Journal articles on the topic 'Privacy, Right of Taiwan'

To see the other types of publications on this topic, follow the link: Privacy, Right of Taiwan.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Privacy, Right of Taiwan.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sherstoboeva, Elena, and Valentina Pavlenko. "Trends in East Asian policies on digital surveillance tools during the COVID-19 pandemic." Journal of Digital Media & Policy 12, no. 1 (March 1, 2021): 47–65. http://dx.doi.org/10.1386/jdmp_00047_1.

Full text
Abstract:
This article investigates how digital surveillance tools used by East Asian governments against COVID-19 affect privacy and personal data protection. It applies doctrinal legal analysis and case study to compare national regulations of these tools as well as their implementation in China, Hong Kong, Macau, Taiwan, Japan and South Korea. The approaches range considerably from total (China) to selective surveillance, which, however, seems overly excessive towards privacy of certain social groups, exacerbating social stratification and business disruptions in East Asia. The article argues that selective surveillance models vary across the region from voluntary selective (Japan) to compulsory selective surveillance (Hong Kong, Macau, Taiwan, South Korea) and differ in terms of privacy and related rights. Yet, the increased risks of data misuse and leakages in all the East Asian states and territories need effective legal mechanisms for privacy and data protection that pay sufficient attention to public scrutiny and independent regulators.
APA, Harvard, Vancouver, ISO, and other styles
2

Hsieh, Yi-Ping, Yun-Ju Wang, Ling-Yi Feng, Li-Tzy Wu, and Jih-Heng Li. "Mifepristone (RU-486®) as a Schedule IV Controlled Drug—Implications for a Misleading Drug Policy on Women’s Health Care." International Journal of Environmental Research and Public Health 19, no. 14 (July 8, 2022): 8363. http://dx.doi.org/10.3390/ijerph19148363.

Full text
Abstract:
Background: Mifepristone (RU-486) has been approved for abortion in Taiwan since 2000. Mifepristone was the first non-addictive medicine to be classified as a schedule IV controlled drug. As a case of the “misuse” of “misuse of drugs laws,” the policy and consequences of mifepristone-assisted abortion for pregnant women could be compared with those of illicit drug use for drug addicts. Methods: The rule-making process of mifepristone regulation was analyzed from various aspects of legitimacy, social stigma, women’s human rights, and access to health care. Results and Discussion: The restriction policy on mifepristone regulation in Taiwan has raised concerns over the legitimacy of listing a non-addictive substance as a controlled drug, which may produce stigma and negatively affect women’s reproductive and privacy rights. Such a restriction policy and social stigma may lead to the unwillingness of pregnant women to utilize safe abortion services. Under the threat of the COVID-19 pandemic, the US FDA’s action on mifepristone prescription and dispensing reminds us it is time to consider a change of policy. Conclusions: Listing mifepristone as a controlled drug could impede the acceptability and accessibility of safe mifepristone use and violates women’s right to health care.
APA, Harvard, Vancouver, ISO, and other styles
3

Lee, Tsung-Ling. "The Rise of Technocracy and the COVID-19 Pandemic in Taiwan: Courts, Human Rights, and the Protection of Vulnerable Populations." German Law Journal 22, no. 6 (September 2021): 1115–32. http://dx.doi.org/10.1017/glj.2021.49.

Full text
Abstract:
AbstractDriven by the need to address the immediate public health threats of the COVID-19 pandemic, this has seen a rise of the technocratic mode of governance around the world. A technocratic approach is evidence-based and relies upon the guidance of experts to respond to the public health crisis. The rise of technocracy reflects a utilitarian calculus that seeks to preserve the greater good. Taiwan’s pandemic response exemplifies the strengths and weaknesses of this type of governance. Based on an analysis of the relevant case law of the Taiwan Constitutional Court, legislation, and political developments this Article takes a legal-historical look and traces the current technocratic approach—defined for this Article as an experts-driven and procedural-driven process—which is a hallmark of Taiwan’s pandemic response. Examining Taiwan’s pandemic response through a human rights lens sheds light on a more complex relationship between the collective right to health and life, and the individual rights to health, work, privacy, and liberty during the pandemic.
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Li-Wei, Su-Rong Yan, Shih-Yung Wei, and Yun-Han Zhang. "Exploring the Privacy and Rights of Healthcare Systems - A Healthcare System Based in Taiwan." Saudi Journal of Economics and Finance 4, no. 8 (August 14, 2020): 406–11. http://dx.doi.org/10.36348/sjef.2020.v04i08.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

