Academic literature on the topic 'Privacy Infringements'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy Infringements.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Privacy Infringements"

1

Lin, Tong. "Challenges and Legislative Responses to Privacy Protection in the Digital Age." Lecture Notes in Education Psychology and Public Media 95, no. 1 (2025): 21–30. https://doi.org/10.54254/2753-7048/2025.23023.

Full text
Abstract:
In the digital age, the right to privacy faces more severe threats, which are reflected in the diversification of privacy infringement methods, the control of personal privacy by platforms and the associated risk of data breaches, and the increasing frequency of privacy violations. Currently, China has not established dedicated legislation for privacy protection; instead, there are scattered provisions in certain laws, administrative regulations, local regulations, and rules. The challenges in privacy protection are mainly reflected in the following aspects: incomplete legislation, difficulty
APA, Harvard, Vancouver, ISO, and other styles
2

Park, Minjung, and Sangmi Chai. "AI Model for Predicting Legal Judgments to Improve Accuracy and Explainability of Online Privacy Invasion Cases." Applied Sciences 11, no. 23 (2021): 11080. http://dx.doi.org/10.3390/app112311080.

Full text
Abstract:
Since there are growing concerns regarding online privacy, firms may have the risk of being involved in various privacy infringement cases resulting in legal causations. If firms are aware of consequences from possible cases of invasion of online privacy, they can more actively prevent future online privacy infringements. Thus, this study attempts to predict the probability of judgment types caused by various invasions within US judicial cases that are related to online privacy invasions. Since legal judgment results are significantly influenced by societal factors and technological developmen
APA, Harvard, Vancouver, ISO, and other styles
3

Karro, Jonathan, Andrew W. Dent, and Stephen Farish. "Patient perceptions of privacy infringements in an emergency department." Emergency Medicine Australasia 17, no. 2 (2005): 117–23. http://dx.doi.org/10.1111/j.1742-6723.2005.00702.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kamleitner, Bernadette, and Vince Mitchell. "Your Data Is My Data: A Framework for Addressing Interdependent Privacy Infringements." Journal of Public Policy & Marketing 38, no. 4 (2019): 433–50. http://dx.doi.org/10.1177/0743915619858924.

Full text
Abstract:
Everyone holds personal information about others. Each person’s privacy thus critically depends on the interplay of multiple actors. In an age of technology integration, this interdependence of data protection is becoming a major threat to privacy. Yet current regulation focuses on the sharing of information between two parties rather than multiactor situations. This study highlights how current policy inadequacies, illustrated by the European Union General Data Protection Regulation, can be overcome by means of a deeper understanding of the phenomenon. Specifically, the authors introduce a ne
APA, Harvard, Vancouver, ISO, and other styles
5

Lannon, Caitriona, John Nelson, and Martin Cunneen. "Ethical AI for Automated Bus Lane Enforcement." Sustainability 13, no. 21 (2021): 11579. http://dx.doi.org/10.3390/su132111579.

Full text
Abstract:
There is an explosion of camera surveillance in our cities today. As a result, the risks of privacy infringement and erosion are growing, as is the need for ethical solutions to minimise the risks. This research aims to frame the challenges and ethics of using data surveillance technologies in a qualitative social context. A use case is presented which examines the ethical data required to automatically enforce bus lanes using camera surveillance and proposes ways of minimising the risks of privacy infringement and erosion in that scenario. What we seek to illustrate is that there is a challen
APA, Harvard, Vancouver, ISO, and other styles
6

Pastukhov, Oleksandr. "Leveraging Privacy Torts: A Case for Statutory Damages under European Data Protection Law." Global Privacy Law Review 5, Issue 2 (2024): 69–81. http://dx.doi.org/10.54648/gplr2024010.

Full text
Abstract:
Privacy torts remain poor relations of European Union (EU) data protection law. The Data Protection Directive’s rules on compensation for damages caused by intrusions of privacy remained largely unchanged in the General Data Protection Regulation (GDPR) that is preoccupied with administrative measures against the violators of its rules more than with arming the victims of privacy infringements with effective and efficient rules on privacy torts. This article addresses the issue of the underutilization of the right of private action under EU data protection law by identifying deficiencies of th
APA, Harvard, Vancouver, ISO, and other styles
7

Journal, IJSREM. "CYPHER TALKS-Chatting Application." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 07 (2024): 1–3. http://dx.doi.org/10.55041/ijsrem36285.

