To see the other types of publications on this topic, follow the link: Regulating Privacy.

Dissertations / Theses on the topic 'Regulating Privacy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Regulating Privacy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Williams, Elizabeth A., and n/a. "Regulating the Internet : privacy under the microscope." University of Canberra. Communication, 1997. http://erl.canberra.edu.au./public/adt-AUC20061114.094402.

Full text
Abstract:
This thesis is an exploration of privacy as it relates to the Internet in general, and e-mail communication in particular. It looks at the philosophy of privacy and tracks the privacy debate in both an academic and legal framework. It examines the Australian Privacy Act of 1988 and similar legislation overseas. Current government approaches to privacy and privacy regulation are also examined providing a legislative/political context for the research. The fieldwork component of the thesis attempts to unravel individual perceptions of privacy. It overlays those perceptions of privacy with an examination of the effects of Internet technology on a conceptual understanding of privacy. There is no doubt that the discussion of privacy and the electronic age is extensive but discussion with individuals about their place in the debate and, indeed, the legislation is yet to be tackled in an extensive manner. Until we mesh the views of individuals in the community about their place in the new communications technology and privacy debate, we will not reap the full benefits of advances in communications technology. Consumers will remain reluctant about and suspicious of breaches of their privacy via the Internet.
APA, Harvard, Vancouver, ISO, and other styles
2

Laufer, Deanna (Deanna Raquel). "Radio Frequency Identification : regulating information privacy protection." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41767.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program, 2007.<br>Includes bibliographical references (p. 82-87).<br>As applications of Radio Frequency Identification (RFID) become more profuse, the technology itself is stirring up some controversy. Due to its potential for amassing large amounts of information about both people and things, and the possibility of using the information for marketing, tracking, or even spying, numerous consumer groups are spearheading efforts to ensure that RFID does not breach their privacy rights. While there are some privacy laws regulating specific aspects of commerce, there are no laws which currently apply to the collection and use of information as it pertains to RFID. This lack of formal regulation allows companies to legally engage in practices which may encroach on consumers' privacy. However, RFID has the potential to optimize supply chain practices as well as provide other benefits to both consumers and businesses. As RFID use becomes more widespread, regulatory strategies should be considered to protect consumers' right to privacy while obtaining the benefits of using the technology. This thesis explores consumer and industry opinion of RFID through a customized survey. Results of the survey found that consumer and industry opinion are similar in many aspects, especially in the concern for protecting privacy and the desire for a regulatory mechanism to enforce those privacy rights. This thesis addresses the question of whether market-based solutions, self-regulation, or government regulation is the best option for addressing consumers' legitimate concerns of privacy while allowing businesses to reap the benefits of using the technology.<br>(cont.) The regulatory options are compared and then discussed based on the needs of consumers and industry members as determined by the survey. Finally, four recommendations are suggested to provide guidance for ensuring a positive acceptance of RFID while acknowledging the privacy rights of consumers.<br>by Deanna R. Laufer.<br>S.M.
APA, Harvard, Vancouver, ISO, and other styles
3

AlHemaidi, Waleed Kassab. "The dilemma of regulating privacy : planning regulations, privacy and house form : the case study of low-density single-family dwellings in Saudi Arabia." Thesis, University College London (University of London), 1996. http://discovery.ucl.ac.uk/1349878/.

Full text
Abstract:
The object of this research is the exploration of the effects of planning regulations on house form and privacy in low-density single-family dwellings (villas) in the context of Saudi Arabian cities. The research explores two main issues: firstly, the importance and the effects of privacy violation between neighbouring villas through overlooking on their residents' behaviour and use of house spaces; and secondly, to investigate the residents' preferred house form. To assess these two issues practically, seven suburbs from three different cities, representing large (Riyadh), medium (Tabuk) and small (Haqil) urban centres in Saudi Arabia were selected for carrying out a questionnaire survey. The selection of these suburbs was intended to represent, as far as possible, the different social groups in Saudi Arabian society. The population of the survey was the villa residents in these suburbs, who were asked questions regarding their use of house yards and windows, and tested on their awareness of planning regulations, and the effects of these regulations on house form and degree of privacy. The respondents were also asked about their preferred house form. The results indicated that privacy is considered an important issue by residents, and the effects of privacy violation, through neighbours overlooking each others' houses, were very clearly seen on the residents' reduced use of overlooked yards, compared to those not overlooked, as well as through the construction of extra fences to block overlooking from neighbouring houses. Although the residents showed a high degree of awareness about the effects of the villa house form on the high degree of overlooking, they showed a far greater preference for living in villas rather than attached courtyard house forms. The final conclusion of the research demonstrates the failure of the present planning regulations to promote an acceptable house form that allows for a reasonably sufficient degree of privacy protection. While some research and housing schemes have promoted house forms different from that of the villa, these have proved to be unacceptable and were rejected by residents. The recommendation of the current research is that efforts to find a solution to the problem should instead focus upon means to reduce the effects or degree of privacy violation between neighbouring houses, while maintaining the popular house form of the villa.
APA, Harvard, Vancouver, ISO, and other styles
4

Gerlach, Natascha. "Regulating the Internet, a futile effort? The case of privacy in a German-Canadian comparative study." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape9/PQDD_0001/MQ42713.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Glover, Philip Bruce. "Reconceptualise investigatory powers again? : an argument for a comprehensive single statute regulating the acquisition of expression-related data for investigative purposes by UK public authorities." Thesis, University of Aberdeen, 2015. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=228973.

Full text
Abstract:
Communications-related investigatory powers are ostensibly regulated within the Regulation of Investigatory Powers Act (RIPA) 2000, under the descriptive headings: 'interception of communications'; 'acquisition and disclosure of communications data' and 'investigation of data protected by encryption'. The scope, legality and extent of these hitherto infrequently examined powers experienced increased scrutiny following the controversial 2013 disclosures of fugitive United States National Security Agency contractor Edward Snowden, scrutiny generally founded on subjective conceptions of 'privacy', 'intrusiveness' or 'security'. This research however, adopts 'communications' as its conceptual common denominator. It comprehensively explores the separate politico-legal evolution of RIPA's communications-related investigatory powers, whilst identifying and critically analysing alternative statutory provisions that permit circumvention of RIPA's purported human rights-centric integrity. The detailed chronology provides conclusive evidence that current UK Secretaries of State and their executive agencies possess virtually unlimited communications-related information acquisition powers bequeathed by their predecessors. Perhaps more importantly, its simultaneous exposure of an executive culture of secrecy and deference to the UK's intelligence community assists in explaining why any fettering of the current powers will be so difficult to achieve. Drawing from Intelligence Studies, Information Science and Computer Science, this research logically deconstructs RIPA's communications-related powers, finding them more accurately describable as narrowly defined techniques facilitating the acquisition of communications-related data. Consequently, RIPA fails to envisage or regulate all types of acquisition, such as that obtained extra-jurisdictionally or via Computer Network Exploitation, thus partially legitimizing the status quo. The research also examines RIPA's seemingly all-encompassing definition of 'communication', finding it under-utilised, in that communications from the mind into electronic storage ('expression-related data') are not included. Consequently, the boundaries between 'communication', 'expression' and 'property,' and between RIPA's powers and those enabling Computer Network Exploitation are currently unnecessarily complicated. It concludes by recommending the enactment of a single statute regulating all investigative expression-related data acquisition.
APA, Harvard, Vancouver, ISO, and other styles
6

Visser, Diane. "A study on database marketing practices that raise consumer privacy concern : a proposed model for regulating database marketing practices in South Africa." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52711.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2002.<br>ENGLISH ABSTRACT: One of the phenomena's in the marketing industry of the past decade is the increased use of database marketing. Database marketing involves the collection, processing and dissemination of vast amounts of consumer information in order to compile detailed consumer databases. The increasing popularity of database marketing can be attributed to various factors. Consumer information can now be obtained easier, cheaper and faster due to the availability of information technology. It has become easier to segment consumer markets and it is possible to identify consumer trends. It is possible to make predictions of consumer behaviour or buying patterns because consumer databases provide a more complete consumer profile with information ranging from demographics, psycho graphics to life-style information. Database technology improves the efficiency and effectiveness of marketing campaigns because marketers can analyse the available information and select the most appropriate marketing strategies and tactics, while concentrating efforts on the most profitable consumer. Marketers therefore waste less effort, money, and other resources by not promoting to individuals who are unlikely to react upon such offers. Widespread databases assist marketers in offering products that are more reasonably priced and more precisely tailored for smaller, more homogeneous market segments. Improved product and service offerings as well as the availability of a wider variety of products and services will likely result in higher consumer satisfaction and could build consumer loyalty. Therefore, marketers use consumer information to improve the overall marketing strategy and individual customer service. Consumers are concerned about database marketing practices because consumers believe some data practices invade personal privacy. The need for privacy has always been inherent to human nature and the concept of privacy dates back to early mankind. One should however differentiate between an individual's basic need for privacy from a general perspective and privacy within a consumer-marketer context. Privacy from a general perspective refers to one's territoriality and need for physical seclusion, whereas consumer privacy mainly relate to the privacy of personal information. Bennett, as well as Stone and Stone proposed that a state of privacy exist when a consumer can control social interaction, unwanted external stimuli, and the dissemination of personal information as well as being able to make independent decisions without outside interference. Consumers' need for privacy is however, in conflict with the need for social interaction and the need to participate in commercial exchange relationships. The more a person interacts with other members of society, the more the person could expect to compromise some privacy. This implies that when consumers participate in a business transaction, or where an exchange relationship exists between the database marketer and consumer, consumers could expect that a degree of privacy will be lost. Consumer groups however, argue that some marketing practices invade the reasonable amount of privacy consumers should be able to expect. The raising consumer concern for privacy is attributable to several reasons. The primary driver of consumer concern is the general lack of knowledge on data collection and use. Other reasons for the raising privacy concern include the type of information collected and the amount of control consumers have over subsequent use of data; the use of personal information to identify specific individuals; collection and use of sensitive information, such as medical and financial data; the volume of information collected and used; secondary information use; the use and dissemination of inaccurate databases; the collection and use of children's data; the lack of tangible benefits received in exchange for information provided; and the use of consumer information for financial gain. Consumers have also expressed concern about electronic database marketing practices because of the secrecy in data collection and use. However, privacy concerns may vary depending on consumers' cultural orientation, age, perception on what constitutes good marketing ethics or the specific methods employed to obtain consumer data. One could distinguish between several consumer clusters when considering consumers" attitudes on database marketing practices and personal privacy. In this regard the typical South African consumer is classified as a "pragmatist". Pragmatists are concerned with privacy to the extent they are exposed to database marketing activities. The South African database marketing industry is still in its infancy phase and as the industry progress, and consumers become more knowledgeable, privacy concerns are likely to increase. It is important to address the issues that raise consumer privacy concerns and to find solutions for ensuring sustainable database marketing practice in future. Marketers' information needs and consumers' privacy needs should somehow be balanced in order to withhold government intervention. Compromises from both sides are necessary to reach a more balanced relationship between the two parties. The successful outcome of the privacy debate will depend on marketers' understanding of consumer privacy issues and by addressing these accordingly.Several approaches exist for regulating database marketing practices that invade consumer privacy: the implementation of information technology, self-regulation and government intervention. Self-regulation is preferred for regulating database marketing practices, whereas privacy-enhancing information technology is recommended as a supplemental tool for protecting consumer privacy. Government regulating seems to be the last resort because of unnecessary restrictions that might be imposed on database marketing activities. Recommended models for regulating database marketing activities and for protecting consumer privacy in South Africa are the Registration Model, together with elements of the Data Commissioner Model. These models were proposed after careful consideration of characteristics, unique to the South African database marketing industry. The models place the responsibility for data protection with the database marketer and the South African government, rather than with the consumer. The Registration Model and the Data Commissioner Model seems a viable combination for implementation in South Africa because these models acknowledge the fact that South African pragmatic consumers are not well educated and informed enough on privacy invading database marketing practices. This combination rarely involves any consumer participation and therefore suits the typical apathetic nature of South African consumers. The Registration Model acts like a notice system where an agency, currently the Direct Marketing Association of South Africa, develops principles of fair information practices to which registered marketers need to comply with. A commission, an element of the Data Commissioner Model, has power to investigate consumer complaints, constrain development of databases, review data practices and advise on improvements on data collectors' systems. The commission could also monitor advancements in information technology that may enhance consumer privacy. The only problem with these models seems to be that the agency and or the commission have no authoritative power to enforce compliance with principles and codes of conduct. Industry self-regulation in conjunction with some governmental control and the application of information technology seems to be useful in providing adequate levels of consumer privacy and data protection. Such a combination might strike a balance between South African consumers' need for privacy and South African marketers' need for consumer information.<br>AFRIKAANSE OPSOMMING: Een van die verskynsels in die bemarkingsindustrie oor die afgelope dekade is die toenemende gebruik van databasisbemarking. Databasisbemarking behels die insameling, prosessering en verspreiding van groot hoeveelhede verbruikersinligting met die doelom gedetailleerde verbruikersdatabasisse saam te stel. Die toenemende gewildheid van databasisbemarking kan toegeskryf word aan verskeie faktore. Inligtingstegnologie maak dit baie makliker, goedkoper en vinniger om verbruikersinligting te bekom. Dit raak al hoe makliker om verbruikersmarkte te segmenteer en dit is moontlik om verbruikers tendense te identifiseer. Voorspellings kan ook gemaak word ten opsigte van verbruikersgedrag en aankooppatrone omdat die omvang van inligting in verbruikersdatabasisse strek vanaf demografiese, psigografiese tot lewenstylinligting en daarom 'n baie meer volledige verbruikersprofiel bied. Databasistegnologie verbeter die doeltreffendheid en effektiwiteit van bemarkingsveldtogte omdat bemarkers beskikbare inligting kan analiseer en die mees gepaste bemarkingstrategieë en taktieke kan selekteer, terwyl programme gerig kan word op die mees winsgewinde verbruiker. Bemarkers sal dus minder moeite, geld en ander hulpbronne vermors deurdat bemarkingsprogramme nie gerig word op individue wat heel waarskynlik nie op sulke aanbiedinge sal reageer nie. Omvangryke databasisse help bemarkers om goedkoper produkte te bied wat meer presies ontwerp is op kleiner, meer homogene marksegmente te dien. Verbeterde produk en diens aanbiedinge tesame met die beskikbaarheid van 'n wyer verskeidenheid van produkte en dienste, sal heel waarskynlik hoër verbruikersatisfaksie tot gevolg hê en kan verbruikerslojaliteit bewerkstellig. Dus, bemarkers gebruik verbruikersinligting om die algehele bemarkingstrategie en individuele diens aan verbruikers te verbeter. Verbruikers het belang by databasis bemarkingspraktyke omdat verbruikers glo dat sommige data praktyke inbreuk maak op persoonlike privaatheid. Die behoefte aan privaatheid was nog altyd inherent aan die menslike natuur en die konsep van privaatheid dateer terug tot vroeë beskawings. Daar behoort egter 'n onderskeid getref te word tussen 'n individu se basiese behoefte aan privaatheid vanuit 'n algemene perspektief en privaatheid vanaf 'n verbruiker-bemarker konteks. Privaatheid, vanaf 'n algemene perspektief, verwys na 'n individu se persoonlike ruimte en die behoefte aan fisiese afsondering, teenoor verbruikersprivaatheid wat hoofsaaklik verband hou met die privaatheid van persoonlike inligting. Bennett, sowel as Stone en Stone het voorgestel dat 'n mate van privaatheid heers wanneer 'n verbruiker beheer het oor sosiale interaksies, ongewenste eksterne prikkels, die verspreiding van persoonlike inligting, sowel as om in staat te wees om onafhanklike besluite te neem sonder invloed van buite. Verbruikers se behoefte aan privaatheid is egter in konflik met die behoefte aan sosiale interaksie en die behoefte om deel te neem aan kommersiële transaksies. Hoe meer 'n persoon in wisselwerking tree met ander lede van die gemeenskap, hoe meer kan die persoon verwag om 'n mate van privaatheid op te offer. Dit impliseer dat wanneer verbruikers deelneem in 'n besigheidstransaksie of waar 'n ruilverhouding bestaan tussen die databasisbemarker en verbruiker, kan verbruikers verwag dat 'n mate van privaatheid verlore sal gaan. Verbruikers kan 'n redelike mate van privaatheid verwag, maar verbruikersgroepe argumenteer dat sommige bemarkingspraktyke inbreuk maak op hierdie redelike verwagting van privaatheid. Die toenemende verbruikersbelang by privaatheid is toeskryfbaar aan verskeie redes. Die primêre dryfkrag agter verbruikers se belang is die algemene gebrek aan kennis oor data insameling en gebruik. Ander redes wat bydrae tot die toenemende belang by privaatheid sluit in die tipe inligting ingesamel en die hoeveelheid beheer verbruikers het oor die daaropeenvolgende gebruik van data; die gebruik van persoonlike inligting om spesifieke individue te identifiseer; die insameling en gebruik van sensitiewe inligting, soos byvoorbeeld mediese en finansiële data; die hoeveelheid inligting wat ingesamel en gebruik word; sekondêre gebruik van inligting; die gebruik en verspreiding van onakkurate databasisse; en die insameling en gebruik van verbruikersinligting om finansieël voordeel daaruit te trek. Verbruikers het ook belang getoon teenoor elektroniese databasis bemarkingspraktyke as gevolg van die geheimhouding oor data insameling en gebruik. Die belang by privaatheid mag egter varieër afhangende van verbruikers se kulturele oriëntasie, ouderdom, persepsie van wat goeie bemarkingsetiek behels of die spesifieke metodes gebruik om data aangaande verbruikers te bekom. Daar kan onderskei word tussen verskeie verbruikersgroepe wanneer verbruikershoudings teenoor databasis bemarkingspraktyke en persoonlike privaatheid oorweeg word. In hierdie verband kan die tipiese Suid-Afrikaanse verbruiker geklassifiseer word as 'n pragmatis. Pragmatiste is besorg oor privaatheid tot die mate waartoe hulle blootgestel is aan databasisbemarkingsaktiwiteite. Die Suid-Afrikaanse databasis industrie is nog in die beginfase en soos die industrie groei en verbruikers meer ingelig raak, sal besorgdheid oor privaatheid heelwaarskynlik ook toeneem. Dit is belangrik om die kwessies wat besorgdheid oor verbruikersprivaatheid veroorsaak aan te spreek en om oplossings te vind om volhoubare databasisbemarkingspraktyke in die toekoms te verseker. Daar moet gepoog word om bemarkers se behoefte aan inligting en verbruikers se behoefte aan privaatheid in ewewig te bring om sodoende owerheidsinmenging te voorkom. Opofferings van beide partye is nodig om 'n meer gebalanseerde verhouding tussen die twee partye te bewerkstellig. Die suksesvolle uitkoms van die privaatheidsdebat sal afhang van bemarkers se begrip vir verbruikersprivaatheidskwessies en om dit dienooreenkomstig aan te spreek. Die regulering van databasisbemarkingspraktyke wat inbreuk maak op verbruikersprivaatheid kan verskillend benader word: die implementering van inligtingstegnologie, self-regulering en owerheids-inmenging. Self-regulering word verkies as basis om databasisbemarkingspraktyke te reguleer, terwyl privaatheids-bevorderende inligtingstegnologie aanbeveel word as bykomende gereedskap om verbruikersprivaatheid te beskerm. Owerheidsregulering word gesien as die laaste uitweg as gevolg van onnodige beperkinge wat dit mag plaas op databasisbemarkingsaktiwitei te. Die voorgestelde modelle vir die regulering van databasis bemarkingsaktiwiteite en vir die beskerming van verbruikersprivaatheid in Suid Afrika, is die Registrasie Model, tesame met elemente van die Data Kommissaris Model. Hierdie modelle is voorgestel nadat eienskappe, uniek aan die Suid Afrikaanse databasisbemarkingsindustrie, deeglik oorweeg IS. Die modelle plaas die verantwoordelikheid van data beskerming in die hande van die databasisbemarker en die Suid-Afrikaanse owerheid, eerder as by die verbruiker. Die Registrasie Model en die Data Kommissaris Model blyk 'n uitvoerbare kombinasie vir implementering in Suid Afrika te wees, omdat hierdie modelle die feit inagneem dat Suid Afrikaanse pragmatiese verbruikers nie goed genoeg opgevoed en ingelig is oor die databasisbemarkingsaktiwiteite wat inbreuk maak op privaatheid nie. Hierdie kombinasie behels selde verbruikersdeelname en is daarom gepas by die tipiese apatiese aard van Suid Afrikaanse verbruikers. Die Registrasie Model dien as 'n kennisgee-stelsel waar 'n agentskap, tans die Direkte Bemarkings Assosiasie van Suid Afrika, beginsels vir regverdige inligtingspraktyke ontwikkel waaraan geregistreerde databasisbemarkers moet voldoen. 'n Kommissie, 'n element van die Data Kommissaris Model, het mag om verbruikersklagtes te ondersoek, die ontwikkelling van databasisse aan bande te lê en om datapraktyke te hersien en advies te gee oor verbeteringe in die stelsels van data-insamelaars. Die kommissie kan ook ontwikkelinge in inligtingstegnologie wat verbruikersprivaatheid bevorder, monitor. Die enigste probleem met hierdie modelle blyk te wees dat die agenstkap en die kommissie geen gesag het om te verseker dat beginsels en kodes van goeie gedrag afgedwing word nie. Industrie self-regulering, tesame met 'n mate van owerheidsbeheer en die implementering van inligtingstegnologie blyk nuttig te wees om voldoende vlakke van verbruikers-privaatheid en data beskerming te verseker. Dié kombinasie kan moontlik 'n balans vind tussen Suid Afrikaanse verbruikers se behoefte aan privaatheid en Suid Afrikaanse bemarkers se behoefte aan verbruikersinligting.
APA, Harvard, Vancouver, ISO, and other styles
7

WITTE, NATHAN ALLAN. "PRIVACY: ARCHITECTURE IN SUPPORT OF PRIVACY REGULATION." University of Cincinnati / OhioLINK, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1053701814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Witte, Nathan. "Privacy architecture in support of privacy regulation /." Cincinnati, Ohio : University of Cincinnati, 2003. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=ucin1053701814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Johnson, Virginia Wilson. "Architectural correlates of privacy : the dynamics of privacy regulation /." Diss., This resource online, 1990. http://scholar.lib.vt.edu/theses/available/etd-07132007-143142/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jagasia, Punit. "Everyday struggles: User regulation of privacy, advertising and labour on Facebook." Thesis, The University of Sydney, 2017. http://hdl.handle.net/2123/17993.

Full text
Abstract:
With more than two billion users worldwide, Facebook is often described in popular media as the ‘largest country in the world’, due to its nature, size and composition. However, Facebook is a company, regulated primarily as a business. The aim of this project is to raise and answer key questions about Facebook’s normative practices, and particularly about the site’s regulation. My argument is that, throughout its short history, Facebook’s users have regulated the site. User regulation is described as the practices of criticism, negotiation and rejection to which Facebook’s architecture, policies and practices are subjected by its users and non-users, and the subsequent impacts of such regulation on Facebook. User regulation of Facebook is an informal, arbitrary process that leads to Facebook’s continuously evolving norms and reflects the persistent struggle for control between Facebook and its users. A pluralistic, digital-cultures approach has been adopted in the theoretical and conceptual framework of this thesis, with an emphasis on the canons of media and communication, cultural studies and political economy. Multiple case studies of user regulation are presented to explain the dynamics of how users are regulating the architecture, policies and practices of the site, in order to demonstrate that users are regulating Facebook. The first part of the thesis begins with an exposition of the user regulation model, after which a framework for Facebook, its users and user regulation is presented. Subsequently, the methodology, the efficacy of the methodology and the case study approach are discussed. The second part of the thesis explores three interrelated themes – privacy, advertising and labour on Facebook – to explain and demonstrate my argument. These three themes are key to explaining the process and phenomenon of user regulation, as they constitute what I term the ‘circle of exploitation’ on Facebook. In the third part of the thesis, resolutions to this circle of exploitation are addressed by proposing certain alternatives, in order to examine the ability and vulnerability of users. Finally, the key outcomes of this project and my research agenda of providing a historical account for future research into the ontology and epistemology of Facebook are considered.
APA, Harvard, Vancouver, ISO, and other styles
11

Nordström, Michael, and Sergej Sevcenko. "Internet Privacy : A look into the construct of Privacy Knowledge." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Marketing and Logistics, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-18313.

Full text
Abstract:
Background:                With the increasing use of personalized marketing and the increasing ability to collect information on consumers, the consumers’ concern of privacy is increasing. Therefore it is important to understand what effects privacy concern, and how marketers can minimize this concern. Previous research suggest that factors such as computer knowledge, internet knowledge, and regulation awareness all affect privacy concern, however we believe that these are all related to each other in a construct we call Privacy Knowledge. Purpose:                        To investigate the construct of Privacy Knowledge and to what degree it influences a consumer’s attitude towards informational privacy. Method:                        In order to validate the Privacy Knowledge construct and measure its relationship to Privacy Concern we employed a deductive methodology which was comprised of questionnaires. The questionnaires were composed of summative Likert Scales, three of which had been previous validated by previous research. We utilized a quota sampling technique in order to gather enough data from each age group. The results were then analyzed by tools such as Factor Analysis, ANOVA tests, and Multiple Regression Analysis. Conclusion:                   Through the Factor Analysis we found that the factors Internet Knowledge, Computer Knowledge, and Regulation Awareness were better organized as Basic IT Knowledge, Advanced IT Knowledge and Regulation Awareness. Privacy Knowledge was found to be positively related to Privacy Concern. However we could only conclude of the three factors which make up Privacy Knowledge, Basic IT Knowledge had an effect on Privacy Concern. We believe this is due to the exclusion of other factors affecting Privacy Concern such as situational factors and suggest conducting further research on the matter including these variables.
APA, Harvard, Vancouver, ISO, and other styles
12

Ewert, Mary. "Adolescent citizenship : reproductive privacy, welfare, and regulation." Thesis, Keele University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.510707.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Hecker, Michael. "A generic privacy ontology and its applications to different domains." Thesis, Curtin University, 2009. http://hdl.handle.net/20.500.11937/956.

Full text
Abstract:
Privacy is becoming increasingly important due to the advent of e-commerce, but is equally important in other application domains. Domain applications frequently require customers to divulge many personal details about themselves that must be protected carefully in accordance with privacy principles and regulations. Here, we define a privacy ontology to support the provision of privacy and help derive the level of privacy associated with transactions and applications. The privacy ontology provides a framework for developers and service providers to guide and benchmark their applications and systems with regards to the concepts of privacy and the levels and dimensions experienced. Furthermore, it supports users or data subjects with the ability to describe their own privacy requirements and measure them when dealing with other parties that process personal information. The ontology developed captures the knowledge of the domain of privacy and its quality aspects, dimensions and assessment criteria. It is composed of a core ontology, which we call generic privacy ontology and application domain specific extensions, which commit to some of application domain concepts, properties and relationships as well as all of the generic privacy ontology ones. This allows for an evaluation of privacy dimensions in different application domains and we present case studies for two different application domains, namely a restricted B2C e-commerce scenario as well as a restricted hospital scenario from the medical domain.
APA, Harvard, Vancouver, ISO, and other styles
14

Donadelli, Flavia Maria de Mattos. "A Importância da Governança Privada para a Elevação de Padrões de Proteção Ambiental: Um Estudo de Caso." Universidade de São Paulo, 2011. http://www.teses.usp.br/teses/disponiveis/101/101131/tde-13012012-102355/.

Full text
Abstract:
O objetivo central desta pesquisa é contextualizar e debater a emergência de um novo mecanismo de governança das relações transnacionais: as regulações privadas. Por meio de uma ampla revisão bibliográfica, o trabalho se propõe, a princípio, a definir as principais abordagens teóricas e conceituais desenvolvidas pela literatura sobre o fenômeno, facilitando, assim a definição do objeto desta pesquisa. Posteriormente, serão apresentadas as principais respostas da literatura a questões relacionadas aos três principais momentos da consolidação de tais mecanismos: sua emergência, adesão por atores privados e resultados. Conforme verificado, nos três casos as duas grandes linhas explicativas apresentadas pela literatura relacionam-se (1) a abordagens baseadas em incentivos de mercado e (2) a abordagens político-culturais voltadas à análise do campo social em que as empresas atuam. Pretende-se assim, contextualizar, fornecer um amplo panorama teórico e determinar as principais variáveis explicativas para a análise da hipótese central deste trabalho de que mecanismos de regulação privada podem ser efetivos fornecedores de bens públicos. Tais variáveis serão, posteriormente, testadas pela parte empírica desta pesquisa.<br>The main objective of this research is to contextualize and debate the emergence of a new governance mechanism in the transnational relations: private regulations. Through a broad bibliographic review, this work intends, first, to define the most important theoretical and conceptual approaches developed by the literature, facilitating thus the the definition of the specificities of the research\'s object. Second, the main answers to questions regarding the three most crucial moments of private regulations mechanisms consolidation (emergency, adoption by private actors and results) will be presented. As observed in all three cases the two main explanatory approaches presented by the literature relate to (1) approaches based on market incentives, and (2) political-cultural approaches aimed at the analisis of the social field in which firms operate. Hence, the aim is to contextualize, provide a broad theoretical background and determine the main explanatory variables for the analysis of the central hypotheses of this study that both values and market incentives are crucial in the process of adopting private regulatory mechanisms and that such mechanisms can be effective providers of public goods. These hypotheses will then be tested by the empirical part of this research.
APA, Harvard, Vancouver, ISO, and other styles
15

Alhussein, Nawras. "Privacy by Design & Internet of Things: managing privacy." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20590.

Full text
Abstract:
Personlig integritet motsvarar det engelska begreppet privacy, som kan uttryckas som rätten att få bli lämnad ifred. Det har ifrågasatts många gånger om personlig integritet verkligen finns på internet, speciellt i Internet of Things-system eller smarta system som de också kallas. Fler frågor ställs i samband med att den nya allmänna dataskyddsförordningen inom europeiska unionen börjar gälla i maj. I detta arbete studeras privacy by design-arbetssättet som den allmänna dataskyddsförordningen (GDPR) bland annat kommer med. I studien besvaras om privacy by design kommer kunna öka skyddet av den personliga integriteten i Internet of Things-system. För- och nackdelar tas upp och hur företag och vanliga användare påverkas. Genom en litteraturstudie och två intervjuer har frågan kunnat besvaras. Det visade sig att en stor del av problematiken inom Internet of Things avseende personlig integritet kan lösas genom att styra data. I privacy by design-arbetssättet ingår att skydda data i alla tillstånd genom olika metoder som kryptering. På det sättet bidrar privacy by design till ökad säkerhet inom Internet of Things-system.<br>Privacy means the right to be left alone. It has been questioned many times if privacy really exists on the internet, especially in Internet of Things systems or smart systems as they are also called. More questions occur when the new general data protection regulation (GDPR) within the European Union applies in May. In this paper privacy by design that the general data protection regulation comes with is being studied. This study answers whether privacy by design will be able to increase the protection of privacy in Internet of Things systems. Advantages and disadvantages are also addressed and how companies and common users are affected by the implementation of privacy by design. The question has been answered by a literature review and two interviews. It turned out that a significant part of the problems in Internet of Things regarding privacy may be solved by data management. The privacy by design includes protection of data in all states through different methods such as encryption. In this way, privacy by design contributes to increased security within Internet of Things system.
APA, Harvard, Vancouver, ISO, and other styles
16

Sallaku, Redlon <1994&gt. "Privacy and Protecting Privacy: Using Static Analysis for legal compliance. General Data Protection Regulation." Master's Degree Thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/14682.

Full text
Abstract:
The main purpose of the thesis is to study Privacy and how protecting Privacy, including the new regulation framework proposed by EU the GDPR, investigating how static analysis could help GDPR enforcement, and develop a new static analysis prototype to fulfill this task in practice. GDPR (General Data Protection Regulation) is a recent European regulation to harmonize and enforce data privacy laws across Europe, to protect and empower all EU citizens data privacy, and to reshape the way organizations deal with sensitive data. This regulation has been enforced starting from May 2018. While it is already clear that there is no unique solution to deal with the whole spectrum of GDPR, it is still unclear how static analysis might help enterprises to fulfill the constraints imposed by this regulation.
APA, Harvard, Vancouver, ISO, and other styles
17

Nolte, Claus-Georg [Verfasser], and Günter [Akademischer Betreuer] Müller. "Privacy in social networks – economic options for regulation." Freiburg : Universität, 2017. http://d-nb.info/1156171067/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Flynn, Patrick. "Regulating the privatization of policing : an empirical examination of the private security industry and options for regulation." Thesis, University of Essex, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.360812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Cook, Don Lloyd. "Governance Mechanisms as a Means of Increasing Consumer Trust in Online Exchanges: A Signaling Perspective." Diss., Virginia Tech, 2001. http://hdl.handle.net/10919/26589.

Full text
Abstract:
Many consumers seem to be uncomfortable or unwilling in making online transactions. This lack of trust stems in part from the online exchange process itself where consumers are deprived of many traditional cues that they would use to evaluate this process. This research focuses on consumer perceptions of regulatory governance in online exchanges and how signals of governance might act to increase consumer trust in online transac-tions. An experimental methodology was used to examine the effects of different types of structures on consumer perceptions and to provide direction for public policy makers as well as online businesses and private regulatory entities.<br>Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
20

Hecker, Michael. "A generic privacy ontology and its applications to different domains." Curtin University of Technology, Digital Ecosystems and Business Intelligence Institute, 2009. http://espace.library.curtin.edu.au:80/R/?func=dbin-jump-full&object_id=129029.

Full text
Abstract:
Privacy is becoming increasingly important due to the advent of e-commerce, but is equally important in other application domains. Domain applications frequently require customers to divulge many personal details about themselves that must be protected carefully in accordance with privacy principles and regulations. Here, we define a privacy ontology to support the provision of privacy and help derive the level of privacy associated with transactions and applications. The privacy ontology provides a framework for developers and service providers to guide and benchmark their applications and systems with regards to the concepts of privacy and the levels and dimensions experienced. Furthermore, it supports users or data subjects with the ability to describe their own privacy requirements and measure them when dealing with other parties that process personal information. The ontology developed captures the knowledge of the domain of privacy and its quality aspects, dimensions and assessment criteria. It is composed of a core ontology, which we call generic privacy ontology and application domain specific extensions, which commit to some of application domain concepts, properties and relationships as well as all of the generic privacy ontology ones. This allows for an evaluation of privacy dimensions in different application domains and we present case studies for two different application domains, namely a restricted B2C e-commerce scenario as well as a restricted hospital scenario from the medical domain.
APA, Harvard, Vancouver, ISO, and other styles
21

Dumlupinar, Nihat. "Regulation of private military companies in Iraq." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FDumlupinar.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Civil-Military Relations))--Naval Postgraduate School, March 2010.<br>Thesis Advisor(s): Bruneau, Thomas ; Ear, Sophal. "March 2010." Description based on title screen as viewed on April 26, 2010. Author(s) subject terms: Private military companies, Private security companies, Civil-military relations, Regulation of private military companies, Contractors. Includes bibliographical references (p. 93-100). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
22

Allouard, Hugo. "Three essays in digital economics : privacy, regulation & labor markets." Electronic Thesis or Diss., université Paris-Saclay, 2024. http://www.theses.fr/2024UPASI005.

Full text
Abstract:
Cette thèse étudie les implications économiques et comportementales de la numérisation. Le chapitre 1 étudie la sensibilité à la vie privée des consommateurs sur le marché des applications mobiles en tenant compte du gain en qualité résultant de l'utilisation des données utilisateurs. Les résultats indiquent que ne pas tenir compte des bénéfices du consommateur à partager ses informations personnelles conduit à une sous-estimation de la sensibilité à la vie privée. De plus, je montre que la sensibilité à la collecte de données augmente avec le temps, mais avec une hétérogénéité persistante entre les pays. Le chapitre 2 étudie les implications de la non-discrimination des politiques de collecte de données entre les marchés qui est en vigueur sur le marché des applications mobiles. En estimant un modèle structurel de demande et d'offre et en simulant des scénarios contrefactuels, je démontre qu'une régulation imposant la discrimination de la collecte de données entre les pays augmenterait le surplus du consommateur et la vie privée en Europe, mais aurait des effets contraires aux États-Unis. Le chapitre 3 étudie l'impact de l'essor des plateformes de livraison de repas à la demande sur la criminalité, en exploitant les disparités temporelles et géographiques de leur introduction en France. Notre approche en différence de différences étagées révèle que l'arrivée d'une plateforme de livraison dans une zone d'emploi entraîne une forte réduction des crimes liés à la drogue. Ces résultats indiquent que la "gig economy" favorise les opportunités d'emploi pour les travailleurs peu qualifiés, les jeunes et les groupes minoritaires, facilitant leur engagement dans des activités économiques légales<br>Certainly! Here is the revised paragraph with corrected grammar:This thesis studies the economic and behavioral implications of digitization. Chapter 1 investigates the privacy sensitivity of consumers in the mobile app market, accounting for the quality enhancement resulting from the use of user data. The findings indicate that not accounting for the consumer benefit of sharing personal information leads to an underestimation of privacy sensitivity. As a result, the sensitivity to data collection is higher than commonly reported in the literature. Furthermore, I show that privacy sensitivity increases over time, but with persistent heterogeneity across countries. Chapter 2 examines the implications of non-discrimination in data collection policies across markets, which is prevalent in the mobile app industry. By estimating a structural model of demand and supply and simulating counterfactual scenarios, I demonstrate that a regulation enforcing discrimination in data collection across countries would increase consumer surplus and privacy in Europe, but with opposite effects in the US. Chapter 3 investigates the impact of the boom in on-demand food delivery platforms on crime, leveraging the temporal and geographic disparities in their introduction in France. Our staggered difference-in-differences approach reveals that the arrival of a delivery platform in an employment area leads to a significant reduction in drug-related crimes. These results indicate that the gig economy fosters employment opportunities for low-skilled workers, youth, and minority groups, facilitating their engagement in lawful economic activities
APA, Harvard, Vancouver, ISO, and other styles
23

Siganto, Jean Josephine. "Transparent, balanced and vigorous: The exercise of the Australian Privacy Commissioner's powers in relation to National Privacy Principle 4." Thesis, Queensland University of Technology, 2015. https://eprints.qut.edu.au/83792/4/Jean_Siganto_Thesis.pdf.

Full text
Abstract:
This thesis considers whether the Australian Privacy Commissioner's use of its powers supports compliance with the requirement to 'take reasonable steps' to protect personal information in National Privacy Principle 4 of the Privacy Act 1988 (Cth). Two unique lenses were used. First, the Commissioner's use of powers was assessed against the principles of transparency, balance and vigorousness and secondly against alignment with an industry practice approach to securing information. Following a comprehensive review of publicly available materials, interviews and investigation file records, this thesis found that the Commissioner's use of his powers has not been transparent, balanced or vigorous, nor has it been supportive of an industry practice approach to securing data. Accordingly, it concludes that the Privacy Commissioner's use of its regulatory powers is unlikely to result in any significant improvement to the security of personal information held by organisations in Australia.
APA, Harvard, Vancouver, ISO, and other styles
24

Siggelin, Sofie. "Seniors Privacy Concerns in Health Technology Wearables : Regulations vs. User Concerns." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-63652.

Full text
Abstract:
Technology is rapidly advancing and more sophisticated wearables capable of monitoring health concerns and potential diseases are entering the market. Meanwhile, regulations are just catching up and the new EU-wide General Data Protection Regulation (GDPR) will be implemented in May of 2018. This thesis reviews the concerns voiced by users when using wearables collecting their sensitive health data and compare them with the upcoming regulatory changes, to see if they address the many worries of users. The main goal of the GDPR is to bring ownership of the data back to the individual as well as harmonizing the market in the EU, but the question is if its focus is on the right things that users actually value and will their concerns be eased by the new regulations? A high-level review of the current and upcoming regulations on data collection was made as well as reviewing already discovered user concerns. The study was made using qualitative methodology and face-to-face interviews with users affected by medical conditions, in order to identify their perception of trust in wearable technology monitoring their health status. The results were analyzed using a thematic analysis where three main areas of concern were discovered. These where then compared to the literature review. The three areas of concern that were discovered are: a lack of control where users have a clear need of ownership of their personal data, the concern of companies abusing individual’s data for commercial purposes and a doubt in the level of trust users can put in the information they receive. The GDPR does address several of these concerns by bringing ownership of data back to the users. By strengthening the need for explicit consent from the companies, more transparent policies and security implementations of data integrity, the GDPR features several steps that could ensure the privacy of users such as distribution of data and “the right to be forgotten”. Upcoming research can go deeper into the GDPR and the future will tell if it is successful in its aim to empower the user as it might seem excellent on paper but face several challenges in reaching its goal.
APA, Harvard, Vancouver, ISO, and other styles
25

Spiekermann-Hoff, Sarah, and Alexander Novotny. "A vision for global privacy bridges: Technical and legal measures for international data markets." Elsevier, 2015. http://dx.doi.org/10.1016/j.clsr.2015.01.009.

Full text
Abstract:
From the early days of the information economy, personal data has been its most valuable asset. Despite data protection laws and an acknowledged right to privacy, trading personal information has become a business equated with "trading oil". Most of this business is done without the knowledge and active informed consent of the people. But as data breaches and abuses are made public through the media, consumers react. They become irritated about companies' data handling practices, lose trust, exercise political pressure and start to protect their privacy with the help of technical tools. As a result, companies' Internet business models that are based on personal data are unsettled. An open conflict is arising between business demands for data and a desire for privacy. As of 2015 no true answer is in sight of how to resolve this conflict. Technologists, economists and regulators are struggling to develop technical solutions and policies that meet businesses' demand for more data while still maintaining privacy. Yet, most of the proposed solutions fail to account for market complexity and provide no pathway to technological and legal implementation. They lack a bigger vision for data use and privacy. To break this vicious cycle, we propose and test such a vision of a personal information market with privacy. We accumulate technical and legal measures that have been proposed by technical and legal scholars over the past two decades. And out of this existing knowledge, we compose something new: a four-space market model for personal data.
APA, Harvard, Vancouver, ISO, and other styles
26

Rose, Cecily Elizabeth. "International regulation of private sector corruption." Thesis, University of Cambridge, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.648506.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Neuhaus, Christian, Andreas Polze, and Mohammad M. R. Chowdhuryy. "Survey on healthcare IT systems : standards, regulations and security." Universität Potsdam, 2011. http://opus.kobv.de/ubp/volltexte/2011/5146/.

Full text
Abstract:
IT systems for healthcare are a complex and exciting field. One the one hand, there is a vast number of improvements and work alleviations that computers can bring to everyday healthcare. Some ways of treatment, diagnoses and organisational tasks were even made possible by computer usage in the first place. On the other hand, there are many factors that encumber computer usage and make development of IT systems for healthcare a challenging, sometimes even frustrating task. These factors are not solely technology-related, but just as well social or economical conditions. This report describes some of the idiosyncrasies of IT systems in the healthcare domain, with a special focus on legal regulations, standards and security.<br>IT Systeme für Medizin und Gesundheitswesen sind ein komplexes und spannendes Feld. Auf der einen Seite stehen eine Vielzahl an Verbesserungen und Arbeitserleichterungen, die Computer zum medizinischen Alltag beitragen können. Einige Behandlungen, Diagnoseverfahren und organisatorische Aufgaben wurden durch Computer überhaupt erst möglich. Auf der anderen Seite gibt es eine Vielzahl an Fakturen, die Computerbenutzung im Gesundheitswesen erschweren und ihre Entwicklung zu einer herausfordernden, sogar frustrierenden Aufgabe machen können. Diese Faktoren sind nicht ausschließlich technischer Natur, sondern auch auf soziale und ökonomische Gegebenheiten zurückzuführen. Dieser Report beschreibt einige Besondenderheiten von IT Systemen im Gesundheitswesen, mit speziellem Fokus auf gesetzliche Rahmenbedingungen, Standards und Sicherheit.
APA, Harvard, Vancouver, ISO, and other styles
28

El-Sheikh, Mahmoud Mohamed Omar. "Developing a Libyan information privacy framework." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/65866/1/Mahmoud%20Mohamed%20Omar_El-Sheikh_Thesis.pdf.

Full text
Abstract:
This thesis considers how an information privacy system can and should develop in Libya. Currently, no information privacy system exists in Libya to protect individuals when their data is processed. This research reviews the main features of privacy law in several key jurisdictions in light of Libya's social, cultural, and economic context. The thesis identifies the basic principles that a Libyan privacy law must consider, including issues of scope, exceptions, principles, remedies, penalties, and the establishment of a legitimate data protection authority. This thesis concludes that Libya should adopt a strong information privacy law framework and highlights some of the considerations that will be relevant for the Libyan legislature.
APA, Harvard, Vancouver, ISO, and other styles
29

Hall, Thea Denean. "Public Perception and Privacy Issues with DNA Regulations and Database in Alabama." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/3099.

Full text
Abstract:
The Combined DNA Index System (CODIS) database is utilized in all 50 states for matching DNA evidence with criminal suspects. While each state administers CODIS, which ultimately feeds into a national database, little is understood about how citizens in states perceive the utility of such a database and how their perceptions and knowledge of DNA could impact state policy changes though voting. Research also suggests that the "CSI Effect" may impact how citizens perceive the role of a national DNA database. Grounded on Gerbner's cultivation theory, the purpose of this study was to determine if, in Alabama, there is a statistically significant relationship between the likelihood of providing DNA and the educational level and gender of study participants and perceptions concerning expanded support state participation in CODIS. Data were collected through an online survey administered to a random sample (n = 584) residents of Alabama that focused on examined the relationships between demographics variables of age, race or ethnicity, level of education and the CSI effect, and support of increased participation in in a standardized national DNA database. Findings indicate that there is not a statistically significant relationship between the CSI effect and support of participation in CODIS. However, data analysis revealed that level of education (p=.05) and gender (p=
APA, Harvard, Vancouver, ISO, and other styles
30

Liljedahl, Hildebrand Teodor, and Filip Nyquist. "Cookies, GDPR and Dark patterns : Effect on consumer privacy." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21726.

Full text
Abstract:
The European General Data Protection Regulation has changed how users interact with cookie notices online. The rules state that users consent must be given via a clear, affirmative act and easily withdrawable by the end-user. Dark patterns, a way of tricking a user into giving more consent than needed with the help of, for example,size of objects, text and button colour could be applied to these notices to trick the user into giving more consent than needed. The objective of the thesis study was to develop a scraper in Python which could analyze web pages automatically against a set of created measurable parameters. That means that first, measurable parameters needed to be defined for the scraper, and then, implemented in such a way that it automatically could find and analyze cookie notices. The scraper was implemented in Python with the help of the browser testing libraries called Splinter and Selenium. The results from the experiment showed that the size of the notices was mostly small, but some pages used up the whole page for the notice. The amount of pre-ticked boxes and the readability of the notices also showed usage of dark patterns. The conclusion that can be drawn from the result is that the GDPR and e-Privacydirective have affected the usage in most web pages, as they seem to use some types of dark patterns to trick the user into giving more consent than is needed to be able to use the web page, and with an improved scraper, the result could show even more<br><p>Presentation har redan ägt rum på zoom </p>
APA, Harvard, Vancouver, ISO, and other styles
31

Van, der Merwe Melani. "The challenges of regulating private military companies: exploring the possibilities." Master's thesis, University of Cape Town, 2013. http://hdl.handle.net/11427/4460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Dawes, S. "Broadcasting regulation and the public-private dichotomy." Thesis, Nottingham Trent University, 2013. http://irep.ntu.ac.uk/id/eprint/74/.

Full text
Abstract:
This thesis is a theoretical and methodological engagement with the extent to which the public-private dichotomy is an appropriate and effective framework within which to critically approach the history of broadcasting regulation in the UK. The critical literature on the subject tends to present a narrative of decline, from an ethos of public service and citizenship, which is presumed to have enabled the public sphere, to a neoliberal faith in market logic and consumer choice, which is accused of undermining it. Much of this discussion is theoretically weakened, however, by a lack of engagement with the relevant literatures, and by the reduction to unitary oppositions between commonsensical terms of what are actually protean distinctions between contentious concepts. Taking this claim as its starting point, the thesis will attempt to clarify the ambiguity of the key concepts of debate on broadcasting regulation, recognising the need for the complexification of distinctions rather than their simplification or abandonment. Although not arguing that the assumptions or conclusions in the dominant literature are incorrect, the aim of the thesis is nevertheless to move away from an approach that identifies public service broadcasting (PSB) with political citizenship and the public sphere, and to explore instead the ways in which the distinction between public and private, and that between citizens and consumers, has always been a negotiated and unresolved process. Consequently, critical engagement with theoretical debates on citizenship, consumption, neoliberalism and the public sphere, as well as with methodological debates on the critical and genealogical approaches to discourse analysis, will be undertaken as a first step towards a more theoretically-informed (and more critical) genealogical account of the history of broadcasting regulation.
APA, Harvard, Vancouver, ISO, and other styles
33

Hamid, Mir Ajmal. "Regulation of private health care in Pakistan." Thesis, London School of Hygiene and Tropical Medicine (University of London), 2001. http://researchonline.lshtm.ac.uk/682255/.

Full text
Abstract:
The private health sector in Pakistan has been expanding rapidly, largely unregulated and partly at the expense of the public sector. While there have been previous attempts at formulating policies for the regulation of this sector, these have not always been based on ground realities, with the result that they never reached the stage of implementation. The objectives of the thesis were: 1) to describe and evaluate the existing regulatory framework governing health care provision in general and private health care provision in particular both at federal & provincial levels; 2) to explore the views and perceptions of key stakeholders regarding existing regulations and the reasons for their effectiveness/non-effectiveness; 3) to identify whether and how regulatory mechanisms can be made to work effectively; and 4) to explore the views of stakeholders regarding the potential for alternative mechanisms for ensuring the quality of formal private medical services, including the role of information dissemination to service users/the public. The methods adopted to achieve the stated objective were mapping of the existing legislations and a stakeholder analysis. The results showed that the existing legislations on regulation of health care provision were scanty, weak and inadequate and required radical re-structuring. The stakeholder analysis demonstrated the conflicting interests of the state and the private providers, the role of the powerful medical community and the views of the service users, who were shown to be the ultimate victims. Avenues for alternative regulatory mechanisms, including one based on information dissemination were explored and their feasibility discussed. It is hoped that the information gained from this study, by reflecting the views of the various actors in this process, will contribute towards the formulation of a policy for regulation of private health care provision in Pakistan, which is realistic, feasible and sustainable.
APA, Harvard, Vancouver, ISO, and other styles
34

Lu, Lerong. "The regulation of private lending in China." Thesis, University of Leeds, 2017. http://etheses.whiterose.ac.uk/17746/.

Full text
Abstract:
This thesis mainly explores legal and regulatory issues regarding the private lending market in China, which is a vital element of the country’s shadow banking system and used by millions of private businesses as an alternative financing channel. Over the past four decades, China said goodbye to the old centrally planned economy and embraced Adam Smith’s free market ideology. It has witnessed the rapid growth of private capitalism as local entrepreneurs started their business ventures to pursue personal wealth. In contrast to the well-known story of China’s economic achievements, how Chinese businesses are being financed remains a secret. In fact, most entrepreneurs have been facing severe financing difficulties, for the state- dominated banks often refuse to lend to the private sector. Therefore, they can only rely on private financing to borrow money, giving rise to a massive private lending market running outside of the official regulatory regime. In recent years, the shadow banking system has encountered a series of credit crises when numerous borrowers failed to repay high-cost private debts as a result of the slowdown of Chinese economy. It caused investors heavy financial losses and led to a large number of corporate bankruptcy cases. Many bosses chose to abandon their companies and run away to evade debts. Against this background, this thesis is a timely work to investigate China’s shadow banking system and answers the following questions: First, how the private lending market has evolved into a major form of alternative finance for private businesses; Second, what factors contributed to the private lending crisis, what impacts the crisis had on relevant stakeholders, and what problems were exposed during the crisis; Third, whether the current legal framework is effective and efficient in regulating private lending activities, and if not, what can be improved; Fourth, to what extent China’s experimental financial reforms can solve the private financing puzzle; Fifth, whether British SMEs also face the similar financing dilemma as their Chinese counterparts do, and what alternative financing methods are available in the UK. After answering these questions, the thesis provides recommendations for China’s policy-makers, in terms of how to regulate private loans and creating more financing resources for private entrepreneurs.
APA, Harvard, Vancouver, ISO, and other styles
35

Pinto, Augusto Eduardo Miranda. "Os efeitos da cidade digital: o direito à privacidade e à liberdade de informação." Universidade do Estado do Rio de Janeiro, 2012. http://www.bdtd.uerj.br/tde_busca/arquivo.php?codArquivo=4518.

Full text
Abstract:
O presente trabalho analisa a formação da cidade digital nas relações sociais, ressaltando os efeitos da garantia do direito à privacidade no ambiente dos navegantes de sites e redes sociais, em função das repercussões jurídicas do vazamento de informações da vida pessoal dos usuários da rede, e do tratamento dos dados coletados pelos prestadores de serviço. Através do ciberespaço formam-se comunidades virtuais que ultrapassam a necessidade de localidade e sociabilidade, criando um isolamento social e abandonando as interações face a face em ambientes reais, originando uma sociabilidade baseada no individualismo. Avaliamos os novos padrões de interação que se originam nesta nova formatação de coletividade informacional e suas repercussões no âmbito do direito. Em uma perspectiva mais detalhada, esse estudo indica quais as hipóteses de responsabilidade civil dos provedores na Internet em decorrência de atos ilícitos cometidos por terceiros e as alternativas de um sistema de tutela da privacidade à proteção de dados, face à lesão no ambiente informacional. O levantamento das possíveis situações de responsabilização civil foi efetuado através da análise da jurisprudência e da doutrina dominante, ressaltando os aspectos fáticos que caracterizam sua formatação. Esse modelo se impõe, através de uma relação hierárquica a uma multiplicidade de indivíduos, criando um encarceramento perfeito através do exercício do biopoder. Tais papéis são reforçados por uma cultura consumista e a sociedade do espetáculo, que transforma o indivíduo em mercadoria levantando perfis de usuários conectados em rede, propiciando uma categorização dos consumidores. Nesse contexto, apresentamos os riscos de uma sociedade de vigilância que se apresenta factível como um produto das relações de mercado, que possibilita dispor livremente de um conjunto crescente de informações. Esta constante vigilância invade todos os espaços, custodiando nosso comportamento independente do tempo, com uma implacável memória no âmbito das comunicações eletrônicas, tornando nosso passado eternamente visível e fazendo surgir situações constrangedoras a nos assombrar.<br>The present work analyzes the formation of the Digital City within social rela-tions, focusing on the effects of the warranty of the right to privacy for users of the virtual environment, namely, websites and social networks. This study was motivated by the juridical effects, both of the leakage of personal information of the Internet users, and of the treatment of data collected by its service providers. The virtual communities which are formed by means of cyberspace surpass the need for locality and sociability. Since they generate social isolation and the abandonment of face-to-face interactions in real environments, they help creating a sociability pattern based on individualism. In this work, the new interaction patterns originated in this new format of informational collectivity and its effects concerning laws will be analyzed. More specifically, this study presents a number of hypotheses of civil liability of the Internet service providers in view of illicit acts by other parties, as well as alternatives, as far as a privacy tutelage system regarding data protection is concerned, in view of injury in the informational environment. The mapping of possible situations of civil liability charging was conducted by means of analysis, both of jurisprudence and of the prevailing doctrine, and it highlighted the factual aspects of the case which characterize its formatting. The model under study is imposed upon a multiplicity of individuals, thus creating a perfect incarceration by means of the exertion of biopower. The roles of the Internet surfers within informational society are reinforced by a consumerist culture and by the society of spectacle, which turns the individual into goods, once it researches the profiles of the Internet-connected users, and thus categorizes them as consumers. In this sense, this work discusses the risks of a society of vigilance, which functions as a product in market relations and makes it possible disposing freely of a growing number of information. Such constant vigilance invades all environments and, regardless of chronological time, monitors our behavior by means of an implacable memory, making our past eternally visible as well as generating constraining situations which astound us.
APA, Harvard, Vancouver, ISO, and other styles
36

Rodrigues, Rafael Mourão dos Santos. "Essays on incentives, procurement and regulation." reponame:Repositório Institucional do FGV, 2013. http://hdl.handle.net/10438/11744.

Full text
Abstract:
Submitted by Rafael Mourão dos Santos Rodrigues (rmrodrigues@fgvmail.br) on 2014-05-05T18:47:15Z No. of bitstreams: 1 Tese_RafaelMourao.pdf: 1333900 bytes, checksum: 1d361f3d57be73e6205d021c993d7fd9 (MD5)<br>Approved for entry into archive by ÁUREA CORRÊA DA FONSECA CORRÊA DA FONSECA (aurea.fonseca@fgv.br) on 2014-05-08T13:31:42Z (GMT) No. of bitstreams: 1 Tese_RafaelMourao.pdf: 1333900 bytes, checksum: 1d361f3d57be73e6205d021c993d7fd9 (MD5)<br>Approved for entry into archive by Marcia Bacha (marcia.bacha@fgv.br) on 2014-05-13T14:22:53Z (GMT) No. of bitstreams: 1 Tese_RafaelMourao.pdf: 1333900 bytes, checksum: 1d361f3d57be73e6205d021c993d7fd9 (MD5)<br>Made available in DSpace on 2014-05-13T14:41:12Z (GMT). No. of bitstreams: 1 Tese_RafaelMourao.pdf: 1333900 bytes, checksum: 1d361f3d57be73e6205d021c993d7fd9 (MD5) Previous issue date: 2013-10-30<br>This thesis is composed of three articles. The first article, 'Simple Contracts under Simultaneous Adverse Selection and Moral Hazard', considers a principal-agent problem under the simultaneous presence of both moral hazard and adverse selection, where the adverse selection dimension is given over the outcome conditional probabilities given the agents actions. The second article, 'Public-Private Partnerships in the Presence of Adverse Selection' analyses the optimality of private-public partnerships under the presence of adverse selection. The third article, 'Regulation Under Stock Market Information Disclosure', by its turn, considers the problem of regulating publicly traded companies, where firms have incentives to send opposing signals to the regulator and the market.<br>Esta tese é composta de três artigos. No primeiro artigo, 'Simple Contracts under Simultaneous Adverse Selection and Moral Hazard', é considerado um problema de principal-agente sob a presença simultânea dos problemas de risco moral e seleção adversa, em que a dimensão de seleção adversa se dá sobre as distribuições de probabilidade condicionais as ações do agente. No segundo artigo, 'Public-Private Partnerships in the Presence of Adverse Selection' é analisada a otimalidade de parcerias público-privadas sob a presença de seleção adversa. No terceiro artigo, 'Regulation Under Stock Market Information Disclosure', por sua vez, é considerado o problema da regulação de firmas de capital aberto, onde as firmas possuem incentivos para mandar sinais opostos para o regulador e o mercado.
APA, Harvard, Vancouver, ISO, and other styles
37

Furst, Alexander J. "State Regulation of Private Police and Security Agents." Bowling Green State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1245626912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Zanetic, Andre. "A questão da segurança privada: estudo do marco regulatório dos serviços particulares de segurança\"." Universidade de São Paulo, 2006. http://www.teses.usp.br/teses/disponiveis/8/8131/tde-14062007-154033/.

Full text
Abstract:
A grande expansão dos serviços particulares de segurança, verificada em diversos países a partir de meados do século XX, traz à tona importantes questões relativas à responsabilidade do Estado sobre a segurança e sobre a necessidade de aprimoramento dos mecanismos de regulação e controle pelos órgãos responsáveis, sobretudo devido à diversificação das demandas por esse tipo de serviço, como as grandes empresas e os espaços privados abertos ao público, que representam hoje os principais consumidores dos serviços de segurança. A partir de parâmetros observados na literatura internacional, em documentos oficiais e nos dados relativos ao setor, este trabalho faz uma análise do marco regulatório existente no Brasil localizando as implicações relativas a algumas características mais problemáticas, como o treinamento e qualificação dos profissionais, a disseminação das empresas clandestinas, o segundo emprego dos policiais como guardas privados, o uso de armas de fogo e a questão das sanções e da regulação de acesso empregadas na segurança privada.<br>The growth of private security verified in many countries in the middle of twentieth century displays important questions about state responsibility in relation to the security and the need to improve the mechanisms of control and regulation, especially due the new and diversified demands for this kind of service, like the big enterprises and the private spaces open for the public which represent today the main costumers of security services. Taking into consideration approaches observed in the international literature, official documents and the data relative to this sector, this work analyze the Brazilian regulatory framework, showing the implications about some more problematic features, like the training and qualification of the professionals, the dissemination of illegal enterprises, the second job of the public police in the private security, the use of firearm and the question about the sanctions and regulation of access used in private security.
APA, Harvard, Vancouver, ISO, and other styles
39

Kalinauskas, Marius. "Privatumo ir asmens duomenų apsaugos reguliavimas tarptautiniu mastu." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2008~D_20090204_113311-03419.

Full text
Abstract:
Darbe nagrinėjami privatumo bei asmens duomenų apsaugos probleminiai aspektai tarptautiniu mastu. Apibūdinti šia vertybę yra išties nelengva, kadangi joje persipynę daugybė skirtingų, bet tarpusavyje susietų kategorijų. Nepaisant to, privatumas priskirtinas prie svarbiausių žmogaus teisių bei laisvių ir yra gerbtinas bei saugotinas. Šio darbo tikslas – pažvelgti į dabar esantį tarptautinį teisinį reguliavimą privatumo bei asmens duomenų apsaugos srityje, atskleisti bei aptarti grėsmes privatumui XXI a. pradžioje bei atsakyti į klausimą: ar dabartinis privatumo bei asmens duomenų apsaugos reguliavimas atitinka šiandienos technologines, socialines bei ekonomines realijas. Magistriniame darbe keliama hipotezė, jog privatumo bei asmens duomenų apsaugos reguliavimas nėra pakankamas, todėl jį būtina iš naujo peržiūrėti bei papildyti. Autorius išsako nuomonę, jog pasaulis yra per daug skirtingas ir kad vieningo bei efektyvaus teisės akto priėmimas šiomis aplinkybėmis tampa sunkiai įmanomu. Darbe aptariamas tarptautinis bei regioninis privatumo bei asmens duomenų apsaugos reglamentavimas, supažindinama su galimais pažeidimais šioje srityje, keliami probleminiai klausimai dėl atskirų šios teisės apsaugos reguliavimo aspektų bei pateikiami pasiūlymai dėl efektyvesnio iškilusių problemų sprendimo. Iškeltam tikslui bei iš jo sekantiems uždaviniams įgyvendinti naudojami lingvistinis, loginis, lyginamasis, sisteminės analizės bei kiti tyrimo metodai. Darbą sudaro keturi skyriai, kuriuose... [toliau žr. visą tekstą]<br>The main research issue of this master thesis is problem-oriented approach of privacy and data protection regulation in international level. It’s hard to conceptualize privacy as a value, because it’s very complex ant closely intertwined with other categories of similar topic. Nevertheless, privacy is numbered as one of the fundamental human rights and should be treated with respect and under great protection. The main objective of the final paper is to overlook today’s legal basis of international law norms concerning privacy and data protection. Also, to reveal and discuss main threats to mentioned value at the beginning of XXI century and answer the question: is nowadays regulation of privacy and data protection in international level deals with challenges of technological, social and economical reality. In this final paper author comes with the hypothesis that privacy and data protection regulation is ineffective in international level. Legal acts must be revised and supplemented with new norms which should be up to date considering nowadays reality. It is also noted that differences of various countries are huge and effective new generation privacy and data protection regulation is more like a utopia. Some problematic aspects are discussed in master’s thesis concerning privacy violations, legal norm regulation effectiveness and possible ways of solving these problems. In order to achieve goals of objective, author uses scientific methods for his research. These methods... [to full text]
APA, Harvard, Vancouver, ISO, and other styles
40

PROCÓPIO, MURILO RAMALHO. "PRIVACY, ANONIMITY AND SELF-DETERMINATION: THE REGULATION OF POLITICAL PARTICIPATION IN SURVAILANCE SOCIETY." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2015. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=26703@1.

Full text
Abstract:
PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO<br>CONSELHO NACIONAL DE DESENVOLVIMENTO CIENTÍFICO E TECNOLÓGICO<br>Esta dissertação procura realizar uma investigação do fenômeno social de manifestações políticas individuais e coletivas exercidas de forma anônima sob a ótica do direito à privacidade, principalmente em razão da tendência proibitiva adotada pelos entes institucionais brasileiros nas oportunidades em que se manifestaram sobre o tema. Neste sentido, desenvolve-se uma pesquisa teórico-prescritiva, de método hipotético-dedutivo, cujo principal objetivo se refere à construção analítica de determinados conceitos relacionados à participação política democrática na atualidade, ao anonimato e à privacidade. Pretende-se, portanto, identificar e propor alguns princípios regulatórios do exercício da manifestação política anônima, de acordo com limites explorados no desenvolvimento da própria pesquisa. A construção destes princípios regulatórios, por sua vez, foi realizada a partir dois conjuntos conceituais principais. Primeiramente, foi utilizada a concepção de Michael Hardt e Antonio Negri a respeito de Multidão (2005), o sujeito político responsável por guiar as ações políticas atuais, bem como a descrição das manifestações em rede feita por Manuel Castells (2013). No que diz respeito aos contornos assumidos atualmente pelo direito à privacidade e sua relação com o anonimato das ações políticas, foi utilizada a noção de privacidade desenvolvida por Stefano Rodotà (2007, 2011). A partir destes dois eixos teóricos principais, identificamos que, nas diversas formas de atuação política contemporâneas, influenciadas, principalmente, pelo paradigma comunicacional das tecnologias digitais, o anonimato, além de característica essencial da comunicação e expressão em diversos casos, apresenta benefícios sociais que devem ser levados em consideração em qualquer proposta regulatória sobre o assunto.<br>The present dissertation intends to realize an investigation about the social phenomenon of individual and collective political actions conducted anonymously from the perspective of the right to privacy, especially because of the prohibitive trend adopted by Brazilian s institutional agents, in the opportunities they have spoken on the subject. In this sense, we develop a theoretical and prescriptive research, using the hypothetical-deductive method. Our main objective is the analytic construction of certain concepts related to democratic political participation today, to the anonymity and to privacy. It is intended, therefore, to identify and propose some regulatory principles of the exercise of anonymous political action, according to limits exploited in the development of the research. The construction of these regulatory principles, in turn, was made from two major conceptual perspectives. First, we used the concept of Michael Hardt and Antonio Negri about Multitude (2005) , the political entity responsible for guiding the current political actions, as well the description of events in network made by Manuel Castells (2013) . With regard to the contours currently assumed by the right to privacy and its relation to the anonymity of political actions, we used the privacy notion developed by Stefano Rodotà (2007, 2011). From these two main theoretical axes, we found that, in the various forms of contemporary political activity, mainly influenced by the communication paradigm of digital technologies, anonymity, as an essential feature of communication and expression in several cases, has already social benefits that should be considered in any regulatory proposal on the subject.
APA, Harvard, Vancouver, ISO, and other styles
41

Narváez, Bustamante Alex Fernando. "Policy implications of ubiquitous technologies in the car : privacy, data ownership, and regulation." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/38567.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program, 2006.<br>Includes bibliographical references (leaves 58-61).<br>Motor vehicle travel is the primary means of transportation in the United States, providing freedom in travel and enterprise for many people. However, motor vehicle accidents are the largest component of unintentional injuries and contribute to a high degree of morbidity and mortality for all ages. This thesis analyzes the relationship between feedback technologies and driver behavior. Based on the findings, policy recommendations were made to help ensure that the privacy and trust of the public are not compromised, as ubiquitous technologies become a reality in automobiles. The thesis provides an overview of the most modem mechanisms available in cars today. Furthermore, this thesis takes the first steps to combining existing technologies into a single system that not only tracks driver behavior, but also provides feedback in the hopes of improving drive performance and safety. The qualitative discussion includes a stakeholder analysis of the prime interests and effects of all parties that are impacted by ubiquitous technologies in the car. The qualitative discussion also contains the results of four focus groups that were conducted to gain first hand insights about the view of the drivers about monitoring technologies in the car.<br>(cont.) This study finds that most drivers have a symbiotic relationship with the technologies that exist in their car; however, drivers feel uncomfortable with a fully automated system. Their concerns rise from the belief that fully automated systems take control away from the driver. Drivers were also concerned about the privacy and security of the data collected and stored by these technologies in their vehicles. These concerns can be addressed within the existing legal framework, but additional regulations also need to be designed because as the technology changes so will the concerns. Therefore, it is important to design policies that are flexible, rather than completely depending on current regulations to address future concerns.<br>by Alex Fernando Narváez Bustamante.<br>S.M.
APA, Harvard, Vancouver, ISO, and other styles
42

Robol, Marco. "Consent modeling and verification: privacy regulations compliance from business goals to business processes." Doctoral thesis, Università degli studi di Trento, 2020. http://hdl.handle.net/11572/277802.

Full text
Abstract:
Privacy regulations impose on companies limitations about the collection, use, and disclosure of user data. One of the actions most companies undertake for this, consists in modifying their systems with processes for consent acquisition and management. Unfortunately, where systems are large and with many dependencies, they often also have little documentation, and knowledge on the system is distributed among different domain experts. These circumstances make the re-engineering of systems a tedious and complex, if not impossible, activity. This PhD Thesis proposes a model-based method with a top-down approach, for modeling consent requirements and analyzing compliance with regulations, by refinement of models from organizational structure down to business processes. The method is provided with guidelines in the form of a process and includes modeling languages and reasoning frameworks for the analysis of requirements with respect to a preset of privacy principles on consent. The Thesis includes validations with realistic scenarios and with domain practitioners from the healthcare domain.
APA, Harvard, Vancouver, ISO, and other styles
43

Robol, Marco. "Consent modeling and verification: privacy regulations compliance from business goals to business processes." Doctoral thesis, Università degli studi di Trento, 2020. http://hdl.handle.net/11572/277802.

Full text
Abstract:
Privacy regulations impose on companies limitations about the collection, use, and disclosure of user data. One of the actions most companies undertake for this, consists in modifying their systems with processes for consent acquisition and management. Unfortunately, where systems are large and with many dependencies, they often also have little documentation, and knowledge on the system is distributed among different domain experts. These circumstances make the re-engineering of systems a tedious and complex, if not impossible, activity. This PhD Thesis proposes a model-based method with a top-down approach, for modeling consent requirements and analyzing compliance with regulations, by refinement of models from organizational structure down to business processes. The method is provided with guidelines in the form of a process and includes modeling languages and reasoning frameworks for the analysis of requirements with respect to a preset of privacy principles on consent. The Thesis includes validations with realistic scenarios and with domain practitioners from the healthcare domain.
APA, Harvard, Vancouver, ISO, and other styles
44

Wacks, Raymond Ivor. "Personal information : the protection against disclosure and regulation in the use of private facts about the individual." Thesis, University of London, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.362985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Dogru, Ali Kemal. "Outsourcing, managing, supervising, and regulating private military companies in contingency operations." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5171.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>This thesis examines the utilization of private military companies (PMCs) by government agencies of the United States in contingency operations in Iraq and Afghanistan. The aim of this thesis is to investigate the roles that PMCs play in current contingency operations, and to analyze how PMCs can become more useful instruments in contingency operations if they are properly outsourced, managed, supervised, and regulated. In this regard, this study largely rests on transaction cost economics to explain the logic of outsourcing from governmental agencies' perspectives. On the other hand, principal-agent theory and new institutionalism provide the theoretical basis of using effective oversight mechanisms to exert better control over the activities of PMCs in contingency operations. This thesis recommends the United States, Iraq, and Afghanistan use the Montreux Document as a guide to better regulate PMCs in contingency operations.
APA, Harvard, Vancouver, ISO, and other styles
46

Rännare, Angelica. "Nya Dataskyddsförordningens påverkan på en organisation : En fallstudie med fokus på privacy by design." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-13718.

Full text
Abstract:
Detta arbete har till syfte att studera den nya dataskyddsförordningen General Data Protection Regulation´s (GDPR) utmaningar och påverkan på både organisation samt system. Fokus i arbetet har varit på det specifika kravet privacy by design som är en del av GDPR. GDPR-förordningen kommer träda i kraft den 25 maj 2018. Eftersom GDPR är en ny förordning så har det inte skett forskning i större utsträckning i ämnet ännu. Den forskning som har skett inom området har mestadels varit inom juridiken. Detta resulterar i att ämnet är högaktuellt att undersökas eftersom ny kunskap kommer tillkomma genom detta arbete. Arbetet syftar till att undersöka hur GDPR genom sina krav påverkar en organisation och hur hänsyn tas till det specifika kravet privacy by design. Det kommer också undersökas vilka krav som ställs på teknik och funktioner. Genom att göra detta kommer kunskap tas fram om och hur en organisation förbereder sig och vad som krävs för att uppfylla kraven med GDPR. Privacy by design är en filosofi på hur inbyggd integritet kan användas för att skydda och bygga in den personliga integriteten i system. Den baseras på sju principer som skall användas för att förstå hur integritet kan skyddas. Men likt alla lösningar finns det utmaningar. Det är dessa utmaningar som arbetet skall undersöka och för att utifrån resultatet ge rekommendationer som förhoppningsvis kan användas för att få en överblick hur en organisation ligger i fas med privacy by design, som är en del av GDPR. Baserat på organisationens svar kommer rekommendationer ges för hur organisationen skulle kunna förbättra sitt arbete ytterligare. Metoden som använts till stöd för detta arbete är en fallstudie av kvalitativ art, och innefattar intervjuer med personer från en organisation inom säkerhetsbranschen som utvecklar metoder samt mjukvara för informationssäkerhetsarbete. Organisationen som har undersökts befinner sig i startgroparna för säkerställandet av GDPR och har gjort en inledande analys av läget. Fyra intervjuer har legat till grund för studien och på dessa har en innehållsanalys genomförts. Med hjälp av analysen så framträder en tydlig bild av hur arbetet kan se ut, i samband med lagförändringen ur privacy by design-perspektivet. För att ta reda på detta har en organisation som arbetar med informationssäkerhet och mjukvaruutveckling undersökts. Till arbetet utvecklades en frågeguide och en sammanfattning av principer, som är relaterade till privacy by design. Det har visat sig att organisationen som undersöktes till stora delar arbetar med privacy by design, men har ytterligare utmaningar att bemöta. Analys och diskussion av intervjuerna har resulterat i rekommendationer till organisationen angående hur de kan stärka upp sitt informationssäkerhetsarbete ytterligare. Dessutom har en frågeguide, som återfinns i bilagorna, tagits fram och denna kan användas av andra organisationer som önskar undersöka hur de ligger till i sitt arbete med GDPR:s krav på privacy by design.<br>The purpose of this work is to study the General Data Protection Regulation (GDPR) and what challenges and impact this regulation can have on both organization and systems. The focus of the work will be on the specific requirement “privacy by design” that is one part of GDPR. The GDPR will come into force on May 25, 2018. Since the GDPR is a new regulation, there has been little research on the subject yet. The research that has taken place in the field has mostly been in the field of law. This results in the subject being highly relevant for further studies, since this work will unravel new information. The purpose of the work is to investigate how GDPR, through its requirements, affects an organization and how to take into account the specific requirement of privacy by design. It will also be investigated which demands are made of technology and functions. By doing this, knowledge will come about if and how an organization prepares and what it takes to meet the requirements of the GDPR. Privacy by design is a philosophy of how built-in integrity can be used to protect and integrate the personal integrity of systems. It is based on seven principles that will be used to understand how integrity can be protected. But like all solutions there are challenges. These are the challenges that the work will investigate, and as a result give recommendations that hopefully can be used to get an overview of how an organization, is in phase with privacy by design, which is part of GDPR. Based on the organization's response, recommendations will be given for how the organization could further improve its work. The method used to support this work is of a qualitative nature and includes interviews with persons from an organization in the security industry that develop methods and software for information security work. The organization that has been investigated is in the pitfalls for ensuring GDPR and has conducted an initial analysis of the situation. The foundation of this study relies on four interviews, on which a content analysis was made. Through this analysis, a clear picture emerges of how the work with upcoming challenges can present itself, with the changes regarding the new law concerning privacy by design. In order to investigate this, an organisation that works with information security and software development has been scrutinized. As a part of the study, a questionnaire and a summary of the principles relevant to privacy by design, was developed. The conclusion was that the scrutinized organisation generally does work with privacy by design, but still has some challenges to face. The analysis and discussion of the interviews resulted in recommendations for the organization on how to further strengthen their work with information security. Furthermore, a questionnaire, which can be found in the appendix, has been developed, and can be used by other organizations wishing to examine their progress on the work with implementing the GDPR requirements regarding privacy by design.
APA, Harvard, Vancouver, ISO, and other styles
47

Schart, Ellen E. "Private sector principal influence on broadcast ownership regulation /." Available to subscribers only, 2005. http://proquest.umi.com/pqdweb?did=1079668381&sid=3&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Galai, Katerina. "The use and regulation of private military companies." Thesis, University of Sussex, 2017. http://sro.sussex.ac.uk/id/eprint/68194/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Pettersson, Li. "Dataskyddsförordningens organisatoriska påverkan på privata bolag." Thesis, Linköpings universitet, Affärsrätt, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-137272.

Full text
Abstract:
Idag regleras personuppgiftsbehandlingar i Sverige främst genom Dataskyddsdirektivet och personuppgiftslagen. I takt med den omfattande användningen och utvecklingen av internet, av såväl privatpersoner som företag, krävs en uppdatering kring dataskydd för personuppgifter.Personuppgifter lagras hos företag i enorma mängder och skyddet för den personliga integriteten anses inte längre vara lika stort, varför en Dataskyddsförordning har utformats som en gemensam reglering i EU. Uppsatsen är en framläggning av hur privata bolag påverkas av de kommande förändringarna med huvudfokus på ansvar, roller, förberedelser, planering samt vilka sanktioner bolag står inför om reglerna inte efterlevs. I Dataskyddsförordningen utnämns ett flertal befattningar med skilda roller inomorganisationen. Dessa är personuppgiftsansvarig, personuppgiftsbiträde samtdataskyddsombud. I och med den nya regleringen har varje befattning ett utökat ansvareftersom att reglerna skärps. Med Dataskyddsförordningen kommer nya regler som kräver förberedelser samt planering för att artiklarna ska kunna efterlevas den dag ikraftträdandet sker. Exempel här är incidentrapportering som kräver tydliga rutiner för att verksamheten ska fungera. För att organisationer ska förstå allvaret, i och med de höga sanktionsavgifterna bolaget kan påföras, krävs att ledningen tar implementeringen på allvar och upprättar en analys samt en genomtänkt plan för arbetet. Det kan konstateras att Dataskyddsförordningen leder till ett omfattande arbete för varje organisation där rollerna behöver tydliggöras, i vissa fall behöver nya roller utses. Samtidigtbehöver kompetens finnas och det krävs stor planering i varje verksamhet för att reglerna ska efterlevas. Implementeringsarbetet behöver sättas igång direkt för att allt ska vara i sin ordning till den dag Dataskyddsförordningen träder i kraft. Dataskyddsförordningen är ett komplext regelverk. Osäkerheter kring Dataskyddsförordningens reglering kommer dock troligtvis att minska när Europeiska dataskyddsstyrelsen och Datainspektionen utfärdar fler tydliggöranden samt genom svensk utredning. Övergripande i hela bolaget gäller samma regler med vissa undantag, men viktigt är att anpassa och föra implementeringsarbetet utifrån den egna specifika verksamheten.
APA, Harvard, Vancouver, ISO, and other styles
50

Makki, S., S. Meek, A. Musah, Michael J. A. Crowley, and D. Lilly. "Private Military Companies and the Proliferation of Small Arms: Regulating the Actors." Thesis, British American Security Information Council (BASIC), International Alert and Saferworld, 2001. http://hdl.handle.net/10454/4268.

Full text
Abstract:
yes<br>The 1990s witnessed a change in the way wars were fought as the amount of available weaponry increased and the types of actors engaged in warfare multiplied. The opening up of the international arms trade, in particular with new buyers and more channels of supply, has raised concerns about who purchases weapons and for what use. Afeature of this changing nature of conflict has been the continuing, if not growing, presence of mercenaries and the emergence of private companies contracted to provide military and security services. These range from logistical support and training to advice and procurement of arms and on-the-ground intervention. This briefing highlights how the activities of mercenaries and private military and security companies can contribute to small arms proliferation and misuse and examines steps the international community can take at the UN Small Arms Conference and elsewhere to effectively combat mercenarism and regulate the activities of private military and security companies. The role played by these companies relates not only to provisions contained in the contracts they sign with their clients to provide large amounts of weaponry, but also how the military and security services and training that they provide contributes to the demand for weapons in the regions where they operate. There are a number of ways in which mercenaries and private military and security companies are involved in small arms proliferation. These include: l Arms brokering and transportation activities l Violations of UN arms embargoes l Impact on human rights and humanitarian law l Driving demand for small arms Various measures already exist to ban the activities of mercenaries and regulate some of the activities of private military and security companies either through national legislation or international agreements. However, there is concern these efforts are neither comprehensive nor accepted widely enough to effectively control the activities of mercenaries and private military and security companies.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!