Rozprawy doktorskie na temat „Privacy, Right of”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Privacy, Right of.

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Privacy, Right of”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Tao, Ran. "The Right to Privacy". Scholarship @ Claremont, 2019. https://scholarship.claremont.edu/scripps_theses/1338.

Pełny tekst źródła
Streszczenie:
Contemporary debates about the right to privacy were inaugurated by Samuel Warren and Louis Brandeis’ article on the topic. While Warren and Brandeis understand the right to privacy as a stand-alone right, J. J. Thomson interprets it as a cluster of rights that itself intersects with other rights. Despite such disagreement, both accounts point to a deep connection between property rights and one’s right to herself. A close examination of the Lockean and Kantian concepts of property confirms this. In particular, Arthur Ripstein’s Kantian account of innate right and property rights suggests that property rights are derived from the innate right one has in herself. Building on this account, I suggest that one’s innate right and property rights grant one the exclusive control to herself and to her property. Such exclusive control can be conceptualized as the basis for one’s privileged space, any unauthorized access to which and any unauthorized use of what lies within which constitute violation of one’s right to privacy.
Style APA, Harvard, Vancouver, ISO itp.
2

Wolfson, Susan Ann. "The right to privacy and education". Thesis, University College London (University of London), 1989. http://discovery.ucl.ac.uk/10019704/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Lander, Angelina M. "Privacy, surveillance and the state a comparison of U.S. and British privacy rights /". Orlando, Fla. : University of Central Florida, 2009. http://purl.fcla.edu/fcla/etd/CFE0002772.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Al-Rawashdeh, Sami H. "Is privacy brought home? : criminal justice and the right to privacy". Thesis, University of Aberdeen, 2003. http://digitool.abdn.ac.uk/R?func=search-advanced-go&find_code1=WSN&request1=AAIU176274.

Pełny tekst źródła
Streszczenie:
This thesis is concerned with protection of the right to privacy in the English and Scottish criminal justice systems. The aim of this research is to consider the extent to which privacy has been recognised in both criminal justice systems. It analyses the extent to which the right to privacy is protected by the substantive criminal law of those jurisdictions, as well as in their criminal procedural law. A part of the examination will address the question of whether there should be a criminal offence of violating the privacy of another. The thesis is mainly devoted to addressing whether the right to respect for private life has a place within criminal justice theory and practice. The protection of privacy in the criminal justice system is the predominant subject of this thesis for two main reasons. First, this is an important topic that has been neglected. Prior to this thesis no one had yet addressed this topic at any length as a distinct subject. The protection of privacy in the criminal justice system and the use of substantive criminal law to enforce the privacy rights of victims have received minimal attention in the English jurisprudence. No comprehensive legal and theoretical analysis of the topic could be found in English or Scottish law. Therefore, this topic was crying out for new insights and perspectives. Secondly, the Human Rights Act 1998 incorporates into the UK law certain rights and freedoms set out in the European Convention on Human Rights, including the right to respect for private life enshrined by Article 8. The aim of the Act is to "bring rights home" and give further effect to rights and freedoms guaranteed under the European Convention. The Act requires all public authorities to act in a way which is compatible with the Convention rights. Since the incorporation of the European Convention on Human Rights into United Kingdom law, it is particularly appropriate to ask whether English and Scottish criminal lawyers need to add privacy to their essential lexicon. The Human Rights Act 1998 could be expected to have a profound impact on the right to privacy within the criminal justice system. The European Convention obliges the Contracting States to bring their criminal justice systems into line with the European Convention requirements to protect the fundamental human rights in it. The thesis has the following objectives. First, to address the extent to which the right to privacy is protected by the substantive criminal law and whether privacy rights have been respected in criminal procedure laws. Secondly, to highlight the impact of the Human Rights Act of 1998 on the right to privacy in the criminal justice arena. This thesis shows that although right to privacy has been recognised by the European Convention and incorporated by the Human Rights Act 1998, the criminal justice systems in England and Scotland display little respect for privacy rights. In other words, this study has demonstrated that, as far as privacy is concerned, it is misleading and inaccurate to say that rights have been brought home.
Style APA, Harvard, Vancouver, ISO itp.
5

Gibb, Susan Jennifer. "Privacy and Australian law". Title page, contents and abstract only, 1987. http://web4.library.adelaide.edu.au/theses/09PH/09phg4372.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Theis, Adriane. "Liberal privacy and women a broken promise /". Diss., Connect to the thesis, 2006. http://hdl.handle.net/10066/726.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Mitroff, Melanie. "Privacy : a constitutional right that threatens democracy /". Lynchburg, VA : Liberty University, 2007. http://digitalcommons.liberty.edu.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

jajodia(Mozika), Jyoti. "Emerging right to privacy : an Indian perspective". Thesis, University of North Bengal, 2002. http://ir.nbu.ac.in/handle/123456789/309.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Crounse, Shane. "The fair information principles : a comparison of U.S. and Canadian privacy policy as applied to the private sector /". Online version of thesis, 2009. http://hdl.handle.net/1850/8638.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Heite, Martin. "Privacy, Constitutions and the Law of Torts: a Comparative and Theoretical Analysis of Protecting Personal Information Against Dissemination in New Zealand, the UK and the USA". University of Canterbury. Law, 2008. http://hdl.handle.net/10092/2955.

