To see the other types of publications on this topic, follow the link: Privacy Infringements.

Journal articles on the topic 'Privacy Infringements'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Privacy Infringements.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lin, Tong. "Challenges and Legislative Responses to Privacy Protection in the Digital Age." Lecture Notes in Education Psychology and Public Media 95, no. 1 (2025): 21–30. https://doi.org/10.54254/2753-7048/2025.23023.

Full text
Abstract:
In the digital age, the right to privacy faces more severe threats, which are reflected in the diversification of privacy infringement methods, the control of personal privacy by platforms and the associated risk of data breaches, and the increasing frequency of privacy violations. Currently, China has not established dedicated legislation for privacy protection; instead, there are scattered provisions in certain laws, administrative regulations, local regulations, and rules. The challenges in privacy protection are mainly reflected in the following aspects: incomplete legislation, difficulty
APA, Harvard, Vancouver, ISO, and other styles
2

Park, Minjung, and Sangmi Chai. "AI Model for Predicting Legal Judgments to Improve Accuracy and Explainability of Online Privacy Invasion Cases." Applied Sciences 11, no. 23 (2021): 11080. http://dx.doi.org/10.3390/app112311080.

Full text
Abstract:
Since there are growing concerns regarding online privacy, firms may have the risk of being involved in various privacy infringement cases resulting in legal causations. If firms are aware of consequences from possible cases of invasion of online privacy, they can more actively prevent future online privacy infringements. Thus, this study attempts to predict the probability of judgment types caused by various invasions within US judicial cases that are related to online privacy invasions. Since legal judgment results are significantly influenced by societal factors and technological developmen
APA, Harvard, Vancouver, ISO, and other styles
3

Karro, Jonathan, Andrew W. Dent, and Stephen Farish. "Patient perceptions of privacy infringements in an emergency department." Emergency Medicine Australasia 17, no. 2 (2005): 117–23. http://dx.doi.org/10.1111/j.1742-6723.2005.00702.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kamleitner, Bernadette, and Vince Mitchell. "Your Data Is My Data: A Framework for Addressing Interdependent Privacy Infringements." Journal of Public Policy & Marketing 38, no. 4 (2019): 433–50. http://dx.doi.org/10.1177/0743915619858924.

Full text
Abstract:
Everyone holds personal information about others. Each person’s privacy thus critically depends on the interplay of multiple actors. In an age of technology integration, this interdependence of data protection is becoming a major threat to privacy. Yet current regulation focuses on the sharing of information between two parties rather than multiactor situations. This study highlights how current policy inadequacies, illustrated by the European Union General Data Protection Regulation, can be overcome by means of a deeper understanding of the phenomenon. Specifically, the authors introduce a ne
APA, Harvard, Vancouver, ISO, and other styles
5

Lannon, Caitriona, John Nelson, and Martin Cunneen. "Ethical AI for Automated Bus Lane Enforcement." Sustainability 13, no. 21 (2021): 11579. http://dx.doi.org/10.3390/su132111579.

Full text
Abstract:
There is an explosion of camera surveillance in our cities today. As a result, the risks of privacy infringement and erosion are growing, as is the need for ethical solutions to minimise the risks. This research aims to frame the challenges and ethics of using data surveillance technologies in a qualitative social context. A use case is presented which examines the ethical data required to automatically enforce bus lanes using camera surveillance and proposes ways of minimising the risks of privacy infringement and erosion in that scenario. What we seek to illustrate is that there is a challen
APA, Harvard, Vancouver, ISO, and other styles
6

Pastukhov, Oleksandr. "Leveraging Privacy Torts: A Case for Statutory Damages under European Data Protection Law." Global Privacy Law Review 5, Issue 2 (2024): 69–81. http://dx.doi.org/10.54648/gplr2024010.

Full text
Abstract:
Privacy torts remain poor relations of European Union (EU) data protection law. The Data Protection Directive’s rules on compensation for damages caused by intrusions of privacy remained largely unchanged in the General Data Protection Regulation (GDPR) that is preoccupied with administrative measures against the violators of its rules more than with arming the victims of privacy infringements with effective and efficient rules on privacy torts. This article addresses the issue of the underutilization of the right of private action under EU data protection law by identifying deficiencies of th
APA, Harvard, Vancouver, ISO, and other styles
7

Journal, IJSREM. "CYPHER TALKS-Chatting Application." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 07 (2024): 1–3. http://dx.doi.org/10.55041/ijsrem36285.

Full text
Abstract:
Abstract— CypherTalks is a novel chatting application designed to prioritize user privacy and security in the digital communication landscape. In an era marked by increasing concerns over data breaches and privacy infringements, CypherTalks emerges as a robust solution offering end-to-end encryption and advanced privacy features. This paper presents the architecture, functionality, and security mechanisms of CypherTalks, emphasizing its commitment to safeguarding user data and conversations. Leveraging state-of-the-art cryptographic techniques, CypherTalks ensures that messages remain encrypte
APA, Harvard, Vancouver, ISO, and other styles
8

Pool, R. L. D., and B. H. M. Custers. "The Police Hack Back: Legitimacy, Necessity and Privacy Implications of The Next Step in Fighting Cybercrime." European Journal of Crime, Criminal Law and Criminal Justice 25, no. 2 (2017): 123–44. http://dx.doi.org/10.1163/15718174-25022109.

Full text
Abstract:
In an attempt to strengthen the position of the police to fight cybercrime, the Dutch government proposed new legislation giving police agencies new investigative powers on the Internet. This proposed legislation is controversial as it allows police agencies to hack into computers and install spyware. This paper examines the background and contents of the proposed legislation and tries to answer the question to what extent these new investigative powers may result in infringements of the right to privacy and other fundamental rights of citizens, and whether these infringements are justified. T
APA, Harvard, Vancouver, ISO, and other styles
9

Riabchynska, O. P., and E. H. Stomatov. "Criminal law protection of the private life in the Kingdom of Spain." Uzhhorod National University Herald. Series: Law 4, no. 86 (2025): 356–66. https://doi.org/10.24144/2307-3322.2024.86.1.4.54.

Full text
Abstract:
The article analyzes the state of criminal law protection of respect for private life (inviolability of private life) in the Kingdom of Spain, its basis, scope and peculiarities of criminalizing infringements on this right, as well as problematic issues arising in the doctrine and law enforcement activity. It is established that criminal law protection of private life of an individual in Spain, as well as in Ukraine, is based primarily on the provisions of the Convention for the Protection of Human Rights and Fundamental Freedoms, as well as on the provisions of the Constitution of Spain, art.
APA, Harvard, Vancouver, ISO, and other styles
10

Dąbrowska-Kłosińska, Patrycja, Agnieszka Grzelak, and Agnieszka Nimark. "The Use of Covid-19 Digital Applications and Unavoidable Threats to the Protection of Health Data and Privacy." Białostockie Studia Prawnicze 26, no. 3 (2021): 61–94. http://dx.doi.org/10.15290/bsp.2021.26.03.04.

Full text
Abstract:
Abstract This paper starts with a dilemma. How to ensure the adequate protection of individual health data and privacy in a global pandemic, which has intensified the use of digital applications for the purposes of data sharing and contact-tracing? There is no simple answer to this question when choosing between the protection of public health and individual privacy. However, the history of the existing case-law regarding infectious diseases control, both Polish and European, teaches about numerous examples in which health data and privacy were not adequately protected, but, on the contrary, w
APA, Harvard, Vancouver, ISO, and other styles
11

Kim, Dong Hyun. "A Case Study of the Infringement of Residential Environment by the New Building - Focused on Sunshine, Views and Privacy Infringements -." Residential Environment Institute Of Korea 17, no. 2 (2019): 123–41. http://dx.doi.org/10.22313/reik.2019.17.2.123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Oerlemans, J. J., and B. J. Koops. "Surveilleren en opsporen in een internetomgeving." Justitiële verkenningen 38, no. 5 (2012): 35–49. https://doi.org/10.5553/jv/016758502012038005004.

Full text
Abstract:
Police patrolling and downtracking on the Internet Publicly available information on the Internet about people or criminal acts can be relevant to criminal investigations. This article analyses to what extent Dutch criminal procedure law allows open source intelligence for law-enforcement purposes. When more than ‘minor’ privacy interferences arise, an explicit investigatory power in the criminal procedure code is required. Minor infringements are allowed under the general task description in the Police Act 1993. It is unclear however when ‘substantial’ privacy infringements arise. On the basi
APA, Harvard, Vancouver, ISO, and other styles
13

Lemin, Jae. ""To Know or Not to Know?": The Privacy Law Implications of The 1996 Paedophile and Sex Offender Index." Victoria University of Wellington Law Review 28, no. 2 (1998): 415. http://dx.doi.org/10.26686/vuwlr.v28i2.6075.

Full text
Abstract:
This article reflects on the privacy and public interest issues raised by the publication of an index of paedophiles and sex offenders. The legislation and caselaw of other jurisdictions is investigated to assess the relevance of that experience to any reform of the law in New Zealand. The article uses Deborah Coddington The 1996 Paedophile and Sex Offender Index (Alister Taylor Publishers Pty Ltd, Auckland, 1996) as a starting point to explore the balancing of the public's right to know about an individual with that individual's right to privacy. The author first outlines the information in C
APA, Harvard, Vancouver, ISO, and other styles
14

Nadwi, Waliuddin, and Muhannad Abdul Moneim Uday. "The Right to Privacy: Foundations and Protections in Islamic Jurisprudence." International Journal of Religion 5, no. 12 (2024): 725–35. http://dx.doi.org/10.61707/864v8350.

Full text
Abstract:
Islam honors human beings by acknowledging a set of rights, including the right to privacy, as stated in numerous international legal articles which aim to protect it. This study aims to elucidate the foundations of the right to privacy in Islamic jurisprudence by examining religious texts and clarifying the protective methods provided by Islamic law. To achieve the desired results of this research, I have relied on an inductive analytical method. Among the conclusions reached is that Islamic law addresses the components and branches of the right to privacy, even though the term "privacy" itse
APA, Harvard, Vancouver, ISO, and other styles
15

Wang, Weiyuan. "Legal Effect of Internet Privacy Policy." Journal of Education, Humanities and Social Sciences 28 (April 1, 2024): 126–33. http://dx.doi.org/10.54097/zjz34p19.

Full text
Abstract:
The legal effect of Internet privacy policies is self-evident in protecting users’ personal privacy. However, in practical applications, the implementation of privacy policies faces many challenges. First, conflicts between commercial interests and privacy protection often arise, and network service providers may infringe on user privacy in pursuit of commercial interests. Secondly, considerations of national security and social stability may also conflict with the protection of personal privacy. Network service providers may need to cooperate with the investigation and regulatory requirements
APA, Harvard, Vancouver, ISO, and other styles
16

Trouille, Helen. "Private Life and Public Image: Privacy Legislation in France." International and Comparative Law Quarterly 49, no. 1 (2000): 199–208. http://dx.doi.org/10.1017/s0020589300064034.

Full text
Abstract:
In October 1998, at the height of the Monicagate scandal, the publication by the French publisher Plon of a novel which recounts the adulterous relationship in the 1960s between a politician bearing a marked resemblance to Francois Mitterrand, and a journalist, provided an interesting comparison between the attitudes of the French and of the Americans to the romantic dalliances of their respective leaders. For Jeanne Dautun's work of fiction Un ami d'autrefois is most certainly no Monica's Story, and French reactions to their President's lengthy extra-marital relationship with Anne Pingeot hav
APA, Harvard, Vancouver, ISO, and other styles
17

Eom, Sungwook, and Jun-Ho Huh. "The Opening Capability for Security against Privacy Infringements in the Smart Grid Environment." Mathematics 6, no. 10 (2018): 202. http://dx.doi.org/10.3390/math6100202.

Full text
Abstract:
It is now known that more information can be leaked into the smart grid environment than into the existing environment. In particular, specific information such as energy consumption data can be exposed via smart devices. Such a phenomenon can incur considerable risks due to the fact that both the amount and the concreteness of information increase when more types of information are combined. As such, this study aimed to develop an anonymous signature technique along with a signature authentication technique to prevent infringements of privacy in the smart grid environment, and they were teste
APA, Harvard, Vancouver, ISO, and other styles
18

Sarikakis, Katharine, and Sarah Anne Ganter. "Governance and Technologies of Surveillance." MedienJournal 36, no. 2 (2017): 6–21. http://dx.doi.org/10.24989/medienjournal.v36i2.145.

Full text
Abstract:
Although new technologies can serve as tools for creating an environment of equal opportunities and empowerment, they also reflect and reinforce an offline gendered social order. The paper examines the emergence of new cultures of control based on technological designs that support infringements of privacy and new practices of surveillance and argues that technologies left unchecked constitute tools for new forms of surveillance and control of women´s lives. These under-researched issues are mapped and international policy initiatives are discussed against this matrix. It discusses whether and
APA, Harvard, Vancouver, ISO, and other styles
19

Sarikakis, Katharine, and Sarah Anne Ganter. "Governance and Technologies of Surveillance." MedienJournal 36, no. 2 (2017): 6. http://dx.doi.org/10.24989/mj.v36i2.145.

Full text
Abstract:
Although new technologies can serve as tools for creating an environment of equal opportunities and empowerment, they also reflect and reinforce an offline gendered social order. The paper examines the emergence of new cultures of control based on technological designs that support infringements of privacy and new practices of surveillance and argues that technologies left unchecked constitute tools for new forms of surveillance and control of women´s lives. These under-researched issues are mapped and international policy initiatives are discussed against this matrix. It discusses whether and
APA, Harvard, Vancouver, ISO, and other styles
20

Watson, Hayley, and Rachel L. Finn. "Ethical and Privacy Implications of the use of Social Media during the Eyjafjallajokull Eruption Crisis." International Journal of Information Systems for Crisis Response and Management 6, no. 4 (2014): 29–41. http://dx.doi.org/10.4018/ijiscram.2014100103.

Full text
Abstract:
In a relatively new area of research for crisis management, this article presents a discussion of some of the privacy and ethical implications surrounding the use of social media in the event of a crisis. The article uses the travel chaos caused by the eruptions of the Eyjafjallajokull volcano in 2010 to contextualise the analysis. It begins by providing an overview of the use of social media in crisis management, before continuing to present two case studies of the use of social media by members of the public and the aviation industry during the crisis caused by the ash plume. The article the
APA, Harvard, Vancouver, ISO, and other styles
21

Carpenter, Christine. "Privacy and Proportionality: Examining Mass Electronic Surveillance under Article 8 and the Fourth Amendment." International and Comparative Law Review 20, no. 1 (2020): 27–57. http://dx.doi.org/10.2478/iclr-2020-0002.

Full text
Abstract:
Summary An individual citizen’s right to privacy has found extensive protection in the modern democratic state. However, with the increase of technological innovation and new kinds of threats, democratic states must grapple with balancing a problem that can never be wholly solved—governments seeking to create the optimal degree of security inevitably conflicts with citizens’ optimal degree of privacy. This article examines one vehicle through which governments have prioritized national security at the expense of individual privacy: mass electronic surveillance. Employing the case study method,
APA, Harvard, Vancouver, ISO, and other styles
22

D.S. Nonju, Dr Kalada, and Agent Benjamin Ihua-Maduenyi. "The Impact of Artificial Intelligence on Privacy Laws." International Journal of Research and Innovation in Social Science VIII, no. IX (2024): 2150–74. http://dx.doi.org/10.47772/ijriss.2024.8090178.

Full text
Abstract:
The integration of artificial intelligence (AI) into various sectors has significantly impacted privacy law, raising complex legal and ethical questions. AI systems, particularly those utilizing big data and machine learning algorithms, have the capacity to collect, analyze, and infer sensitive personal information at unprecedented scales. This capability challenges existing privacy frameworks that were primarily designed for less intrusive technologies. Key concerns include the potential for AI to bypass user consent, the difficulty in achieving meaningful transparency and accountability, and
APA, Harvard, Vancouver, ISO, and other styles
23

Polonetsky, Jules, and Omer Tene. "The Ethics of Student Privacy: Building Trust for Ed Tech." International Review of Information Ethics 21 (July 1, 2014): 25–34. http://dx.doi.org/10.29173/irie367.

Full text
Abstract:
This article analyzes the opportunities and risks of data driven education technologies (ed tech). It discusses the deployment of data technologies by education institutions to enhance student performance, evaluate teachers, improve education techniques, customize programs, devise financial assistance plans, and better leverage scarce resources to assess and optimize education results. Critics fear ed tech could introduce new risks of privacy infringements, narrowcasting and discrimination, fueling the stratification of society by channeling “winners” to a “Harvard track” and “losers” to a “bl
APA, Harvard, Vancouver, ISO, and other styles
24

Moeed Hashmi, Ata ul. "EYES IN THE SKY: STRENGTHENING PUBLIC AWARENESS AND LAW ENFORCEMENT RESPONSE TO DRONE-DRIVEN INFRINGEMENTS ON PRIVACY RIGHTS IN THE UNITED STATES." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 16, no. 2 (2025): 44–59. https://doi.org/10.61841/turcomat.v16i2.15268.

Full text
Abstract:
The rapid proliferation of drones in the United States has created urgent challenges concerning individual privacy, institutional readiness, and legal enforcement. While drones serve diverse functions, their use in surveilling private spaces without consent has exposed significant regulatory gaps in both federal and local legal frameworks. This research investigates these gaps by analyzing a real-life case from Silicon Valley, where a civilian encountered a drone hovering above their private residence and was unable to obtain meaningful assistance from law enforcement.Drawing on recent scholar
APA, Harvard, Vancouver, ISO, and other styles
25

Chen, Qizhan, Ruifeng Zhao, Bin Li, Zewei Liu, Huijun Zhuang, and Chunqiang Hu. "Regional Load Forecasting Scheme for Security Outsourcing Computation." Electronics 13, no. 18 (2024): 3712. http://dx.doi.org/10.3390/electronics13183712.

Full text
Abstract:
Smart grids generate an immense volume of load data. When analyzed using intelligent technologies, these data can significantly improve power load management, optimize energy distribution, and support green energy conservation and emissions reduction goals. However, in the process of data utilization, a pertinent issue arises regarding potential privacy leakage concerning both regional and individual user power load data. This paper addresses the scenario of outsourcing computational tasks for regional power load forecasting in smart grids, proposing a regional-level load forecasting solution
APA, Harvard, Vancouver, ISO, and other styles
26

Lu, Yunpeng. "Analysis and Countermeasures of Computer Network Security in the Age of Artificial Intelligence." Innovation in Science and Technology 2, no. 6 (2023): 10–14. http://dx.doi.org/10.56397/ist.2023.11.02.

Full text
Abstract:
With the widespread adoption of artificial intelligence technology, the landscape of network threats is continually evolving. Malicious attackers are increasingly leveraging intelligent technology to enhance their attacks, resulting in more intricate network security challenges. Among these challenges, antagonistic attacks and intelligent threats stand out, while the risk of large-scale data breaches and privacy infringements looms over both individuals and organizations. This paper proposes a set of strategies to address these pressing issues. These strategies encompass the deployment of deep
APA, Harvard, Vancouver, ISO, and other styles
27

Jawad, Ayesha, Shahzeen Jamil, and Nazar Hussain. "Social Media: A Boon to Human Rights?" Journal of Law & Social Studies 5, no. 1 (2023): 21–29. https://doi.org/10.52279/jlss.05.01.01.2129.

Full text
Abstract:
In modern digital times, social media has progressively changed society's mind. Though social media has great advantages and has been used as a medium to promote freedom of speech, it is also being used as a tool of oppression and violation of human rights. This paper will discuss the violations of human rights through social media in three aspects: the right to privacy, hate speech and trials by media. This paper seeks to explore how social media has adversely influenced and tilted the balance of power in the minds of the people. Several inherent risks are potentially involved in social media
APA, Harvard, Vancouver, ISO, and other styles
28

Mao, Weiwei. "Technological Realization of AI in Media: Ethical Implications for Content Generation, Immersive Storytelling, and Automated Moderation Systems." Applied and Computational Engineering 138, no. 1 (2025): 199–204. https://doi.org/10.54254/2755-2721/2025.21527.

Full text
Abstract:
Media technologies now heavily rely on Artificial Intelligence (AI) to drive content creation while enhancing immersive storytelling and enabling automated content moderation. AI techniques like natural language processing and generative adversarial networks have transformed media production through automating creative tasks which once needed substantial human effort. These technological advances trigger serious ethical issues including algorithm bias in AI systems privacy threats in immersive storytelling and automated moderation system reliability. The research investigates ethical issues su
APA, Harvard, Vancouver, ISO, and other styles
29

Lesjak, Benjamin, and Mateja Savić. "Video surveillance legislation in the EU and Slovenia: privacy rights, security needs, and data protection challenges." Mednarodno inovativno poslovanje = Journal of Innovative Business and Management 15, no. 2 (2023): 1–10. http://dx.doi.org/10.32015/jibm.2023.15.2.3.

Full text
Abstract:
This paper describes the legal framework of video surveillance in the European Union (EU), with an emphasis on the legislation of the Republic of Slovenia. We are analyzing the legal intricacies inherent in balancing privacy rights and security needs. The purpose of the paper is to examine the legislative instruments in the EU and Slovenia, especially regarding the legal basis for processing data of video surveillance. The research methodology combines qualitative analysis and legislative review and case studies from selected Slovenian Information Commissioner opinions and decisions. The findi
APA, Harvard, Vancouver, ISO, and other styles
30

Svadeba, N. I. "Individual’s right to privacy protection." Uzhhorod National University Herald. Series: Law, no. 65 (October 25, 2021): 128–32. http://dx.doi.org/10.24144/2307-3322.2021.65.23.

Full text
Abstract:
The article is devoted to the individual’s right to privacy protection and the study of legal consolidation of the individual’s right to privacy of communication problems. Issues of respect for private life, generalized norms of procedural legislation of Ukraine and the European Court of Human Rights decisions on the admissibility of inter-ference by investigators in private life are studied there.The normative legal acts that regulate the procedure for obtaining the consent of an individual to the processing of his / her data are considered and researched there. On the basis of author’s concl
APA, Harvard, Vancouver, ISO, and other styles
31

Sayed, Abdelrazek Wahba. "Legal Protection of Personal Images in the Era of Modern Technology 'Comparative Study'." International Journal of Religion 5, no. 11 (2024): 2880–88. http://dx.doi.org/10.61707/kz59nw52.

Full text
Abstract:
Technology creates serious problems as it facilitates obtaining a person's image without their knowledge, constituting a violation of their right to privacy. Hence, our research titled 'Legal Protection of Personal Images in the Era of Modern Technology' aims to demonstrate how the personal image is protected through the rules of Egyptian and Algerian civil law, assessing their sufficiency and effectiveness in addressing the damages resulting from infringements upon it. Our findings lead to several conclusions and recommendations, emphasizing that the right to one's image is inherent to human
APA, Harvard, Vancouver, ISO, and other styles
32

Zaky, Moody Magdy. "Egyptian legislation on the compulsory treatment of persons with psychiatric disorders: the old and the new." International Psychiatry 6, no. 3 (2009): 57–58. http://dx.doi.org/10.1192/s1749367600000576.

Full text
Abstract:
Compulsory admission to and treatment in psychiatric facilities have recently been brought into the spotlight by both psychiatrists and the media in Egypt. Interventions of this kind have always inherently involved deprivations of liberty and infringements on privacy. The debate around this issue acquired considerable heat after it was joined by the legislatures during the discussion of a Bill in Parliament. The Parliamentary Committee for Constitutional and Legislative Affairs questioned the constitutionality of the process of compulsory detention and requested more robust safeguards to prote
APA, Harvard, Vancouver, ISO, and other styles
33

Chan, Gary K. Y. "Towards a calibrated trust-based approach to the use of facial recognition technology." International Journal of Law and Information Technology 29, no. 4 (2021): 305–31. http://dx.doi.org/10.1093/ijlit/eaab011.

Full text
Abstract:
ABSTRACT The use of facial recognition technology has given rise to much debate relating to issues concerning privacy infringements, bias and inaccuracies of data and outputs, possibilities of covert use, the lack of data security and the problem of function creep. Certain states and jurisdictions have called for bans and moratoria on the use of facial recognition technology. This article argues that a blanket ban on facial recognition technology would be overly precautionary without fully considering the wide range of uses and benefits of the innovation. To promote its acceptance, trust in fa
APA, Harvard, Vancouver, ISO, and other styles
34

Habibu, Taban, Edith Talina Luhanga, and Anael Elikana Sam. "Evaluation of Users’ Knowledge and Concerns of Biometric Passport Systems." Data 4, no. 2 (2019): 58. http://dx.doi.org/10.3390/data4020058.

Full text
Abstract:
The increase in terrorism and identity fraud has forced governments worldwide to make a combined effort to enhance the security of national borders. Biometric passports are the emergent identity travel document deployed in guaranteeing the safekeeping of the entry point of the border and limiting the usage of counterfeit documents. This study analyzes users’ concerns and threats to the biometric passport delivery system in Uganda, where the first biometric passports are planned for rollout in 2019. We used a mixed approach to compute and articulate the results. Factors impacting fear of techno
APA, Harvard, Vancouver, ISO, and other styles
35

Shi, Rongquan, Lifei Wei, and Lei Zhang. "More Efficient and Verifiable Privacy-Preserving Aggregation Scheme for Internet of Things-Based Federated Learning." Applied Sciences 14, no. 13 (2024): 5361. http://dx.doi.org/10.3390/app14135361.

Full text
Abstract:
As Internet of Things (IoT) technology continues to advance at a rapid pace, smart devices have permeated daily life. Service providers are actively collecting copious numbers of user data, with the aim of refining machine learning models to elevate service quality and accuracy. However, this practice has sparked apprehensions amongst users concerning the privacy and safety of their personal data. Federated learning emerges as an evolution of centralized machine learning, enabling a collective training of machine learning models by multiple users on their respective devices. Crucially, this is
APA, Harvard, Vancouver, ISO, and other styles
36

Kravchuk, Natalya. "Privacy of a Child in the Digital Environment: New Risks Unaddressed." Legal Issues in the Digital Age 3, no. 2 (2022): 73–89. https://doi.org/10.17323/2713-2749.2022.2.73.89.

Full text
Abstract:
Digital technologies have brought with them new possibilities for exercising and protecting human rights; however, their potential for violations of human rights has also grown exponentially. Use of ICT influences the daily lives of adults, but their impact on children is even greater, as the risks of harm they face are now mediated and exacerbated online. The importance of children’s right to privacy has manifested itself anew in the context of digital technologies. In addition to concerns about safety, there are other considerations such as data processing and the “digital footprints” create
APA, Harvard, Vancouver, ISO, and other styles
37

Kravchuk, Natalya. "Privacy of a Child in the Digital Environment: New Risks Unaddressed." Law Journal of the Higher School of Economics, no. 5 (March 25, 2022): 162–76. http://dx.doi.org/10.17323/2072-8166.2022.5.162.176.

Full text
Abstract:
Digital technologies have brought with them new possibilities for exercising and protecting human rights; however, their potential for violations of human rights has also grown exponentially. Use of ICT influences the daily lives of adults, but their impact on children is even greater, as the risks of harm they face are now mediated and exacerbated online. The importance of children’s right to privacy has manifested itself anew in the context of digital technologies. In addition to concerns about safety, there are other considerations such as data processing and the “digital footprints” create
APA, Harvard, Vancouver, ISO, and other styles
38

Xianghan, Zhang, and Li Zhengwei. "Research on the Impact of Algorithmic Management on Employee Work Behavior in Platform Enterprises." Journal of Economics and Management Sciences 8, no. 2 (2025): p99. https://doi.org/10.30560/jems.v8n2p99.

Full text
Abstract:
This paper, set against the backdrop of platform enterprises, examines the impact of algorithmic management on employee work behavior. Through a literature review and theoretical construction, the study first defines the core concepts of platform enterprises, algorithmic management, and employee work behavior, while outlining related theoretical foundations such as institutional theory, the technology acceptance model, and social exchange theory. Based on this, a conceptual model is developed that describes how algorithmic management influences employee behavior through mediating variables suc
APA, Harvard, Vancouver, ISO, and other styles
39

Xinbo, Huang, and Liu Guo. "Navigating the Risks of Generative AI: A Comparative Analysis of International Regulatory Approaches." Problemy Ekorozwoju 20, no. 2 (2025): 11–20. https://doi.org/10.35784/preko.7444.

Full text
Abstract:
The rise of Generative Artificial Intelligence (Generative AI) offers transformative potential for productivity and creativity but also introduces significant risks that challenge current AI regulation frameworks. This study systematically investigates these risks, including security vulnerabilities, privacy concerns, copyright infringements, and algorithmic biases. It critically assesses the effectiveness of existing regulatory approaches in managing these issues. Through a comparative analysis of regulatory practices in the European Union, the United States, the UK, and China, the study reve
APA, Harvard, Vancouver, ISO, and other styles
40

MOON, Jae Young, Hye Yoon PARK, and Eun Kyung CHOI. "Social Responsibilities of Health Care Professionals during the COVID-19 Pandemic: Avoiding Privacy Infringements and the Stigmatization of Patients." Korean Journal of Medical Ethics 24, no. 2 (2021): 159–70. http://dx.doi.org/10.35301/ksme.2021.24.2.159.

Full text
Abstract:
This article explores the social responsibilities of healthcare professionals (HCPs) during the COVID-19 pandemic, especially those concerning the stigmatization of individuals and the infringement of privacy. In the context of public health crises like the current COVID-19 pandemic, HCPs have the dual responsibility of respecting the rights and interests of individuals and at the same time protecting and promoting public health. While contact-tracing is considered an essential public health tool, it can conflict with the rights and interests of individuals. Furthermore, the fact that exposure
APA, Harvard, Vancouver, ISO, and other styles
41

Łukanko, Bernard. "Uchybienie przepisom o ochronie danych osobowych jako naruszenie dobra osobistego – analiza na przykładzie orzecznictwa Sądu Najwyższego." Studia Prawnoustrojowe, no. 46 (December 31, 2019): 245–59. http://dx.doi.org/10.31648/sp.5333.

Full text
Abstract:
The study is concerned with the issue of mutual relationship between the failure to comply with the laws on personal data protection and regulations relating to the protection of personal interests, including in particular the right to privacy. The article presents the views held by the Supreme Court with respect to the possibility of considering acts infringing upon the provisions of the Personal Data Protection Act of 1997 (after 24 May 2018) and of the General Data Protection Regulation (after 25 May 2018) as violation of personal interests, such as the right to privacy. The author shared t
APA, Harvard, Vancouver, ISO, and other styles
42

Ghosh, Anwesh. "SECURING WOMEN'S DIGITAL SANCTITY: ADDRESSING AI-DRIVEN THREATS HEAD-ON." Indian Journal of Law and Society II, no. 6 (2024): 63–82. https://doi.org/10.5281/zenodo.14285150.

Full text
Abstract:
ABSTRACTThis research article delves into the pressing issue of women's privacy violation through the malicious use of artificial intelligence (AI), particularly employing the deepfake technology. The study highlights the alarming trends of AI-driven deepfakes being employed for the abuse of women's privacy, encompassing scenarios of cyberbullying, harassment, and even blackmail. The article underscores the urgency of addressing these challenges by advocating for stringent regulations governing the deployment of AI and emphasizing the need to fortify existing data usage policies. It emphasizes
APA, Harvard, Vancouver, ISO, and other styles
43

Mgiba, Freddy Marilahimbilu, and Thozama Mxotwa. "Communicating Banking Cyber-security Measures, Customer Ethical Concerns, Experience, and Loyalty Intentions: A Developing Economy’s Perspective." International Review of Management and Marketing 14, no. 3 (2024): 123–35. http://dx.doi.org/10.32479/irmm.16095.

Full text
Abstract:
AI technology-based banking services development has disrupted the way people participate in banking transactions. It has created easier and faster banking transaction possibilities with the use of electronic gadgets. However, ethical concerns about these applications have also been amplified together with the need for management communication of safety features and protocols for customer information protection, and redress when infringements occur. The study was an attempt to highlight how AI-enabled banking services safety communication affects customers’ ethical concerns and how the concern
APA, Harvard, Vancouver, ISO, and other styles
44

Fan, Ziyan. "Brain-Computer Interface for Emotion Recognition Based on Electroencephalography." Highlights in Science, Engineering and Technology 85 (March 13, 2024): 231–38. http://dx.doi.org/10.54097/30642q16.

Full text
Abstract:
Human emotions are erratic, and so are their brain signals throughout the day. Brain-computer interface devices must handle high signal throughputs in the form of electroencephalography from different areas of the human brain for us to learn more about these emotions. Researchers can recognize emotions from these signals after data acquisition, preprocessing, feature extraction, and feature selection to the classifier. Efficient machine learning algorithms for the process are imperative to quickly provide emotional feedback to a device. Models of such devices are already applicable in medical
APA, Harvard, Vancouver, ISO, and other styles
45

Enis Sholikhah, Suharto Suharto, and Rachmad Ilham. "The Application of Artificial Intelligence in Recruitment and Selection: Ethical Challenges and Effectiveness." JUMBIWIRA : Jurnal Manajemen Bisnis Kewirausahaan 4, no. 1 (2025): 426–35. https://doi.org/10.56910/jumbiwira.v4i1.2733.

Full text
Abstract:
This study explores the application of Artificial Intelligence (AI) in recruitment and selection processes, focusing on its effectiveness and the ethical challenges it presents. Utilizing a qualitative method through a systematic literature review, the research examines recent scholarly works published in the last five years. The findings reveal that AI significantly enhances recruitment efficiency by streamlining candidate screening, improving job fit predictions, and reducing human bias. However, these advantages are counterbalanced by ethical risks such as algorithmic bias, lack of transpar
APA, Harvard, Vancouver, ISO, and other styles
46

Stahl, Bernd Carsten. "Locating the Ethics of ChatGPT—Ethical Issues as Affordances in AI Ecosystems." Information 16, no. 2 (2025): 104. https://doi.org/10.3390/info16020104.

Full text
Abstract:
ChatGPT is a high-profile technology that has inspired broad discussions about its capabilities and likely consequences. There has been much debate concerning ethical issues that it raises which are typically described as potentially harmful (or beneficial) consequences of ChatGPT. Concerns relating to issues such as privacy, biases, infringements of intellectual property, or discrimination are widely discussed. The article pursues the question of where these issues originate and where they are located. This article suggests that these ethical issues of the technology are located in the techno
APA, Harvard, Vancouver, ISO, and other styles
47

Huda, Uu Nurul, Dian Rachmat Gumelar, and Alwi Al Hadad. "Fortifying Democracy: Deploying Electoral Justice for Robust Personal Data Protection in the Indonesian Election." Khazanah Hukum 6, no. 1 (2024): 24–33. http://dx.doi.org/10.15575/kh.v6i1.30734.

Full text
Abstract:
Elections stand as a cornerstone of democracy, yet the burgeoning integration of technology and personal data underscores the pressing need for safeguarding individual privacy within the electoral process. This study endeavors to scrutinize the efficacy of the Electoral Justice System in fortifying the protection of personal data throughout the registration, verification, and adjudication phases of political party participation in the forthcoming 2024 elections. Through an empirical juridical methodology, this research delves into the practical application of the Electoral Justice System acros
APA, Harvard, Vancouver, ISO, and other styles
48

Huang, Mingyue. "Protection of workers' rights and interests in the problem of algorithmic discrimination: legal challenges and response strategies." Education and Social Work 2, no. 1 (2025): 148. https://doi.org/10.63313/esw.9069.

Full text
Abstract:
With the widespread application of artificial intelligence and algorithms in the recruitment process, the problem of discrimination in algorithms' employ-ment is becoming increasingly prominent, posing new challenges to the rights and interests of workers. A thorough analysis of the main characteristics of al-gorithmic employment discrimination and discuss the infringements faced by workers in terms of individual privacy, data security and equal rights. Its real impact is demonstrated through typical cases, revealing the shortcomings of the current legal system in dealing with algorithmic disc
APA, Harvard, Vancouver, ISO, and other styles
49

Rubisz, Szymon. "LEGAL LIABILITY OF AN ORGANISATION USING ARTIFICIAL INTELLIGENCE." Scientific Papers of Silesian University of Technology Organization and Management Series 2024, no. 212 (2024): 493–507. https://doi.org/10.29119/1641-3466.2024.212.29.

Full text
Abstract:
Purpose: an analysis of the impact of artificial intelligence on organisations, with a particular focus on the legal liability associated with the use of AI-based tools. Design/methodology/approach: legal and qualitative analysis of AI’s impact on organizations, focusing on general principles of civil law and regulatory frameworks like the AI Act. The paper adopts a formal-dogmatic method of interpreting legal texts and case-study approach, examining specific instances of AI use, and covers theoretical aspects of liability, data privacy, intellectual property etc. Findings: the analysis reveal
APA, Harvard, Vancouver, ISO, and other styles
50

Basova, A. V., G. N. Komkova, and R. A. Torosyan. "The constitutional right of HIV-infected russian citizens to protect personal privacy: limits of restriction." HIV Infection and Immunosuppressive Disorders 13, no. 2 (2021): 124–30. http://dx.doi.org/10.22328/2077-9828-2021-13-1-124-130.

Full text
Abstract:
The aim: to conduct a constitutional and legal analysis of the legal regulation of medical secrecy protection for HIV-infected Russian citizens.Materials and methods. The analysis was carried out on the basis of Russian and foreign legislation and scientific literature published on this topic over the past 7 years, including in Pubmed. The study used dialectical and logical methods, which created the basis for a comprehensive and complete study of the limits of admissibility of protecting medical secrets of HIV-infected; the use of the systemicstructural method allowed to study it in conjuncti
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!