Full text
Abstract:
Abstract— CypherTalks is a novel chatting application designed to prioritize user privacy and security in the digital communication landscape. In an era marked by increasing concerns over data breaches and privacy infringements, CypherTalks emerges as a robust solution offering end-to-end encryption and advanced privacy features. This paper presents the architecture, functionality, and security mechanisms of CypherTalks, emphasizing its commitment to safeguarding user data and conversations. Leveraging state-of-the-art cryptographic techniques, CypherTalks ensures that messages remain encrypte
APA, Harvard, Vancouver, ISO, and other styles
8

Pool, R. L. D., and B. H. M. Custers. "The Police Hack Back: Legitimacy, Necessity and Privacy Implications of The Next Step in Fighting Cybercrime." European Journal of Crime, Criminal Law and Criminal Justice 25, no. 2 (2017): 123–44. http://dx.doi.org/10.1163/15718174-25022109.

Full text
Abstract:
In an attempt to strengthen the position of the police to fight cybercrime, the Dutch government proposed new legislation giving police agencies new investigative powers on the Internet. This proposed legislation is controversial as it allows police agencies to hack into computers and install spyware. This paper examines the background and contents of the proposed legislation and tries to answer the question to what extent these new investigative powers may result in infringements of the right to privacy and other fundamental rights of citizens, and whether these infringements are justified. T
APA, Harvard, Vancouver, ISO, and other styles
9

Riabchynska, O. P., and E. H. Stomatov. "Criminal law protection of the private life in the Kingdom of Spain." Uzhhorod National University Herald. Series: Law 4, no. 86 (2025): 356–66. https://doi.org/10.24144/2307-3322.2024.86.1.4.54.

Full text
Abstract:
The article analyzes the state of criminal law protection of respect for private life (inviolability of private life) in the Kingdom of Spain, its basis, scope and peculiarities of criminalizing infringements on this right, as well as problematic issues arising in the doctrine and law enforcement activity. It is established that criminal law protection of private life of an individual in Spain, as well as in Ukraine, is based primarily on the provisions of the Convention for the Protection of Human Rights and Fundamental Freedoms, as well as on the provisions of the Constitution of Spain, art.
APA, Harvard, Vancouver, ISO, and other styles
10

Dąbrowska-Kłosińska, Patrycja, Agnieszka Grzelak, and Agnieszka Nimark. "The Use of Covid-19 Digital Applications and Unavoidable Threats to the Protection of Health Data and Privacy." Białostockie Studia Prawnicze 26, no. 3 (2021): 61–94. http://dx.doi.org/10.15290/bsp.2021.26.03.04.

Full text
Abstract:
Abstract This paper starts with a dilemma. How to ensure the adequate protection of individual health data and privacy in a global pandemic, which has intensified the use of digital applications for the purposes of data sharing and contact-tracing? There is no simple answer to this question when choosing between the protection of public health and individual privacy. However, the history of the existing case-law regarding infectious diseases control, both Polish and European, teaches about numerous examples in which health data and privacy were not adequately protected, but, on the contrary, w
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Privacy Infringements"

1

Kamleitner, Bernadette, and Vince Mitchell. "Your Data Is My Data: A Framework for Addressing Interdependent Privacy Infringements." Sage, 2019. http://dx.doi.org/10.1177/0743915619858924.

Full text
Abstract:
Everyone holds personal information about others. Each person's privacy thus critically depends on the interplay of multiple actors. In an age of technology integration, this interdependence of data protection is becoming a major threat to privacy. Yet current regulation focuses on the sharing of information between two parties rather than multiactor situations. This study highlights how current policy inadequacies, illustrated by the European Union General Data Protection Regulation, can be overcome by means of a deeper understanding of the phenomenon. Specifically, the authors introduce a ne
APA, Harvard, Vancouver, ISO, and other styles
2

Le, Menestrel Penelope. "Emotion analytics and their impact : enhanced personalized consumer experiences or infringement of privacy?" Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/111457.

Full text
Abstract:
Thesis: S.M. in Management Studies, Massachusetts Institute of Technology, Sloan School of Management, 2017.<br>Page 85 blank. Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 79-84).<br>The consumer landscape has changed: the balance between supply and demand has shifted, with consumers facing a variety of products and services that are hard to tell apart, resulting in poor brand loyalty, and customers are now overwhelmed with a flood of constant information, leading to reduced attention spans that brands have to fight for. Brands have to be innovative and m
APA, Harvard, Vancouver, ISO, and other styles
3

SKARA, GENTJAN. "Private Enforcement of Competition Law and the Directive 2014/104/EU on Action for Damages for Infringements of Competition Law Provisions: The Impact on Albanian Legal System compared with the Implementation in some selected EU-Member States." Doctoral thesis, Università degli studi di Ferrara, 2020. http://hdl.handle.net/11392/2478808.

Full text
Abstract:
Dopo 44 anni di applicazione continua delle regole di concorrenza dell'UE da parte della CGUE, la Courage Ltd contro Crehan (2001) ha riconosciuto il diritto delle persone a chiedere il risarcimento dei danni derivanti da comportamenti anticoncorrenziali. Inoltre, il regolamento n. 1/2003 ha suggerito, tra l'altro, la possibilità per le persone di chiedere il risarcimento del danno ai sensi degli articoli 101 e 102 TFUE. Da allora in poi, la Commissione si è impegnata attivamente a promuovere il dibattito ed a incoraggiare l'istituzione di un vero sistema europeo di applicazione a livello priv
APA, Harvard, Vancouver, ISO, and other styles
4

Ebadi, Solmaz, and Mirja Johansson. "Music File Sharing : Genius Technology or Copyright Infringement?" Thesis, Jönköping University, JIBS, Commercial Law, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-7598.

Full text
Abstract:
<p>Today’s technology of music file sharing in peer-to-peer networks is genius. Peer-to-peer are networks composed of several computers enabling files to be shared among users. A substantial part of the files shared constitute unlawful copies; uploading and downloading of such files infringes copyright legislation. File sharing through peer-to-peer networks is therefore both a genius technology and a copyright infringement.</p><p>Peer-to-peer technology has been subject to heavy debate in media, both nationally and internationally. The issue of illegal downloads of music is an international di
APA, Harvard, Vancouver, ISO, and other styles
5

Hitsevich, N. "Intellectual property rights infringement on the Internet : an analysis of the private international law implications." Thesis, City, University of London, 2015. http://openaccess.city.ac.uk/17914/.

Full text
Abstract:
The topic “Intellectual Property Rights Infringement on the Internet: An Analysis of the Private International Law Implications” has become increasingly important as the Internet has revolutionized the traditional understanding of the rules of private international law which govern the determination of jurisdiction in the case of intellectual property rights infringement over the Internet. The private international law of intellectual property has until recently been both straightforward and based on traditions, geographical boundaries and physical space. However, the ubiquitous nature of the
APA, Harvard, Vancouver, ISO, and other styles
6

Gamlashe, Thembinkosi. "Freedom of the press, or the infringement of the right to privacy?: media coverage of President Kgalema Motlanthe from October 2008 to April 2009 in three newspapers." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1010118.

Full text
Abstract:
The researcher attempts to assess in which respect the privacy of former President Kgalema Motlanthe may have been invaded during his presidency, in view of journalistic ethics and press codes currently in effect. The study will explore media practices based on media freedom at the time of publication, and assess whether this freedom is understood to suggest the infringement of the right to privacy in the coverage of the private lives of politicians in the media. This study will therefore examine a sample of articles from the Sunday Times, City Press and Mail and Guardian, covering former Pres
APA, Harvard, Vancouver, ISO, and other styles
7

Tusikov, Natasha Marie. "Chokepoints : internet intermediaries and the private regulation of counterfeit goods on the internet." Phd thesis, Canberra, ACT : The Australian National University, 2014. http://hdl.handle.net/1885/125030.

Full text
Abstract:
This dissertation examines non-state regulation on the Internet, specifically the capacity of corporate actors to create private regulatory arrangements and the degree to which those efforts may rely upon the state. It critically traces the interactions and inter-dependencies between corporate actors and the state through the lens of corporate online anti-counterfeiting enforcement efforts. Between 2010 and 2013, small groups of multinational corporations and government officials from the United States, United Kingdom and the European Commission created a global private regulatory regime to co
APA, Harvard, Vancouver, ISO, and other styles
8

Hyland, Mark Leo. "The practical difficulties of applying the tort Private International Law rules to the internet using online copyright infringement as the primary research component." Thesis, University of Newcastle upon Tyne, 2014. http://hdl.handle.net/10443/2724.

Full text
Abstract:
The objective of this thesis is to analyse the very real and practical difficulties faced by lawyers in applying the tort private international law (PIL) rules to the internet and to investigate which factors, technology-related or otherwise, either assist or hinder the application of the PIL rules to the internet. These practical difficulties arise from the fact that many of the basic provisions of PIL relate to physical world (or offline) elements such as domicile, nationality and place of damage or harmful event (locus delicti). Effective application of PIL rules is dependent on sovereign c
APA, Harvard, Vancouver, ISO, and other styles
9

Halvarsson, Ida. "Statlig ersättning för biotopskyddsområden : En studie som undersöker hur den statliga ersättningen för ett biotopskyddsområde motsvarar en fortsatt drift av skogsbruket." Thesis, Högskolan Dalarna, Företagsekonomi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:du-30502.

Full text
Abstract:
Denna studie har ämnat undersöka hur ett biotopskyddsområde påverkar avkastningen för en privat skogsägare. Bildandet av ett biotopskyddsområde ses som ett ingrepp i den privata äganderätten där skogsägaren får sin mark inlöst och i utbyte utgår en ersättning från staten per hektar skogsmark som ingår i biotopskyddet. För att ta reda på hur skogsägaren påverkas av bildandet av biotopskyddsområden har studien utgått från befintliga data. Detta i form av statistik från Skogsstyrelsen där nybildade biotopskyddsområden och ersättningen för dessa presenteras. Vidare, för att stärka variablernas kva
APA, Harvard, Vancouver, ISO, and other styles
10

Nilsson, Jennie. "Are Colours Worth Protecting? : An Examination of Abstract Colour Marks’ Scope of Protection." Thesis, Jönköping University, JIBS, Commercial Law, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-11212.

Full text
Abstract:
<p>In the search for companies to distinguish themselves from the mass, so called non-traditional trade marks have become increasingly popular, and in particular colour marks. It is now clear that abstract colour marks can be registered as trade marks, and the number of registered colour marks has increased considerably in recent years. However, it remains a lot more uncertain, mainly due to lack of case law, what the extent of colour marks’ scope of protection is. Are colours actually worth protecting? The purpose of this thesis is to examine the scope of protection of registered abstract col
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Privacy Infringements"

1

Great Britain. Lord Chancellor's Department. and Great Britain Scottish Office, eds. Infringement of privacy: Consultation paper. Lord Chancellor's Department, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Besen, Stanley M. Private copying, appropriability, and optimal copying royalties. RAND, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Godwin, Mike, Parry Aftab, and Stephen D. Kahn. Internet law: The three P's : privacy, piracy, patents. Law Journal Seminars, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1930-, Schneider Richard G., Benton Elizabeth C. 1963-, and American Bar Association. Task Force of the Private Litigation Committee and the Intellectual Property Committee., eds. The Antitrust counterattack in patent infringement litigation: A project of the Task Force of the Private Litigation Committee and the Intellectual Property Committee, Section of Antitrust Law. American Bar Association, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Computer, Law Institute (23rd 2003 New York NY Atlanta GA and San Francisco CA). 23rd annual institute on computer law. Practising Law Institute, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

The international handbook on computer crime: Computer-related economic crime and the infringements of privacy. Wiley, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sieber, Ulrich. The International Handbook on Computer Crime: Computer-Related Economic Crime and the Infringements of Privacy. John Wiley & Sons Inc, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Witting, Christian. Street on Torts. 16th ed. Oxford University Press, 2021. http://dx.doi.org/10.1093/he/9780198865506.001.0001.

Full text
Abstract:
Street on Torts provides a wide-ranging overview, and a clear and accurate explanation of tort law. The book consists of nine parts. Part I provides an introduction to the subject, including examination of protected interests in tort and the history of this branch of law beginning with the ancient trespass torts. Part II looks at negligent infringements of the person, property and financial interests, as well as examining the liability in negligence of public authorities. Part III looks at intentional invasions of interests in the person and property. Part IV looks at misrepresentation-based a
APA, Harvard, Vancouver, ISO, and other styles
9

Visintini, Giovanna, Francesco Busnelli, Antonio Pérez, and Silvia Scalzini. Vicisitudes del derecho a la privacidad (privacy). Cuestiones sobre el tratamiento de datos personales y la responsabilidad civil. Edited by Olenka Woolcott Oyague and Diego Fernando Monje Mayorca. Editorial Universidad Católica de Colombia, 2020. http://dx.doi.org/10.14718/9789585133273.2020.

Full text
Abstract:
The objective of this work is to spread academic research on the recent transformations experienced by traditional civil law institutions ––ownership and liability–– within the field of right to privacy. The evolution of the data privacy that belongs to a person is checked. The notion of the right to privacy and its evolution towards a personal data protection right from a comparative law perspective in order to discover the advances of the Italian and the American law. This work also proposes to review the traditional postulates of property and civil liability to find solutions regarding data
APA, Harvard, Vancouver, ISO, and other styles
10

Davis, Peter, Ioannis Lianos, and Paolisa Nebbia. Damages Claims for the Infringement of EU Competition Law. Oxford University Press, 2015. http://dx.doi.org/10.1093/law/9780199575183.001.0001.

Full text
Abstract:
Abstract This book provides a critical analysis of damages claims for the infringement of EU competition law by combining a theoretical with a practical perspective. The work focuses on the relevant EU framework, focusing on the recently adopted directive, examining all aspects of EU law that may be relevant to damages claims (whether brought by a consumer or not), including an analysis of the rarely examined causation aspects, alternative dispute resolution, as well as private international law instruments. The book also delves into the economic underpinnings of claims for damages, including
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Privacy Infringements"

1

Zimmer, Franziska, Kaja J. Fietkiewicz, and Wolfgang G. Stock. "Law Infringements in Social Live Streaming Services." In Human Aspects of Information Security, Privacy and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ding, Sophia. "Digital Rights Management." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_28.

Full text
Abstract:
AbstractEssentially, digital rights management refers to “trusted exchange of digital information over the Internet in which the user is granted only those privileges granted by the document sender”. Digital rights management systems serve multiple functions, such as access control, usage control, billing, and the pursuit of legal infringements. These functions are achieved through various technologies, such as encryption, digital signatures, digital watermarks, secure authentication, rights expression languages, and product key. In recent years, digital rights management systems have been con
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Yue, Jia Wen, Xintao Wu, and Xinghua Shi. "Infringement of Individual Privacy via Mining Differentially Private GWAS Statistics." In Big Data Computing and Communications. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-42553-5_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Guo, Yimeei, Weiwei Hu, and Zhengzheng Fang. "Internet Industry’s Legal Risk and Solution to Personal Privacy Infringement." In Research on Selected China's Legal Issues of E-Business. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-44542-6_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chaen, Shigeki. "Cross-Border Trade Secret Infringement and Private International Law." In Changing Orders in International Economic Law Volume 2. Routledge, 2023. http://dx.doi.org/10.4324/9781003193104-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Witting, Christian. "22. Privacy actions in tort." In Street on Torts. Oxford University Press, 2021. http://dx.doi.org/10.1093/he/9780198865506.003.0022.

Full text
Abstract:
This chapter examines the privacy action in tort. It explains that the tort has its origins in the equitable wrong of breach of confidence. It discusses the gist and elements of this tort and highlights the influence of Article 8 of the European Convention on Human Rights on the case law. The law now protects against infringements of private information and against infringements upon the seclusion of the individual. This chapter also discusses potential defences, which include consent to the disclosure and the differential treatment of private information in the public domain.
APA, Harvard, Vancouver, ISO, and other styles
7

Riordan, Jaani. "Confidentiality and Privacy." In The Liability of Internet Intermediaries. Oxford University Press, 2016. http://dx.doi.org/10.1093/oso/9780198719779.003.0009.

Full text
Abstract:
This chapter examines the liability of internet intermediaries for breaches of confidence and invasions of privacy. The scope and content of these duties embody delicate compromises between, on the one hand, the rights to data protection and respect for private life and, on the other, the freedoms to express and receive information. The enforcement of that balance against service providers requires further choices about how far to extend responsibility for infringements of those rights by others, and who should be required to police them. The importance of these rights and policy choices conti
APA, Harvard, Vancouver, ISO, and other styles
8

Losavio, Michael, Adel Elmaghraby, and Deborah Keeling. "Information Management." In Open Information Management. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-246-6.ch019.

Full text
Abstract:
The global interconnected information space offers unprecedented ways of accessing and analyzing information. New infringements of the rights of individuals to privacy, personality and personal autonomy may be a consequence presenting possible legal and ethical issues for developers and users ofopen information systems. Awareness of these issues will assist the use, engineering and regulation of open information systems with minimal infringement of those rights. We examine, National, international and transnational jurisdictional issues affecting open information management, privacy and person
APA, Harvard, Vancouver, ISO, and other styles
9

Miller, Seumas, and Terry Bossomaier. "Public Health, Pandemics, and Cybertechnology." In Cybersecurity, Ethics, and Collective Responsibility. Oxford University PressNew York, 2024. http://dx.doi.org/10.1093/oso/9780190058135.003.0006.

Full text
Abstract:
Abstract Cybertechnology has given rise to ethical and security issues in the health sector (e.g., ransomware attacks such as WannaCry). Ransomware attacks cripple hospitals causing deaths. Cybertechnology, such as phone apps and bulk health databases utilizing machine-learning techniques, is involved in controlling pandemics (e.g., COVID-19). However, there are potential moral costs, notably in terms of infringements of individual privacy and ownership rights. Here collective goods, such as public health and security, can conflict with individual rights. However, infringements of rights can b
APA, Harvard, Vancouver, ISO, and other styles
10

Watson, Hayley, and Rachel L. Finn. "Ethical and Privacy Implications of the Use of Social Media During the Eyjafjallajokull Eruption Crisis." In Cyber Law, Privacy, and Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch036.

Full text
Abstract:
In a relatively new area of research for crisis management, this article presents a discussion of some of the privacy and ethical implications surrounding the use of social media in the event of a crisis. The article uses the travel chaos caused by the eruptions of the Eyjafjallajokull volcano in 2010 to contextualise the analysis. It begins by providing an overview of the use of social media in crisis management, before continuing to present two case studies of the use of social media by members of the public and the aviation industry during the crisis caused by the ash plume. The article the
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Privacy Infringements"

1

Che, Xin, Jingdi Hu, Zirui Zhou, Yong Zhang, and Lingyang Chu. "Training Fair Models in Federated Learning without Data Privacy Infringement." In 2024 IEEE International Conference on Big Data (BigData). IEEE, 2024. https://doi.org/10.1109/bigdata62323.2024.10825911.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Inkizhekova, M. "On Infringements of Right to Privacy Through Information and Communications Technology: Legal and Identity Aspects." In XVII International Research-to-Practice Conference dedicated to the memory of M.I. Kovalyov (ICK 2020). Atlantis Press, 2020. http://dx.doi.org/10.2991/assehr.k.200321.125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Averkienė, Dalia. "European Union Financial Support for Rural Development: Infringements Identification Problems in Lithuania." In Contemporary Issues in Business, Management and Education. Vilnius Gediminas Technical University, 2017. http://dx.doi.org/10.3846/cbme.2017.037.

Full text
Abstract:
Funds allocated in accordance with various instruments of the Lithuanian rural development programme to businesses must help to achieve agriculture policy goals. During the implementation of financial support from the European Union, beneficiaries commit infringements and, consequently, support that was given to them or a part thereof may be withdrawn. Research results show that infringement research and the assessment of documents, which influences the making of decisions on the payment of financial support, must not only be adequate, but also efficient in order to protect public and private
APA, Harvard, Vancouver, ISO, and other styles
4

Tsai, Janice Y., Lorrie Faith Cranor, and Scott Craver. "Vicarious infringement creates a privacy ceiling." In the ACM workshop. ACM Press, 2006. http://dx.doi.org/10.1145/1179509.1179512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Feraci, Ornella. "International Jurisdiction Over Online Copyright Infringements Under EU Private International Law." In Annual International Conference on Law, Regulations and Public Policy. Global Science & Technology Forum (GSTF), 2015. http://dx.doi.org/10.5176/2251-3809_lrpp15.50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cai, Nishui, Jianfeng Deng, and Yiang Gao. "Research on the Reasoning Credibility of Privacy Infringement Risk Monitoring System Based on Blockchain." In 2023 International Conference on Blockchain Technology and Information Security (ICBCTIS). IEEE, 2023. http://dx.doi.org/10.1109/icbctis59921.2023.00040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kemppainen, Tiina, and Lauri Frank. "Customer Perceptions of In-Store Identification." In 37th Bled eConference. University of Maribor Press, 2024. http://dx.doi.org/10.18690/um.fov.4.2024.38.

Full text
Abstract:
Customer identification is essential for all businesses; however, brick-and-mortar (B&amp;M) retailers often face challenges capturing shopping behaviors in physical stores where customers are not accustomed to being identified, especially outside checkout. Nevertheless, B&amp;M retailers are increasingly pressured to improve their identification and data collection methods to stay competitive with online retailers. Additionally, businesses are under pressure to incorporate digital elements into physical environments to keep them engaging and inspiring for the increasingly digitized customers.
APA, Harvard, Vancouver, ISO, and other styles
8

Vinerová, Bronislava. "Sloboda prejavu verzus právo na ochranu výsledkov tvorivej duševnej činnosti a možnosti jeho trestnoprávnej ochrany." In Naděje právní vědy 2023. University of West Bohemia, Czech Republic, 2024. http://dx.doi.org/10.24132/zcu.nadeje.2023.739-752.

Full text
Abstract:
In her contribution, the author focuses on the relationship between freedom of expression and the right to protection of the results of creative intellectual activity, since their mutual relationship in legal theory is not given much attention. As part of the article, the author also focuses on private law and public means of copyright protection in the legal order of the Slovak Republic, especially the crime of copyright infringement under § 283 of Act no. 300/2005 Coll. criminal code with reference to application problems.
APA, Harvard, Vancouver, ISO, and other styles
9

Bukovavc Puvača, Maja. "NOVA EU OPĆA UREDBA O ZAŠTITI OSOBNIH PODATAKA – PRAVO NA NAKNADU ŠTETE I ODGOVORNOST ZBOG NjENOG KRŠENjA (čl. 82. Uredbe)." In 14 Majsko savetovanje. University of Kragujevac, Faculty of Law, 2018. http://dx.doi.org/10.46793/xivmajsko.755bp.

Full text
Abstract:
In European Union, the right to personal data protection is recognized as one of the fundamental rights. The increasing availability of personal data to private and public entities and the possibility of their rapid and global exchange and use entail the risk of their unauthorized collection, processing and transfer. The General Data Protection Regulation will begin to apply on May 25, 2018. It is fully binding and directly applicable in all Member States. This paper deals with some issues of liability for damage due to violation of General Data Protection Regulation. Focus is on changes that
APA, Harvard, Vancouver, ISO, and other styles
10

WEI, JIXIN, and YAN WU. "RESEARCH ON THE APPROACH AND REGULATION OF BLOCKCHAIN TECHNOLOGY OF THE PROTECTION OF NETWORK CULTURAL PRODUCTS DISSEMINATION." In 2023 9TH INTERNATIONAL SYMPOSIUM ON SOCIAL SCIENCE. Destech Publications, Inc., 2023. http://dx.doi.org/10.12783/dtssehs/isss2023/36099.

Full text
Abstract:
The rise of the Internet and big data has realized the digitization of the cultural industry, accelerated the promotion of cultural and literary works on the Internet, and expanded its scope of influence. At the same time, its development has also aggravated the long-standing moral issues in the cultural industry, such as privacy leakage, data theft, copyright infringement, etc., which seriously hinder the healthy development of the cultural industry. Based on the Internet, multi-node composition and decentralization, the blockchain, as a distributed ledger system, has the characteristics of “
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!