Pełny tekst źródła
Streszczenie:
The New Zealand Court of Appeal has recently acknowledged the existence of a freestanding tort of invasion of privacy in Hosking v Runting. The tort is in its infancy and the courts are still grappling with essential problems, the most prominent of which is the conflict with countervailing interests in freedom of speech. In need of guidance, the courts turn to overseas authorities, predominantly from the United Kingdom and the United States of America. The commonly found descriptive nature of the comparison invites a broader analysis of these jurisdictions. In this thesis, I offer a theoretically informed comparative law analysis of New Zealand's new tort with the American public disclosure of private facts tort and the British extended breach of confidence action. In all three jurisdictions, the conflict of privacy with individual and societal concerns in freedom of speech has led to an exten-sion of (quasi-) constitutional norms derived, for instance, from the New Zealand Bill of Rights Act 1990 into the common law sphere – the horizontal effect. The horizontal application of constitutional rights poses significant legal problems to the common law, because it has learned to deal with duties rather than rights. The time has come to re-consider the nature of rights in both constitutional and tort law. The comparison shows that New Zealand has effectively adopted two torts – one following the duty-based lead of the United States of America and an alternative modelled along the lines of the more rights-orientated British law. The law of the United Kingdom and the USA differ to a degree that calls their comparability into question. I present the preferable British ap-proach as a 'constitutionalised common law tort of privacy.' The results also show that this model represents a competitive third way to traditional solutions based on common law or statute by means of utilising a statutory human rights instrument as an analytical framework for the common law.
Style APA, Harvard, Vancouver, ISO itp.
11

Weston, Mindy. "The Right to Be Forgotten: Analyzing Conflicts Between Free Expression and Privacy Rights". BYU ScholarsArchive, 2017. https://scholarsarchive.byu.edu/etd/6453.

Pełny tekst źródła
Streszczenie:
As modern technology continues to affect civilization, the issue of electronic rights grows in a global conversation. The right to be forgotten is a data protection regulation specific to the European Union but its consequences are creating an international stir in the fields of mass communication and law. Freedom of expression and privacy rights are both founding values of the United States which are protected by constitutional amendments written before the internet also changed those fields. In a study that analyzes the legal process of when these two fundamental values collide, this research offers insight into both personal and judicial views of informational priority. This thesis conducts a legal analysis of cases that cite the infamous precedents of Melvin v. Reid and Sidis v. F-R Pub. Corp., to examine the factors on which U.S. courts of law determinewhether freedom or privacy rules.
Style APA, Harvard, Vancouver, ISO itp.
12

Marasinghe, S. C. "A child's right to privacy in international law". Thesis, University of Oxford, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.413108.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Skahill, Tina M. "Striking the right balance : fusion centers and privacy". Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5243.

Pełny tekst źródła
Streszczenie:
CHDS State/Local
Approved for public release; distribution is unlimited
After the events of 9/11, the number of fusion centers rapidly multiplied. As a result, state and local agencies that operated the centers adopted a myriad of policies. This thesis seeks to answer how fusion centers can implement policies as to operational structure and transparency that simultaneously safeguard against abuse of citizens' privacy while facilitating the collection, maintenance, and dissemination of information. Two methods of research are utilized: policy analysis and policy options analysis. This thesis examines existing federal guidelines, federal case law, and various federal statutes and regulations. Moreover, the thesis explores three policy options as possible decision-making tools for fusion centers: 1) mandatory federal guidelines, 2) imposition of a balancing test and administrative review process, and 3) a compulsory reasonable-suspicion requirement. In the end, this thesis recommends imposition of all three policies.
Style APA, Harvard, Vancouver, ISO itp.
14

Johnson, Virginia Wilson. "Architectural correlates of privacy : the dynamics of privacy regulation /". Diss., This resource online, 1990. http://scholar.lib.vt.edu/theses/available/etd-07132007-143142/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

Dayan, Michael Oved. "Privacy boundaries : stories of protecting personal autonomy in the information age". Thesis, McGill University, 2004. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=85147.

Pełny tekst źródła
Streszczenie:
In 1890, lawyers Samuel Warren and Louis Brandeis conceived of a "sacred" right, the right to "be let alone." They argued for this right as a measure of "retreat from the world" for protection of an individual's "inviolate personality." Their argument was born in response to intrusions made possible with technological developments in printing and photography. For over a 100-year period, the concept of privacy has received attention from a multi-disciplinary collection of scholars. Despite this significant attention, however, relatively little consideration has been paid to conceptualizations of privacy in the everyday. My dissertation utilizes the focus group method to access individuals' stories about privacy in everyday lives. The unit of the story is important because it contains rich connotative language, imbued with meaning. My method of analysis is inspired primarily by Michel de Certeau and Clifford Geertz. This analysis reveals four significant themes, all linking back to Warren and Brandeis's original conceptualization in thinking about privacy in the everyday: it is associated with fears, it is considered a defence against surveillance, it is conceived of in metaphorical terms as a protective boundary, and it protects personal information and individual autonomy. This dissertation explores how individuals articulate these themes. It finds that individuals apply the language of space as a framework in which to believe their privacy is protected from surveillance.
Style APA, Harvard, Vancouver, ISO itp.
16

Lonka, Anna. "Profiling through Ultrasound Technoogy, the Right to Privacy and the Right to Data Protection". Thesis, Stockholms universitet, Juridiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-154902.

Pełny tekst źródła
Streszczenie:
The right to private and family life and the right to the protection of personal data are two fundamental rights of the EU. The protection of these rights is addressed in the new General Data Protection Regulation (GDPR), the Directive on Privacy and Electronic Communications (ePrivacyDirective) and the upcoming new Regulation on Privacy and Electronic Communications (draft ePrivacy Regulation). In this thesis these three legal acts are evaluated in light of profiling through ultrasound tracking technology. Their technology neutrality and their functioning as safeguards of the two fundamental rights against the use of profiling through ultrasound tracking technology is tested. The GDPR is found to differentiate between profiling in the context of automatic decision-making and profiling in other contexts. The process of profiling is described in general terms. It is shown how tracking technologies in general and ultrasound tracking technology in particular have a central role in the profiling process.It is found that ultrasound tracking technology enables far wider tracking and data collection than the other tracking technologies. Differences and similarities between ultrasound tracking technology and other tracking technologies are described. According to the findings, the three legal instruments, the GDPR, the ePrivacy Directive and the draft ePrivacy Regulation, all live up to their aim of technology neutrality on theoretical level, since profiling through ultrasound tracking technology is within the material scope of all of them. An exemption is Article 8(2) of the draft ePrivacy Regulation that, unlike Article 9 of the ePrivacyDirective, does not stretch to cover location tracking through ultrasound technology. However, as will be shown, there are risks related to the practical implementation of these legal frameworks.
Style APA, Harvard, Vancouver, ISO itp.
17

O'REILLY, JOSEPH MATTHEW. "LEGAL PRIVACY AND PSYCHOLOGICAL PRIVACY: AN EVALUATION OF COURT ORDERED DESIGN STANDARDS (ENVIRONMENTAL, PSYCHIATRIC HOSPITALS, ARCHITECTURE)". Diss., The University of Arizona, 1985. http://hdl.handle.net/10150/187916.

Pełny tekst źródła
Streszczenie:
The legal system and the social sciences share an interest in privacy but have developed separate conceptualizations of the concept. The result is two similar but conflicting theories of privacy that make different assumptions about how people behave and how that behavior can be controlled. The purpose of this study was to begin testing these theories by examining the operationalization of privacy through mandated standards intended to ensure privacy for the mentally ill. Specifically, the standards set in Wyatt v. Stickney, which reflect the idea that privacy is a sphere of space free from outside intrusion, were examined to see if they did indeed ensure privacy. Using two units in a facility that met the standards mandated by the court in Wyatt v. Stickney, the research examined staff and patient perceptions of privacy. Thirty-five patients were interviewed and twenty-four staff completed questionnaires on the overall habitability of the unit and patient privacy. Results indicated that the Wyatt court's operationalization of privacy as primarily a visual phenomena was inadequate and although the specific standards ordered to ensure privacy were reported to be effective by a simple majority of patients, overall patients reported a lack of privacy. Staff responses were generally in agreement with patients but they tended to use more extreme or stronger ratings. The present study also has implications for the legal conceptualization of privacy. It was found that privacy was perceived as important by patients; that autonomy as evidenced by control was an important issue for a minority of patients; and, the right of selective disclosure was not a major concern of patients. Needed future areas of research that were identified included: comparing privacy ratings across a variety of group living situations, comparing the mentally ill's conceptualizations of privacy from others, determining the effect of privacy on the therapeutic goals of an institution and therapeutic outcome and, determine the relative importance of privacy to the mentally ill.
Style APA, Harvard, Vancouver, ISO itp.
18

Black, Gillian. "Right of publicity in Scots law". Thesis, University of Edinburgh, 2009. http://hdl.handle.net/1842/5943.

Pełny tekst źródła
Streszczenie:
This thesis examines publicity exploitation in practice and the possible legal response of Scots law to that exploitation. It argues that the common law in Scotland is not capable of providing a coherent and principled right of publicity for individuals, and that a statutory right is instead required. By examining the nature of publicity exploitation and the activities that constitute publicity, it becomes clear that there are a number of different methods by which an individual’s “persona” – name, image, identity and reputation – can be used to enhance the goods and services of others, and that this enhancement is something for which other parties are willing to pay. The first part of this thesis explores publicity in practice, in order to derive a framework and vocabulary on which to build the subsequent legal analysis. One conclusion reached here is that, whereas much case law and academic commentary focuses on the unauthorised use of persona, authorised exploitation is more common and more lucrative for the individual. Both authorised and unauthorised use therefore need to be represented in a publicity right. The second part explores justifications for establishing a legal right to regulate the exploitation of publicity and to enable the control of such exploitation by the individual in question. These justifications reflect the dual interests at stake in publicity rights, being dignitarian interests in the use and control of one’s persona, and economic interests in the financial value of such use. The third part of the thesis draws upon the findings of the first two parts in order to assess the most appropriate legal classification of a right of publicity. The conclusion reached is that publicity cannot be sufficiently protected through established real rights or personal rights. Instead, the hybrid nature of publicity, comprising dignitarian and economic interests, should most appropriately be protected through a right in the nature of exclusive privilege (a concept already known in Scots law). This right is capable of enabling the necessary control of persona for the individual, subject to appropriate limitations to recognise the competing interests of other parties. These limits include freedom of expression and cultural communication. The final conclusion is that such a statutory right of exclusive privilege would be best placed to give principled and coherent effect to a right of publicity in Scots law.
Style APA, Harvard, Vancouver, ISO itp.
19

Kunz, Thea. "Celebrating Privacy Day: The Right to be forgotten and individual Privacy in the digital Age". Thesis, Uppsala universitet, Medier och kommunikation, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-356108.

Pełny tekst źródła
Streszczenie:
This thesis explores the current status of privacy in the context of the upcoming implementation of the General Data Protection Regulation (GDPR) and, more precisely, focuses on the redefined Right to be forgotten as its most controversial component. Norman Fairclough’s three-dimensional model of critical discourse analysis was deployed to show how the Right to be forgotten is reshaping the privacy discourse in the age of big data, digitalization, surveillance and data driven business. Qualitative content analysis was used to serve critical discourse analysis as the first stage of the three dimensions, which built the foundation for the analysis of the broader discursive and societal practices. The digital age requires a rethinking of privacy in terms of the protection of personal data due to the embeddedness of technology in everyday life, big data, easy retrieval and cheap cloud storage. Forgetting and remembering are two facets that constitute human behavior but within the regime of technological advancements, both have lost, or changed their meaning. The new legislative framework aims to enhance forgetting but seems more of a façade to legitimate remembering. Several online blog posts written by experts in diverse fields of knowledge have shown that the current legislative framework is no longer sufficient due to technological change and unequal hegemonic relations, which contribute to reshaping the privacy discourse. The thesis does not give a final answer to the questions raised but contributes to the debate and to a comprehensive understanding of the new legislation in Europe.
Style APA, Harvard, Vancouver, ISO itp.
20

Boshego, Ngwanathaba Angelinah. "Balancing the right to freedom of expression with the right to privacy for public figures". Diss., University of Pretoria, 2017. http://hdl.handle.net/2263/62559.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Fischer-Hübner, Simone. "IT-security and privacy : design and use of privacy-enhancing security mechanisms /". Berlin [u.a.] : Springer, 2001. http://www.loc.gov/catdir/enhancements/fy0812/2001034161-d.html.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Simsek, Yilmaz. "New Surveillance Technologies and the Invasion of Privacy Rights". Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4252/.

Pełny tekst źródła
Streszczenie:
Definition of privacy has changed by the changes and improvements in information and surveillance technologies. These changes and improvement need new legal decisions for new kinds of privacy invasions. This study explores the scope of privacy right, particularly when a technological surveillance has occurred by law enforcement agencies. It focuses in particular on increasing law enforcements' surveillance technologies and devices that have the potential to impact citizens' information privacy. These increasing changes in surveillance technologies have important implications both for law enforcements and citizens. This study also discusses increasing law enforcement surveillance for the public's security, changes of the laws that allow law enforcements to use new surveillance powers as a war on terrorism, and the citizens concerns of information privacy. A particular attention is given to the recent public opinion surveys which show citizens' increasing privacy concerns. Finally, a set of recommendations to figure out security-privacy debate and reduce the privacy concerns of the citizens is offered.
Style APA, Harvard, Vancouver, ISO itp.
23

Nam, Hyung Doo. "The right of publicity in the global market : is James Dean a living dead even in Korea? /". Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/9613.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

Lukman, Joshua R. "Right to publicity and privacy versus first amendment freedom of speech". Honors in the Major Thesis, University of Central Florida, 2003. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/323.

Pełny tekst źródła
Streszczenie:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf.edu/Systems/DigitalInitiatives/DigitalCollections/InternetDistributionConsentAgreementForm.pdf You may also contact the project coordinator, Kerri Bottorff, at kerri.bottorff@ucf.edu for more information.
Bachelors
Health and Public Affairs
Legal Studies
Style APA, Harvard, Vancouver, ISO itp.
25

Grigalashvili, Mariam. "Taxpayers’ rights protection during exchange of information : Whether taxpayers’ rights (right to privacy, participation rights) aresufficiently protected during exchange of information". Thesis, Uppsala universitet, Juridiska institutionen, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-409537.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

Hunt, Christopher Douglas Lorne. "Justifying and structuring a principled common law privacy tort". Thesis, University of Cambridge, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.607899.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

Paton, Elizabeth Katrine. "Privacy law and the media". Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/28826.

Pełny tekst źródła
Streszczenie:
This thesis explores the issue of how to reconcile the value of individual privacy with that of freedom of speech. It argues that there ought to be legal protection against invasion of privacy by the media, and that such protection should be seen as complementary to a system of free expression rather than opposed to such a system. A definition of privacy is outlined which, it is contended, meets the criteria for a coherent, neutral definition. Various reasons for valuing privacy and in favour of protecting the individual's reasonable expectations of privacy are identified. It is argued that lack of precision in the normative realm, in defining with certainty when privacy is invaded, should not be an excuse for leaving the individual without legal protection. There follows an examination of the protection of privacy against media incursions in English, New Zealand, Australian and Canadian law, other than the coincidental protection afforded by certain common law actions. There has been significant judicial and legislative recognition of the need to safeguard privacy interests, and many interesting developments in recent years are discussed. However, none of the countries considered has yet developed effective recourse for victims of unwarranted and invasive publications. It is argued that the relationship between privacy and free speech has been wrongly conceptualised, and that in fact both interests serve the same underlying set of values. Problems arise when privacy and free speech interests are balanced in the abstract rather than in context, and when a simplistic view of press freedom is adopted in disregard of the realities of the modern mass media. Invasive publications generally do not significantly advance free speech interests unless they help to provide the information needed for public decision-making. Furthermore, this information can in many cases be conveyed without detriment by withholding details which disclose identity. A three-step test is proposed to determine whether privacy and free speech interests can be reconciled without compromise to either of them, or whether it is necessary to balance these interests in the context of the case. It will also be maintained that a contextual approach is preferable to the adoption of categories such as "public figures" and "public places". These concepts tend to be misleading, and should be eschewed as analytical tools, since they confuse important questions which require separate analysis.
Law, Peter A. Allard School of
Graduate
Style APA, Harvard, Vancouver, ISO itp.
28

Yamashita, Miyo. "Electronic surveillance and the prospects for privacy in Canada's private sector by the year 2000". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape11/PQDD_0020/NQ44634.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Moller, Kerry. "The Right to Digital Privacy: Advancing the Jeffersonian Vision of Adaptive Change". Scholarship @ Claremont, 2014. http://scholarship.claremont.edu/cmc_theses/936.

Pełny tekst źródła
Streszczenie:
The relationship between privacy, technology, and law is complex. Thomas Jefferson’s prescient nineteenth century observation that laws and institutions must keep pace with the times offers a vision for change. Statutory law and court precedents help to define our right to privacy, however, the development of new technologies has complicated the application of old precedents and statutes. Third party organizations, such as Google, facilitate new methods of communication, and the government can often collect the information that third parties receive with a subpoena or court order, rather than a Fourth Amendment-mandated warrant. Privacy promotes fundamental democratic freedoms, however, under current law, the digital age has diminished the right to privacy in our electronic communications data. This work explores the statutory and constitutional law protecting our right to privacy, as well as the inadequacies that have developed with the digital revolution. With commonplace use of third parties to facilitate electronic communication, our courts and lawmakers must amend current laws and doctrines to protect the privacy of communications in the digital age. To provide clarity and appropriate data privacy protections, the following clarifications and amendments should be made to the third party doctrine and the Stored Communications Act (SCA): 1) third party doctrine should only apply to context data, 2) content data should be protected by the Fourth Amendment, 3) the SCA should eliminate the distinction between Remote Computing Services (RCS) data and Electronic Communication Services (ECS) data, and 4) the SCA should require warrants for all content data acquisition.
Style APA, Harvard, Vancouver, ISO itp.
30

Sato, Keiko. "Privacy on the internet : Investigation into corporate privacy policy of Australian large private sector organisations on the internet". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2001. https://ro.ecu.edu.au/theses/1032.

Pełny tekst źródła
Streszczenie:
The popularity of the Internet has been dramatically increased over recent years. The rapid growth of this technology and its international use has made it almost impossible to regulate the internet. As a result, the Internet has certainly provided freedoms to people and it has led to some abusing systems. Privacy is one of the major issues in the development of Electronic Commerce using the Internet. As an enormous amount of personal information is transmitted to several hosts connecting to the Internet, the information can be accessed by both authorised and unauthorised people. Although it is certain that there are several existing problems of using the Internet for business activities, many organisations have already started using it. It is believed that the Internet provides efficiency and effectiveness for various activities Although much research has been described the business use of the Internet in many countries, these studies have not specifically investigated Australian organisations. Therefore, this research investigates the current use of the Internet by Australian organisations and their associated privacy policies, as a means of seeking their privacy concerns. Using a benchmark provided by Australian privacy commissioners, it evaluates their privacy policies to see how well they are established to protect privacy of users. The study utilises the top 100 Australian large private sector organisations as the sample. The current practice of the sample organisations on the Internet was observed by exploring their Web sites. Privacy policies were also collected from their Web sites. Moreover, a letter requesting corporate privacy policy was sent to each organisation that collects personal information on the Internet. The result showed that the majority of Australian organisations were using the Internet today, but a surprisingly few organisations showed their privacy policy on the Internet. Also, this research showed that many organisations did not actually have a corporate privacy policy. Many organisations are using the Internet without apparent concern for customers' privacy. The organisations proactively involved in the Internet Commerce are more concerned about security side of the Internet. Hence, they appear to believe that the technology itself protects information sent on the Internet. It has become clear that technology by itself does not provide the security needed for users of the Internet as unethical act of authorised parties could harm privacy of individuals. There is an argument that the Internet needs to be regulated. However, the process of international regulation on the Internet has not been started. Thus, it is ideal that organisations proactively protect clients' personal information accessible by the use of the Internet technology. This study looks at the methods of obtaining privacy of individuals and suggests the ideal conduct of organisations.
Style APA, Harvard, Vancouver, ISO itp.
31

Hedefine, Eeva Kaarina. "Personal Privacy Protection within Pervasive RFID Environments". Fogler Library, University of Maine, 2006. http://www.library.umaine.edu/theses/pdf/HedefineEK2006.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Brase, Susanne. "Public figures' right to privacy, private law constraints on the media's rights to access and to publish information : a Canadian-German comparative study". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape15/PQDD_0003/MQ36006.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Janz, Linda, i University of Lethbridge Faculty of Arts and Science. "Privacy and the internet : differences in perspectives". Thesis, Lethbridge, Alta. : University of Lethbridge, Faculty of Arts and Science, 1997, 1997. http://hdl.handle.net/10133/64.

