Academic literature on the topic 'Privacy Infringements'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy Infringements.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Privacy Infringements"
Lin, Tong. "Challenges and Legislative Responses to Privacy Protection in the Digital Age." Lecture Notes in Education Psychology and Public Media 95, no. 1 (2025): 21–30. https://doi.org/10.54254/2753-7048/2025.23023.
Full textPark, Minjung, and Sangmi Chai. "AI Model for Predicting Legal Judgments to Improve Accuracy and Explainability of Online Privacy Invasion Cases." Applied Sciences 11, no. 23 (2021): 11080. http://dx.doi.org/10.3390/app112311080.
Full textKarro, Jonathan, Andrew W. Dent, and Stephen Farish. "Patient perceptions of privacy infringements in an emergency department." Emergency Medicine Australasia 17, no. 2 (2005): 117–23. http://dx.doi.org/10.1111/j.1742-6723.2005.00702.x.
Full textKamleitner, Bernadette, and Vince Mitchell. "Your Data Is My Data: A Framework for Addressing Interdependent Privacy Infringements." Journal of Public Policy & Marketing 38, no. 4 (2019): 433–50. http://dx.doi.org/10.1177/0743915619858924.
Full textLannon, Caitriona, John Nelson, and Martin Cunneen. "Ethical AI for Automated Bus Lane Enforcement." Sustainability 13, no. 21 (2021): 11579. http://dx.doi.org/10.3390/su132111579.
Full textPastukhov, Oleksandr. "Leveraging Privacy Torts: A Case for Statutory Damages under European Data Protection Law." Global Privacy Law Review 5, Issue 2 (2024): 69–81. http://dx.doi.org/10.54648/gplr2024010.
Full textJournal, IJSREM. "CYPHER TALKS-Chatting Application." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 07 (2024): 1–3. http://dx.doi.org/10.55041/ijsrem36285.
Full textPool, R. L. D., and B. H. M. Custers. "The Police Hack Back: Legitimacy, Necessity and Privacy Implications of The Next Step in Fighting Cybercrime." European Journal of Crime, Criminal Law and Criminal Justice 25, no. 2 (2017): 123–44. http://dx.doi.org/10.1163/15718174-25022109.
Full textRiabchynska, O. P., and E. H. Stomatov. "Criminal law protection of the private life in the Kingdom of Spain." Uzhhorod National University Herald. Series: Law 4, no. 86 (2025): 356–66. https://doi.org/10.24144/2307-3322.2024.86.1.4.54.
Full textDąbrowska-Kłosińska, Patrycja, Agnieszka Grzelak, and Agnieszka Nimark. "The Use of Covid-19 Digital Applications and Unavoidable Threats to the Protection of Health Data and Privacy." Białostockie Studia Prawnicze 26, no. 3 (2021): 61–94. http://dx.doi.org/10.15290/bsp.2021.26.03.04.
Full textDissertations / Theses on the topic "Privacy Infringements"
Kamleitner, Bernadette, and Vince Mitchell. "Your Data Is My Data: A Framework for Addressing Interdependent Privacy Infringements." Sage, 2019. http://dx.doi.org/10.1177/0743915619858924.
Full textLe, Menestrel Penelope. "Emotion analytics and their impact : enhanced personalized consumer experiences or infringement of privacy?" Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/111457.
Full textSKARA, GENTJAN. "Private Enforcement of Competition Law and the Directive 2014/104/EU on Action for Damages for Infringements of Competition Law Provisions: The Impact on Albanian Legal System compared with the Implementation in some selected EU-Member States." Doctoral thesis, Università degli studi di Ferrara, 2020. http://hdl.handle.net/11392/2478808.
Full textEbadi, Solmaz, and Mirja Johansson. "Music File Sharing : Genius Technology or Copyright Infringement?" Thesis, Jönköping University, JIBS, Commercial Law, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-7598.
Full textHitsevich, N. "Intellectual property rights infringement on the Internet : an analysis of the private international law implications." Thesis, City, University of London, 2015. http://openaccess.city.ac.uk/17914/.
Full textGamlashe, Thembinkosi. "Freedom of the press, or the infringement of the right to privacy?: media coverage of President Kgalema Motlanthe from October 2008 to April 2009 in three newspapers." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1010118.
