
Full textBachelors
Arts and Sciences
Liberal Arts
Sun, Zhendong 1978. "Balancing freedom of the press and the right to privacy : lessons for China." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99152.
Full textCraig, John D. R. "Legal principles for the protection of the right of privacy in the workplace." Thesis, University of Oxford, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.286833.
Full textWeston, Mindy. "The Right to Be Forgotten: Analyzing Conflicts Between Free Expression and Privacy Rights." BYU ScholarsArchive, 2017. https://scholarsarchive.byu.edu/etd/6453.
Full textLam, Wai-hong, and 林偉雄. "Review on effectiveness of policy on privacy protection." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B46757740.
Full textGivens, Lynn Marie, and Jesse Ornelas. "Degree of privacy afforded in long-term care." CSUSB ScholarWorks, 2008. https://scholarworks.lib.csusb.edu/etd-project/3335.
Full textLe, Poire Beth Ann 1964. "Communication strategies to restore or preserve informational and psychological privacy; the effects of privacy invasive questions in the health care context." Thesis, The University of Arizona, 1988. http://hdl.handle.net/10150/276798.
Full textMangwanda, Nigel. "The impact of the right to be forgotten on privacy and online information disclosure." Diss., University of Pretoria, 2015. http://hdl.handle.net/2263/52439.
Full textMini Dissertation (MBA)--University of Pretoria, 2015.
sn2016
Gordon Institute of Business Science (GIBS)
MBA
Unrestricted
McGoldrick, Albert W. "Confidentiality of tribunal acts the civil law implications in the U.S.A. of canon 1598, [par.] 1 /." Theological Research Exchange Network (TREN), 2005. http://www.tren.com.
Full textHarrysson, Alexandra, and Julia Olsson. "Personalization paradox: the wish to be remembered and the right to be forgotten : A qualitative study of how companies balance being personal while protecting consumers’ right to privacy." Thesis, Uppsala universitet, Företagsekonomiska institutionen, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-387611.
Full textBritz, Jaco. "Does the tax administration act sufficiently protect the taxpayers' right to privacy or provide the taxpayer with a right to be informed?" Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/8564.
Full textThis dissertation endeavours to establish whether the Tax Administration Act sufficiently protects the taxpayers' constitutional rights to privacy and right to be informed. Specifically it will be investigating these rights versus the powers provided to SARS under the different fiscal statutes to access information and to exchange information internationally. The research focussed on the rights conferred on taxpayers in terms of the Constitution versus the powers awarded to SARS in terms of the Tax Administration Act and the Income Tax Act. The research included other relevant fiscal statutes, books, case law, websites, articles and comments of experts. It has been said that the Commissioner of SARS has "draconian powers" that infringe on the rights of taxpayers. My research concludes that most of these rights are reasonable and justifiable limited in the interest of a democratic society in order to fund the administrative and financial burden on the state. The current society with advanced information technology has resulted in information being easily accessible and transferred and accordingly our privacy is being more invaded than before. This is also the case in dealings with the tax authorities but is considered a justifiable infringement in order to collect taxes to finance an open and democratic society. Tax authorities around the world are entering into tax information exchange agreements that make the sharing of taxpayer information permissible by law. The search and seizure powers without a warrant are substantially unconstitutional. It should be noted that these powers have been challenged in court and the Commissioner will not easily authorise such actions without being convinced that his actions are above the law. Taxpayers' will therefore not be subject to these powers on a regular basis. Taxpayers' are not always informed of their right to administrative justice that ensures lawful, reasonable and procedurally fair administrative actions by the Commissioner. The newly appointed tax ombudsman will be a more cost effective remedy for challenging the powers of SARS and it is likely that the future will bring about more precedents that will prevent the abuse of powers. The Tax Ombudsman will have a duty to educate taxpayers' about their rights and also to educate the SARS officials on reasonable and procedurally fair conduct.
Lukacs, Adrienn. "Protection of employees' right to privacy and right to data protection on social network sites : with special regard to France and Hungary." Thesis, Paris 1, 2020. http://www.theses.fr/2020PA01D041.
Full textOnline social network sites have gained considerable importance in everyday life. Their use results in the unprecedented share of personal data : individuals from all over the globe share personal information in a quality and quantity never seen before. Employees and prospective employees are amongst users as well, which raises privacy and data protection issues specific to the context of employment. Although the “traditional” ways of employee monitoring, such as CCTV surveillance, monitoring of the use of Internet and e-mail, etc. are already regulated both at the international and at the national (French and Hungarian) level, the comprehensive regulation of social network sites with regard to the context of employment is yet to be elaborated. Social network sites have fundamentally influenced conceptions of privacy and data protection, resulting in the boundaries of work and personal life becoming increasingly blurred, both within and outside working hours. Yet, the processing of personal data obtained from social network sites increasingly raises the question of the protection of employees’ rights – particularly the protection of the right to privacy and the right to data protection. These rights must be balanced notably against the employer’s right to control and monitor, which ensue from the employer’s right to property (ensuring the equipment provided by the employer is used in accordance with the purpose of the employment relationship), the right to protect his/her economic interest (e.g. through ensuring productivity, the protection of reputation) and occupational safety and health (which confers obligations on the employer). Thus, the dissertation examines how the existing rules of labour law and of data protection law in France and in Hungary can be applied to social network sites and what the main challenge posed by them are, particularly in the phase of recruitment and during the use of social networks during and outside working hours. The main question to be answered by the dissertation is: in the light of the increasingly blurred boundaries, where should the balance be struck between the employees’ and the employer’s rights?