辛昀浩, 辛昀浩. "我國受僱者心理資訊隱私權保護法制之研究——美國經驗之啟示." 國立中正大學法學集刊 76, no. 76 (July 2022): 117–99. http://dx.doi.org/10.53106/172876182022070076003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Chih-Yao, and Ren-Jye Dzeng. "Evaluating Ancillary Business Scale for PPP-BOT Projects: A Social Housing BOT Case in Taiwan." Sustainability 11, no. 5 (March 7, 2019): 1415. http://dx.doi.org/10.3390/su11051415.

Full text
Abstract:
Due to budgetary constraints, the government releases the right to ancillary business development for private investors to increase profits in PPP projects. However, the ancillary business scale is not specified in the regulations, and there is little relevant research on modeling the scale. Thus, our research aims to create a model with mathematical analysis to evaluate the ancillary business scale. The model is constructed based on the discounted cash flow model to calculate the ancillary business scale attracting private investors with a case study of a social housing project. For this case, the calculated ancillary business minimum scale (ratio of ancillary business to project in total floor area) based on the 7-year (2009–2016) and 17-year (2000–2016) data are 30.81% and 52.79%, respectively; neither is able to meet the scale listed in the tender condition regulated by the government, i.e., 25%. Moreover, this study performs a sensitivity analysis on the expected rate of return and rent discount of the case. The government needs to raise the proportion of ancillary businesses or to increase the rent of social housing to successfully attract private investors.
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Chingning. "Strategic Information Technology Compensation." Journal of Global Information Management 27, no. 4 (October 2019): 16–45. http://dx.doi.org/10.4018/jgim.2019100102.

Full text
Abstract:
The 2008 financial crisis has made many high-tech firms vulnerable. Some non-American firms (e.g. in Taiwan) have even granted their IT professionals a “no-pay break” to reduce firms' financial uncertainty. The crisis leads to a need to re-examine managerial compensation thinking from a cross-cultural perspective. Drawing on cross-cultural case studies in Taiwan, a collectivist culture, and in the United States, an individualist culture, this research explores managerial thinking on how to align strategic IT compensation with personnel's immigrant status and IT sourcing strategies in different industrial and national/cultural contexts. It also explores how firms utilize nonmonetary compensation in different cultures. Compensation for IT professionals in Taiwan are reportedly to be more uniform because of the feature of collectivist culture. Compensation for IT professionals in the United States are reportedly more fluid thanks to a frontier culture and individualism. Therefore, negotiable competitive pay is emphasized. Both Taiwan and the US have suffered from wage stagnation for decades. In Taiwan, this stagnation may be related to a depreciation of higher degrees since the number of university graduates has been increased fivefold in two decades and IT related degrees have been amidst popular majors which lead to oversupply in IT workforce. In the US, this stagnation may be related to economic recession and reduced IT investment/full-time positions, dropping IT enrollment, IT skill/education-job mismatch, and increased reliance on IT contractors in an emerging IT gig economy. From a cultural perspective, “still under employment” in a Confucian society which emphasizes face-saving that has value in its own right and it explains why some firms in Taiwan granted IT professionals a “no-pay break” instead of immediate layoff to cope with the 2008 crisis. Meanwhile, to cope with the challenge of IT skill/education-job mismatch in the United States, using a domestic training program as nonmonetary compensation may be a viable alternative to IT firms whose IT compensation strategies emphasize lucrative pay or poach IT talents rather than nurturing IT talents. Theoretically, economic/organization theories derived from western experiences or ideologies in 1900s, where industrialization, private/hierarchical organizations, and higher education were booming, may not fit non-western countries' experiences or today's world where the trends of outsourcing, IT contracting, gig economy and depreciation of education are emerging.
APA, Harvard, Vancouver, ISO, and other styles
8

Hofmann, Reto. "What's Left of the Right: Nabeyama Sadachika and Anti-communism in Transwar Japan, 1930–1960." Journal of Asian Studies 79, no. 2 (November 12, 2019): 403–27. http://dx.doi.org/10.1017/s0021911819000688.

