Academic literature on the topic 'Privacy policy negotiation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy policy negotiation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Privacy policy negotiation"
Such, Jose M., and Michael Rovatsos. "Privacy Policy Negotiation in Social Media." ACM Transactions on Autonomous and Adaptive Systems 11, no. 1 (April 20, 2016): 1–29. http://dx.doi.org/10.1145/2821512.
Full textLupi, Lucia. "City Data Plan: The Conceptualisation of a Policy Instrument for Data Governance in Smart Cities." Urban Science 3, no. 3 (August 13, 2019): 91. http://dx.doi.org/10.3390/urbansci3030091.
Full textBULL, BENEDICTE. "Policy Networks and Business Participation in Free Trade Negotiations in Chile." Journal of Latin American Studies 40, no. 2 (April 29, 2008): 195–224. http://dx.doi.org/10.1017/s0022216x08003969.
Full textKucik, Jeffrey, and Krzysztof J. Pelc. "Measuring the Cost of Privacy: A Look at the Distributional Effects of Private Bargaining." British Journal of Political Science 46, no. 4 (January 28, 2015): 861–89. http://dx.doi.org/10.1017/s0007123414000520.
Full textSteeves, Valerie, and Priscilla Regan. "Young people online and the social value of privacy." Journal of Information, Communication and Ethics in Society 12, no. 4 (November 4, 2014): 298–313. http://dx.doi.org/10.1108/jices-01-2014-0004.
Full textYakovleva, Svetlana, and Kristina Irion. "Toward Compatibility of the EU Trade Policy with the General Data Protection Regulation." AJIL Unbound 114 (2020): 10–14. http://dx.doi.org/10.1017/aju.2019.81.
Full textRadchenko, Sergey, and Lisbeth Tarlow. "Gorbachev, Ozawa, and the Failed Back-Channel Negotiations of 1989–1990." Journal of Cold War Studies 15, no. 2 (April 2013): 104–30. http://dx.doi.org/10.1162/jcws_a_00339.
Full textBazzoli, Gloria J., Larry M. Manheim, and Teresa M. Waters. "U.S. Hospital Industry Restructuring and the Hospital Safety Net." INQUIRY: The Journal of Health Care Organization, Provision, and Financing 40, no. 1 (February 2003): 6–24. http://dx.doi.org/10.5034/inquiryjrnl_40.1.6.
Full textDuBord, Elise. "Language policy and the drawing of social boundaries." Ideologías lingüísticas y el español en contexto histórico 7, no. 1 (March 30, 2010): 25–45. http://dx.doi.org/10.1075/sic.7.1.02dub.
Full textBarnett, Ronald, and Gareth Parry. "Policy analysis research in higher education: negotiating dilemmas." Magis. Revista Internacional de Investigación en Educación 7, no. 14 (December 30, 2014): 69. http://dx.doi.org/10.11144/javeriana.m7-14.parh.
Full textDissertations / Theses on the topic "Privacy policy negotiation"
Walker, Daniel David. "Or Best Offer: A Privacy Policy Negotiation Protocol." BYU ScholarsArchive, 2007. https://scholarsarchive.byu.edu/etd/1016.
Full textBobade, Kailas B. "Personalized Credential Negotiation Based on Policy Individualization in Federation." Kent State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=kent1259734008.
Full textFreer, Christopher Michael. "Parental Influence on Curricular Decisions in Private Schools: Negotiating Parental Expectations." Digital Archive @ GSU, 2009. http://digitalarchive.gsu.edu/eps_diss/32.
Full textLawani, Oluwa Sosso. "Priv-C : une politique de confidentialité personnalisable." Thèse, 2016. http://hdl.handle.net/1866/13776.
Full textPrivacy policies define the way online services collect, use and share users’ data. Although they are the main channel through which users are informed about the use of their private data, privacy policies are generally ignored by them. This is due to their long and vague content, their difficult vocabulary and their no standard format. Privacy policies also confront users to a dilemma. Indeed, they must agree to all their content in order to use the service or reject it, and in this case they do not have access to the service. No other alternative is given to the user. Online services process data collected from users to provide them a service, but they also exploit those data for economic purposes (targeted advertising, resale, etc.). According to various studies, allowing users to benefit from the use of their data could restore their trust towards online services and facilitate data exchanges on the Internet. In this work, we propose a new model of privacy policy, inspired by the P3P (a World Wide Web Consortium - W3C Recommendation) but increasing its functionalities and reducing its complexity. This model defines a specific structure allowing users and online services to define their preferences and needs. Users have the opportunity to decide for each of their private data, specifying how it will be used and shared. A negotiation phase will allow a needs analysis of the online service and preferences of the user to establish a confidentiality agreement. The value of personal data is also an important aspect of our study. While companies have resources allowing them to rate this value, we apply in this thesis, a hierarchical multi-criteria method. This method will allow each user to give value to his personal data according to the importance he attaches to it. In this model, we also integrate a regulation authority. It is in charge of conducting negotiations between users and online services, and generate recommendations to users based on their profile and current trends.
Bensabat, Remonda R. "The Mexican private sector's role in the North American Free Trade Negotiations implications for business-state relations /." 1995. http://catalog.hathitrust.org/api/volumes/oclc/38273300.html.
Full textBooks on the topic "Privacy policy negotiation"
Krichewsky, Damien. Negotiating the terms of a new social contract: Private companies, civil society, and the state in India. New Delhi: Centre de Sciences Humanies, 2009.
Find full textKrichewsky, Damien. Negotiating the terms of a new social contract: Private companies, civil society, and the state in India. New Delhi: Centre de Sciences Humanies, 2009.
Find full textCowhey, Peter F., and Jonathan D. Aronson. Digital DNA. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190657932.001.0001.
Full textGray, Joanne Elizabeth. Google Rules. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190072070.001.0001.
Full textBhattacharya, Sanjoy. Global and Local Histories of Medicine: Interpretative Challenges and Future Possibilities. Edited by Mark Jackson. Oxford University Press, 2012. http://dx.doi.org/10.1093/oxfordhb/9780199546497.013.0008.
Full textHenke, Marina E. Constructing Allied Cooperation. Cornell University Press, 2019. http://dx.doi.org/10.7591/cornell/9781501739699.001.0001.
Full textBook chapters on the topic "Privacy policy negotiation"
Kolar, Martin, Carmen Fernandez-Gago, and Javier Lopez. "Policy Languages and Their Suitability for Trust Negotiation." In Data and Applications Security and Privacy XXXII, 69–84. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-95729-6_5.
Full textKursawe, Klaus, Gregory Neven, and Pim Tuyls. "Private Policy Negotiation." In Financial Cryptography and Data Security, 81–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11889663_6.
Full textBonatti, Piero A., Juri L. De Coi, Daniel Olmedilla, and Luigi Sauro. "Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security." In Logic Programming, 779–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89982-2_76.
Full textYee, George, and Larry Korba. "Privacy Policies and Their Negotiation in Distance Education." In Instructional Technologies, 237–64. IGI Global, 2004. http://dx.doi.org/10.4018/978-1-59140-565-8.ch009.
Full textBertino, Elisa, Anna C. Squicciarini, Lorenzo Martino, and Federica Paci. "An Adaptive Access Control Model for Web Services." In Information Security and Ethics, 671–703. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch051.
Full textFish, Jennifer N. "“First to Work; Last to Sleep”." In Domestic Workers of the World Unite! NYU Press, 2017. http://dx.doi.org/10.18574/nyu/9781479848676.003.0004.
Full textHeath, Robert L., and Damion Waymer. "Social Movement Activism Analysis of Strategic: Communication in Context." In Strategic Communication in Context: Theoretical Debates and Applied Research, 87–109. UMinho Editora/CECS, 2021. http://dx.doi.org/10.21814/uminho.ed.46.5.
Full textPolido, Fabrício B. Pasquot. "The Judgments Project of the Hague Conference on Private International Law: A Way Forward for a Long-awaited Solution." In Diversity and Integration in Private International Law, 176–96. Edinburgh University Press, 2019. http://dx.doi.org/10.3366/edinburgh/9781474447850.003.0012.
Full textBogue, Kelly. "Housing precarity and advanced marginality in the UK." In The Divisive State of Social Policy, 145–62. Policy Press, 2019. http://dx.doi.org/10.1332/policypress/9781447350538.003.0007.
Full textFrancis, Martin. "Wounded Pride and Petty Jealousies: Private Lives and Public Diplomacy in Second World War Cairo." In Total War, 98–115. British Academy, 2020. http://dx.doi.org/10.5871/bacad/9780197266663.003.0006.
Full textConference papers on the topic "Privacy policy negotiation"
Walker, Daniel D., Eric G. Mercer, and Kent E. Seamons. "Or Best Offer: A Privacy Policy Negotiation Protocol." In 2008 IEEE Workshop on Policies for Distributed Systems and Networks - POLICY. IEEE, 2008. http://dx.doi.org/10.1109/policy.2008.39.
Full textJang, In Joo, Wenbo Shi, and Hyeon Seon Yoo. "Policy Negotiation System Architecture for Privacy Protection." In 2008 Fourth International Conference on Networked Computing and Advanced Information Management (NCM). IEEE, 2008. http://dx.doi.org/10.1109/ncm.2008.244.
Full textLi, Yanhuang, Nora Cuppens-Boulahia, Jean-Michel Crom, Frederic Cuppens, and Vincent Frey. "Reaching Agreement in Security Policy Negotiation." In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2014. http://dx.doi.org/10.1109/trustcom.2014.17.
Full textCheng, Vivying, Patrick Hung, and Dickson Chiu. "Enabling Web Services Policy Negotiation with Privacy preserved using XACML." In 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07). IEEE, 2007. http://dx.doi.org/10.1109/hicss.2007.207.
Full textZhang, Yunxi, and Darren Mundy. "Remembrance of Local Information Status for Enforcing Robustness of Policy-Exchanged Strategies for Trust Negotiation." In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2014. http://dx.doi.org/10.1109/trustcom.2014.18.
Full textReports on the topic "Privacy policy negotiation"
Kelly, Luke. Characteristics of Global Health Diplomacy. Institute of Development Studies (IDS), June 2021. http://dx.doi.org/10.19088/k4d.2021.09.
Full textJones, Emily, Beatriz Kira, Anna Sands, and Danilo B. Garrido Alves. The UK and Digital Trade: Which way forward? Blavatnik School of Government, February 2021. http://dx.doi.org/10.35489/bsg-wp-2021/038.
Full text