Full textTusikov, Natasha Marie. "Chokepoints : internet intermediaries and the private regulation of counterfeit goods on the internet." Phd thesis, Canberra, ACT : The Australian National University, 2014. http://hdl.handle.net/1885/125030.
Full textHyland, Mark Leo. "The practical difficulties of applying the tort Private International Law rules to the internet using online copyright infringement as the primary research component." Thesis, University of Newcastle upon Tyne, 2014. http://hdl.handle.net/10443/2724.
Full textHalvarsson, Ida. "Statlig ersättning för biotopskyddsområden : En studie som undersöker hur den statliga ersättningen för ett biotopskyddsområde motsvarar en fortsatt drift av skogsbruket." Thesis, Högskolan Dalarna, Företagsekonomi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:du-30502.
Full textNilsson, Jennie. "Are Colours Worth Protecting? : An Examination of Abstract Colour Marks’ Scope of Protection." Thesis, Jönköping University, JIBS, Commercial Law, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-11212.
Full textBooks on the topic "Privacy Infringements"
Great Britain. Lord Chancellor's Department. and Great Britain Scottish Office, eds. Infringement of privacy: Consultation paper. Lord Chancellor's Department, 1993.
Find full textBesen, Stanley M. Private copying, appropriability, and optimal copying royalties. RAND, 1987.
Find full textGodwin, Mike, Parry Aftab, and Stephen D. Kahn. Internet law: The three P's : privacy, piracy, patents. Law Journal Seminars, 2000.
Find full text1930-, Schneider Richard G., Benton Elizabeth C. 1963-, and American Bar Association. Task Force of the Private Litigation Committee and the Intellectual Property Committee., eds. The Antitrust counterattack in patent infringement litigation: A project of the Task Force of the Private Litigation Committee and the Intellectual Property Committee, Section of Antitrust Law. American Bar Association, 1994.
Find full textComputer, Law Institute (23rd 2003 New York NY Atlanta GA and San Francisco CA). 23rd annual institute on computer law. Practising Law Institute, 2003.
Find full textThe international handbook on computer crime: Computer-related economic crime and the infringements of privacy. Wiley, 1986.
Find full textSieber, Ulrich. The International Handbook on Computer Crime: Computer-Related Economic Crime and the Infringements of Privacy. John Wiley & Sons Inc, 1987.
Find full textWitting, Christian. Street on Torts. 16th ed. Oxford University Press, 2021. http://dx.doi.org/10.1093/he/9780198865506.001.0001.
Full textVisintini, Giovanna, Francesco Busnelli, Antonio Pérez, and Silvia Scalzini. Vicisitudes del derecho a la privacidad (privacy). Cuestiones sobre el tratamiento de datos personales y la responsabilidad civil. Edited by Olenka Woolcott Oyague and Diego Fernando Monje Mayorca. Editorial Universidad Católica de Colombia, 2020. http://dx.doi.org/10.14718/9789585133273.2020.
Full textDavis, Peter, Ioannis Lianos, and Paolisa Nebbia. Damages Claims for the Infringement of EU Competition Law. Oxford University Press, 2015. http://dx.doi.org/10.1093/law/9780199575183.001.0001.
Full textBook chapters on the topic "Privacy Infringements"
Zimmer, Franziska, Kaja J. Fietkiewicz, and Wolfgang G. Stock. "Law Infringements in Social Live Streaming Services." In Human Aspects of Information Security, Privacy and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_40.
Full textDing, Sophia. "Digital Rights Management." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_28.
Full textWang, Yue, Jia Wen, Xintao Wu, and Xinghua Shi. "Infringement of Individual Privacy via Mining Differentially Private GWAS Statistics." In Big Data Computing and Communications. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-42553-5_30.
Full textGuo, Yimeei, Weiwei Hu, and Zhengzheng Fang. "Internet Industry’s Legal Risk and Solution to Personal Privacy Infringement." In Research on Selected China's Legal Issues of E-Business. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-44542-6_11.
Full textChaen, Shigeki. "Cross-Border Trade Secret Infringement and Private International Law." In Changing Orders in International Economic Law Volume 2. Routledge, 2023. http://dx.doi.org/10.4324/9781003193104-9.
Full textWitting, Christian. "22. Privacy actions in tort." In Street on Torts. Oxford University Press, 2021. http://dx.doi.org/10.1093/he/9780198865506.003.0022.
Full textRiordan, Jaani. "Confidentiality and Privacy." In The Liability of Internet Intermediaries. Oxford University Press, 2016. http://dx.doi.org/10.1093/oso/9780198719779.003.0009.
Full textLosavio, Michael, Adel Elmaghraby, and Deborah Keeling. "Information Management." In Open Information Management. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-246-6.ch019.
Full textMiller, Seumas, and Terry Bossomaier. "Public Health, Pandemics, and Cybertechnology." In Cybersecurity, Ethics, and Collective Responsibility. Oxford University PressNew York, 2024. http://dx.doi.org/10.1093/oso/9780190058135.003.0006.
Full textWatson, Hayley, and Rachel L. Finn. "Ethical and Privacy Implications of the Use of Social Media During the Eyjafjallajokull Eruption Crisis." In Cyber Law, Privacy, and Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch036.
Full textConference papers on the topic "Privacy Infringements"
Che, Xin, Jingdi Hu, Zirui Zhou, Yong Zhang, and Lingyang Chu. "Training Fair Models in Federated Learning without Data Privacy Infringement." In 2024 IEEE International Conference on Big Data (BigData). IEEE, 2024. https://doi.org/10.1109/bigdata62323.2024.10825911.
Full textInkizhekova, M. "On Infringements of Right to Privacy Through Information and Communications Technology: Legal and Identity Aspects." In XVII International Research-to-Practice Conference dedicated to the memory of M.I. Kovalyov (ICK 2020). Atlantis Press, 2020. http://dx.doi.org/10.2991/assehr.k.200321.125.
Full textAverkienė, Dalia. "European Union Financial Support for Rural Development: Infringements Identification Problems in Lithuania." In Contemporary Issues in Business, Management and Education. Vilnius Gediminas Technical University, 2017. http://dx.doi.org/10.3846/cbme.2017.037.
Full textTsai, Janice Y., Lorrie Faith Cranor, and Scott Craver. "Vicarious infringement creates a privacy ceiling." In the ACM workshop. ACM Press, 2006. http://dx.doi.org/10.1145/1179509.1179512.
Full textFeraci, Ornella. "International Jurisdiction Over Online Copyright Infringements Under EU Private International Law." In Annual International Conference on Law, Regulations and Public Policy. Global Science & Technology Forum (GSTF), 2015. http://dx.doi.org/10.5176/2251-3809_lrpp15.50.
Full textCai, Nishui, Jianfeng Deng, and Yiang Gao. "Research on the Reasoning Credibility of Privacy Infringement Risk Monitoring System Based on Blockchain." In 2023 International Conference on Blockchain Technology and Information Security (ICBCTIS). IEEE, 2023. http://dx.doi.org/10.1109/icbctis59921.2023.00040.
Full textKemppainen, Tiina, and Lauri Frank. "Customer Perceptions of In-Store Identification." In 37th Bled eConference. University of Maribor Press, 2024. http://dx.doi.org/10.18690/um.fov.4.2024.38.
Full textVinerová, Bronislava. "Sloboda prejavu verzus právo na ochranu výsledkov tvorivej duševnej činnosti a možnosti jeho trestnoprávnej ochrany." In Naděje právní vědy 2023. University of West Bohemia, Czech Republic, 2024. http://dx.doi.org/10.24132/zcu.nadeje.2023.739-752.
Full textBukovavc Puvača, Maja. "NOVA EU OPĆA UREDBA O ZAŠTITI OSOBNIH PODATAKA – PRAVO NA NAKNADU ŠTETE I ODGOVORNOST ZBOG NjENOG KRŠENjA (čl. 82. Uredbe)." In 14 Majsko savetovanje. University of Kragujevac, Faculty of Law, 2018. http://dx.doi.org/10.46793/xivmajsko.755bp.
Full textWEI, JIXIN, and YAN WU. "RESEARCH ON THE APPROACH AND REGULATION OF BLOCKCHAIN TECHNOLOGY OF THE PROTECTION OF NETWORK CULTURAL PRODUCTS DISSEMINATION." In 2023 9TH INTERNATIONAL SYMPOSIUM ON SOCIAL SCIENCE. Destech Publications, Inc., 2023. http://dx.doi.org/10.12783/dtssehs/isss2023/36099.
Full text