Full text
Abstract:
This article examines the thought and career of Nabeyama Sadachika (1901–79) from communist militant in 1920s Japan to his conversion to the emperor system in the 1930s and, finally, to his role in shaping the postwar anti-communist movement. Using Nabeyama's recently released private papers, the article shows how he brokered his anti-communist expertise to a range of postwar actors and institutions—the police, the Self-Defense Forces, business circles, politicians—as well as to foreign states, especially the Republic of China (Taiwan). These networks indicate that important sections of Japan's postwar establishment rallied behind anti-communism in the face of reforms that threatened their power at home and their vision for Japan in the world order after 1945. As a transwar history, this article adds to our understanding of Japan's transition from the age of empire to that of liberal democracy by qualifying narratives about the “progressive” nature of postwar Japanese politics. It argues that the vitality of anti-communism is symptomatic of the durability of particular political traditions, and reveals that, despite the significant reforms that Japan underwent after 1945, the Right was able to claim a space in the country's political culture that has been neglected by historians.
APA, Harvard, Vancouver, ISO, and other styles
9

Chou, Hsin-Ju, and Kai-Yu Tseng. "The Experience of Emergency Nurses Caring for Patients with Mental Illness: A Qualitative Study." International Journal of Environmental Research and Public Health 17, no. 22 (November 18, 2020): 8540. http://dx.doi.org/10.3390/ijerph17228540.

Full text
Abstract:
Background: The medical burden of psychiatric disorders continues to increase and has caused a major impact on health, society, human rights, and economy in the world. Patients with mental illness have a higher ratio of emergency department visits than non-psychiatric patients. Psychiatric disorder-related emergency department care is a stress-causing factor in emergency department work. Therefore, the purpose of this study was to explore the experience of emergency department nurses in caring for patients with mental illness. Methods: A descriptive qualitative research design with purposive sampling was adopted. A total of 17 nurses working in the emergency department in central Taiwan were recruited. In-depth semi-structured interviews were conducted and thematic content analysis was performed. Results: Four themes and six sub-themes emerged that described the experiences of emergency nurse caring for patients with mental illness: (1) Mindset; (2) The predicament of psychiatric care: Violence and isolation and helplessness, and lack of therapeutic communication skills; (3) The influence of open space: insufficient safety and privacy; and (4) The educational needs of psychiatric nursing: improving cognition in psychiatric patients and changing negative thinking into positive thinking. Conclusions: The results revealed the experience of emergency nurses in caring for patients with mental illness. Emergency psychiatric nursing training related to foundational psychiatric knowledge, communication skill, concept of recovery, coping with violence restraining are needed for nurses who work in emergency departments.
APA, Harvard, Vancouver, ISO, and other styles
10

Aung, Myo Nyein, Claire Stein, Wei-Ti Chen, Vandana Garg, Monika Saraswati Sitepu, Nguyen Thi Dang Thu, Carlos Primero D. Gundran, et al. "Community responses to COVID-19 pandemic first wave containment measures: a multinational study." Journal of Infection in Developing Countries 15, no. 08 (August 31, 2021): 1107–16. http://dx.doi.org/10.3855/jidc.15254.

Full text
Abstract:
Introduction: National strategies to control COVID-19 pandemic consisted mostly of social distancing measures such as lockdowns, curfews, and stay-home guidelines, personal protection such as hand hygiene and mask wearing, as well as contact tracing, isolation and quarantine. Whilst policy interventions were broadly similar across the globe, there were some differences in individual and community responses. This study explored community responses to COVID-19 containment measures in different countries and synthesized a model. This exaplains the community response to pandemic containment measures in the local context, so as to be suitably prepared for future interventions and research. Methodology: A mutlinational study was conducted from April-June 2020 involving researchers from 12 countries (Japan, Austria, U.S., Taiwan, India, Sudan, Indonesia, Malaysia, Philippines, Myanmar, Vietnam and Thailand). Steps in this research consisted of carrying out open-ended questionnaires, qualitative analyses in NVivo, and a multinational meeting to reflect, exchange, and validate results. Lastly, a commuinty response model was synthesized from multinational experiences. Results: Effective communication is key in promoting collective action for preventing virus transmission. Health literacy, habits and social norms in different populations are core components of public health interventions. To enable people to stay home while sustaining livelihoods, economic and social support are essential. Countries could benefit from previous pandemic experience in their community response. Whilst contact tracing and isolation are crucial intervention components, issues of privacy and human rights need to be considered. Conclusions: Understanding community responses to containment policies will help in ending current and future pandemics in the world.
APA, Harvard, Vancouver, ISO, and other styles
11

Anderson, Scott A. "Privacy Without the Right to Privacy." Monist 91, no. 1 (2008): 81–107. http://dx.doi.org/10.5840/monist200891114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

CREIGHTON, HELEN. "Right of Privacy." Nursing Management (Springhouse) 16, no. 3 (March 1985): 15???17. http://dx.doi.org/10.1097/00006247-198503000-00003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Koterski,, Joseph W. "The Right to Privacy." International Philosophical Quarterly 49, no. 3 (2009): 414–16. http://dx.doi.org/10.5840/ipq200949357.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Drywa, Anna. "Taxpayer’s Right to Privacy?" Intertax 50, Issue 1 (January 1, 2022): 40–55. http://dx.doi.org/10.54648/taxi2022004.

Full text
Abstract:
In the last decade, one of the most important tax challenges has been the fight against tax evasion and tax crime. In response to these phenomena, a number of initiatives have been undertaken that have a side effect of reducing the privacy of taxpayers. In view of the many undoubtedly important observations made in the context of the fight against taxpayers’ dishonesty, this discussion seems to be overly biased and should be balanced by a reflection on the need to protect the rights of taxpayers, among others, and the right to privacy. Attention should be paid to the legislator’s visible tendency to overstep the boundaries of their privacy. Most amendments to tax law are dramatically demonstrating how much of their privacy they have already surrendered. The article approaches the topic from a broad perspective beginning with the meaning and scope of the right to privacy from a constitutional perspective. Reflecting on privacy is never easy as it is a dynamic concept with fluid boundaries. The regulations introducing the right to privacy are of a general nature. The decisions of the courts in that regard are inherently fragmentary and do not allow a general understanding to be decoded. Nor has a universally accepted definition of privacy or the right to privacy been developed. Against this background, the extent of taxpayers’ privacy has been considered. A number of factors have been discussed that demonstrate a change in views in tax law and a trend towards restricting taxpayers’ privacy. The question is whether a taxpayer has a genuine right to privacy or whether they only have a substitution of such protection. Right to privacy, taxpayer’s privacy, tax, taxpayer, taxpayers’ rights, taxpayer situation.
APA, Harvard, Vancouver, ISO, and other styles
15

Anonymous. "NSF's right to privacy." Eos, Transactions American Geophysical Union 75, no. 42 (1994): 490. http://dx.doi.org/10.1029/94eo01096.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Rubenfeld, Jed. "The Right of Privacy." Harvard Law Review 102, no. 4 (February 1989): 737. http://dx.doi.org/10.2307/1341305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Klein, Sandra S. "Your Right to Privacy." Legal Reference Services Quarterly 12, no. 2-3 (February 24, 1993): 217–31. http://dx.doi.org/10.1300/j113v12n02_07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Trossman, Susan. "RNs’ Right to Privacy." AJN, American Journal of Nursing 105, no. 9 (September 2005): 73–75. http://dx.doi.org/10.1097/00000446-200509000-00031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Gebbie, Kristine M. "Privacy: The Patient’s Right." American Journal of Nursing 101, no. 6 (June 2001): 69–73. http://dx.doi.org/10.1097/00000446-200106000-00026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Morton, Bruce. "The Right to Privacy." Journal of Government Information 24, no. 2 (March 1997): 137–38. http://dx.doi.org/10.1016/s1352-0237(97)80902-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Weinreb, Lloyd L. "The Right to Privacy." Social Philosophy and Policy 17, no. 2 (2000): 25–44. http://dx.doi.org/10.1017/s0265052500002090.

Full text
Abstract:
The question that I address in this paper is whether there is a right to privacy. It is not the question whether in the United States there is a legal right to privacy or, more particularly, a constitutional right to privacy. There are any number of ordinary legal rights and specific constitutional rights that might be so described, and the U.S. Supreme Court has referred also to a generic “right to privacy” that is implicit in the U.S. Constitution. Nor is the question that I address whether persons have a moral claim to privacy that others ought to respect. I assume that in many circumstances, respecting a person's claim to privacy is productive of the good and, if so, that the claim ought to be respected. Rather, my question is whether persons have a right to privacy not dependent on positive law, such that it ought ordinarily to be respected without regard to the consequences, good or bad, simply because it is right.
APA, Harvard, Vancouver, ISO, and other styles
22

Rotenberg, Marc. "The right to privacy." Government Information Quarterly 13, no. 2 (January 1996): 211–12. http://dx.doi.org/10.1016/s0740-624x(96)90114-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Keegan, M. "Patients' right to privacy." BMJ 339, no. 02 2 (November 2, 2009): b4509. http://dx.doi.org/10.1136/bmj.b4509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Oqvist, K. L. "A right to privacy." ITNOW 51, no. 2 (March 1, 2009): 10–11. http://dx.doi.org/10.1093/itnow/bwp026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Pye, Lucian W. 1921. "Taiwan gets it right." Journal of Democracy 10, no. 1 (1999): 166–68. http://dx.doi.org/10.1353/jod.1999.0002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Li, Yi, and Gyunyeol Park. "AI Ethics and Privacy Right." J-Institute 5, no. 2 (September 30, 2020): 27–33. http://dx.doi.org/10.22471/ai.2020.5.2.27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Stroud, Irene Elizabeth, and Delese Wear. "Claiming the Right to Privacy." Women's Review of Books 11, no. 12 (September 1994): 22. http://dx.doi.org/10.2307/4021947.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Svadeba, N. I. "Individual’s right to privacy protection." Uzhhorod National University Herald. Series: Law, no. 65 (October 25, 2021): 128–32. http://dx.doi.org/10.24144/2307-3322.2021.65.23.

Full text
Abstract:
The article is devoted to the individual’s right to privacy protection and the study of legal consolidation of the individual’s right to privacy of communication problems. Issues of respect for private life, generalized norms of procedural legislation of Ukraine and the European Court of Human Rights decisions on the admissibility of inter-ference by investigators in private life are studied there.The normative legal acts that regulate the procedure for obtaining the consent of an individual to the processing of his / her data are considered and researched there. On the basis of author’s conclusions the concerning improvement of the legislation in the field of data collection of physical persons - businessmen are substantiated. The article characterizes the basic principles of international legislation on the legal protection of information with limited access and foreign experience of its implementation. The positions of scientists on the protection of an individual’s personal life are analyzed. The positive novelties of the Law of Ukraine “On Personal Data Protection”, as well as the gaps in it are analyzed there. It was found that the consent of the personal data subject is the voluntary expression of the individual’ will (provided that the person is informed) to grant permission for the processing of his / her personal data in accordance with the stated purpose of its processing. The notion of unreliable information and the composition of the offense in the dissemination of such information are studied. Judicial practice is analyzed, in particular, the Supreme Court of Ukraine notes that the legal composition of the offense in the dissemination of inaccurate information is a set of circumstances such as dissemination of information, that is bringing it to the notice of at least one person in any way; the information disseminated relates to a specific individual or legal person, that is the plaintiff; dissemination of unreliable information. It is made generalizations of the experience formed in Ukraine and abroad concerning protection of individual’s private life. The conditions of application of refutation of unreliable information for protection of individual’s right to private life from the infringements which arise as a result of distribution of such information are studied there.
APA, Harvard, Vancouver, ISO, and other styles
29

Rubenstein, Joshua S. "Protecting the right of privacy." Trusts & Trustees 25, no. 1 (December 7, 2018): 149–52. http://dx.doi.org/10.1093/tandt/tty178.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Alfino, Mark, and G. Randolph Mayes. "Reconstructing the Right to Privacy." Social Theory and Practice 29, no. 1 (2003): 1–18. http://dx.doi.org/10.5840/soctheorpract20032915.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Fareed Majeed, Majeed Mohamed. "Privacy Types." Randwick International of Education and Linguistics Science Journal 2, no. 1 (March 30, 2021): 52–58. http://dx.doi.org/10.47175/rielsj.v2i1.199.

Full text
Abstract:
The right to privacy is one of the most problematic rights. In the absence of any consensus on a clear theoretical basis for the concept of privacy; there is hardly a link, reliable, between the various issues and topics, which are included under this right. Privacy claims are used to defend rights that seem quite divergent, such as the right not to be monitored by phone calls, and the right to know what a telecom company keeps of personal data for its customers. The absence of a clear theoretical basis for the right to privacy is exacerbated by the fact that it is exposed to multiple dangers in the era of the massive expansion of the use of the Internet and the development of its applications. The actuality of material, described in the article, conditioned the urgent necessities of society simply to settle a question about privacy types and their appliance in the society. Theoretical and legal conversations about the relationship between taws and privacy were investigated in the article. This paper makes a contribution to a forward-looking privacy framework by examining the privacy impacts of six new and emerging technologies. It examines the privacy issues that each of these technologies present and contends that there are seven distinct sorts of privacy. This contextual investigation data propose that a loose conceptualization of privacy might be important to keep up a smoothness that empowers new measurements of privacy to be identified, that will be understood and addressed so as to adequately react to quick technological evolution.
APA, Harvard, Vancouver, ISO, and other styles
32

Nirala, Dr Surendra Kumar. "Right To Privacy: A Comparative Study." Asia Pacific Law & Policy Review 08 (2022): 24–32. http://dx.doi.org/10.55662/aplpr.2022.802.

Full text
Abstract:
The term ‘Privacy’ is derived from the Latin word ‘Privatus’ which means separated from the rest. Though it is a variable concept and varies with cultural or social context, but actually it means, the right to be left alone. The need for Privacy is to create a balance between individual and social interests, which is equally applicable to past, present and future society. In this sense, the necessity of Privacy was found in the dawn of human civilization. The idea of Privacy is as old as Biblical periods. Also, the growth and expansion of Privacy varied according to the variation in different stages of human civilization. Hence, the description of origin and history of Right to Privacy should proceed from the ancient period to the modern period. In fact, the idea of Privacy was originated in the animal society and gradually it has been incorporated into the human society. The idea of Privacy, which was originated in the animal society, has been adopted in the primitive human society, where the traces of it were first found. According to different Anthropological studies, the idea of Privacy varied in respect of different primitive societies. With the evolution of primitive society to ancient society and then gradually to modern society, the idea of Privacy has been developed to get its present shape. The root of Privacy and its protection is embedded in the history of human civilization, which is characterized specially by transformation of primitive society into modern society. The social transformation has increased both the physical and psychological opportunities for Privacy and also proved to be fruitful for conversion of these opportunities into choices of values in the context of socio-political reality. Social transformation is the responsible factor for changing nature of Privacy as well as the changing character of Privacy violations from primitive societies to modern societies
APA, Harvard, Vancouver, ISO, and other styles
33

Rengel, Alexandra. "Privacy as an International Human Right and the Right to Obscurity in Cyberspace." Groningen Journal of International Law 2, no. 2 (December 5, 2014): 33. http://dx.doi.org/10.21827/5a86a81e79532.

Full text
Abstract:
Fundamental rights are considered to be those which human beings have by the fact of being human and are neither created nor can be abrogated by any government absent extraordinary circumstances. They are fundamental in that the enjoyment of such rights is necessary to live a life with dignity. Fundamental rights are recognized by several international conventions and treaties such as the International Convention on Civil and Political Rights, and the International Convention on Economic and Social Rights and they include cultural, economic, and political rights, such as the right to life, the right to liberty, the right of association, and the right to freedom of religion. Privacy is an essential human need. Although the concept of privacy has a certain abstract quality to it that makes it difficult to define, instinctively, humans need to know that they can keep some things secret from others. Absent extraordinary circumstances the need for humans to have a certain degree of privacy is innate. Perhaps as a result of that intrinsic need, privacy as a concept has been recognized in a social as well as a legal sense in most cultures from time immemorial. Today, the right to privacy is considered to be an identifiable human right with universal qualities deserving legal recognition and protection, although the scope of such legal protection is still being determined. In reviewing the concept of privacy, new technologies often make us wonder what level of protection of our right to privacy is possible in a world where personal information about us can be accessed not by infringing our physical space, but by invisible hands that can access our most private secrets just by pressing a button and looking at a screen. New technologies in the form of the Internet, social networks, remote access to information, etc., make it increasingly more difficult to maintain privacy rights in cyberspace such that online invisibility has become impossible. The quest for invisibility is the idea that individuals should be able to choose to remain invisible online. In order for that scenario to become a reality more emphasis needs to be made on the universal recognition of privacy principles in the context of cyberspace. Additionally, design based privacy solutions must be created to protect individuals’ privacy in cyberspace.
APA, Harvard, Vancouver, ISO, and other styles
34

Hunt, Chris D. L. "From Right to Wrong: Grounding a "Right" to Privacy in the "Wrongs" of Tort." Alberta Law Review 52, no. 3 (June 12, 2015): 635. http://dx.doi.org/10.29173/alr26.

Full text
Abstract:
This article discusses the theoretical foundations for a common law tort of invasion of privacy. The author argues that invading a person’s “right” to privacy is conduct that can be regarded as a tortious “wrong.” He illustrates this by integrating privacyinto the work of several leading tort theorists and also by drawing analogies between privacy and defamation, on the one hand, and battery and trespass, on the other. He concludes that asking tort to protect privacy does not ask it to do work of a kind any different in substance from that which it has long been doing.
APA, Harvard, Vancouver, ISO, and other styles
35

Jingchun, Cao. "Protecting the Right to Privacy in China." Victoria University of Wellington Law Review 36, no. 3 (October 1, 2005): 645. http://dx.doi.org/10.26686/vuwlr.v36i3.5610.

Full text
Abstract:
This article suggests the Chinese government should establish systematic legal protection for personal privacy in China. First, a brief introduction to the history of the concept of privacy in China is given. Based on the definition of privacy in the Western world, the modern concept of privacy has been absorbed by Chinese scholars and defined according to Chinese norms. During this process, the subjects and objects of the right to privacy have been chosen and the distinctions between the right to privacy, the right of reputation and the right to know have been made clear. This article considers that it is most important to recognise the right to privacy as an independent right both in the Constitution and Civil Code. Depending on the impact of the breach of privacy, liability for civil or criminal punishment should attach. Besides these measures, a specific data protection law is also essential.
APA, Harvard, Vancouver, ISO, and other styles
36

Miya, Pamela A. "Teen's Right to Privacy vs. Mother's Right to Know." American Journal of Nursing 96, no. 3 (March 1996): 62. http://dx.doi.org/10.1097/00000446-199603000-00040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Beauchamp, Tom L. "The Right to Privacy and the Right to Die." Social Philosophy and Policy 17, no. 2 (2000): 276–92. http://dx.doi.org/10.1017/s0265052500002193.

Full text
Abstract:
Western ethics and law have been slow to come to conclusions about the right to choose the time and manner of one's death. However, policies, practices, and legal precedents have evolved quickly in the last quarter of the twentieth century, from the forgoing of respirators to the use of Do Not Resuscitate (DNR) orders, to the forgoing of all medical technologies (including hydration and nutrition), and now, in one U.S. state, to legalized physician-assisted suicide. The sweep of history—from the Quinlan case in New Jersey to legislation in Oregon that allows physician-assisted suicide—has been as rapid as it has been revolutionary.
APA, Harvard, Vancouver, ISO, and other styles
38

Diggelmann, O., and M. N. Cleis. "How the Right to Privacy Became a Human Right." Human Rights Law Review 14, no. 3 (July 7, 2014): 441–58. http://dx.doi.org/10.1093/hrlr/ngu014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Arneson, Richard J. "Egalitarian Justice versus the Right to Privacy?" Social Philosophy and Policy 17, no. 2 (2000): 91–119. http://dx.doi.org/10.1017/s0265052500002120.

Full text
Abstract:
In their celebrated essay “The Right to Privacy,” legal scholars Samuel Warren and Louis Brandeis identified as the generic privacy value “the right to be let alone.” This same phrase occurs in Justice Brandeis's dissent in Olmstead v. U.S. (1927). This characterization of privacy has been found objectionable by philosophers acting as conceptual police. For example, moral philosopher William Parent asserts that one can wrongfully fail to let another person alone in all sorts of ways—such as assault—that intuitively do not qualify as violations of privacy and thus cannot be violations of the right to privacy.
APA, Harvard, Vancouver, ISO, and other styles
40

Harding, Emma. "Compliance Costs and the Privacy Act 1993: Perception of Reality for Organisations in New Zealand." Victoria University of Wellington Law Review 36, no. 3 (October 1, 2005): 529. http://dx.doi.org/10.26686/vuwlr.v36i3.5609.

Full text
Abstract:
This article suggests the Chinese government should establish systematic legal protection for personal privacy in China. First, a brief introduction to the history of the concept of privacy in China is given. Based on the definition of privacy in the Western world, the modern concept of privacy has been absorbed by Chinese scholars and defined according to Chinese norms. During this process, the subjects and objects of the right to privacy have been chosen and the distinctions between the right to privacy, the right of reputation and the right to know have been made clear. This article considers that it is most important to recognise the right to privacy as an independent right both in the Constitution and Civil Code. Depending on the impact of the breach of privacy, liability for civil or criminal punishment should attach. Besides these measures, a specific data protection law is also essential.
APA, Harvard, Vancouver, ISO, and other styles
41

Starr, Paul. "Health and the Right to Privacy." American Journal of Law & Medicine 25, no. 2-3 (1999): 193–201. http://dx.doi.org/10.1017/s0098858800010881.

Full text
Abstract:
When Louis Brandeis and Samuel Warren introduced the phrase “the right to privacy” as the title of an article in the Harvard Law Review in December 1890, they were primarily concerned about a right of privacy from the news media. “The press,” they wrote, “is overstepping in every direction the obvious bounds of propriety and of decency. Gossip is no longer the resource of the idle and of the vicious, but has become a trade, which is pursued with industry as well as effrontery. To satisfy a prurient taste the details of sexual relations are spread broadcast in the columns of the daily papers.”
APA, Harvard, Vancouver, ISO, and other styles
42

손형섭. "The right of privacy for entertainer." Korean Lawyers Association Journal 58, no. 8 (August 2009): 5–44. http://dx.doi.org/10.17007/klaj.2009.58.8.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

손형섭. "The right of privacy for entertainer." Korean Lawyers Association Journal 58, no. 8 (August 2009): 5–44. http://dx.doi.org/10.17007/klaj.2009.58.8.001001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Boe, Erik. "«The Right to Privacy» i USA." Lov og Rett 33, no. 10 (December 1, 1994): 577–78. http://dx.doi.org/10.18261/issn1504-3061-1994-10-01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Gilbert, Helen L. "Minors' Constitutional Right to Informational Privacy." University of Chicago Law Review 74, no. 4 (October 1, 2007): 1375. http://dx.doi.org/10.2307/20141865.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Vieira, Norman. "Hardwick and the Right of Privacy." University of Chicago Law Review 55, no. 4 (1988): 1181. http://dx.doi.org/10.2307/1599785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Langer, Richard. "ABORTION AND THE RIGHT TO PRIVACY." Journal of Social Philosophy 23, no. 2 (September 1992): 23–51. http://dx.doi.org/10.1111/j.1467-9833.1992.tb00291.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Machan, Tibor R. "THE RIGHT TO PRIVACY VS. UNIFORMITARIANISM." Journal of Social Philosophy 23, no. 2 (September 1992): 75–84. http://dx.doi.org/10.1111/j.1467-9833.1992.tb00294.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Gadomsky, Dmytro, and Tykhin Alekseienko. "Right to privacy and cybercrime investigation." International Journal of Intellectual Property Management 6, no. 1/2 (2013): 62. http://dx.doi.org/10.1504/ijipm.2013.053453.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Roessler, Beate. "X—Privacy as a Human Right." Proceedings of the Aristotelian Society 117, no. 2 (July 2017): 187–206. http://dx.doi.org/10.1093/arisoc/aox008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography