Journal articles on the topic 'Privacy Infringements'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Privacy Infringements.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lin, Tong. "Challenges and Legislative Responses to Privacy Protection in the Digital Age." Lecture Notes in Education Psychology and Public Media 95, no. 1 (2025): 21–30. https://doi.org/10.54254/2753-7048/2025.23023.
Full textPark, Minjung, and Sangmi Chai. "AI Model for Predicting Legal Judgments to Improve Accuracy and Explainability of Online Privacy Invasion Cases." Applied Sciences 11, no. 23 (2021): 11080. http://dx.doi.org/10.3390/app112311080.
Full textKarro, Jonathan, Andrew W. Dent, and Stephen Farish. "Patient perceptions of privacy infringements in an emergency department." Emergency Medicine Australasia 17, no. 2 (2005): 117–23. http://dx.doi.org/10.1111/j.1742-6723.2005.00702.x.
Full textKamleitner, Bernadette, and Vince Mitchell. "Your Data Is My Data: A Framework for Addressing Interdependent Privacy Infringements." Journal of Public Policy & Marketing 38, no. 4 (2019): 433–50. http://dx.doi.org/10.1177/0743915619858924.
Full textLannon, Caitriona, John Nelson, and Martin Cunneen. "Ethical AI for Automated Bus Lane Enforcement." Sustainability 13, no. 21 (2021): 11579. http://dx.doi.org/10.3390/su132111579.
Full textPastukhov, Oleksandr. "Leveraging Privacy Torts: A Case for Statutory Damages under European Data Protection Law." Global Privacy Law Review 5, Issue 2 (2024): 69–81. http://dx.doi.org/10.54648/gplr2024010.
Full textJournal, IJSREM. "CYPHER TALKS-Chatting Application." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 07 (2024): 1–3. http://dx.doi.org/10.55041/ijsrem36285.
Full textPool, R. L. D., and B. H. M. Custers. "The Police Hack Back: Legitimacy, Necessity and Privacy Implications of The Next Step in Fighting Cybercrime." European Journal of Crime, Criminal Law and Criminal Justice 25, no. 2 (2017): 123–44. http://dx.doi.org/10.1163/15718174-25022109.
Full textRiabchynska, O. P., and E. H. Stomatov. "Criminal law protection of the private life in the Kingdom of Spain." Uzhhorod National University Herald. Series: Law 4, no. 86 (2025): 356–66. https://doi.org/10.24144/2307-3322.2024.86.1.4.54.
Full textDąbrowska-Kłosińska, Patrycja, Agnieszka Grzelak, and Agnieszka Nimark. "The Use of Covid-19 Digital Applications and Unavoidable Threats to the Protection of Health Data and Privacy." Białostockie Studia Prawnicze 26, no. 3 (2021): 61–94. http://dx.doi.org/10.15290/bsp.2021.26.03.04.
Full textKim, Dong Hyun. "A Case Study of the Infringement of Residential Environment by the New Building - Focused on Sunshine, Views and Privacy Infringements -." Residential Environment Institute Of Korea 17, no. 2 (2019): 123–41. http://dx.doi.org/10.22313/reik.2019.17.2.123.
Full textOerlemans, J. J., and B. J. Koops. "Surveilleren en opsporen in een internetomgeving." Justitiële verkenningen 38, no. 5 (2012): 35–49. https://doi.org/10.5553/jv/016758502012038005004.
Full textLemin, Jae. ""To Know or Not to Know?": The Privacy Law Implications of The 1996 Paedophile and Sex Offender Index." Victoria University of Wellington Law Review 28, no. 2 (1998): 415. http://dx.doi.org/10.26686/vuwlr.v28i2.6075.
Full textNadwi, Waliuddin, and Muhannad Abdul Moneim Uday. "The Right to Privacy: Foundations and Protections in Islamic Jurisprudence." International Journal of Religion 5, no. 12 (2024): 725–35. http://dx.doi.org/10.61707/864v8350.
Full textWang, Weiyuan. "Legal Effect of Internet Privacy Policy." Journal of Education, Humanities and Social Sciences 28 (April 1, 2024): 126–33. http://dx.doi.org/10.54097/zjz34p19.
Full textTrouille, Helen. "Private Life and Public Image: Privacy Legislation in France." International and Comparative Law Quarterly 49, no. 1 (2000): 199–208. http://dx.doi.org/10.1017/s0020589300064034.
Full textEom, Sungwook, and Jun-Ho Huh. "The Opening Capability for Security against Privacy Infringements in the Smart Grid Environment." Mathematics 6, no. 10 (2018): 202. http://dx.doi.org/10.3390/math6100202.
Full textSarikakis, Katharine, and Sarah Anne Ganter. "Governance and Technologies of Surveillance." MedienJournal 36, no. 2 (2017): 6–21. http://dx.doi.org/10.24989/medienjournal.v36i2.145.