Pełny tekst źródła
Streszczenie:
This study examined results of a World Wide Web survey that used the framework of domain theory of moral development to examine attitudes of Internet users assuming perspectives of victims, aggressors and bystanders toward privacy issues. The effect of a monetary incentive was tested on two perspectives; effects of three moderating variables, employment status, newsgroup/mailing list membership and culture, were also tested. In the process of examing interactions, an evaluation determined if changes in attitudes indicated movement along a morality continuum. Results show that victims are more concerned than aggressors, and bystanders take a moralizing stance regardless of domain. Results of the monetary incentive test suggest that privacy is for sale. Employed respondents are more concerned than non-employed respondents; membership has little effect. Effects of culture do not support the hypotheses. Implications are that moral judgements are a function of perspective and domain, allowing flexibility along a morality continuum due to situational deviations.
xii, 112 leaves ; 28 cm.
Style APA, Harvard, Vancouver, ISO itp.
34

Barclay, Courtney Anne. "Balancing the right to privacy and the right of access access to child-abuse records in the 50 states /". [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0002305.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Wagner, Sylke. "Das Websurfen und der Datenschutz : ein Rechtsvergleich unter besonderer Berücksichtigung der Zulässigkeit sogenannter Cookies und Web Bugs am Beispiel des deutschen und U.S.-amerikanischen Rechts /". Frankfurt am Main [u.a.] : Lang, 2006. http://www.gbv.de/dms/ilmenau/toc/511997450.PDF.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Bhaduri, Anuket. "User Controlled Privacy Protection in Location-Based Services". Fogler Library, University of Maine, 2003. http://www.library.umaine.edu/theses/pdf/BhaduriA2003.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Kan, Chi-keung. "A review of the implementation of the personal data (privacy) ordinance in the Hong Kong Correctional Services Department". Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B1971015X.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Ophoff, Jacobus Albertus. "WSP3: a web service model for personal privacy protection". Thesis, Port Elizabeth Technikon, 2003. http://hdl.handle.net/10948/272.

Pełny tekst źródła
Streszczenie:
The prevalent use of the Internet not only brings with it numerous advantages, but also some drawbacks. The biggest of these problems is the threat to the individual’s personal privacy. This privacy issue is playing a growing role with respect to technological advancements. While new service-based technologies are considerably increasing the scope of information flow, the cost is a loss of control over personal information and therefore privacy. Existing privacy protection measures might fail to provide effective privacy protection in these new environments. This dissertation focuses on the use of new technologies to improve the levels of personal privacy. In this regard the WSP3 (Web Service Model for Personal Privacy Protection) model is formulated. This model proposes a privacy protection scheme using Web Services. Having received tremendous industry backing, Web Services is a very topical technology, promising much in the evolution of the Internet. In our society privacy is highly valued and a very important issue. Protecting personal privacy in environments using new technologies is crucial for their future success. These facts, combined with the detail that the WSP3 model focusses on Web Service environments, lead to the following realizations for the model: The WSP3 model provides users with control over their personal information and allows them to express their desired level of privacy. Parties requiring access to a user’s information are explicitly defined by the user, as well as the information available to them. The WSP3 model utilizes a Web Services architecture to provide privacy protection. In addition, it integrates security techniques, such as cryptography, into the architecture as required. The WSP3 model integrates with current standards to maintain their benefits. This allows the implementation of the model in any environment supporting these base technologies. In addition, the research involves the development of a prototype according to the model. This prototype serves to present a proof-of-concept by illustrating the WSP3 model and all the technologies involved. The WSP3 model gives users control over their privacy and allows everyone to decide their own level of protection. By incorporating Web Services, the model also shows how new technologies can be used to offer solutions to existing problem areas.
Style APA, Harvard, Vancouver, ISO itp.
39

Harvey, Brett D. "A code of practice for practitioners in private healthcare: a privacy perspective". Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/521.

Pełny tekst źródła
Streszczenie:
Whereas there are various initiatives to standardize the storage, processing and use of electronic patient information in the South African health sector, the sector is fragmented through the adoption of various approaches on national, provincial and district levels. Divergent IT systems are used in the public and private health sectors (“Recommendations of the Committee on …” 2003). Furthermore, general practitioners in some parts of the country still use paper as a primary means of documentation and storage. Nonetheless, the use of computerized systems is increasing, even in the most remote rural areas. This leads to the exposure of patient information to various threats that are perpetuated through the use of information technology. Irrespective of the level of technology adoption by practitioners in private healthcare practice, the security and privacy of patient information remains of critical importance. The disclosure of patient information whether intentional or not, can have dire consequences for a patient. In general, the requirements pertaining to the privacy of patient information are controlled and enforced through the adoption of legislation by the governing body of a country. Compared with developed nations, South Africa has limited legislation to help enforce privacy in the health sector. Conversely, Australia, New Zealand and Canada have some of the most advanced legislative frameworks when it comes to the privacy of patient information. In this dissertation, the Australian, New Zealand, Canadian and South African health sectors and the legislation they have in place to ensure the privacy of health information, will be investigated. Additionally, codes of practice and guidelines on privacy of patient information for GPs, in the afore-mentioned countries, will be investigated to form an idea as to what is needed in creating and formulating a new code of practice for the South African GP, as well as a pragmatic tool (checklist) to check adherence to privacy requirements.
Style APA, Harvard, Vancouver, ISO itp.
40

Andonie, Luisa. "Whistleblower protection programs compromise the reported taxpayer's privacy". Universitätsbibliothek Leipzig, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-224035.

Pełny tekst źródła
Streszczenie:
The United States Whistleblower Program’s inadequate protections have placed the privacy and confidentiality rights of United States taxpayers in a vulnerable state. By using the United States Whistleblower Program as an example, this paper seeks to illustrate the risk of eroding the confidentiality and privacy rights of the taxpayer, which is a risk that other national and international governments should likewise attempt to mitigate in their own whistleblower protection programs.
Style APA, Harvard, Vancouver, ISO itp.
41

Hughes, K. E. "A behavioural understanding of privacy : Article 8 European Convention on Human Rights and a right to respect for barriers". Thesis, University of Cambridge, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.604730.

Pełny tekst źródła
Streszczenie:
To develop effective privacy laws we need to have a thorough understanding of privacy. The thesis addresses four questions: (i) how should we identify the interests that should be protected by a right to privacy? (ii) Does everyone have the same need for privacy? (iii) What constitutes a privacy experience? (iv) What values and functions does privacy serve? This leads to an understanding of privacy which draws upon studies of human behaviour and social interaction. The right can be understood as a claim that barriers used to prevent access should be respected: For X to have a right to privacy against Y is for X to have a claim against Y that Y not access X by breaching a barrier used by X to prevent Y from accessing X. The remainder of the thesis analyses Article 8 European Convention on Human Rights through this theoretical framework. There are four dimensions to this analysis: scope; needs; states; and value. Scope refers to the match between Article 8 ECHR and the above model. Analysis of ‘need’ concentrates on interests of women and children in relation to privacy, helping to identify the normative core of the right and its limits. Analysis of ‘state’ considers the extent to which three types of privacy experiences are recognised: (i) physical separation; (ii) group privacy; and (iii) public privacy. ‘Value’ refers to the perceived significance of the right when it conflicts with other interests and rights. Finally, the thesis concludes with a consideration of the need for legislative intervention.
Style APA, Harvard, Vancouver, ISO itp.
42

Sun, Zhendong 1978. "Balancing freedom of the press and the right to privacy : lessons for China". Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99152.

Pełny tekst źródła
Streszczenie:
The conflict inherent in balancing freedom of the press and the right to privacy invariably presents some controversial legal issues. In addressing the legal dilemmas posed by these competing interests, an in-depth analysis of the conceptual value of these two equally important rights becomes a preliminary starting point. Through its exploration of the history and development of the press and privacy laws in both the United States and Canada, this thesis examines the fundamental values enshrined in these two rights. The author holds that the freedom of the press contains no privilege under the law, but that it serves as the means to promote the public's right to know in a democratic society, while the right to privacy offers an individual the autonomy to regulate his private affairs. By analyzing arguments of "pubic interest," "public figure," and "public privacy," the author compares the theoretical approaches to and practical attempts at striking a balance between the interests of the press and the privacy of the individual in the United States and Canada. Finally, the essay proposes how these experiences may contribute to the construction of relevant Chinese laws.
Style APA, Harvard, Vancouver, ISO itp.
43

Craig, John D. R. "Legal principles for the protection of the right of privacy in the workplace". Thesis, University of Oxford, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.286833.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Bowers, Jonathan. "American and Norwegian Press' Approaches to Identification of Criminal Suspects or Arrestees: The Public's Right to Know Versus the Private Citizen's Right to Privacy, Reputation, and Presumption of Innocence". Thesis, University of Oregon, 2013. http://hdl.handle.net/1794/13428.

Pełny tekst źródła
Streszczenie:
This thesis examines the processes the American and Norwegian press go through when identifying (or not) private citizens who are suspected of or arrested for a crime. Four central principles are explored in detail and elaborated upon as they relate to the press and individuals in the criminal justice system: the public's right to know, the right to privacy, protection of reputation, and presumption of innocence. Three Norwegian newspaper editors and an independent consultant to the Norwegian Institute of Journalism elaborated on how identification of criminal suspects is determined in Norway. The Norwegian case study provides an alternative approach to identification. Both legal and ethics solutions are proposed as a way to help protect the privacy, reputation, and presumption of innocence of private individuals suspected of or arrested for a crime but without unconstitutionally intruding on press freedom.
Style APA, Harvard, Vancouver, ISO itp.
45

Sinkovits, Angela M. "Glass houses: the end of privacy". Honors in the Major Thesis, University of Central Florida, 2000. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/206.

Pełny tekst źródła
Streszczenie:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf.edu/Systems/DigitalInitiatives/DigitalCollections/InternetDistributionConsentAgreementForm.pdf You may also contact the project coordinator, Kerri Bottorff, at kerri.bottorff@ucf.edu for more information.
Bachelors
Arts and Sciences
Liberal Arts
Style APA, Harvard, Vancouver, ISO itp.
46

Harrysson, Alexandra, i Julia Olsson. "Personalization paradox: the wish to be remembered and the right to be forgotten : A qualitative study of how companies balance being personal while protecting consumers’ right to privacy". Thesis, Uppsala universitet, Företagsekonomiska institutionen, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-387611.

Pełny tekst źródła
Streszczenie:
Many argue that personalization is needed in a modern marketing strategy. Whilst there are several positive aspects of personalization, e.g. improved customer satisfaction rates, it can also lead to firms being perceived as intrusive and elicit privacy concerns. This dilemma describes the personalization paradox, which refers to the two-sided results of using personalized communication by collecting and analyzing consumer data. To address the issue of how firms balance the need for personalization while still respecting consumers’ privacy, previous researchers have mainly investigated the issue from the consumer perspective. However, the consumer is believed to display a paradoxical behavior in regards to personalization. Therefore, we have addressed this issue through interviewing 12 company representatives from 7 companies. Our findings indicate that companies are mindful when creating personalized content and do acknowledge the issues with privacy and the risk of being perceived as intrusive. To overcome the personalization paradox, firms are not explicit about their data analysis in their personalized communication as this can lead to consumers feeling discomfort. Finally, an essential way that firms can prevent privacy concerns is to create relevant content as this outweighs feelings of discomfort. These findings to a certain extent do not reflect the empirical research on the topic, however the discrepancies may exist as previous studies were conducted from the consumer side.
Style APA, Harvard, Vancouver, ISO itp.
47

Lam, Wai-hong, i 林偉雄. "Review on effectiveness of policy on privacy protection". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B46757740.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

Givens, Lynn Marie, i Jesse Ornelas. "Degree of privacy afforded in long-term care". CSUSB ScholarWorks, 2008. https://scholarworks.lib.csusb.edu/etd-project/3335.

Pełny tekst źródła
Streszczenie:
The purpose of this study was to assess the level of privacy among the elderly living in long-term nursing and communal facilities. The data was collected through a probability sampling at the Veterans Home of California in Barstow.
Style APA, Harvard, Vancouver, ISO itp.
49

Le, Poire Beth Ann 1964. "Communication strategies to restore or preserve informational and psychological privacy; the effects of privacy invasive questions in the health care context". Thesis, The University of Arizona, 1988. http://hdl.handle.net/10150/276798.

Pełny tekst źródła
Streszczenie:
This investigation explored the role of informational and psychological privacy in the health context by examining the relationship between type of relationship (physician versus acquaintance), type of observation (self-report versus observation), and communication strategies used to restore or preserve privacy (interaction control, dyadic strategies, expressions of negative arousal, blocking and avoidance, distancing, and confrontation). It was hypothesized and confirmed that individuals report exhibiting more behaviors to restore or preserve informational privacy in response to an informationally privacy-invasive question posed by an acquaintance than by a physician. The hypothesis that presentation of an informationally privacy invasive question by the physician causes patients to exhibit more communication strategies after the privacy invasive question than before, was unsupported. Finally, the hypothesis that individuals actually exhibit more privacy restoration behaviors than they report using in a similar situation with their physician was also unsupported. Patients reported using more communication strategies than they actually exhibited. One confound to the self reports was that videotaped participants reported the use of fewer direct privacy restoring communication strategies than non-videotaped.
Style APA, Harvard, Vancouver, ISO itp.
50

Mangwanda, Nigel. "The impact of the right to be forgotten on privacy and online information disclosure". Diss., University of Pretoria, 2015. http://hdl.handle.net/2263/52439.

Pełny tekst źródła
Streszczenie:
The question of how much control individuals have over their data online has taken centre stage with the introduction of the European Union s right to be forgotten (RTBF) principle. However, this principle does not explain the impact and possible consequences that this right has on an individual s willingness to disclose information online. This research examines how an individual s privacy calculus is affected if he or she discloses person ally identifiable information online to service providers. Two hypotheses, the first which, related to the influence the right to be forgotten has on the privacy calculus and, secondly, dealing with the impact of such on information disclosure are assessed using quantitative approach based on an online survey (n=502). The results were analysed using nonparametric tests, which included Spearman s Correlation, Krusal Wallis and the Mann-Whitney U tests. The findings show that the RTBF principle does influence an individual s thought process prior to he or she disclosing information online. Furthermore, the findings indicated individuals with a medium and high degree of information disclosure would disclose more personally identifiable information if they were convinced that information they provided was not discernible. Some of the findings in this research could be of significance in the areas of information technology, international and criminal law, psychology, politics and human rights. Additionally, this study could be used to address individual privacy through amendments to privacy policies, laws and changes in software engineering practices.
Mini Dissertation (MBA)--University of Pretoria, 2015.
sn2016
Gordon Institute of Business Science (GIBS)
MBA
Unrestricted
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii