Academic literature on the topic 'Privacy policy negotiation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy policy negotiation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Privacy policy negotiation"

1

Such, Jose M., and Michael Rovatsos. "Privacy Policy Negotiation in Social Media." ACM Transactions on Autonomous and Adaptive Systems 11, no. 1 (April 20, 2016): 1–29. http://dx.doi.org/10.1145/2821512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lupi, Lucia. "City Data Plan: The Conceptualisation of a Policy Instrument for Data Governance in Smart Cities." Urban Science 3, no. 3 (August 13, 2019): 91. http://dx.doi.org/10.3390/urbansci3030091.

Full text
Abstract:
This paper presents the conceptualisation of the City Data Plan, a data governance policy instrument intended to connect the production and use of urban data in a comprehensive and evolutive long-term strategy aligned with city development goals. The concept of the City Data Plan had been elaborated by taking into account current issues related to privacy and manipulation of data in smart city. The methodological approach adopted to define the nature of a City Data Plan is grounded on the conceptual and empirical parallelism with corporate data governance plans and general urban plans, respectively aimed to regulate decision-making powers and actions on data in enterprise contexts, and the interests of local stakeholders in the access and use of urban resources. The result of this analytic process is the formulation of the outline of a City Data Plan as a data governance policy instrument to support the iterative negotiation between the instances of data producers and data users for instantiating shared smart city visions. The conceptualisation of the City Data Plan includes a description of the multi-stakeholder organisational structures for the city data governance, cooperation protocols and decision areas, responsibilities assignments, components of the plan and its implementation mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
3

BULL, BENEDICTE. "Policy Networks and Business Participation in Free Trade Negotiations in Chile." Journal of Latin American Studies 40, no. 2 (April 29, 2008): 195–224. http://dx.doi.org/10.1017/s0022216x08003969.

Full text
Abstract:
AbstractWithin Latin America, Chile is distinguished by its stable trade policies and rapid negotiation of trade agreements with countries and regions all over the world. Explanations for these phenomena often point to the stable pro-free trade coalition established in the aftermath of the shock-therapy pursued in the 1970s, and Chile's professional government bureaucracy. Although both of these elements are important, this article shows how the rapid integration of Chile into the world economy has also depended on the existence of business associations with expertise on trade issues. Through the process of integration, a close policy network has evolved between key public officials and business representatives. This is premised on the mutual recognition of expertise in the public and private sectors, and is held together by close personal networks of loyalty and trust across the public-private divide. However, while the development of such a policy network has been highly favourable to the process of negotiating trade agreements, it has also contributed to the de-facto exclusion of societal actors that have less to contribute to trade negotiations than business sectors.
APA, Harvard, Vancouver, ISO, and other styles
4

Kucik, Jeffrey, and Krzysztof J. Pelc. "Measuring the Cost of Privacy: A Look at the Distributional Effects of Private Bargaining." British Journal of Political Science 46, no. 4 (January 28, 2015): 861–89. http://dx.doi.org/10.1017/s0007123414000520.

Full text
Abstract:
Transparency is one of the most contested aspects of international organizations. While observers frequently call for greater oversight of policy making, evidence suggests that settlement between states is more likely when negotiations are conducted behind closed doors. The World Trade Organization’s (WTO) legal body provides a useful illustration of these competing perspectives. As in many courts, WTO dispute settlement is designed explicitly to facilitate settlement throughprivateconsultations. However, this study argues that the privacy of negotiations creates opportunities for states to strike deals that disadvantage others. Looking at product-level trade flows from all disputes between 1995 and 2011, it finds that private (early) settlements lead to discriminatory trade outcomes – complainant countries gain disproportionately more than the rest of the membership. When the facts of a case are made known through a ruling, these disproportional gains disappear entirely. The article also finds that third-party participation – commonly criticized for making settlement less likely – significantly reduces disparities in post-dispute trade. It then draws parallels to domestic law and concludes with a set of policy prescriptions.
APA, Harvard, Vancouver, ISO, and other styles
5

Steeves, Valerie, and Priscilla Regan. "Young people online and the social value of privacy." Journal of Information, Communication and Ethics in Society 12, no. 4 (November 4, 2014): 298–313. http://dx.doi.org/10.1108/jices-01-2014-0004.

Full text
Abstract:
Purpose – The purpose of this paper is to develop a conceptual framework to contextualize young people’s lived experiences of privacy and invasion online. Social negotiations in the construction of privacy boundaries are theorized to be dependent on individual preferences, abilities and context-dependent social meanings. Design/methodology/approach – Empirical findings of three related Ottawa-based studies dealing with young people’s online privacy are used to examine the benefits of online publicity, what online privacy means to young people and the social importance of privacy. Earlier philosophical discussions of privacy and identity, as well as current scholarship, are drawn on to suggest that privacy is an inherently social practice that enables social actors to navigate the boundary between self/other and between being closed/open to social interaction. Findings – Four understandings of privacy’s value are developed in concordance with recent privacy literature and our own empirical data: privacy as contextual, relational, performative and dialectical. Social implications – A more holistic approach is necessary to understand young people’s privacy negotiations. Adopting such an approach can help re-establish an ability to address the ways in which privacy boundaries are negotiated and to challenge surveillance schemes and their social consequences. Originality/value – Findings imply that privacy policy should focus on creating conditions that support negotiations that are transparent and equitable. Additionally, policy-makers must begin to critically evaluate the ways in which surveillance interferes with the developmental need of young people to build relationships of trust with each other and also with adults.
APA, Harvard, Vancouver, ISO, and other styles
6

Yakovleva, Svetlana, and Kristina Irion. "Toward Compatibility of the EU Trade Policy with the General Data Protection Regulation." AJIL Unbound 114 (2020): 10–14. http://dx.doi.org/10.1017/aju.2019.81.

Full text
Abstract:
The European Union's (EU) negotiating position on cross-border data flows, which the EU has recently included in its proposal for the World Trade Organization (WTO) talks on e-commerce, not only enshrines the protection of privacy and personal data as fundamental rights, but also creates a broad exception for a Member's restrictions on cross-border transfers of personal data. This essay argues that maintaining such a strong position in trade negotiations is essential for the EU to preserve the internal compatibility of its legal system when it comes to the right to protection of personal data under the EU Charter of Fundamental Rights (EU Charter) and the recently adopted General Data Protection Regulation (GDPR).
APA, Harvard, Vancouver, ISO, and other styles
7

Radchenko, Sergey, and Lisbeth Tarlow. "Gorbachev, Ozawa, and the Failed Back-Channel Negotiations of 1989–1990." Journal of Cold War Studies 15, no. 2 (April 2013): 104–30. http://dx.doi.org/10.1162/jcws_a_00339.

Full text
Abstract:
This article analyzes the evolution, content, and fate of the back-channel negotiations between senior Soviet and Japanese officials in 1989–1990, a time of radical changes in most aspects of Soviet foreign policy. Sources that have recently become available—especially the private papers of Aleksandr Yakovlev and Anatolii Chernyaev and several recently published collections of documents—not only confirm what has long been suspected about this critical channel of negotiation but shed valuable light on motives and complications in Moscow that precipitated the channel's ultimate failure. Because Japanese documents on the matter have not yet been declassified, the article cannot offer a full account of these talks, but the Soviet documents are sufficient to indicate why a bilateral rapprochement has been so elusive.
APA, Harvard, Vancouver, ISO, and other styles
8

Bazzoli, Gloria J., Larry M. Manheim, and Teresa M. Waters. "U.S. Hospital Industry Restructuring and the Hospital Safety Net." INQUIRY: The Journal of Health Care Organization, Provision, and Financing 40, no. 1 (February 2003): 6–24. http://dx.doi.org/10.5034/inquiryjrnl_40.1.6.

Full text
Abstract:
The U.S. hospital industry was reshaped during the 1990s, with many hospitals becoming members of health systems and networks. Our research examines whether safety net hospitals (SNHs) were generally included or excluded from these arrangements, and the factors associated with their involvement. Our analysis draws on the earlier work of Alexander and Morrisey (1988), and not only studies factors affecting SNH participation in multihospital arrangements but also updates their earlier study. We constructed measures for hospital market conditions, management, and mission, and examined network and system affiliation patterns between 1994 and 1998. Our findings suggest that larger and more technically advanced hospitals joined systems in the 1990s, which contrasts with 1980s findings that smaller, financially weak institutions joined systems. Further, SNH participation in networks and systems was more common when hospitals faced less market pressure and where only a limited number of unaffiliated hospitals remained. If networks and systems are key parties in negotiating with private payers, SNHs may be going it alone in these negotiations in highly competitive markets.
APA, Harvard, Vancouver, ISO, and other styles
9

DuBord, Elise. "Language policy and the drawing of social boundaries." Ideologías lingüísticas y el español en contexto histórico 7, no. 1 (March 30, 2010): 25–45. http://dx.doi.org/10.1075/sic.7.1.02dub.

Full text
Abstract:
Educational institutions developed in Tucson, Arizona in the last quarter of the nineteenth century, during a critical time in cultural and political shifts of power between Anglo and Mexican elites in Southwestern United States. My qualitative analysis reconstructs language policies in the incipient educational system in Territorial Tucson. This article examines official and unofficial language policies in both public and private schools in Tucson that reflected this accommodation of power and the negotiation of a new racial hierarchy in the context of westward expansion. I argue that the private schools Mexican elites founded in this period maintained bilingual instruction and promoted biliteracy as a means of racially and linguistically distancing themselves from Anglos, Indians and Mexicans from lower socioeconomic classes in public schools.
APA, Harvard, Vancouver, ISO, and other styles
10

Barnett, Ronald, and Gareth Parry. "Policy analysis research in higher education: negotiating dilemmas." Magis. Revista Internacional de Investigación en Educación 7, no. 14 (December 30, 2014): 69. http://dx.doi.org/10.11144/javeriana.m7-14.parh.

Full text
Abstract:
Increasingly, qualitative research is funded by agencies – whether government or national agencies or in the private sector – that have a direct interest in the research that they are funding. Especially in qualitative research in such situations, methodological issues arise but so too do dilemmas, both in the actual conduct of the study and in the writing and the positioning of ensuing texts (for example, in relation to value neutrality and value commitment, in doing justice to the multiple and conflicting interests of various constituencies and in steering among competing ideologies). Here, in this paper, such dilemmas are brought out in an account of a study conducted in the UK in the 1990s, to review and to evaluate the UK’s then quality assurance system.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Privacy policy negotiation"

1

Walker, Daniel David. "Or Best Offer: A Privacy Policy Negotiation Protocol." BYU ScholarsArchive, 2007. https://scholarsarchive.byu.edu/etd/1016.

Full text
Abstract:
Users today are concerned about how their information is collected, stored and used by Internet sites. Privacy policy languages, such as the Platform for Privacy Preferences (P3P), allow websites to publish their privacy practices and policies in machine readable form. Currently, software agents designed to protect users' privacy follow a "take it or leave it" approach when evaluating these privacy policies. This approach is inflexible and gives the server ultimate control over the privacy of web transactions. Privacy policy negotiation is one approach to leveling the playing field by allowing a client to negotiate with a server to determine how that server collects and uses the client's data. We present a privacy policy negotiation protocol, "Or Best Offer", that includes a formal model for specifying privacy preferences and reasoning about privacy policies. The protocol is guaranteed to terminate within three rounds of negotiation while producing policies that are Pareto-optimal, and thus fair to both parties. That is, it remains fair to both the client and the server.
APA, Harvard, Vancouver, ISO, and other styles
2

Bobade, Kailas B. "Personalized Credential Negotiation Based on Policy Individualization in Federation." Kent State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=kent1259734008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Freer, Christopher Michael. "Parental Influence on Curricular Decisions in Private Schools: Negotiating Parental Expectations." Digital Archive @ GSU, 2009. http://digitalarchive.gsu.edu/eps_diss/32.

Full text
Abstract:
Parental input and participation on curricular decisions influence the educational process in private schools. Parental participation in the development and continual examination of the curriculum is essential to maintaining an educational environment that reflects the ideals and goals of all of the stakeholders. However, parents often have differing ideas from schools on what the curriculum should encompass. The problem facing private school leaders is how to negotiate the tensions resulting from conflicting parental expectations for the curriculum of the school. Literature is reviewed surrounding the main research question for this study: how do school leaders respond to the differences in expectations for curriculum between parents and private secondary schools? Areas of the literature reviewed include the purpose of education, the curriculum development process in schools and the role of educational leadership in the curriculum development process. The overall research design of this study is framed by a qualitative methodology that includes a multiple-site case study that aims to create a better understanding of the dynamics of parental influences on curriculum in private schools. Data from the Upper Schools of three private schools in a metropolitan area were collected over the period of one academic semester from a variety of sources, including interviews, observations and document analysis. The emerging themes were constructed around the current and past knowledge of informants within the context of the social interactions of the stakeholders in the three schools. Several significant findings resulted from this study, which provides a framework to understand how school leaders negotiate parental curriculum expectations. These findings include parental influence and expectations, the distinction between leadership with the curriculum versus the co-curriculum, and the factors influencing the negotiation of curriculum conflict. This inquiry is important because it creates a dialogue among the stakeholders who influence curriculum in private schools. The results of this study help school leaders understand the influences of parents on the curriculum of their schools and offer practical suggestions for private school leaders on how to negotiate the differences in expectations for curriculum between parents and private secondary schools.
APA, Harvard, Vancouver, ISO, and other styles
4

Lawani, Oluwa Sosso. "Priv-C : une politique de confidentialité personnalisable." Thèse, 2016. http://hdl.handle.net/1866/13776.

Full text
Abstract:
Les politiques de confidentialité définissent comment les services en ligne collectent, utilisent et partagent les données des utilisateurs. Bien qu’étant le principal moyen pour informer les usagers de l’utilisation de leurs données privées, les politiques de confidentialité sont en général ignorées par ces derniers. Pour cause, les utilisateurs les trouvent trop longues et trop vagues, elles utilisent un vocabulaire souvent difficile et n’ont pas de format standard. Les politiques de confidentialité confrontent également les utilisateurs à un dilemme : celui d’accepter obligatoirement tout le contenu en vue d’utiliser le service ou refuser le contenu sous peine de ne pas y avoir accès. Aucune autre option n’est accordée à l’utilisateur. Les données collectées des utilisateurs permettent aux services en ligne de leur fournir un service, mais aussi de les exploiter à des fins économiques (publicités ciblées, revente, etc). Selon diverses études, permettre aux utilisateurs de bénéficier de cette économie de la vie privée pourrait restaurer leur confiance et faciliter une continuité des échanges sur Internet. Dans ce mémoire, nous proposons un modèle de politique de confidentialité, inspiré du P3P (une recommandation du W3C, World Wide Web Consortium), en élargissant ses fonctionnalités et en réduisant sa complexité. Ce modèle suit un format bien défini permettant aux utilisateurs et aux services en ligne de définir leurs préférences et besoins. Les utilisateurs ont la possibilité de décider de l’usage spécifique et des conditions de partage de chacune de leurs données privées. Une phase de négociation permettra une analyse des besoins du service en ligne et des préférences de l’utilisateur afin d’établir un contrat de confidentialité. La valeur des données personnelles est un aspect important de notre étude. Alors que les compagnies disposent de moyens leur permettant d’évaluer cette valeur, nous appliquons dans ce mémoire, une méthode hiérarchique multicritères. Cette méthode va permettre également à chaque utilisateur de donner une valeur à ses données personnelles en fonction de l’importance qu’il y accorde. Dans ce modèle, nous intégrons également une autorité de régulation en charge de mener les négociations entre utilisateurs et services en ligne, et de générer des recommandations aux usagers en fonction de leur profil et des tendances.
Privacy policies define the way online services collect, use and share users’ data. Although they are the main channel through which users are informed about the use of their private data, privacy policies are generally ignored by them. This is due to their long and vague content, their difficult vocabulary and their no standard format. Privacy policies also confront users to a dilemma. Indeed, they must agree to all their content in order to use the service or reject it, and in this case they do not have access to the service. No other alternative is given to the user. Online services process data collected from users to provide them a service, but they also exploit those data for economic purposes (targeted advertising, resale, etc.). According to various studies, allowing users to benefit from the use of their data could restore their trust towards online services and facilitate data exchanges on the Internet. In this work, we propose a new model of privacy policy, inspired by the P3P (a World Wide Web Consortium - W3C Recommendation) but increasing its functionalities and reducing its complexity. This model defines a specific structure allowing users and online services to define their preferences and needs. Users have the opportunity to decide for each of their private data, specifying how it will be used and shared. A negotiation phase will allow a needs analysis of the online service and preferences of the user to establish a confidentiality agreement. The value of personal data is also an important aspect of our study. While companies have resources allowing them to rate this value, we apply in this thesis, a hierarchical multi-criteria method. This method will allow each user to give value to his personal data according to the importance he attaches to it. In this model, we also integrate a regulation authority. It is in charge of conducting negotiations between users and online services, and generate recommendations to users based on their profile and current trends.
APA, Harvard, Vancouver, ISO, and other styles
5

Bensabat, Remonda R. "The Mexican private sector's role in the North American Free Trade Negotiations implications for business-state relations /." 1995. http://catalog.hathitrust.org/api/volumes/oclc/38273300.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Privacy policy negotiation"

1

Krichewsky, Damien. Negotiating the terms of a new social contract: Private companies, civil society, and the state in India. New Delhi: Centre de Sciences Humanies, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Krichewsky, Damien. Negotiating the terms of a new social contract: Private companies, civil society, and the state in India. New Delhi: Centre de Sciences Humanies, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cowhey, Peter F., and Jonathan D. Aronson. Digital DNA. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190657932.001.0001.

Full text
Abstract:
Digital DNA identifies how the disruption of digital information and production technologies transforms how companies and national economies are innovating. Wisely guiding this transformation is an enormous challenge because innovation promotes global economic prosperity. Economic tensions and market surprises are inevitable. Part I reviews the challenges we face and argues that national and international policies require experimentation and flexibility to address them. The case studies in Part III probe issues tied to the rise of cloud computing and transborder data flows, international collaboration to reduce cybersecurity risks, and the consequences of different national standards of digital privacy protection. Significant diversity in individual national policies is inevitable, but an international baseline of policy fundamentals to facilitate “quasi-convergence” of national policies is needed. Moreover, expert multistakeholder organizations that facilitate the implementation of formal government policies hold promise but should operate across national boundaries because the implications of digital technologies are global. Parts II and IV propose a strategy for using international regulatory and trade agreements to revamp the international governance regime for digital technologies. Better measures to safeguard digital privacy and cybersecurity can improve both market access and the welfare of users. A “Digital Economy Agreement” that embraces “soft rules” requiring governments to achieve certain objectives without specifying how, can achieve sufficient quasi-convergence of national policies for innovation to flourish. The political legitimacy and flexibility of international governance regimes likely will be better if multistakeholder organizations are involved in their negotiation.
APA, Harvard, Vancouver, ISO, and other styles
4

Gray, Joanne Elizabeth. Google Rules. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190072070.001.0001.

Full text
Abstract:
Google Rules traces the rise of Google through its legal, commercial, and political negotiations over copyright. The first part of the book shows how the public interest suffers in a digital copyright policy debate dominated by powerful industry stakeholders. The second part explores Google’s contributions to digital copyright and the copyright policies that Google enforces across its own platforms. Increasingly, Google self-regulates and negotiates with media and entertainment companies to privately devise copyright rules. Google then deploys algorithmic regulatory technologies to enforce those rules. Google’s private copyright rule-making and algorithmic enforcement limits transparency and accountability in digital copyright governance and privileges private interest and values over the public interest. Today, Google reigns over a technological and economic order that features empowered private actors and rapidly changing technological conditions. How to effectively regulate Google—in an evolving technological environment and in order to achieve public interest outcomes—is one of the most pressing policy questions of our time. Google Rules provides several strategies for taking up this challenge. While the parameters may be narrowly set upon one firm and one area of intellectual property law, ultimately, the book is a contribution to a much broader conversation about a new generation of monopolistic companies, born from the technological developments of the digital age, and the social, political, and economic influence they have acquired in contemporary society.
APA, Harvard, Vancouver, ISO, and other styles
5

Bhattacharya, Sanjoy. Global and Local Histories of Medicine: Interpretative Challenges and Future Possibilities. Edited by Mark Jackson. Oxford University Press, 2012. http://dx.doi.org/10.1093/oxfordhb/9780199546497.013.0008.

Full text
Abstract:
This article attempts to develop a more inclusive set of conceptual frameworks for global histories of health and medicine. It is based on the assessment of a very well known global story: the programme to eradicate smallpox. It is a case study worthy of analysis because its histories have been particularly prone to narrow notions of globality. An effort is made in this article to study a variety of voices and to examine how a diversity of people carried out intricate negotiations with different political and social constituencies and helped to expunge variola. The approach here, which is also recommended as a mode of research, is to go behind the scenes to study views expressed in private, and then assess how the resulting convictions, discussions, and debates impacted on the unfolding of policy.
APA, Harvard, Vancouver, ISO, and other styles
6

Henke, Marina E. Constructing Allied Cooperation. Cornell University Press, 2019. http://dx.doi.org/10.7591/cornell/9781501739699.001.0001.

Full text
Abstract:
How do states overcome problems of collective action in the face of human atrocities, terrorism and the threat of weapons of mass destruction? How does international burden-sharing in this context look like? This book addresses these questions. It demonstrates that coalitions do not emerge naturally; rather, pivotal states deliberately build them. They develop operational plans and bargain suitable third parties into the coalition. Pulling apart the strategy behind multilateral military coalition-building, the book looks at the ramifications and side effects as well. Via these ties, pivotal states have access to private information on the deployment preferences of potential coalition participants. Moreover, they facilitate issue-linkages and side-payments and allow states to overcome problems of credible commitments. Finally, pivotal states can use common institutional contacts as cooperation brokers, and they can convert common institutional venues into fora for negotiating coalitions. The theory and evidence presented force us to revisit the conventional wisdom on how cooperation in multilateral military operations comes about. The book generates new insights with respect to who is most likely to join a given multilateral intervention, what factors influence the strength and capacity of individual coalitions, and what diplomacy and diplomatic ties are good for. Moreover, as the Trump administration promotes an “America First” policy and withdraws from international agreements and the United Kingdom completes Brexit, this book is an important reminder that international security cannot be delinked from more mundane forms of cooperation; multilateral military coalitions thrive or fail depending on the breadth and depth of existing social and diplomatic networks.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Privacy policy negotiation"

1

Kolar, Martin, Carmen Fernandez-Gago, and Javier Lopez. "Policy Languages and Their Suitability for Trust Negotiation." In Data and Applications Security and Privacy XXXII, 69–84. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-95729-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kursawe, Klaus, Gregory Neven, and Pim Tuyls. "Private Policy Negotiation." In Financial Cryptography and Data Security, 81–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11889663_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bonatti, Piero A., Juri L. De Coi, Daniel Olmedilla, and Luigi Sauro. "Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security." In Logic Programming, 779–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89982-2_76.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yee, George, and Larry Korba. "Privacy Policies and Their Negotiation in Distance Education." In Instructional Technologies, 237–64. IGI Global, 2004. http://dx.doi.org/10.4018/978-1-59140-565-8.ch009.

Full text
Abstract:
This chapter begins by introducing the reader to privacy policies, e-services, and privacy management. It then derives the contents of a privacy policy and explains “policy matching”. It next presents an approach for the negotiation of privacy policies for an e-learning service. Both negotiating under certainty and uncertainty are treated. The type of uncertainty discussed is uncertainty of what offers and counter-offers to make during the negotiation. The approach makes use of common interest and reputation to arrive at a list of candidates who have negotiated the same issues in the past, from whom the negotiator can learn the possible offers and counter-offers that could be made. Negotiation in this work is done through human-mediated computer-assisted interaction rather than through autonomous agents. The chapter concludes with a discussion of issues and future research in this area.
APA, Harvard, Vancouver, ISO, and other styles
5

Bertino, Elisa, Anna C. Squicciarini, Lorenzo Martino, and Federica Paci. "An Adaptive Access Control Model for Web Services." In Information Security and Ethics, 671–703. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch051.

Full text
Abstract:
This paper presents an innovative access control model, referred to as Web service Access Control Version 1 (Ws-AC1), specifically tailored to Web services. The most distinguishing features of this model are the flexible granularity in protection objects and negotiation capabilities. Under Ws-AC1, an authorization can be associated with a single service and can specify for which parameter values the service can be authorized for use, thus providing a fine access control granularity. Ws-AC1 also supports coarse granularities in protection objects in that it provides the notion of service class under which several services can be grouped. Authorizations can then be associated with a service class and automatically propagated to each element in the class. The negotiation capabilities of Ws-AC1 are related to the negotiation of identity attributes and the service parameters. Identity attributes refer to information that a party requesting a service may need to submit in order to obtain the service. The access control policy model of Ws-AC1 supports the specification of policies in which conditions are stated, specifying the identity attributes to be provided and constraints on their values. In addition, conditions may also be specified against context parameters, such as time. To enhance privacy and security, the actual submission of these identity attributes is executed through a negotiation process. Parameters may also be negotiated when a subject requires use of a service with certain parameters values that, however, are not authorized under the policies in place. In this paper, we provide the formal definitions underlying our model and the relevant algorithms, such as the access control algorithm. We also present an encoding of our model in the Web Services Description Language (WSDL) standard for which we develop an extension, required to support Ws-AC1.
APA, Harvard, Vancouver, ISO, and other styles
6

Fish, Jennifer N. "“First to Work; Last to Sleep”." In Domestic Workers of the World Unite! NYU Press, 2017. http://dx.doi.org/10.18574/nyu/9781479848676.003.0004.

Full text
Abstract:
Chapter 4 outlines the historical trajectory of domestic workers’ social position, “from slaves to workers.” It spells out the terms of the domestic worker protections debated within the ILO, with special attention given to the issues and concerns that generated the widest debate. The discussion examines the tripartite negotiations among government, employer, and worker organizations over the course of two International Labour Conferences, with an eye on the larger meanings of the terms debated on the social policy floor. Migration emerges as a central point of debate in the negotiating process, as policymakers confronted the challenges of protecting migrant workers in the private household.
APA, Harvard, Vancouver, ISO, and other styles
7

Heath, Robert L., and Damion Waymer. "Social Movement Activism Analysis of Strategic: Communication in Context." In Strategic Communication in Context: Theoretical Debates and Applied Research, 87–109. UMinho Editora/CECS, 2021. http://dx.doi.org/10.21814/uminho.ed.46.5.

Full text
Abstract:
Social movement activism presumes strategic communication processes by which groups achieve extra-governmental changes to public and private policy through public pressure. Such pressure presumes conditions of five kinds: strain, mobilization, confrontation, negotiation, and resolution. To explain this process, several cases will be offered but especially the U.S. civil rights movement and the activist career of John Lewis. Social movement activism is a test of wills, a test of character, strength, fact, value, identity, identification, and place
APA, Harvard, Vancouver, ISO, and other styles
8

Polido, Fabrício B. Pasquot. "The Judgments Project of the Hague Conference on Private International Law: A Way Forward for a Long-awaited Solution." In Diversity and Integration in Private International Law, 176–96. Edinburgh University Press, 2019. http://dx.doi.org/10.3366/edinburgh/9781474447850.003.0012.

Full text
Abstract:
This chapter discusses distinct foundational benchmarks and inspirational ideas underlying the diplomatic negotiations leading to the adoption of the Convention on Recognition and Enforcement of Foreign Judgments on Civil or Commercial Matters by the Hague Conference of Private International Law in June 2019 and conclusion of a historical phase of the ‘Judgments Project’. It argues that the establishment of a ‘global facilitated regime’ for circulation of foreign judgements at multilateral level still remains as one of the utmost policy choices for further development of private international law related institutions and their interplay with cross-border civil and commercial litigation. The successful outcomes of the Judgment Project might be tested under multiple criteria, such as minimum standards of uniformity - with diversity being preserved at domestic normative levels-, predictability and a balanced framework for end-users in transnational litigation.
APA, Harvard, Vancouver, ISO, and other styles
9

Bogue, Kelly. "Housing precarity and advanced marginality in the UK." In The Divisive State of Social Policy, 145–62. Policy Press, 2019. http://dx.doi.org/10.1332/policypress/9781447350538.003.0007.

Full text
Abstract:
This chapter presents concluding remarks about the impacts of the Bedroom Tax. It reflects on the processes through which housing insecurity is generated and how this is playing a central role in increasing urban marginality. It does so by drawing on studies about rising housing precarity and homelessness to consider how both the social and private housing sectors have been responding to reductions in housing benefit. This chapter argues that we need to re-consider how and in what ways the struggles over housing are being played out at the local level and how this can generate divisions in and between different groups. Particularly when people are re-negotiating a welfare state that is undergoing deep systematic reorganisation. It considers the relationship between austerity policies and their role in creating political dissatisfaction with the state of UK politics. Especially in areas where the full impact of austerity measures have been felt.
APA, Harvard, Vancouver, ISO, and other styles
10

Francis, Martin. "Wounded Pride and Petty Jealousies: Private Lives and Public Diplomacy in Second World War Cairo." In Total War, 98–115. British Academy, 2020. http://dx.doi.org/10.5871/bacad/9780197266663.003.0006.

Full text
Abstract:
This chapter offers a case study of the affective registers of British imperial policy during the Second World War. It examines how the conduct of war and diplomacy by Sir Miles Lampson, British Ambassador in Cairo, was shaped by his emotional dispositions, in particular his domestic obligations and attachments, his insecure pride, and his susceptibility to jealousy and resentment. It locates Lampson’s personal negotiation between private feeling and public action in the broader context of the heightened emotional registers of wartime Egypt, where it became virtually impossible to quarantine intimate desires, especially romantic and sexual longings, within the private sphere. More critically, it also demonstrates how broader anxieties about Britain’s waning global hegemony during the Second World War were manifested in the various forms of psychological projection, displacement, and compulsion exhibited by Lampson, and also in the Ambassador’s recourse in his statecraft to gossip and rumour.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Privacy policy negotiation"

1

Walker, Daniel D., Eric G. Mercer, and Kent E. Seamons. "Or Best Offer: A Privacy Policy Negotiation Protocol." In 2008 IEEE Workshop on Policies for Distributed Systems and Networks - POLICY. IEEE, 2008. http://dx.doi.org/10.1109/policy.2008.39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jang, In Joo, Wenbo Shi, and Hyeon Seon Yoo. "Policy Negotiation System Architecture for Privacy Protection." In 2008 Fourth International Conference on Networked Computing and Advanced Information Management (NCM). IEEE, 2008. http://dx.doi.org/10.1109/ncm.2008.244.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Yanhuang, Nora Cuppens-Boulahia, Jean-Michel Crom, Frederic Cuppens, and Vincent Frey. "Reaching Agreement in Security Policy Negotiation." In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2014. http://dx.doi.org/10.1109/trustcom.2014.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cheng, Vivying, Patrick Hung, and Dickson Chiu. "Enabling Web Services Policy Negotiation with Privacy preserved using XACML." In 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07). IEEE, 2007. http://dx.doi.org/10.1109/hicss.2007.207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Yunxi, and Darren Mundy. "Remembrance of Local Information Status for Enforcing Robustness of Policy-Exchanged Strategies for Trust Negotiation." In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2014. http://dx.doi.org/10.1109/trustcom.2014.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Privacy policy negotiation"

1

Kelly, Luke. Characteristics of Global Health Diplomacy. Institute of Development Studies (IDS), June 2021. http://dx.doi.org/10.19088/k4d.2021.09.

Full text
Abstract:
This rapid review focuses on Global Health Diplomacy and defines it as a method of interaction between the different stakeholders of the public health sector in a bid to promote representation, cooperation, promotion of the right to health and improvement of health systems for vulnerable populations on a global scale. It is the link between health and international relations. GHD has various actors including states, intergovernmental organizations, private companies, public-private partnerships and non-governmental organizations. Foreign policies can be integrated into national health in various ways i.e., designing institutions to govern practices regarding health diplomacy (i.e., health and foreign affairs ministries), creating and promoting norms and ideas that support foreign policy integration and promoting policies that deal with specific issues affecting the different actors in the GHD arena to encourage states to integrate them into their national health strategies. GHD is classified into core diplomacy – where there are bilateral and multilateral negotiations which may lead to binding agreements, multistakeholder diplomacy – where there are multilateral and bilateral negotiations which do not lead to binding agreements and informal diplomacy – which are interactions between other actors in the public health sector i.e., NGOs and Intergovernmental Organizations. The US National Security Strategy of 2010 highlighted the matters to be considered while drafting a health strategy as: the prevalence of the disease, the potential of the state to treat the disease and the value of affected areas. The UK Government Strategy found the drivers of health strategies to be self-interest (protecting security and economic interests of the state), enhancing the UK’s reputation, and focusing on global health to help others. The report views health diplomacy as a field which requires expertise from different disciplines, especially in the field of foreign policy and public health. The lack of diplomatic expertise and health expertise have been cited as barriers to integrating health into foreign policies. States and other actors should collaborate to promote the right to health globally.
APA, Harvard, Vancouver, ISO, and other styles
2

Jones, Emily, Beatriz Kira, Anna Sands, and Danilo B. Garrido Alves. The UK and Digital Trade: Which way forward? Blavatnik School of Government, February 2021. http://dx.doi.org/10.35489/bsg-wp-2021/038.

Full text
Abstract:
The internet and digital technologies are upending global trade. Industries and supply chains are being transformed, and the movement of data across borders is now central to the operation of the global economy. Provisions in trade agreements address many aspects of the digital economy – from cross-border data flows, to the protection of citizens’ personal data, and the regulation of the internet and new technologies like artificial intelligence and algorithmic decision-making. The UK government has identified digital trade as a priority in its Global Britain strategy and one of the main sources of economic growth to recover from the pandemic. It wants the UK to play a leading role in setting the international standards and regulations that govern the global digital economy. The regulation of digital trade is a fast-evolving and contentious issue, and the US, European Union (EU), and China have adopted different approaches. Now that the UK has left the EU, it will need to navigate across multiple and often conflicting digital realms. The UK needs to decide which policy objectives it will prioritise, how to regulate the digital economy domestically, and how best to achieve its priorities when negotiating international trade agreements. There is an urgent need to develop a robust, evidence-based approach to the UK’s digital trade strategy that takes into account the perspectives of businesses, workers, and citizens, as well as the approaches of other countries in the global economy. This working paper aims to inform UK policy debates by assessing the state of play in digital trade globally. The authors present a detailed analysis of five policy areas that are central to discussions on digital trade for the UK: cross-border data flows and privacy; internet access and content regulation; intellectual property and innovation; e-commerce (including trade facilitation and consumer protection); and taxation (customs duties on e-commerce and digital services taxes). In each of these areas the authors compare and contrast the approaches taken by the US, EU and China, discuss the public policy implications, and examine the choices facing the UK.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography