To see the other types of publications on this topic, follow the link: Privacy practices.

Journal articles on the topic 'Privacy practices'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Privacy practices.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Smith, H. Jeff. "Privacy policies and practices." Communications of the ACM 36, no. 12 (December 1993): 104–22. http://dx.doi.org/10.1145/163298.163349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Paasche-Orlow, Michael K., Dan M. Jacob, and Joshua N. Powell. "Notices of Privacy Practices." Medical Care 43, no. 6 (June 2005): 558–64. http://dx.doi.org/10.1097/01.mlr.0000163646.90393.e4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schlueter, John P. "Private Practices." Nineteenth-Century Literature 66, no. 3 (December 1, 2011): 283–306. http://dx.doi.org/10.1525/ncl.2011.66.3.283.

Full text
Abstract:
Abstract This essay uses selected works of Washington Irving and Ralph Waldo Emerson to delineate two different privacies. The first privacy is associated with secreted spaces, whether physical or personal, and is one that has been normalized. The other privacy is under-appreciated and far less understood: it is an unpredictable, speculative flight of what Irving calls “fancy.” The essay argues that each privacy comes with a distinct set of consequences. If we choose to associate privacy with secreted spaces, we ourselves become like texts, able to be read, and we then associate with others as
APA, Harvard, Vancouver, ISO, and other styles
4

Hsu, Chiung‐wen (Julia). "Privacy concerns, privacy practices and web site categories." Online Information Review 30, no. 5 (September 2006): 569–86. http://dx.doi.org/10.1108/14684520610706433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Toy, Alan, David Lau, David Hay, and Gehan Gunasekara. "The views of privacy auditors regarding standards and methodologies." Meditari Accountancy Research 27, no. 3 (June 3, 2019): 366–98. http://dx.doi.org/10.1108/medar-07-2018-0367.

Full text
Abstract:
Purpose This paper aims to uncover the practices of different privacy auditors to reveal the extent of any similarities in such practices. The purpose is to investigate the drivers of practices used by privacy auditors and to identify potential for improvements in the practice of privacy auditing so that privacy audits may better serve stakeholders. Design/methodology/approach Six semi-structured interviews with seven privacy auditors and regulators and an analyst across Australia, Canada, New Zealand and the USA are used as the basis for our analysis. Findings The study shows that some privac
APA, Harvard, Vancouver, ISO, and other styles
6

Mensch, Scott E., and LeAnn Wilkie. "Smart Phone Security Practices." International Journal of Cyber Behavior, Psychology and Learning 9, no. 3 (July 2019): 1–14. http://dx.doi.org/10.4018/ijcbpl.2019070101.

Full text
Abstract:
Hand-held cell phone technology has been around for quite some time, however when Apple introduced the iPhone in 2007, the widespread adoption of smartphones took off. Smartphones allow users to communicate via talk, text and video; access personal and work e-mail and the Internet; run applications; make purchases; manage bank accounts; take pictures - and for many of us are an integral part of our everyday (The Privacy Rights Clearinghouse, 2018). Smartphones are “essentially tiny computers, we reach for these devices when we first wake up, bring them with us into the car, and often keep them
APA, Harvard, Vancouver, ISO, and other styles
7

Han, Ye, and T. Selwyn Ellis. "A Study of User Continuance Behavioral Intentions Toward Privacy-Protection Practices." Information Resources Management Journal 31, no. 2 (April 2018): 24–46. http://dx.doi.org/10.4018/irmj.2018040102.

Full text
Abstract:
Prior research on privacy protective behaviors has found that online users irrationally trade protection for convenience, and so act against their own privacy preferences. The present article uses expectancy-confirmation theory (ECT) models to explain the continuance behavioral intentions of online users toward privacy-protection practices. It redefines convenience to highlight human behaviors involved in various stages of implementing privacy practices processes. The results show that earlier privacy practice experiences impact the present as well as the future protective behaviors of users,
APA, Harvard, Vancouver, ISO, and other styles
8

Hope, Joan. "Follow best practices for transparency about student privacy practices." Disability Compliance for Higher Education 20, no. 9 (March 17, 2015): 9. http://dx.doi.org/10.1002/dhe.30049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cohen, Julie E. "Turning Privacy Inside Out." Theoretical Inquiries in Law 20, no. 1 (March 16, 2019): 1–31. http://dx.doi.org/10.1515/til-2019-0002.

Full text
Abstract:
Abstract The problem of theorizing privacy moves on two levels, the first consisting of an inadequate conceptual vocabulary and the second consisting of an inadequate institutional grammar. Privacy rights are supposed to protect individual subjects, and so conventional ways of understanding privacy are subject-centered, but subject-centered approaches to theorizing privacy also wrestle with deeply embedded contradictions. And privacy’s most enduring institutional failure modes flow from its insistence on placing the individual and individualized control at the center. Strategies for rescuing p
APA, Harvard, Vancouver, ISO, and other styles
10

Culnan, Mary J., and Thomas J. Carlin. "Online privacy practices in higher education." Communications of the ACM 52, no. 3 (March 2009): 126–30. http://dx.doi.org/10.1145/1467247.1467277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Lauer, Thomas W., and Xiaodong Deng. "Building online trust through privacy practices." International Journal of Information Security 6, no. 5 (July 3, 2007): 323–31. http://dx.doi.org/10.1007/s10207-007-0028-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

NORD, CATHARINA. "Architectural space as a moulding factor of care practices and resident privacy in assisted living." Ageing and Society 31, no. 6 (March 14, 2011): 934–52. http://dx.doi.org/10.1017/s0144686x10001248.

Full text
Abstract:
ABSTRACTThis article presents an analysis of privacy, care practices and architectural space in assisted living in Sweden. The presented research is a qualitative case study. Observations and personal interviews with staff as well as residents were the major data collection methods. The analysis revealed the evasiveness of a private–public dichotomy; that is, how privacy appears in public spaces and how private spaces became public under certain conditions. During the course of a day, the residents' privacy was qualified and structured by caring activities that took place in various spaces and
APA, Harvard, Vancouver, ISO, and other styles
13

Charlesworth, Andrew J. "Privacy, Personal Information and Employment." Surveillance & Society 1, no. 2 (September 1, 2002): 217–22. http://dx.doi.org/10.24908/ss.v1i2.3355.

Full text
Abstract:
It is a widely accepted proposition, reflected in privacy-enhancing legislation and regulations, that individuals will have less privacy in their workplace activities than in their private lives. However, modern technologies and business practices have blurred the boundary between private life and workplace, and a re-evaluation of the traditional legislative and regulatory protections for privacy in employment is required.
APA, Harvard, Vancouver, ISO, and other styles
14

Coppens, Paulien, Carina Veeckman, and Laurence Claeys. "Privacy in location-based social networks: privacy scripts & user practices." Journal of Location Based Services 9, no. 1 (January 2, 2015): 1–15. http://dx.doi.org/10.1080/17489725.2015.1017015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Burton, Julian. "Privacy on their terms." Canadian Journal of Children's Rights / Revue canadienne des droits des enfants 5, no. 1 (November 9, 2018): 150–72. http://dx.doi.org/10.22215/cjcr.v5i1.1256.

Full text
Abstract:
Respecting participants' privacy rights is a vital component of research ethics, but conventional practices in this area may falter when research focuses on groups whose experiences and concerns diverge from those deemed normative, or takes place in novel environments where information flows and functions in unexpected ways. This article examines the specific example of research with young people in digital social spaces, discussing how online youth communities construct and maintain privacy and arguing that choices regarding research practices should be made in response to contextualized unde
APA, Harvard, Vancouver, ISO, and other styles
16

Charbonneau, Deborah H. "Privacy Practices of Health Social Networking Sites." CIN: Computers, Informatics, Nursing 34, no. 8 (August 2016): 355–59. http://dx.doi.org/10.1097/cin.0000000000000249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Pfleeger, S. L., and C. P. Pfleeger. "Harmonizing privacy with security principles and practices." IBM Journal of Research and Development 53, no. 2 (March 2009): 6:1–6:12. http://dx.doi.org/10.1147/jrd.2009.5429048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Martin, David M., Richard M. Smith, Michael Brittain, Ivan Fetch, and Hailin Wu. "The privacy practices of Web browser extensions." Communications of the ACM 44, no. 2 (February 2001): 45–50. http://dx.doi.org/10.1145/359205.359226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Jin, Haojian, Hong Shen, Mayank Jain, Swarun Kumar, and Jason I. Hong. "Lean Privacy Review: Collecting Users’ Privacy Concerns of Data Practices at a Low Cost." ACM Transactions on Computer-Human Interaction 28, no. 5 (October 31, 2021): 1–55. http://dx.doi.org/10.1145/3463910.

Full text
Abstract:
Today, industry practitioners (e.g., data scientists, developers, product managers) rely on formal privacy reviews (a combination of user interviews, privacy risk assessments, etc.) in identifying potential customer acceptance issues with their organization’s data practices. However, this process is slow and expensive, and practitioners often have to make ad-hoc privacy-related decisions with little actual feedback from users. We introduce Lean Privacy Review (LPR), a fast, cheap, and easy-to-access method to help practitioners collect direct feedback from users through the proxy of crowd work
APA, Harvard, Vancouver, ISO, and other styles
20

Hartman-Caverly, Sarah, and Alexandria Chisholm. "Privacy literacy instruction practices in academic libraries: Past, present, and possibilities." IFLA Journal 46, no. 4 (August 28, 2020): 305–27. http://dx.doi.org/10.1177/0340035220956804.

Full text
Abstract:
This article explores the past, present, and possibilities of privacy and privacy literacy (PL) instruction in academic libraries. It surveys the scholarship on privacy and privacy literacy from the domains of philosophy, anthropology, history, law, education, and LIS. A privacy conceptual model is proposed demonstrating the zones of informational agency that privacy preserves, and a timeline of privacy and libraries documents key developments in privacy culture in the US. Findings from an original exploratory survey of privacy literacy instruction practices in academic libraries are discussed
APA, Harvard, Vancouver, ISO, and other styles
21

Chen, Wenhong, Gejun Huang, Joshua Miller, Kye-Hyoung Lee, Daniel Mauro, Bryan Stephens, and Xiaoqian Li. "“As We Grow, It Will Become a Priority”: American Mobile Start-Ups’ Privacy Practices." American Behavioral Scientist 62, no. 10 (July 12, 2018): 1338–55. http://dx.doi.org/10.1177/0002764218787867.

Full text
Abstract:
Privacy has become a crucial issue of the digital age, with significant social, political, and economic ramifications. A growing body of literature has dedicated to the patterns, causes, and consequences of individuals’ privacy concerns, skills, and practices. Advancing a producer’s perspective, this research draws on in-depth interviews with 45 tech entrepreneurs to examine privacy practices of mobile start-ups in the United States. Results reveal (a) factors that contribute to the problematic status of privacy issues and (b) whether and how entrepreneurs leverage privacy management as a comp
APA, Harvard, Vancouver, ISO, and other styles
22

Culnan, Mary J. "Protecting Privacy Online: Is Self-Regulation Working?" Journal of Public Policy & Marketing 19, no. 1 (April 2000): 20–26. http://dx.doi.org/10.1509/jppm.19.1.20.16944.

Full text
Abstract:
The author assesses the extent to which 361 consumer-oriented commercial Web sites post disclosures that describe their information practices and whether these disclosures reflect fair information practices. Although approximately 67% of the sites sampled post a privacy disclosure, only 14% of these disclosures constitute a comprehensive privacy policy. The study was initiated by the private sector as a progress report to the Federal Trade Commission (FTC) and is one in a series of efforts designed to assess whether consumer privacy can be protected through industry self-regulation or whether
APA, Harvard, Vancouver, ISO, and other styles
23

McQuay, Terry, and Ann Cavoukian. "A pragmatic approach to privacy risk optimization: privacy by design for business practices." Identity in the Information Society 3, no. 2 (July 11, 2010): 379–96. http://dx.doi.org/10.1007/s12394-010-0067-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Parsons, Christopher. "Beyond Privacy: Articulating the Broader Harms of Pervasive Mass Surveillance." Media and Communication 3, no. 3 (October 20, 2015): 1–11. http://dx.doi.org/10.17645/mac.v3i3.263.

Full text
Abstract:
This article begins by recounting a series of mass surveillance practices conducted by members of the “Five Eyes” spying alliance. While boundary- and intersubjectivity-based theories of privacy register some of the harms linked to such practices I demonstrate how neither are holistically capable of registering these harms. Given these theories’ deficiencies I argue that critiques of signals intelligence surveillance practices can be better grounded on why the practices intrude on basic communicative rights, including those related to privacy. The crux of the argument is that pervasive mass su
APA, Harvard, Vancouver, ISO, and other styles
25

Hosseini, Henry, Martin Degeling, Christine Utz, and Thomas Hupperich. "Unifying Privacy Policy Detection." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (July 23, 2021): 480–99. http://dx.doi.org/10.2478/popets-2021-0081.

Full text
Abstract:
Abstract Privacy policies have become a focal point of privacy research. With their goal to reflect the privacy practices of a website, service, or app, they are often the starting point for researchers who analyze the accuracy of claimed data practices, user understanding of practices, or control mechanisms for users. Due to vast differences in structure, presentation, and content, it is often challenging to extract privacy policies from online resources like websites for analysis. In the past, researchers have relied on scrapers tailored to the specific analysis or task, which complicates co
APA, Harvard, Vancouver, ISO, and other styles
26

Barbosa, Natã M., Joon S. Park, Yaxing Yao, and Yang Wang. "“What if?” Predicting Individual Users’ Smart Home Privacy Preferences and Their Changes." Proceedings on Privacy Enhancing Technologies 2019, no. 4 (October 1, 2019): 211–31. http://dx.doi.org/10.2478/popets-2019-0066.

Full text
Abstract:
Abstract Smart home devices challenge a long-held notion that the home is a private and protected place. With this in mind, many developers market their products with a focus on privacy in order to gain user trust, yet privacy tensions arise with the growing adoption of these devices and the risk of inappropriate data practices in the smart home (e.g., secondary use of collected data). Therefore, it is important for developers to consider individual user preferences and how they would change under varying circumstances, in order to identify actionable steps towards developing user trust and ex
APA, Harvard, Vancouver, ISO, and other styles
27

Odella, Francesca. "Privacy Awareness and the Networking Generation." International Journal of Technoethics 9, no. 1 (January 2018): 51–70. http://dx.doi.org/10.4018/ijt.2018010105.

Full text
Abstract:
The article discusses the social and privacy implications of children's access to the internet and to information technologies of communication (ITCS) services. The growing rate of children online represents an epochal change for issues related to their personal safety and protection, as well as for their privacy rights and chances of improved life. In order to better understand the long term privacy implications of these phenomena the discussion reviews sociological studies that have investigated the structure of friendships networks among adolescents, and describes theoretical frames adopted
APA, Harvard, Vancouver, ISO, and other styles
28

Sheehan, Kim Bartel, and Timothy W. Gleason. "Online Privacy: Internet Advertising Practitioners' Knowledge and Practices." Journal of Current Issues & Research in Advertising 23, no. 1 (March 2001): 31–41. http://dx.doi.org/10.1080/10641734.2001.10505112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Dowling, Thomas. "Protecting patron privacy: Safe practices for public computers." Technical Services Quarterly 33, no. 2 (March 21, 2016): 214–15. http://dx.doi.org/10.1080/07317131.2016.1135018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Dewi, Sinta. "Balancing privacy rights and legal enforcement: Indonesian practices." International Journal of Liability and Scientific Enquiry 5, no. 3/4 (2012): 232. http://dx.doi.org/10.1504/ijlse.2012.051961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Weber, R. H. "Privacy management practices in the proposed EU regulation." International Data Privacy Law 4, no. 4 (September 4, 2014): 290–97. http://dx.doi.org/10.1093/idpl/ipu018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Smith, H. Jeff, Sandra J. Milberg, and Sandra J. Burke. "Information Privacy: Measuring Individuals' Concerns about Organizational Practices." MIS Quarterly 20, no. 2 (June 1996): 167. http://dx.doi.org/10.2307/249477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Schellenberg, Kathryn. "Police Information Systems, Information Practices and Individual Privacy." Canadian Public Policy / Analyse de Politiques 23, no. 1 (March 1997): 23. http://dx.doi.org/10.2307/3552129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Millar, Sheila A. "Privacy and security: Best practices for global security." Journal of International Trade Law and Policy 5, no. 1 (May 31, 2006): 36–49. http://dx.doi.org/10.1108/14770020680000539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

ROTFELD, HERBERT JACK. "Privacy Crimes, Annoyances and Self-Defeating Business Practices." Journal of Consumer Affairs 43, no. 3 (September 2009): 538–42. http://dx.doi.org/10.1111/j.1745-6606.2009.01154.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Wang, Shu-Ching, and Jen-Her Wu. "Proactive privacy practices in transition: Toward ubiquitous services." Information & Management 51, no. 1 (January 2014): 93–103. http://dx.doi.org/10.1016/j.im.2013.09.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Karyda, Maria, Stefanos Gritzalis, Jong Hyuk Park, and Spyros Kokolakis. "Privacy and fair information practices in ubiquitous environments." Internet Research 19, no. 2 (April 3, 2009): 194–208. http://dx.doi.org/10.1108/10662240910952346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Schwaig, Kathy Stewart, Gerald C. Kane, and Veda C. Storey. "Privacy, fair information practices and the fortune 500." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 36, no. 1 (February 7, 2005): 49–63. http://dx.doi.org/10.1145/1047070.1047075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Bui, Duc, Kang G. Shin, Jong-Min Choi, and Junbum Shin. "Automated Extraction and Presentation of Data Practices in Privacy Policies." Proceedings on Privacy Enhancing Technologies 2021, no. 2 (January 29, 2021): 88–110. http://dx.doi.org/10.2478/popets-2021-0019.

Full text
Abstract:
Abstract Privacy policies are documents required by law and regulations that notify users of the collection, use, and sharing of their personal information on services or applications. While the extraction of personal data objects and their usage thereon is one of the fundamental steps in their automated analysis, it remains challenging due to the complex policy statements written in legal (vague) language. Prior work is limited by small/generated datasets and manually created rules. We formulate the extraction of fine-grained personal data phrases and the corresponding data collection or shar
APA, Harvard, Vancouver, ISO, and other styles
40

LaMonica, Haley M., Anna E. Roberts, Grace Yeeun Lee, Tracey A. Davenport, and Ian B. Hickie. "Privacy Practices of Health Information Technologies: Privacy Policy Risk Assessment Study and Proposed Guidelines." Journal of Medical Internet Research 23, no. 9 (September 16, 2021): e26317. http://dx.doi.org/10.2196/26317.

Full text
Abstract:
Background Along with the proliferation of health information technologies (HITs), there is a growing need to understand the potential privacy risks associated with using such tools. Although privacy policies are designed to inform consumers, such policies have consistently been found to be confusing and lack transparency. Objective This study aims to present consumer preferences for accessing privacy information; develop and apply a privacy policy risk assessment tool to assess whether existing HITs meet the recommended privacy policy standards; and propose guidelines to assist health profess
APA, Harvard, Vancouver, ISO, and other styles
41

Shipp, Laura, and Jorge Blasco. "How private is your period?: A systematic analysis of menstrual app privacy policies." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (October 1, 2020): 491–510. http://dx.doi.org/10.2478/popets-2020-0083.

Full text
Abstract:
AbstractMenstruapps are mobile applications that can track a user’s reproductive cycle, sex life and health in order to provide them with algorithmically derived insights into their body. These apps are now hugely popular, with the most favoured boasting over 100 million downloads. In this study, we investigate the privacy practices of a set of 30 Android menstruapps, a set which accounts for nearly 200 million downloads.We measured how the apps present information and behave on a number of privacy related topics, such as the complexity of the language used, the information collected by them,
APA, Harvard, Vancouver, ISO, and other styles
42

Hollenbaugh, Erin E. "Privacy Management Among Social Media Natives: An Exploratory Study of Facebook and Snapchat." Social Media + Society 5, no. 3 (April 2019): 205630511985514. http://dx.doi.org/10.1177/2056305119855144.

Full text
Abstract:
Guided by communication privacy management theory, this study tested network size, network diversity, privacy concerns, and privacy management practices in and between Facebook and Snapchat for social media natives. A cross-sectional survey of 273 college students (predominately Caucasian, female, 18- to 20 years old) showed that audiences were larger and more diverse in Facebook than Snapchat. Snapchat users with larger friend lists and lower privacy concerns reported more shared boundary ownership, whereas those with more diverse networks reportedly used more open friending practices to expa
APA, Harvard, Vancouver, ISO, and other styles
43

König, Katharina, and Florence Oloff. "Mobile Medienpraktiken im Spannungsfeld von Öffentlichkeit, Privatheit und Anonymität." Journal für Medienlinguistik 2, no. 2 (September 27, 2019): 1–27. http://dx.doi.org/10.21248/jfml.2019.9.

Full text
Abstract:
This contribution aims to describe privacy, publicness and anonymity as essential dimensions for doing media linguistics. These dimensions are not inherent in and predetermined by the technical features and forms of communication, but are used by the participants as an orientation grid for shaping their online and offline practices in and with mobile media. Considering both mobile media use in the public realm and the dissemination of increasingly private content in social media (which is said to lead to ‘blurred boundaries’ between the private and the public), this paper provides a brief over
APA, Harvard, Vancouver, ISO, and other styles
44

König, Katharina, and Florence Oloff. "Mobile Medienpraktiken im Spannungsfeld von Öffentlichkeit, Privatheit und Anonymität." Journal für Medienlinguistik 2, no. 2 (September 27, 2019): 1–27. http://dx.doi.org/10.21248/jfml.2019.9.

Full text
Abstract:
This contribution aims to describe privacy, publicness and anonymity as essential dimensions for doing media linguistics. These dimensions are not inherent in and predetermined by the technical features and forms of communication, but are used by the participants as an orientation grid for shaping their online and offline practices in and with mobile media. Considering both mobile media use in the public realm and the dissemination of increasingly private content in social media (which is said to lead to ‘blurred boundaries’ between the private and the public), this paper provides a brief over
APA, Harvard, Vancouver, ISO, and other styles
45

Kitsos, Panagiotis, and Aikaterini Yannoukakou. "Privacy in the 21st Century." International Journal of E-Politics 4, no. 3 (July 2013): 15–29. http://dx.doi.org/10.4018/jep.2013070102.

Full text
Abstract:
The events of 9/11 along with the bombarding in Madrid and London forced governments to resort to new structures of privacy safeguarding and electronic surveillance under the common denominator of terrorism and transnational crime fighting. Legislation as US PATRIOT Act and EU Data Retention Directive altered fundamentally the collection, processing and sharing methods of personal data, while it granted increased powers to police and law enforcement authorities concerning their jurisdiction in obtaining and processing personal information to an excessive degree. As an aftermath of the resulted
APA, Harvard, Vancouver, ISO, and other styles
46

Adorjan, Michael, and Rosemary Ricciardelli. "A New Privacy Paradox? Youth Agentic Practices of Privacy Management Despite “Nothing to Hide” Online." Canadian Review of Sociology/Revue canadienne de sociologie 56, no. 1 (January 15, 2019): 8–29. http://dx.doi.org/10.1111/cars.12227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Barhamgi, Mahmoud, Arosha K. Bandara, Yijun Yu, Khalid Belhajjame, and Bashar Nuseibeh. "Protecting Privacy in the Cloud: Current Practices, Future Directions." Computer 49, no. 2 (February 2016): 68–72. http://dx.doi.org/10.1109/mc.2016.59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Dias, Gonçalo Paiva, Hélder Gomes, and André Zúquete. "Privacy policies and practices in Portuguese local e-government." Electronic Government, an International Journal 12, no. 4 (2016): 301. http://dx.doi.org/10.1504/eg.2016.080430.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Zúquete, André, Gonçalo Paiva Dias, and Hélder Gomes. "Privacy policies and practices in Portuguese local e-government." Electronic Government, an International Journal 12, no. 4 (2016): 301. http://dx.doi.org/10.1504/eg.2016.10001404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Kemp, Katharine. "Concealed data practices and competition law: why privacy matters." European Competition Journal 16, no. 2-3 (September 1, 2020): 628–72. http://dx.doi.org/10.1080/17441056.2020.1839228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!