Full textSarikakis, Katharine, and Sarah Anne Ganter. "Governance and Technologies of Surveillance." MedienJournal 36, no. 2 (2017): 6. http://dx.doi.org/10.24989/mj.v36i2.145.
Full textWatson, Hayley, and Rachel L. Finn. "Ethical and Privacy Implications of the use of Social Media during the Eyjafjallajokull Eruption Crisis." International Journal of Information Systems for Crisis Response and Management 6, no. 4 (2014): 29–41. http://dx.doi.org/10.4018/ijiscram.2014100103.
Full textCarpenter, Christine. "Privacy and Proportionality: Examining Mass Electronic Surveillance under Article 8 and the Fourth Amendment." International and Comparative Law Review 20, no. 1 (2020): 27–57. http://dx.doi.org/10.2478/iclr-2020-0002.
Full textD.S. Nonju, Dr Kalada, and Agent Benjamin Ihua-Maduenyi. "The Impact of Artificial Intelligence on Privacy Laws." International Journal of Research and Innovation in Social Science VIII, no. IX (2024): 2150–74. http://dx.doi.org/10.47772/ijriss.2024.8090178.
Full textPolonetsky, Jules, and Omer Tene. "The Ethics of Student Privacy: Building Trust for Ed Tech." International Review of Information Ethics 21 (July 1, 2014): 25–34. http://dx.doi.org/10.29173/irie367.
Full textMoeed Hashmi, Ata ul. "EYES IN THE SKY: STRENGTHENING PUBLIC AWARENESS AND LAW ENFORCEMENT RESPONSE TO DRONE-DRIVEN INFRINGEMENTS ON PRIVACY RIGHTS IN THE UNITED STATES." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 16, no. 2 (2025): 44–59. https://doi.org/10.61841/turcomat.v16i2.15268.
Full textChen, Qizhan, Ruifeng Zhao, Bin Li, Zewei Liu, Huijun Zhuang, and Chunqiang Hu. "Regional Load Forecasting Scheme for Security Outsourcing Computation." Electronics 13, no. 18 (2024): 3712. http://dx.doi.org/10.3390/electronics13183712.
Full textLu, Yunpeng. "Analysis and Countermeasures of Computer Network Security in the Age of Artificial Intelligence." Innovation in Science and Technology 2, no. 6 (2023): 10–14. http://dx.doi.org/10.56397/ist.2023.11.02.
Full textJawad, Ayesha, Shahzeen Jamil, and Nazar Hussain. "Social Media: A Boon to Human Rights?" Journal of Law & Social Studies 5, no. 1 (2023): 21–29. https://doi.org/10.52279/jlss.05.01.01.2129.
Full textMao, Weiwei. "Technological Realization of AI in Media: Ethical Implications for Content Generation, Immersive Storytelling, and Automated Moderation Systems." Applied and Computational Engineering 138, no. 1 (2025): 199–204. https://doi.org/10.54254/2755-2721/2025.21527.
Full textLesjak, Benjamin, and Mateja Savić. "Video surveillance legislation in the EU and Slovenia: privacy rights, security needs, and data protection challenges." Mednarodno inovativno poslovanje = Journal of Innovative Business and Management 15, no. 2 (2023): 1–10. http://dx.doi.org/10.32015/jibm.2023.15.2.3.
Full textSvadeba, N. I. "Individual’s right to privacy protection." Uzhhorod National University Herald. Series: Law, no. 65 (October 25, 2021): 128–32. http://dx.doi.org/10.24144/2307-3322.2021.65.23.
Full textSayed, Abdelrazek Wahba. "Legal Protection of Personal Images in the Era of Modern Technology 'Comparative Study'." International Journal of Religion 5, no. 11 (2024): 2880–88. http://dx.doi.org/10.61707/kz59nw52.
Full textZaky, Moody Magdy. "Egyptian legislation on the compulsory treatment of persons with psychiatric disorders: the old and the new." International Psychiatry 6, no. 3 (2009): 57–58. http://dx.doi.org/10.1192/s1749367600000576.
Full textChan, Gary K. Y. "Towards a calibrated trust-based approach to the use of facial recognition technology." International Journal of Law and Information Technology 29, no. 4 (2021): 305–31. http://dx.doi.org/10.1093/ijlit/eaab011.
Full textHabibu, Taban, Edith Talina Luhanga, and Anael Elikana Sam. "Evaluation of Users’ Knowledge and Concerns of Biometric Passport Systems." Data 4, no. 2 (2019): 58. http://dx.doi.org/10.3390/data4020058.
Full textShi, Rongquan, Lifei Wei, and Lei Zhang. "More Efficient and Verifiable Privacy-Preserving Aggregation Scheme for Internet of Things-Based Federated Learning." Applied Sciences 14, no. 13 (2024): 5361. http://dx.doi.org/10.3390/app14135361.
Full textKravchuk, Natalya. "Privacy of a Child in the Digital Environment: New Risks Unaddressed." Legal Issues in the Digital Age 3, no. 2 (2022): 73–89. https://doi.org/10.17323/2713-2749.2022.2.73.89.
Full textKravchuk, Natalya. "Privacy of a Child in the Digital Environment: New Risks Unaddressed." Law Journal of the Higher School of Economics, no. 5 (March 25, 2022): 162–76. http://dx.doi.org/10.17323/2072-8166.2022.5.162.176.
Full textXianghan, Zhang, and Li Zhengwei. "Research on the Impact of Algorithmic Management on Employee Work Behavior in Platform Enterprises." Journal of Economics and Management Sciences 8, no. 2 (2025): p99. https://doi.org/10.30560/jems.v8n2p99.
Full textXinbo, Huang, and Liu Guo. "Navigating the Risks of Generative AI: A Comparative Analysis of International Regulatory Approaches." Problemy Ekorozwoju 20, no. 2 (2025): 11–20. https://doi.org/10.35784/preko.7444.
Full textMOON, Jae Young, Hye Yoon PARK, and Eun Kyung CHOI. "Social Responsibilities of Health Care Professionals during the COVID-19 Pandemic: Avoiding Privacy Infringements and the Stigmatization of Patients." Korean Journal of Medical Ethics 24, no. 2 (2021): 159–70. http://dx.doi.org/10.35301/ksme.2021.24.2.159.
Full textŁukanko, Bernard. "Uchybienie przepisom o ochronie danych osobowych jako naruszenie dobra osobistego – analiza na przykładzie orzecznictwa Sądu Najwyższego." Studia Prawnoustrojowe, no. 46 (December 31, 2019): 245–59. http://dx.doi.org/10.31648/sp.5333.
Full textGhosh, Anwesh. "SECURING WOMEN'S DIGITAL SANCTITY: ADDRESSING AI-DRIVEN THREATS HEAD-ON." Indian Journal of Law and Society II, no. 6 (2024): 63–82. https://doi.org/10.5281/zenodo.14285150.
Full textMgiba, Freddy Marilahimbilu, and Thozama Mxotwa. "Communicating Banking Cyber-security Measures, Customer Ethical Concerns, Experience, and Loyalty Intentions: A Developing Economy’s Perspective." International Review of Management and Marketing 14, no. 3 (2024): 123–35. http://dx.doi.org/10.32479/irmm.16095.
Full textFan, Ziyan. "Brain-Computer Interface for Emotion Recognition Based on Electroencephalography." Highlights in Science, Engineering and Technology 85 (March 13, 2024): 231–38. http://dx.doi.org/10.54097/30642q16.
Full textEnis Sholikhah, Suharto Suharto, and Rachmad Ilham. "The Application of Artificial Intelligence in Recruitment and Selection: Ethical Challenges and Effectiveness." JUMBIWIRA : Jurnal Manajemen Bisnis Kewirausahaan 4, no. 1 (2025): 426–35. https://doi.org/10.56910/jumbiwira.v4i1.2733.
Full textStahl, Bernd Carsten. "Locating the Ethics of ChatGPT—Ethical Issues as Affordances in AI Ecosystems." Information 16, no. 2 (2025): 104. https://doi.org/10.3390/info16020104.
Full textHuda, Uu Nurul, Dian Rachmat Gumelar, and Alwi Al Hadad. "Fortifying Democracy: Deploying Electoral Justice for Robust Personal Data Protection in the Indonesian Election." Khazanah Hukum 6, no. 1 (2024): 24–33. http://dx.doi.org/10.15575/kh.v6i1.30734.
Full textHuang, Mingyue. "Protection of workers' rights and interests in the problem of algorithmic discrimination: legal challenges and response strategies." Education and Social Work 2, no. 1 (2025): 148. https://doi.org/10.63313/esw.9069.
Full textRubisz, Szymon. "LEGAL LIABILITY OF AN ORGANISATION USING ARTIFICIAL INTELLIGENCE." Scientific Papers of Silesian University of Technology Organization and Management Series 2024, no. 212 (2024): 493–507. https://doi.org/10.29119/1641-3466.2024.212.29.
Full textBasova, A. V., G. N. Komkova, and R. A. Torosyan. "The constitutional right of HIV-infected russian citizens to protect personal privacy: limits of restriction." HIV Infection and Immunosuppressive Disorders 13, no. 2 (2021): 124–30. http://dx.doi.org/10.22328/2077-9828-2021-13-1-124-130.
Full text