Academic literature on the topic 'Right to privacy of communication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Right to privacy of communication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Right to privacy of communication"

1

Gawu, Delali A., and Richard Obeng Mensah. "COVID-19 Contact Tracing and Privacy Rights in Ghana: A Critical Analysis of the Establishment of Emergency Communications System Instrument, 2020 (EI 63)." Journal of African Law 65, S2 (2021): 361–73. http://dx.doi.org/10.1017/s0021855321000425.

Full text
Abstract:
AbstractIn December 2019, the world woke up to the news of a novel coronavirus (COVID-19). Since then, governments across the globe have deployed various measures to contain the spread of the disease. The government of Ghana, among other measures, issued the Establishment of Emergency Communications System Instrument, 2020 (EI 63) to establish an emergency communications system to aid contact tracing during public health emergencies. This executive instrument has been criticized for illegally “legalizing” the breach of the privacy rights of electronic communications network subscribers in Ghana. This article critically analyses EI 63 in relation to the right to privacy of communication enshrined in Ghana's 1992 Constitution. It argues against the constitutionality of EI 63, calls for its revocation and replacement with an act of Parliament enacted with due regard for Ghana's legislative framework on the protection of the right to privacy of communication.
APA, Harvard, Vancouver, ISO, and other styles
2

Jørgensen, Rikke Frank. "The Right to Privacy under Pressure." Nordicom Review 37, s1 (2020): 165–70. http://dx.doi.org/10.1515/nor-2016-0030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Basimanyane, Dorcas. "The Regulatory Dilemma on Mass Communications Surveillance and the Digital Right to Privacy in Africa: The Case of South Africa." African Journal of International and Comparative Law 30, no. 3 (2022): 361–82. http://dx.doi.org/10.3366/ajicl.2022.0414.

Full text
Abstract:
Behind the cloak of maintaining national security and public order, African governments and the private sector constantly encroach upon the data privacy rights of individuals. The right to privacy is not only protected by various international human rights instruments that African states have voluntarily ratified but has been enshrined in several constitutions. Yet, without proper safeguards, the same states continue to stifle the right through intrusive surveillance methods. They indiscriminately acquire, intercept, transmit, analyse and retain an individual’s data, able to be amassed to generate intimate and detailed profiles of individuals. While the right to privacy is not absolute, international human rights law requires that its limitations be legal, justifiable and reasonable 129 . Hence the purpose of this article is to determine the extent to which the South African communications surveillance law conformed to the foregoing. The article finds that the silence of the Regulation of Interception of Communications and Provision of Communication-related Information Act 130 (RICA) on mass surveillance, its weak and ineffective data privacy safeguards, insufficient oversight provisions and law enforcement officials’ impunity render the law invalid for a democratic society. Further, the new personal data law 131 has exempted national security operations from its regulation. As a result, RICA needs to be reformed, as affirmed by the recent verdict of AmaBhunghane Centre for Investigative Journalism NPC v. Minister of Justice and Correctional Services & Others 132 .
APA, Harvard, Vancouver, ISO, and other styles
4

Izotova, Anzhelika N. "LEGAL REGULATION OF COMMUNICATION PRIVACY IN THE INFORMATION SOCIETY." RUDN Journal of Law 24, no. 4 (2020): 985–1004. http://dx.doi.org/10.22363/2313-2337-2020-24-4-985-1004.

Full text
Abstract:
The article is devoted to the regulation of communication privacy, which is not only a guarantee of the individual right to confidentiality and privacy, but also a necessary condition for the collective freedom of speech, trust in communication services, which is essential for formation of the information society. The right to communication privacy with the advent of new communication technologies is being transformed and expanded, which requires updating and harmonization of the legal framework. In this regard, the purpose of the research is to reveal problems and contradictions in updating legal regulation of communication privacy, including by analyzing legislation and existent scientific approaches to the content of communication privacy, description of mechanisms for both ensuring and limiting communication privacy, as well as interaction of legal entities regarding communication privacy. The relationship between Russian and European legislation, which regulate communication privacy (ePrivacy) have been considered in this paper. The research methodology is represented by such methods as dialectical, analysis, analogies, formal-legal, comparative methods of research activity. The work demonstrates different approaches to determining the content of the right to communication privacy, expanding the range of professional subjects of communication privacy, and loosening the mechanisms for limiting this right in the direction of its expansion in the context of interrelations between subjects of legal relations concerning communication privacy.
APA, Harvard, Vancouver, ISO, and other styles
5

Shuraleva, S. V. "THE RIGHT TO PRIVACY IN LABOR RELATIONS: THEORETICAL PROBLEMS OF LEGAL REGULATION." Вестник Пермского университета. Юридические науки, no. 57 (2022): 527–51. http://dx.doi.org/10.17072/1995-4190-2022-57-527-551.

Full text
Abstract:
Introduction: the article is devoted to research on the right to privacy in labor relations. Purpose: to analyze the current regulation of the right to privacy in Russian labor law, to explore the approaches that have developed in the practice of the European Court of Human Rights (hereinafter – ECtHR) and in the doctrine, to propose directions for improving labor legislation in terms of the right to privacy. Methods: general, general scientific methods; special scientific methods (system-structural, formal-legal, comparative-legal).Results: the right to privacy (to respect for private and family life, home, and correspondence) is generally recognized and is contained both in international acts and in regional (interregional, subregional) conventions and declarations. In the absence of definitions of private life and privacy in international documents and Russian legislation, of particular importance is how these concepts are interpreted by national and international courts. In contrast to the definitions of private life and privacy given by the Constitutional Court of the Russian Federation, the ECtHR considers professional activity to be part of private life since it allows people to build communication with the outside world. Analysis of the ECtHR decisions on the complaints of employees about the violation of Article 8 of the European Convention on Human Rights reveals the most typical violations of the right to respect for private and family life in the workplace in the practice of the ECtHR, and also indicates the increasing urgency of this issue. Despite Russia's withdrawal from the Council of Europe, it is advisable to take into account the legal positions of the ECtHR, along with its legal doctrine, when preparing proposals for amending and supplementing labor legislation. Noting the insufficiency of the current labor law regulation with regard to privacy, the paper explores the theoretical aspects of personal non-property labor rights and the right to privacy in labor relations, outlines the possible directions for improving labor legislation. Conclusions: the author notes development of the employee’s right to privacy, supplemented with the right to disconnect; it is expedient to include the right to privacy in the list of basic rights of employees in the Labor Code of the Russian Federation, while establishing the corresponding obligation of the employer. Since the right to privacy is realized not only in labor relations but also in some other, directly related, legal relations, it is proposed, taking into account the terminology of the Labor Code of the Russian Federation, to supplement the list of basic principles provided in Article 2 of the Labor Code with the principle of ensuring privacy in labor and other directly associated relations.
APA, Harvard, Vancouver, ISO, and other styles
6

Zuiderveen Borgesius, Frederik J., and Wilfred Steenbruggen. "The Right to Communications Confidentiality in Europe: Protecting Privacy, Freedom of Expression, and Trust." Theoretical Inquiries in Law 20, no. 1 (2019): 291–322. http://dx.doi.org/10.1515/til-2019-0010.

Full text
Abstract:
Abstract In the European Union, the General Data Protection Regulation (GDPR) provides comprehensive rules for the processing of personal data. In addition, the EU lawmaker intends to adopt specific rules to protect confidentiality of communications, in a separate ePrivacy Regulation. Some have argued that there is no need for such additional rules for communications confidentiality. This Article discusses the protection of the right to confidentiality of communications in Europe. We look at the right’s origins to assess the rationale for protecting it. We also analyze how the right is currently protected under the European Convention on Human Rights and under EU law. We show that at its core the right to communications confidentiality protects three individual and collective values: privacy, freedom of expression, and trust in communication services. The right aims to ensure that individuals and organizations can safely entrust communication to service providers. Initially, the right protected only postal letters, but it has gradually developed into a strong safeguard for the protection of confidentiality of communications, regardless of the technology used. Hence, the right does not merely serve individual privacy interests, but also other more collective interests that are crucial for the functioning of our information society. We conclude that separate EU rules to protect communications confidentiality, next to the GDPR, are justified and necessary.
APA, Harvard, Vancouver, ISO, and other styles
7

Mavedzenge, Justice Alfred. "The Right to Privacy v National Security in Africa: Towards a Legislative Framework Which Guarantees Proportionality in Communications Surveillance." African Journal of Legal Studies 12, no. 3-4 (2020): 360–90. http://dx.doi.org/10.1163/17087384-12340056.

Full text
Abstract:
Abstract Governments often resort to communications surveillance in order to combat threats against national security. Communication surveillance infringes upon the right to privacy. In order to protect privacy, international law requires communication surveillance to be proportionate. However, very little has been written to justify why this right deserves such protection in Africa, given counter-arguments suggesting that where national security is threatened, the state must be permitted to do everything possible to avert the threat, and the protection of privacy is an inconvenience. This article addresses these counter-arguments by demonstrating that the right to privacy deserves protection because it is as important as defending national security. It analyses approaches taken by selected African countries to regulate authorisation of communication surveillance. This article questions the assumption that prior judicial authorisation is the ideal approach to regulating communication surveillance in order to guarantee proportionality, and it suggests a need to consider other alternatives.
APA, Harvard, Vancouver, ISO, and other styles
8

Aroldi, Piermarco, and Nicoletta Vittadini. "Children’s rights and social media: Issues and prospects for adoptive families in Italy." New Media & Society 19, no. 5 (2017): 741–49. http://dx.doi.org/10.1177/1461444816686324.

Full text
Abstract:
The worldwide spread of social media is changing the forms and rules of social relations, the boundaries of private and public spheres, and the definition of privacy and its protection. In reflecting on children’s rights in a digital age, the online experiences of adopted children and their families foreground the tension between the right to privacy and protection and children’s right to know about their origins. This article explores the Italian case through a qualitative study of professionals working in private and public foster and adoptive services. It analyses the risks and opportunities presented by social media in the everyday life of adoptive families, with particular attention to children’s rights and recommendations for families and professionals.
APA, Harvard, Vancouver, ISO, and other styles
9

Akel, William. "Privacy and the global media in the information age." Pacific Journalism Review : Te Koakoa 13, no. 1 (2007): 40–57. http://dx.doi.org/10.24135/pjr.v13i1.883.

Full text
Abstract:
The protection of privacy is being increasingly recognised worldwide by the courts, and media regulators, as a result of what is seen as a more powerful and intrusive media, and the effect of the internet. A right to privacy may even apply in a public place. This article examines the impact this has on the media in the information age? New Zealand now has a tort of interference with privacy. The criminal courts are also considering privacy values in issues ranging from suppression orders to release of court information to the public. The Broadcasting Standards Authority has revised its privacy principles. Codes of conduct with regard to the print media also acknowledge privacy. But the protection of privacy has its genesis in the 1890s and not in the digital age. A seminal article by Warren and Brandeis, ‘The Right to Privacy’ (1890), was a reaction to what was at that time seen as an over-powerful media. United States jurisprudence evolved to the Prosser and Keeton formulation in the 1960s. New Zealand jurisprudence has relied on this formulation to advance privacy rights. The English courts have taken a similar approach in the much publicised Douglas v Hello! and Naomi Campbell cases. The European courts, as a reaction to an overactive paparazzi, have pushed the bounds of privacy in the Peck and Princess Caroline cases. The High Court of Australia considered privacy in Lenah Game Meats Pty Ltd. Finally, the International Covenants and protection of privacy.
APA, Harvard, Vancouver, ISO, and other styles
10

Álvarez-Valenzuela, Daniel. "The Constitutional System for the Protection of Privacy in Chilean Law." Global Privacy Law Review 2, Issue 2 (2021): 131–40. http://dx.doi.org/10.54648/gplr2021017.

Full text
Abstract:
This article proposes a systemic review of the protection of privacy in the Chilean Constitution, understood not only by the norms of Article 19 No. 4, the right to privacy and the right to the protection of personal data, but also through the normative content provided by No. 5, which comprises the rights to the inviolability of the home, private communications and documents, subject to constitutional protection. When we conceive the privacy protection standards set out in Chilean constitutional law as a system, we can appreciate that despite the obvious differences between the different rights that form this system, there are areas where they do intersect or overlap when applying them to specific facts. This wide scope of protection is essential to apply the right to privacy as a strong defence against the threats and risks posed by the use of digital technologies. Chile, Privacy, Constitutional Law, Personal Data, Private Communications, Informational Self-Determination
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Right to privacy of communication"

1

Weston, Mindy. "The Right to Be Forgotten: Analyzing Conflicts Between Free Expression and Privacy Rights." BYU ScholarsArchive, 2017. https://scholarsarchive.byu.edu/etd/6453.

Full text
Abstract:
As modern technology continues to affect civilization, the issue of electronic rights grows in a global conversation. The right to be forgotten is a data protection regulation specific to the European Union but its consequences are creating an international stir in the fields of mass communication and law. Freedom of expression and privacy rights are both founding values of the United States which are protected by constitutional amendments written before the internet also changed those fields. In a study that analyzes the legal process of when these two fundamental values collide, this research offers insight into both personal and judicial views of informational priority. This thesis conducts a legal analysis of cases that cite the infamous precedents of Melvin v. Reid and Sidis v. F-R Pub. Corp., to examine the factors on which U.S. courts of law determinewhether freedom or privacy rules.
APA, Harvard, Vancouver, ISO, and other styles
2

Bhaduri, Anuket. "User Controlled Privacy Protection in Location-Based Services." Fogler Library, University of Maine, 2003. http://www.library.umaine.edu/theses/pdf/BhaduriA2003.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Le, Poire Beth Ann 1964. "Communication strategies to restore or preserve informational and psychological privacy; the effects of privacy invasive questions in the health care context." Thesis, The University of Arizona, 1988. http://hdl.handle.net/10150/276798.

Full text
Abstract:
This investigation explored the role of informational and psychological privacy in the health context by examining the relationship between type of relationship (physician versus acquaintance), type of observation (self-report versus observation), and communication strategies used to restore or preserve privacy (interaction control, dyadic strategies, expressions of negative arousal, blocking and avoidance, distancing, and confrontation). It was hypothesized and confirmed that individuals report exhibiting more behaviors to restore or preserve informational privacy in response to an informationally privacy-invasive question posed by an acquaintance than by a physician. The hypothesis that presentation of an informationally privacy invasive question by the physician causes patients to exhibit more communication strategies after the privacy invasive question than before, was unsupported. Finally, the hypothesis that individuals actually exhibit more privacy restoration behaviors than they report using in a similar situation with their physician was also unsupported. Patients reported using more communication strategies than they actually exhibited. One confound to the self reports was that videotaped participants reported the use of fewer direct privacy restoring communication strategies than non-videotaped.
APA, Harvard, Vancouver, ISO, and other styles
4

Shade, Molly. "The Burner Project: Privacy and Social Control in a Networked World." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc801891/.

Full text
Abstract:
As mobile phones become increasingly ubiquitous in today’s world, academic and public audiences alike are curious about the interaction between mobile technologies and social norms. To investigate this phenomenon, I examined how individuals use technology to actively manage their communication behaviors. Through a three-month research project on usage patterns of Burner, a mobile application, this thesis explores the relationships among technology, culture, and privacy. Burner is a service that equips individuals with the means to create, maintain, and/or dissolve social ties by providing temporary, disposable numbers to customers. The application offers a way to communicate without relying on a user’s personal phone number. In other words, Burner acts as a “privacy layer” for mobile phones. It also provides a valuable platform to examine how customers use the application as a strategy for communication management. This thesis represents a marriage of practice and theory: (1) As an applied enterprise, the project was constructed as a customer needs assessment intending to examine how the service was situated in the lives of its users. The findings have successfully been applied to my client’s company strategy and have led to a more informed customer approach. (2) As an academic endeavor, this research contributes to existing scholarship in anthropology, computer-mediated communication, privacy, and design. The results provide rich fodder for discussions about the impact of mobile communication and services.
APA, Harvard, Vancouver, ISO, and other styles
5

Приказнова, Л. С. "Проблемы нормативно-правового регулирования права личности на тайну связи". Thesis, Українська академія банківської справи Національного банку України, 2009. http://essuir.sumdu.edu.ua/handle/123456789/60302.

Full text
Abstract:
Современный человек не может представить своей жизни без использования средств связи. Телефонные переговоры, почтовые и телеграфные сообщения, мобильная телефонная связь и связь по сети Интернет – всё это является неотъемлемой частью жизнедеятельности современного человека. Но, в тоже время, не должен вызывать сомнений факт необходимости защиты передаваемой информации.
APA, Harvard, Vancouver, ISO, and other styles
6

Karlsson, Norman Nine. "Human Rights Law as an Intervention in Covert Surveillance of Communication : The Right to Private Life and Communication in Large-Scale Surveillance." Thesis, Örebro universitet, Institutionen för juridik, psykologi och socialt arbete, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-65708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hale-Ross, S. A. "The UK's legal response to terrorist communication in the 21st century : striking the right balance between individual privacy and collective security in the digital age." Thesis, Liverpool John Moores University, 2017. http://researchonline.ljmu.ac.uk/6726/.

Full text
Abstract:
The dynamics of private life have changed along with the vast advancements in 21st Century communications technology. Private conversations no longer simply take place in the citizens’ home or through using a landline telephone, but rather online through the Internet, social media and through the ever-growing list of chat applications available on the smartphone that allows encryption. However, what often follows the legitimate use of technological advancements is criminal, or in this case terrorist exploitation. In the digital age it has become increasingly easy for terrorist groups to communicate their propaganda and for individual terrorists to communicate freely. This has served to create an investigatory capabilities gap thereby increasing the pressures on UK policing and security agencies’, in fulfilling their task of protecting national security and protecting the citizens’ right to life. In response, the UK and the European Union (EU) have attempted to close the capabilities gap and thereby ensure collective security, by enacting new laws allowing the law enforcement agencies’ to monitor electronic communications. The UK Government has recently enacted the Investigatory Powers Act 2016 (IPA) that introduces and preserves the ability to bulk collect, and retain electronic communications data, and to attain the operators’ assistance in decryption. Although the IPA attempts to take a human rights approach, the main contentious elements in the Act are those in relation to the authorities’ capabilities to intercept electronic communications data on mass, and to retain such data. Specifically, concerns currently surround the introduction of ‘backdoors’ into encrypted online services, and bulk interception and equipment interference warrants, and bulk personal data sets, all of which serve to weaken the security and individual data protection and privacy rights of, potentially, the entire population. The Court of Justice of the European Union (CJEU) has been the most influential judicial body in terms of individual data protection, and thereby on the UK’s law making process, through its key judgements in Digital Rights Ireland Ltd v Minister for Communications, Marine and Natural Resources and others, and the conjoined case of Kärntner Landesregierung, Michael Seitlinger, Christof Tschohl and others (Digital Rights Ireland). The CJEU has done this by asserting the EU’s constitutional and legal prowess in protecting data protection, such as Article 8 of the Charter of Fundamental Rights and byway of two directives, namely the Data Protection Directive in 1995 and the e-Privacy Directive in 2002. In order to close the capabilities gap ensuring national security, the UK Government must ensure the law endures by safeguarding the cohesiveness with the jurisprudence of the CJEU and the European Court of Human Rights (ECtHR). The courts do focus on different elements, built around the Conventional rights, with the CJEU focused on data protection and the ECtHR on Article 8 right to privacy. To solve the balance between individual privacy and collective security, a human rights focus is required with emphasis placed on the practical reality that one cannot assert privacy rights, if one’s right to life is not fully protected in the first place. This focus must re-forge the UK’s counterterrorism legal structure. Taken in conjunction with the UK’s already broadly worded counterterrorism legal framework, particularly the lack of a freedom fighter exclusion within the legal definition of terrorism, the consequence is to almost criminalise any expression of a view that the armed resistance to a brutal or repressive anti-democratic regime, could in certain circumstances be justifiable, even where such resistance is directed away from non-combatant casualties’. Although the current counterterrorism structure is broad, the UK and the EU must police the Internet and remove the safe places used by criminals and terrorists. The IPA fashions a way within which to achieve this, but because it can be aimed at the whole population, subject to authorisation safeguards, and following historical case law dealing with blanket policies that effect the innocent, it is likely to receive continual CJEU and ECtHR judicial scrutiny. Post the UK’s exit from the EU however, the CJEU may become less important leaving the ECtHR to conduct the analysis. At present, the UK must follow CJEU rulings when the matter concerns EU law, whereas ECtHR decisions are merely recommendatory. The thesis found that overall, the balance between collective security and individual data privacy rights in the UK are fairly stable because of the role and importance of judicial review; judicial independence, and the over-arching scrutiny provided by commissioners and parliamentary committees. It is further argued that a blanket approach to retaining electronic communications data is necessary in finding the terrorist in the ever growing haystacks, because sometimes privacy rights and data protection must be curtailed to ensure the state can protect citizens’ rights to life.
APA, Harvard, Vancouver, ISO, and other styles
8

Gondwe, Mimmy. "The Protection of Privacy in the Workplace: A Comparative Study." Stellenbosch : Stellenbosch University, 2011. http://hdl.handle.net/10019.1/17849.

Full text
Abstract:
Thesis (LLD )--Stellenbosch University, 2011.<br>ENGLISH ABSTRACT: The importance of privacy lies in the fact that it represents the very idea of human dignity or the preservation of the ‘inner sanctum’. Not surprisingly, however, operational concerns of employers and technological developments combine continuously to challenge the preservation of privacy in the workplace. Employees the world over are exposed to numerous privacy invasive measures, including drug testing, psychological testing, polygraph testing, genetic testing, psychological testing, electronic monitoring and background checks. Hence, the issue at the heart of this dissertation is to determine to what extent privacy is protected in the South African workplace given advancements in technology and the implications (if any) for the right to privacy as such. A secondary aim of the dissertation is to attempt to provide a realistic balance between the privacy concerns of employees and the operational needs of employers in this technological age. As such the main focus of dissertation falls within the sphere of employment law. In order to provide an answer to the research issue discussed above, the dissertation addresses five ancillary or interrelated issues. First, the broad historical development of the legal protection of privacy is traced and examined. Second, a workable definition of privacy is identified with reference to academic debate and comparative legislative and judicial developments. Third, those policies and practices, which would typically threaten privacy in the employment sphere are identified and briefly discussed. Fourth, a detailed evaluation of the tension between privacy and a number of selected policies and practices in selected countries is provided. More specifically, the dissertation considers how these policies and practices challenge privacy, the rationale for their existence and, if applicable, how these policies and practices – if necessary through appropriate regulation – may be accommodated while simultaneously accommodating both privacy and the legitimate concerns of employers. The selection of these practices and policies is guided by two considerations. At the first level the emphasis is on those challenges to privacy, which can be traced back to technological developments and which, as such, foster new and unique demands to the accommodation of privacy in the workplace. The secondary emphasis is on those policies, which are representative of the fundamental challenges created by new technologies to privacy. To effectively address the above issues the dissertation uses the traditional legal methodology associated with comparative legal research, which includes a literature review of applicable law and legal frame work and a review of relevant case law and a comparative study of selected foreign jurisdictions.<br>AFRIKAANSE OPSOMMING: Geen opsomming<br>Fulbright Foundation<br>Stellenbosch University<br>Mellon Foundation<br>NFR
APA, Harvard, Vancouver, ISO, and other styles
9

Mason, Barbara Ann Borgstede. "Ethics, privacy, and confidentiality issues related to the application of information technology in health care /." free to MU campus, to others for purchase, 1999. http://wwwlib.umi.com/cr/mo/fullcit?p9962543.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Barnardt, Gerard Louis. "Electronic communication in the workplace : employer vs employee legal rights." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/49942.

Full text
Abstract:
Thesis (LLM)--University of Stellenbosch, 2004.<br>ENGLISH ABSTRACT: The monitoring of electronic communication is likely to face all employers sooner or later. The rapid advancement in technology aimed at helping to monitor electronic communication, makes it easier than ever before for employers to monitor the electronic communications of their employees. There are important questions to consider when dealing with the topic of monitoring electronic communication. Examples include "mayan employer legally monitor electronic communications?" and "how does monitoring affect the employee's right to privacy?" This thesis is an attempt to answer these and other related questions by analysing, inter alia, South African legislation, the Constitution and case law, as well as comparing the law as it applies in the United Kingdom and the United States of America. The analysis and conclusion offered in this thesis aim to provide theoretical consideration to academics and practical application for employers that are faced with the reality of monitoring electronic communications.<br>AFRIKAANSE OPSOMMING: Alle werkgewers sal waarskynlik die een of ander tyd met die monitering van elektroniese kommunikasie gekonfronteer word. Die snelle voortuitgang in tegnologie wat daarop gemik is om te help met die monitering van elektroniese kommunikasie, maak dit vir werkgewers makliker as ooit tevore om sodanige kommunikasies van hulle werknemers te monitor. Daar is egter belangrike vrae wat oorweeg moet word wanneer die onderwerp van monitering van elektroniese kommunikasie ter sprake kom. Voorbeelde hiervan is "mag 'n werknemer regtens elektroniese kommunikasies monitor?" en "hoe raak monitering die werknemer se reg tot privaatheid?" Hierdie tesis is 'n poging om hierdie en ander verwante vrae te beantwoord deur die ontleding van, onder andere, Suid-Afrikaanse wetgewing, die Grondwet en die reg soos deur hofuitsprake ontwikkel, sowel as vergelyking van die reg soos wat dit van toepassing is in die Verenigde Koninkryk en die Verenigde State van Amerika. Die ontleding en gevolgtrekking wat in hierdie tesis aangebied word, is gemik op die verskaffing van teoretiese oorweging aan akademici en praktiese toepassing vir werkgewers wat met die realiteit van die monitering van elektroniese kommunikasies gekonfronteer word.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Right to privacy of communication"

1

Commission, Ghana Law Reform, ed. Report on privacy: Surveillance and interception of communication. Ghana Law Reform Commission, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Elder, David A. Privacy torts. Thomson/West, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kakungulu-Mayambala, R. Privacy, data protection, and national security: Analyzing the right to privacy in correspondence and communication in Uganda. Human Rights and Peace Centre, Faculty of Law, Makerere University, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kakungulu-Mayambala, R. Privacy, data protection, and national security: Analyzing the right to privacy in correspondence and communication in Uganda. Human Rights and Peace Centre, Faculty of Law, Makerere University, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Makerere University. Human Rights and Peace Centre., ed. Privacy, data protection, and national security: Analyzing the right to privacy in correspondence and communication in Uganda. Human Rights and Peace Centre, Faculty of Law, Makerere University, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kakungulu-Mayambala, R. Privacy, data protection, and national security: Analyzing the right to privacy in correspondence and communication in Uganda. Human Rights and Peace Centre, Faculty of Law, Makerere University, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rules, United States Congress House Committee on. Providing for the consideration of H.R. 438, the Wireless Communications and Public Safety Act of 1999: Report (to accompany H. Res. 76). U.S. G.P.O., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Congress. House. Committee on Rules. Providing for the consideration of H.R. 438, the Wireless Communications and Public Safety Act of 1999: Report (to accompany H. Res. 76). U.S. G.P.O., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United States. Congress. House. Committee on Rules. Providing for the consideration of H.R. 2369, the Wireless Privacy Enhancement Act of 1998: Report (to accompany H. Res. 377). U.S. G.P.O., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

United States. Congress. House. Committee on Rules. Providing for the consideration of H.R. 2369, the Wireless Privacy Enhancement Act of 1998: Report (to accompany H. Res. 377). U.S. G.P.O., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Right to privacy of communication"

1

Chałubińska-Jentkiewicz, Katarzyna. "Operational Activities and the Right to Privacy." In Cybersecurity in Poland. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78551-2_28.

Full text
Abstract:
AbstractThe confidentiality of the services and the lack of external control may lead to excessive autonomy or subjectification of the very purpose of operational activity and failure to exercise due restraint in encroaching on civil rights and liberties. Sometimes, such a situation may result from excessive ideological or political considerations in the operations of the executive authorities. In other words, the secrecy of operational control may lead to abuse. An additional aspect is the development of electronic communication facilities and the related cybercrime. The development of cyberspace requires control activities to be undertaken also in this area. The experience of modern democratic states indicates that the executive power responsible for public security and order, including its subordinate entities conducting operational and reconnaissance activities, has at its disposal resources which, in the name of defending public order, may lead to the destruction of democratic institutions and reduction of civil rights, including privacy rights.
APA, Harvard, Vancouver, ISO, and other styles
2

Spinello, Richard. "The Right to Privacy in the Age of Digital Technology." In Computer Communications and Networks. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-08470-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Konrad, Marina, Sabine Koch-Sonneborn, and Christopher Lentzsch. "The Right to Privacy in Socio-Technical Smart Home Settings: Privacy Risks in Multi-Stakeholder Environments." In Communications in Computer and Information Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50732-9_71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

de Andrade, Norberto Nuno Gomes. "Data Protection, Privacy and Identity: Distinguishing Concepts and Articulating Rights." In IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20769-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hansen, Malte, and Andre Büttner. "Secure and Privacy-Preserving Authentication for Data Subject Rights Enforcement." In IFIP Advances in Information and Communication Technology. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57978-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Weippl, Edgar, and Sebastian Schrittwieser. "Introduction to Security and Privacy." In Introduction to Digital Humanism. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45304-5_26.

Full text
Abstract:
AbstractThis chapter on Security and Privacy builds on two aspects central to digital humanism: (1) self-determination and (2) humans in the center.Security refers to a system being in a state of protection against potential threats and risks; what this means specifically depends on the so-called security requirements (Bishop, IEEE Security and Privacy, 1(1), 67–69, 2003). Typically, this pertains to protecting data’s (1) confidentiality, (2) integrity, and (3) availability. Thus, security mechanisms are designed to prevent unauthorized access, use, disclosure, disruption, modification, or destruction.Privacy is the individual’s fundamental right to determine and limit who has access to their personal information and experiences, ensuring their ability to maintain personal boundaries, confidentiality, and freedom from unauthorized surveillance (Bélanger and Crossler, Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, pp. 1017–1041, 2011). Security and privacy are of utmost importance in this increasingly connected world, as they can help protect individuals, companies, and organizations from data breaches, identity theft, and other malicious attacks.The goals of digital humanism are to shape technologies in accordance with human values and needs, instead of allowing technologies to shape humans. Our task is not only to rein in the downsides of information and communication technologies but to encourage human-centered innovation (Werthner, The Vienna manifesto on digital humanism. In Digital transformation and ethics (pp. 338–357). Ecowin, 2020).In the following sections, we will analyze security requirements that can compromise these goals and show which security mechanisms can be employed to protect them. Both security and even more privacy are central to digital humanism—also mentioned as one of its principles.
APA, Harvard, Vancouver, ISO, and other styles
7

Bieker, Felix. "The Court of Justice of the European Union, Data Retention and the Rights to Data Protection and Privacy – Where Are We Now?" In IFIP Advances in Information and Communication Technology. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18621-4_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Caristi, Dom, and William R. Davie. "Privacy." In Communication Law. Routledge, 2018. http://dx.doi.org/10.4324/9781315448367-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Caristi, Dom, William R. Davie, and Laurie Thomas Lee. "Privacy." In Communication Law, 3rd ed. Routledge, 2021. http://dx.doi.org/10.4324/9781003091660-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Caristi, Dom, William R. Davie, and Laurie Thomas Lee. "Privacy." In Communication Law, 4th ed. Routledge, 2025. https://doi.org/10.4324/9781003462989-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Right to privacy of communication"

1

Chandrashekar, Rakesh, Kirana Kumar, Sorabh Lakhanpal, Ankita Nainwal, Ali Albawi, and Kasapolgu Kalpana. "The Importance of Next-Gen Security in Protecting Privacy and Rights." In 2024 1st International Conference on Sustainable Computing and Integrated Communication in Changing Landscape of AI (ICSCAI). IEEE, 2024. https://doi.org/10.1109/icscai61790.2024.10867095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

El Refae, Ghaleb, Ahmad Ibrahim Aljumah, and Mohammed T. Nuseir. "Balancing AI Advancements and Data Privacy in Digital Marketing: A Conceptual Exploration of Ethical Considerations and Consumer Rights." In 2024 International Conference on Intelligent Computing, Communication, Networking and Services (ICCNS). IEEE, 2024. https://doi.org/10.1109/iccns62192.2024.10776477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Blair, Linnea. "Phone Right! How Outstanding Companies Use Telephone Communication." In Paint and Coatings Expo (PACE) 2007. SSPC, 2007. https://doi.org/10.5006/s2007-00010.

Full text
Abstract:
Abstract Painting Contractors generate more business and provide exceptional customer service by training themselves and the people who work for them to employ some easy to implement performance standards that get outstanding results.
APA, Harvard, Vancouver, ISO, and other styles
4

Sathiyapriya, K., R. Kavin Aravindhan, B. Kireshvanth, Yadav Ranganathan, and P. Hardik. "Privacy-Preserving Social Network Clustering Using Differential Privacy." In 2024 International Conference on Smart Systems for Electrical, Electronics, Communication and Computer Engineering (ICSSEECC). IEEE, 2024. http://dx.doi.org/10.1109/icsseecc61126.2024.10649423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhou, Hanlei, and Jie Kong. "Distributed Differential Privacy for Federated Learning: A Privacy-Enhancing Approach." In 2024 4th International Conference on Artificial Intelligence, Robotics, and Communication (ICAIRC). IEEE, 2024. https://doi.org/10.1109/icairc64177.2024.10900017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Staparski, Tamara, and Valentina Ranaldi. "Council of Europe approach towards the right to privacy in digital domain: Recent development." In XXI međunarodni naučni skup Pravnički dani - Prof. dr Slavko Carić, na temu: Odgovori pravne nauke na izazove savremenog društva. Faculty of Law for Commerce and Judiciary, Novi Sad, 2024. http://dx.doi.org/10.5937/pdsc24371s.

Full text
Abstract:
Modern technology is an essential component of modern life, and there is a strong connection between our physical reality and our digital world. Communication is a fundamental attribute of individuals and an integral aspect of social interaction, employment, and overall existence. In today's society, communication through social networks, emails, and Instant Messaging applications (IM) is an integral part of a modern individual's daily life. The IMs are the most accessible, widely used, and cost-effective means of transmitting and receiving information. Since that information reveals and contains a great part of our privacy, employing it makes us vulnerable and exposed to privacy violations. To protect user privacy, IMs (like other means of electronic communication) use encryption to safeguard sensitive data exchanged and transmitted between users. This defines the subject of the research in the paper referring to the right to privacy and right to private communication in the digital domain, from the perspective of the Council of Europe according to Article 8 of the European Convention on Human Rights and Article 11 of the Council of Europe Framework Convention on Artificial Intelligence and Human Rights, Democracy and the Rule of Law. The special attention will be devoted to the Podchasov v. Russia case which concerns the right to privacy by protecting the encryption of sensitive data of electronic communications via IMs Telegram in the Russian Federation. In concluding remarks, the authors highlight the significance of the Podchasov v. Russia case and the Council of Europe Framework Convention as a starting point for future action and the establishment of new standards in this field.
APA, Harvard, Vancouver, ISO, and other styles
7

Domazet, Sinisa. "INTERNET OF THINGS AND THE RIGHT TO PRIVACY." In SECURITY AND CRISIS MANAGEMENT - THEORY AND PRACTICE. RASEC, 2024. https://doi.org/10.70995/qeue9956.

Full text
Abstract:
The dynamic development of information and communication technologies has led to the rapid development of the Internet of Things. Undoubtedly, the Internet of Things has brought numerous novelties in the functioning of modern man, but numerous challenges have also appeared in connection with these technologies. They relate to the protection of personal data, intellectual property rights, product liability, consumer rights and the like. The goal of the research in the paper is to analyze the relationship between the obligation to protect personal data and the Internet of Things, while pointing out the problems of misuse of data that have arisen through the use of modern technologies. The research established that numerous abuses were observed in practice regarding the application of technologies based on the Internet of Things. Normative method and legal-logical methods of induction and deduction were used in the paper.
APA, Harvard, Vancouver, ISO, and other styles
8

Kambovski, Igor. "ZAŠTITA PRIVATNOSTI I LIČNIH PODATAKA OD STRANE TRGOVACA KOD ELEKTRONSKE TRGOVINE." In 14 Majsko savetovanje. University of Kragujevac, Faculty of Law, 2018. http://dx.doi.org/10.46793/xivmajsko.943k.

Full text
Abstract:
In the context of the protection of one of the fundamental human rights - the right to privacy and the protection of personal data and identity, this report provides a brief overview of the procedure which the company that offers products and services through the Internet, or everybody interested who wanted to buy something over e-commerce, must know and respect. Protection of privacy represents a legitimate and human imperative in contemporary world and in every democratic society. Personal data represents the highest stage of private ownership. We are witnesses of dangerous unauthorized incursions in the privacy of social networks, on the Internet, on the occasion of online purchases and in communication channels. There is a rigorous legal solution that regulates this area, but abuses still exist. Companies which trade on the internet must have complied with regulation and must provide unhindered trade transaction.
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Huancheng, and Xiaolong Liu. "The protection of the privacy right in electronic commerce." In 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet). IEEE, 2012. http://dx.doi.org/10.1109/cecnet.2012.6201744.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kasera, Shruti, Anita Gehlot, Vaibhav Uniyal, Shweta Pandey, Gunjan Chhabra, and Kapil Joshi. "Right to Digital Privacy: A Technological Intervention of Blockchain and Big Data Analytics." In 2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA). IEEE, 2023. http://dx.doi.org/10.1109/icidca56705.2023.10100229.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Right to privacy of communication"

1

Perdigão, Rui A. P. Beyond Quantum Security with Emerging Pathways in Information Physics and Complexity. Synergistic Manifolds, 2022. http://dx.doi.org/10.46337/220602.

Full text
Abstract:
Information security and associated vulnerabilities have long been a pressing challenge, from the fundamental scientific backstage to the frontline across the most diverse sectors of society. At the tip of the iceberg of this problem, the citizens immediately feel that the reservation of privacy and the degradation of the quality and security of the information and communication on which they depend for the day-to-day activities, already of crucial relevance, are at stake. Naturally though, the challenges do not end there. There is a whole infrastructure for storing information, processing and communication, whose security and reliability depend on key sectors gearing modern society – such as emergency communication systems (medical, civil and environmental protection, among others), transportation and geographic information, the financial communications systems at the backbone of day-to-day transactions, the information and telecommunications systems in general. And crucially the entire defence ecosystem that in essence is a stalwart in preventing our civilisation to self-annihilate in full fulfilment of the second principle of thermodynamics. The relevance of the problem further encompasses the preservation of crucial values such as the right to information, security and integrity of democratic processes, internal administration, justice, defence and sovereignty, ranging from the well-being of the citizen to the security of the nation and beyond. In the present communication, we take a look at how to scientifically and technically empower society to address these challenges, with the hope and pragmatism enabled by our emerging pathways in information physics and complexity. Edging beyond classical and quantum frontiers and their vulnerabilities to unveil new principles, methodologies and technologies at the core of the next generation system dynamic intelligence and security. To illustrate the concepts and tools, rather than going down the road of engineered systems that we can ultimately control, we take aim at the bewildering complexity of nature, deciphering new secrets in the mathematical codex underlying its complex coevolutionary phenomena that so heavily impact our lives, and ultimately bringing out novel insights, methods and technologies that propel information physics and security beyond quantum frontiers.
APA, Harvard, Vancouver, ISO, and other styles
2

Gerhart, Kenneth R. U.S. Strategic Communication: Getting It Right. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada479692.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kukutai, Tahu, Shemana Cassim, Vanessa Clark, et al. Māori data sovereignty and privacy. Te Ngira Institute for Population Research, 2023. https://doi.org/10.15663/j21.35481.

Full text
Abstract:
Privacy is a fundamental human right. One of its most important aspects is information privacy – providing individuals with control over the way in which their personal data is collected, used, disclosed and otherwise handled. Existing information privacy regulation neither recognises nor protects the collective privacy rights of Indigenous peoples. This paper explores Indigenous data privacy, and the challenges and opportunities, in the context of Aotearoa. It has two aims: to identify gaps in existing data privacy approaches with regards to Indigenous data, and to provide a foundation for progressing alternative privacy paradigms. We argue that while personal data protection is necessary, it is insufficient to meet the needs of Māori and Aotearoa more broadly. In so doing, we draw on three areas of research: Indigenous and Māori data sovereignty; data and information privacy, including collective privacy; and Māori and Indigenous privacy perspectives. We examine key features of the Aotearoa privacy context – including the Privacy Act 2020 (NZ) – and consider the implications of te Tiriti o Waitangi and tikanga Māori for alternative privacy approaches. Future options, including legal and extra-legal measures, are proposed.
APA, Harvard, Vancouver, ISO, and other styles
4

Vincent, Charles, Madjid Tavana, and Tatiana Gherman. The Right To Be Forgotten – Is Privacy Sold Out in the Big Data Age? CENTRUM Catolica Graduate Business School, 2014. http://dx.doi.org/10.7835/ccwp-2014-02-0006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cachalia, Firoz, and Jonathan Klaaren. Digitalisation, the ‘Fourth Industrial Revolution’ and the Constitutional Law of Privacy in South Africa: Towards a public law perspective on constitutional privacy in the era of digitalisation. Digital Pathways at Oxford, 2021. http://dx.doi.org/10.35489/bsg-dp-wp_2021/04.

Full text
Abstract:
In this working paper, our focus is on the constitutional debates and case law regarding the right to privacy, adopting a method that is largely theoretical. In an accompanying separate working paper, A South African Public Law Perspective on Digitalisation in the Health Sector, we employ the analysis developed here and focus on the specific case of digital technologies in the health sector. The topic and task of these papers lie at the confluence of many areas of contemporary society. To demonstrate and apply the argument of this paper, it would be possible and valuable to extend its analysis into any of numerous spheres of social life, from energy to education to policing to child care. In our accompanying separate paper, we focus on only one policy domain – the health sector. Our aim is to demonstrate our argument about the significance of a public law perspective on the constitutional right to privacy in the age of digitalisation, and attend to several issues raised by digitalisation’s impact in the health sector. For the most part, we focus on technologies that have health benefits and privacy costs, but we also recognise that certain technologies have health costs and privacy benefits. We also briefly outline the recent establishment (and subsequent events) in South Africa of a contact tracing database responding to the COVID-19 pandemic – the COVID-19 Tracing Database – a development at the interface of the law enforcement and health sectors. Our main point in this accompanying paper is to demonstrate the value that a constitutional right to privacy can bring to the regulation of digital technologies in a variety of legal frameworks and technological settings – from public to private, and from the law of the constitution to the ‘law’ of computer coding.
APA, Harvard, Vancouver, ISO, and other styles
6

Guy, Hannah V., and Ozge Ozduzen. Mainstreaming, Gender and Communication in the UK. Glasgow Caledonian University, 2025. https://doi.org/10.59019/b47sx620.

Full text
Abstract:
The DRad 5.2 UK country report studies the online agents of far-right extremism and the ways in which citizens and members of civil society attempt to tackle social and political problems related to radicalisation in the UK. By looking at the patterns of visual political communication on social media platforms, the report showcases everyday expressions of sexism, misogyny, transphobia, and racialisation in the UK. In doing so, it aims to provide a scholarly discussion on the textual and visual affordances pertinent to social media platforms that help reproduce existing power structures and social inequalities in society, whilst reinforcing legacy media norms. The report identifies several reasons to explain the underlying issues that help the formation of performative masculinity and its mainstreaming as a far-right reference point for wider users and audiences. First, the Brexit vote in 2016 and subsequent right-wing, nativistic, and populist political leaders such as former Prime Minister Boris Johnson, have made certain radicalised and divisive narratives mainstream in the UK. Second, recent research questions the algorithmic systems underlying new technologies and how they bolster already existing social inequalities and exclusions as well as the communicative tools of social media platforms and apps that boost the visibility of various forms of online hate. Moreover, social media platforms remain largely unregulated, with proposed regulations facing major backlash as some proponents of freedom of speech oppose strict regulation. Problematic and controversial figures can also move from platform to platform, avoiding absolute removal. Although the report is interested in users’ engagement with newer platforms (e.g. TikTok) and the ways these actors and stakeholders engage with them, the report also analyses different types of radicalisation and deradicalisation on legacy social media platforms (e.g. YouTube) where narratives hit the mainstream, are legitimised in society, and reach wider audiences and receive wider support.
APA, Harvard, Vancouver, ISO, and other styles
7

Sargi, Islam. Discourse and Ideologies of the Radical Right. European Center for Populism Studies (ECPS), 2024. https://doi.org/10.55271/br0023.

Full text
Abstract:
Teun A. van Dijk’s book explores how radical right parties adapt their discourses to cultural, economic, and historical contexts in Chile, Spain, Sweden, and the Netherlands. Integrating discourse studies with social cognition theories, van Dijk reveals how nationalism, anti-globalism, and sociocultural backlash drive these narratives. With a focus on populism as a strategic discourse rather than ideology, the book underscores the dynamics of ingroup/outgroup rhetoric and its role in mobilizing support. While highlighting ideological clustering, the work offers valuable insights for scholars of political communication, critical discourse studies, and international relations.
APA, Harvard, Vancouver, ISO, and other styles
8

Eastman, Brittany. Legal Issues Facing Automated Vehicles, Facial Recognition, and Privacy Rights. SAE International, 2022. http://dx.doi.org/10.4271/epr2022016.

Full text
Abstract:
Facial recognition software (FRS) is a form of biometric security that detects a face, analyzes it, converts it to data, and then matches it with images in a database. This technology is currently being used in vehicles for safety and convenience features, such as detecting driver fatigue, ensuring ride share drivers are wearing a face covering, or unlocking the vehicle. Public transportation hubs can also use FRS to identify missing persons, intercept domestic terrorism, deter theft, and achieve other security initiatives. However, biometric data is sensitive and there are numerous remaining questions about how to implement and regulate FRS in a way that maximizes its safety and security potential while simultaneously ensuring individual’s right to privacy, data security, and technology-based equality. Legal Issues Facing Automated Vehicles, Facial Recognition, and Individual Rights seeks to highlight the benefits of using FRS in public and private transportation technology and addresses some of the legitimate concerns regarding its use by private corporations and government entities, including law enforcement, in public transportation hubs and traffic stops. Constitutional questions, including First, Forth, and Ninth Amendment issues, also remain unanswered. FRS is now a permanent part of transportation technology and society; with meaningful legislation and conscious engineering, it can make future transportation safer and more convenient.
APA, Harvard, Vancouver, ISO, and other styles
9

Cantor, Amy G., Rebecca M. Jungbauer, Andrea C. Skelly, et al. Respectful Maternity Care: Dissemination and Implementation of Perinatal Safety Culture To Improve Equitable Maternal Healthcare Delivery and Outcomes. Agency for Healthcare Research and Quality (AHRQ), 2024. http://dx.doi.org/10.23970/ahrqepccer269.

Full text
Abstract:
Objective. To summarize current research defining and measuring respectful maternity care (RMC) and evaluate the effectiveness of RMC and implementation strategies to improve health outcomes, particularly for populations at risk for health disparities. Data sources. Ovid MEDLINE®, Embase®, and Cochrane CENTRAL from inception to November 2022 and SocINDEX to July 2023; manual review of reference lists and responses to a Federal Register Notice. Review methods. Dual review of eligible abstracts and full-text articles using predefined criteria. Data abstraction and quality assessment dual reviewed using established methods. Systematic evaluation of psychometric studies of RMC tools using adapted criteria. Meta-analysis not conducted due to heterogeneity of studies and limited data. Results. Searches identified 4,043 unique records. Thirty-seven studies were included across all questions, including the Contextual Question (CQ). Twenty-four validation studies (3 observational studies, 21 cross-sectional studies) evaluated 12 tools for measuring RMC. One randomized controlled trial (RCT) evaluated RMC effectiveness. There were no effectiveness trials from settings relevant to clinical practice in the United States and no studies evaluating effectiveness of RMC implementation. For the CQ, 12 studies defined 12 RMC frameworks. Two types of frameworks defined RMC: (1) Disrespect and Abuse (D&amp;A) and (2) Rights-Based. Components of D&amp;A frameworks served as indicators for recognizing mistreatment during childbirth, while Rights-Based frameworks incorporated aspects of reproductive justice, human rights, and anti-racism. Overlapping themes from RMC frameworks included: freedom from abuse, consent, privacy, dignity, communication, safety, and justice. Tools that measured RMC performed well based on psychometric measures, but no single tool stood out as the best measure of RMC. The intrapartum version of the Mother’s Autonomy in Decision-Making (MADM), Mothers On Respect index (MORi), and the Childbirth Options, Information, and Person-Centered Explanation (CHOICES) index for measuring RMC demonstrated good overall validity based on analysis of psychometric properties and were applicable to U.S. populations. The Revised Childbirth Experience Questionnaire (CEQ-2) demonstrated good overall validity for measuring childbirth experiences and included RMC components. One fair-quality RCT from Iran demonstrated lower rates of postpartum depression at 6-8 weeks for those who received RMC compared with controls (20% [11/55] vs. 50% [27/54], p=0.001), measured by the Edinburgh Postpartum Depression Scale. No studies evaluated any other health outcomes or measured the effectiveness of RMC implementation strategies. Conclusions. RMC frameworks with overlapping components, themes, and definitions were well described in the literature, but consensus around one operational definition is needed. Validated tools to measure RMC performed well based on psychometric measures but have been subject to limited evaluation. A reliable metric informed by a standard definition could lead to further evaluation and implementation in U.S. settings. Evidence is currently lacking on the effectiveness of strategies to implement RMC to improve any maternal or infant health outcome.
APA, Harvard, Vancouver, ISO, and other styles
10

Lewis, Morgan. Understanding Climate Skepticism: A Rhetorical Analysis of Climate Communication by PiS, AfD, and SD. European Center for Populism Studies (ECPS), 2025. https://doi.org/10.55271/pp0047.

Full text
Abstract:
Two major global challenges of recent decades are climate change and populism. While there is a strong scientific consensus on anthropogenic climate change, social science research highlights how climate change and policy reforms have provoked significant backlash within populist discourse. Despite the clear intersection of these phenomena and the threats they pose to modern democracy, limited literature explores this relationship. This article examines the mechanisms by which right-wing populist (RWP) parties promote climate skepticism or hostility to climate policies. Focusing on the Law and Justice Party (PiS) in Poland, the Sweden Democrats (SD), and Alternative for Germany (AfD), this study conducts a rhetorical analysis of their climate communication to investigate how RWP positions align with shifting ideological and electoral contexts. The research employs Scott Consigny’s (1974) rhetorical situation framework and integrates Wodak’s (2015) interdisciplinary approach to populism, establishing a novel methodology for analyzing populist rhetoric. Findings reveal that RWP parties deploy rhetorical strategies such as framing an antagonism between the “elite” and “the people,” prioritizing national self-interest over climate concerns, and using anti-intellectual rhetoric. However, notable differences in rhetorical strategies emerge among the parties due to varying ideological and political contexts, demonstrating the adaptability of populist rhetoric around its ideological ‘center’. This study highlights the interplay between ideological and rhetorical facets of populism in shaping climate communication. By offering a nuanced understanding of how RWP parties engage with climate discourse across contexts, this research provides a foundation for further exploration of climate communication within populist narratives. Keywords: Climate change, climate skepticism, right-wing populism (RWP), climate communication, anti-intellectualism, Euroscepticism
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!