Az online közösségi oldalak jelentős szerepet játszanak a mindennapi életben. Használatuk során az egyének soha nem látott minőségben és mennyiségben osztják meg személyes adataikat, szerte az egész világon. A munkavállalók és a leendő munkavállalók szintén a felhasználók közé tartoznak, ami a foglalkoztatás kontextusában specifikus kérdéseket vet fel a magánélet és a személyes adatok védelme terén. Bár a munkavállalók megfigyelésének „hagyományos” módszereit, mint például a kamerás megfigyelést, az internet és az e-mail használatának megfigyelését, már mind nemzetközi, mind tagállami (francia és magyar) szinten szabályozzák, a közösségi oldalak foglalkoztatással összefüggő kimerítő szabályozása még kidolgozás alatt áll. A közösségi hálózati oldalak alapjaiban hatnak a magánéletre és a személyes adatok védelmére, aminek eredményeként a munka és magánélet határai egyre inkább elmosódnak, mind a munkaidőn belül, mind azon kívül. Ugyanakkor a közösségi oldalakról származó személyes adatok kezelése fokozottan felveti a munkavállalók jogainak védelmének kérdését – különös tekintettel a magánélet védelmére és a személyes adatok védelméhez való jogra. Ezeket a jogokat össze kell vetni különösen a munkáltató ellenőrzési és felügyeleti jogával, amely a munkáltató tulajdonhoz fűződő jogából (pl.: annak biztosítása, hogy a munkáltató által biztosított felszerelést a munkavállaló a munkaviszony céljának megfelelően használja), valamint a jogos gazdasági érdekeinek védelméből. (pl. produktivitás biztosítása, jó hírnév védelme) és a munkahelyi biztonság és egészségvédelemből (amely kötelezettségeket ró a munkáltatóra) következik. Következésképp, a disszertáció azt vizsgálja, hogy a Franciaországban és Magyarországon már létező munkajogi és adatvédelmi rendelkezések miként alkalmazhatók a közösségi oldalakra, és melyek az általuk felvetett legfőbb kihívások, különösen a munkaerőfelvétel, valamint a közösségi oldalak munkaidőben és azon kívül történő használata terén. A disszertáció által megválaszolandó fő kérdés az, hogy a fokozottan elmosódó határok fényében hol kell megtalálni az egyensúlyt a munkavállalók és a munkáltatók jogai között?
Bakke, Sharen A. "Privacy, Control, and the Use of Information Technology: The Development, Validation, and Testing of the Privacy-Invasive Perceptions Scale." [Kent, Ohio] : Kent State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=kent1145192698.
Full textTitle from PDF t.p. (viewed Sept. 20, 2006). Advisor: Alan Brandyberry and Marvin Troutt. Keywords: privacy; control; information technology use; scale development. Includes bibliographical references (p. 103-120).
Siu, David Chi Ho. "Can confidentiality in Hong Kong arbitration proceedings be sufficiently protected?" access abstract and table of contents access full-text, 2005. http://libweb.cityu.edu.hk/cgi-bin/ezdb/dissert.pl?ma-slw-b20834251a.pdf.
Full textMeuth, Lotte. "Zulässigkeit von Identitätsfeststellungen mittels biometrischer Systeme durch öffentliche Stellen /." Berlin : Duncker & Humblot, 2006. http://www.gbv.de/dms/ilmenau/toc/505963787.PDF.
Full textMoerat, Sedick. "The disclosure of information on medical certificates and the impact on the right to privacy." University of the Western Cape, 2020. http://hdl.handle.net/11394/7647.
Full textChapter 2 of the Constitution contains the Bill of Rights, which ‘enshrines the rights of all people in our country and affirms the democratic values of human dignity, equality and freedom.’1 By rights being afforded to the employee in the workplace, such rights need to be protected (legislation being implemented by legislature is subjugated by the Bill of Rights).2 Labour legislation being implemented in order to protect the rights afforded to the employees,therefore creating fair labour practice in terms of section 23 of the Constitution. Such legislation needs to take in regards various rights of an employee, such as the right to privacy3 of an employee. This resulted in creating domestic legislation in order to protect employees’ rights to privacy. A detail discusses of how various domestic legislation were implemented to protect the right is discussed in Chapter 2. In addition to the implementation of domestic legislation giving effect to the right to fair labour practices, the Constitution requires that international law be considered when individual and a further international obligations with regards to international standards). Section 39(1)(b) provides that ‘when interpreting the Bill of Rights, a court, tribunal or forum must consider international law’. This means that standards set by the International Labour Organisation and Conventions must be considered when interpreting the right to fair labour practice.4 A detailed discussion is dealt with in Chapter 2. The primary research question of this thesis is ‘is an employee’s right to privacy infringed by requiring a medical condition to be disclosed on a sick note for purposes of statutory sick leave?’ In answering this question, a number of ancillary questions must be answered, including whether doctor and patient confidentiality is breached in disclosing such information on a sick note; to what extent medical information can be disclosed in the medical information; whether there is a potential for misuse of information disclosed on the medical certificate against the employee; whether such disclosure of information could lead to unfair labour practice where the employee can be unfairly discriminated against based on such disclosure and how is privacy is being protected and processed in terms of legislation domestically and foreign legislation.
Larsen, Irene. "Public access to information : reaching the right balance between public and private." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=78219.
Full text