Academic literature on the topic 'Right to privacy of communication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Right to privacy of communication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Right to privacy of communication"

1

Gawu, Delali A., and Richard Obeng Mensah. "COVID-19 Contact Tracing and Privacy Rights in Ghana: A Critical Analysis of the Establishment of Emergency Communications System Instrument, 2020 (EI 63)." Journal of African Law 65, S2 (2021): 361–73. http://dx.doi.org/10.1017/s0021855321000425.

Full text
Abstract:
AbstractIn December 2019, the world woke up to the news of a novel coronavirus (COVID-19). Since then, governments across the globe have deployed various measures to contain the spread of the disease. The government of Ghana, among other measures, issued the Establishment of Emergency Communications System Instrument, 2020 (EI 63) to establish an emergency communications system to aid contact tracing during public health emergencies. This executive instrument has been criticized for illegally “legalizing” the breach of the privacy rights of electronic communications network subscribers in Ghan
APA, Harvard, Vancouver, ISO, and other styles
2

Jørgensen, Rikke Frank. "The Right to Privacy under Pressure." Nordicom Review 37, s1 (2020): 165–70. http://dx.doi.org/10.1515/nor-2016-0030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Basimanyane, Dorcas. "The Regulatory Dilemma on Mass Communications Surveillance and the Digital Right to Privacy in Africa: The Case of South Africa." African Journal of International and Comparative Law 30, no. 3 (2022): 361–82. http://dx.doi.org/10.3366/ajicl.2022.0414.

Full text
Abstract:
Behind the cloak of maintaining national security and public order, African governments and the private sector constantly encroach upon the data privacy rights of individuals. The right to privacy is not only protected by various international human rights instruments that African states have voluntarily ratified but has been enshrined in several constitutions. Yet, without proper safeguards, the same states continue to stifle the right through intrusive surveillance methods. They indiscriminately acquire, intercept, transmit, analyse and retain an individual’s data, able to be amassed to gene
APA, Harvard, Vancouver, ISO, and other styles
4

Izotova, Anzhelika N. "LEGAL REGULATION OF COMMUNICATION PRIVACY IN THE INFORMATION SOCIETY." RUDN Journal of Law 24, no. 4 (2020): 985–1004. http://dx.doi.org/10.22363/2313-2337-2020-24-4-985-1004.

Full text
Abstract:
The article is devoted to the regulation of communication privacy, which is not only a guarantee of the individual right to confidentiality and privacy, but also a necessary condition for the collective freedom of speech, trust in communication services, which is essential for formation of the information society. The right to communication privacy with the advent of new communication technologies is being transformed and expanded, which requires updating and harmonization of the legal framework. In this regard, the purpose of the research is to reveal problems and contradictions in updating l
APA, Harvard, Vancouver, ISO, and other styles
5

Shuraleva, S. V. "THE RIGHT TO PRIVACY IN LABOR RELATIONS: THEORETICAL PROBLEMS OF LEGAL REGULATION." Вестник Пермского университета. Юридические науки, no. 57 (2022): 527–51. http://dx.doi.org/10.17072/1995-4190-2022-57-527-551.

Full text
Abstract:
Introduction: the article is devoted to research on the right to privacy in labor relations. Purpose: to analyze the current regulation of the right to privacy in Russian labor law, to explore the approaches that have developed in the practice of the European Court of Human Rights (hereinafter – ECtHR) and in the doctrine, to propose directions for improving labor legislation in terms of the right to privacy. Methods: general, general scientific methods; special scientific methods (system-structural, formal-legal, comparative-legal).Results: the right to privacy (to respect for private and fam
APA, Harvard, Vancouver, ISO, and other styles
6

Zuiderveen Borgesius, Frederik J., and Wilfred Steenbruggen. "The Right to Communications Confidentiality in Europe: Protecting Privacy, Freedom of Expression, and Trust." Theoretical Inquiries in Law 20, no. 1 (2019): 291–322. http://dx.doi.org/10.1515/til-2019-0010.

Full text
Abstract:
Abstract In the European Union, the General Data Protection Regulation (GDPR) provides comprehensive rules for the processing of personal data. In addition, the EU lawmaker intends to adopt specific rules to protect confidentiality of communications, in a separate ePrivacy Regulation. Some have argued that there is no need for such additional rules for communications confidentiality. This Article discusses the protection of the right to confidentiality of communications in Europe. We look at the right’s origins to assess the rationale for protecting it. We also analyze how the right is current
APA, Harvard, Vancouver, ISO, and other styles
7

Mavedzenge, Justice Alfred. "The Right to Privacy v National Security in Africa: Towards a Legislative Framework Which Guarantees Proportionality in Communications Surveillance." African Journal of Legal Studies 12, no. 3-4 (2020): 360–90. http://dx.doi.org/10.1163/17087384-12340056.

Full text
Abstract:
Abstract Governments often resort to communications surveillance in order to combat threats against national security. Communication surveillance infringes upon the right to privacy. In order to protect privacy, international law requires communication surveillance to be proportionate. However, very little has been written to justify why this right deserves such protection in Africa, given counter-arguments suggesting that where national security is threatened, the state must be permitted to do everything possible to avert the threat, and the protection of privacy is an inconvenience. This art
APA, Harvard, Vancouver, ISO, and other styles
8

Aroldi, Piermarco, and Nicoletta Vittadini. "Children’s rights and social media: Issues and prospects for adoptive families in Italy." New Media & Society 19, no. 5 (2017): 741–49. http://dx.doi.org/10.1177/1461444816686324.

Full text
Abstract:
The worldwide spread of social media is changing the forms and rules of social relations, the boundaries of private and public spheres, and the definition of privacy and its protection. In reflecting on children’s rights in a digital age, the online experiences of adopted children and their families foreground the tension between the right to privacy and protection and children’s right to know about their origins. This article explores the Italian case through a qualitative study of professionals working in private and public foster and adoptive services. It analyses the risks and opportunitie
APA, Harvard, Vancouver, ISO, and other styles
9

Akel, William. "Privacy and the global media in the information age." Pacific Journalism Review : Te Koakoa 13, no. 1 (2007): 40–57. http://dx.doi.org/10.24135/pjr.v13i1.883.

Full text
Abstract:
The protection of privacy is being increasingly recognised worldwide by the courts, and media regulators, as a result of what is seen as a more powerful and intrusive media, and the effect of the internet. A right to privacy may even apply in a public place. This article examines the impact this has on the media in the information age? New Zealand now has a tort of interference with privacy. The criminal courts are also considering privacy values in issues ranging from suppression orders to release of court information to the public. The Broadcasting Standards Authority has revised its privacy
APA, Harvard, Vancouver, ISO, and other styles
10

Álvarez-Valenzuela, Daniel. "The Constitutional System for the Protection of Privacy in Chilean Law." Global Privacy Law Review 2, Issue 2 (2021): 131–40. http://dx.doi.org/10.54648/gplr2021017.

Full text
Abstract:
This article proposes a systemic review of the protection of privacy in the Chilean Constitution, understood not only by the norms of Article 19 No. 4, the right to privacy and the right to the protection of personal data, but also through the normative content provided by No. 5, which comprises the rights to the inviolability of the home, private communications and documents, subject to constitutional protection. When we conceive the privacy protection standards set out in Chilean constitutional law as a system, we can appreciate that despite the obvious differences between the different righ
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Right to privacy of communication"

1

Weston, Mindy. "The Right to Be Forgotten: Analyzing Conflicts Between Free Expression and Privacy Rights." BYU ScholarsArchive, 2017. https://scholarsarchive.byu.edu/etd/6453.

Full text
Abstract:
As modern technology continues to affect civilization, the issue of electronic rights grows in a global conversation. The right to be forgotten is a data protection regulation specific to the European Union but its consequences are creating an international stir in the fields of mass communication and law. Freedom of expression and privacy rights are both founding values of the United States which are protected by constitutional amendments written before the internet also changed those fields. In a study that analyzes the legal process of when these two fundamental values collide, this researc
APA, Harvard, Vancouver, ISO, and other styles
2

Bhaduri, Anuket. "User Controlled Privacy Protection in Location-Based Services." Fogler Library, University of Maine, 2003. http://www.library.umaine.edu/theses/pdf/BhaduriA2003.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Le, Poire Beth Ann 1964. "Communication strategies to restore or preserve informational and psychological privacy; the effects of privacy invasive questions in the health care context." Thesis, The University of Arizona, 1988. http://hdl.handle.net/10150/276798.

Full text
Abstract:
This investigation explored the role of informational and psychological privacy in the health context by examining the relationship between type of relationship (physician versus acquaintance), type of observation (self-report versus observation), and communication strategies used to restore or preserve privacy (interaction control, dyadic strategies, expressions of negative arousal, blocking and avoidance, distancing, and confrontation). It was hypothesized and confirmed that individuals report exhibiting more behaviors to restore or preserve informational privacy in response to an informatio
APA, Harvard, Vancouver, ISO, and other styles
4

Shade, Molly. "The Burner Project: Privacy and Social Control in a Networked World." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc801891/.

Full text
Abstract:
As mobile phones become increasingly ubiquitous in today’s world, academic and public audiences alike are curious about the interaction between mobile technologies and social norms. To investigate this phenomenon, I examined how individuals use technology to actively manage their communication behaviors. Through a three-month research project on usage patterns of Burner, a mobile application, this thesis explores the relationships among technology, culture, and privacy. Burner is a service that equips individuals with the means to create, maintain, and/or dissolve social ties by providing temp
APA, Harvard, Vancouver, ISO, and other styles
5

Приказнова, Л. С. "Проблемы нормативно-правового регулирования права личности на тайну связи". Thesis, Українська академія банківської справи Національного банку України, 2009. http://essuir.sumdu.edu.ua/handle/123456789/60302.

Full text
Abstract:
Современный человек не может представить своей жизни без использования средств связи. Телефонные переговоры, почтовые и телеграфные сообщения, мобильная телефонная связь и связь по сети Интернет – всё это является неотъемлемой частью жизнедеятельности современного человека. Но, в тоже время, не должен вызывать сомнений факт необходимости защиты передаваемой информации.
APA, Harvard, Vancouver, ISO, and other styles
6

Karlsson, Norman Nine. "Human Rights Law as an Intervention in Covert Surveillance of Communication : The Right to Private Life and Communication in Large-Scale Surveillance." Thesis, Örebro universitet, Institutionen för juridik, psykologi och socialt arbete, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-65708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hale-Ross, S. A. "The UK's legal response to terrorist communication in the 21st century : striking the right balance between individual privacy and collective security in the digital age." Thesis, Liverpool John Moores University, 2017. http://researchonline.ljmu.ac.uk/6726/.

Full text
Abstract:
The dynamics of private life have changed along with the vast advancements in 21st Century communications technology. Private conversations no longer simply take place in the citizens’ home or through using a landline telephone, but rather online through the Internet, social media and through the ever-growing list of chat applications available on the smartphone that allows encryption. However, what often follows the legitimate use of technological advancements is criminal, or in this case terrorist exploitation. In the digital age it has become increasingly easy for terrorist groups to commun
APA, Harvard, Vancouver, ISO, and other styles
8

Gondwe, Mimmy. "The Protection of Privacy in the Workplace: A Comparative Study." Stellenbosch : Stellenbosch University, 2011. http://hdl.handle.net/10019.1/17849.

Full text
Abstract:
Thesis (LLD )--Stellenbosch University, 2011.<br>ENGLISH ABSTRACT: The importance of privacy lies in the fact that it represents the very idea of human dignity or the preservation of the ‘inner sanctum’. Not surprisingly, however, operational concerns of employers and technological developments combine continuously to challenge the preservation of privacy in the workplace. Employees the world over are exposed to numerous privacy invasive measures, including drug testing, psychological testing, polygraph testing, genetic testing, psychological testing, electronic monitoring and background
APA, Harvard, Vancouver, ISO, and other styles
9

Mason, Barbara Ann Borgstede. "Ethics, privacy, and confidentiality issues related to the application of information technology in health care /." free to MU campus, to others for purchase, 1999. http://wwwlib.umi.com/cr/mo/fullcit?p9962543.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Barnardt, Gerard Louis. "Electronic communication in the workplace : employer vs employee legal rights." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/49942.

Full text
Abstract:
Thesis (LLM)--University of Stellenbosch, 2004.<br>ENGLISH ABSTRACT: The monitoring of electronic communication is likely to face all employers sooner or later. The rapid advancement in technology aimed at helping to monitor electronic communication, makes it easier than ever before for employers to monitor the electronic communications of their employees. There are important questions to consider when dealing with the topic of monitoring electronic communication. Examples include "mayan employer legally monitor electronic communications?" and "how does monitoring affect the employee's
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Right to privacy of communication"

1

Commission, Ghana Law Reform, ed. Report on privacy: Surveillance and interception of communication. Ghana Law Reform Commission, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Elder, David A. Privacy torts. Thomson/West, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kakungulu-Mayambala, R. Privacy, data protection, and national security: Analyzing the right to privacy in correspondence and communication in Uganda. Human Rights and Peace Centre, Faculty of Law, Makerere University, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kakungulu-Mayambala, R. Privacy, data protection, and national security: Analyzing the right to privacy in correspondence and communication in Uganda. Human Rights and Peace Centre, Faculty of Law, Makerere University, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Makerere University. Human Rights and Peace Centre., ed. Privacy, data protection, and national security: Analyzing the right to privacy in correspondence and communication in Uganda. Human Rights and Peace Centre, Faculty of Law, Makerere University, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kakungulu-Mayambala, R. Privacy, data protection, and national security: Analyzing the right to privacy in correspondence and communication in Uganda. Human Rights and Peace Centre, Faculty of Law, Makerere University, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rules, United States Congress House Committee on. Providing for the consideration of H.R. 438, the Wireless Communications and Public Safety Act of 1999: Report (to accompany H. Res. 76). U.S. G.P.O., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Congress. House. Committee on Rules. Providing for the consideration of H.R. 438, the Wireless Communications and Public Safety Act of 1999: Report (to accompany H. Res. 76). U.S. G.P.O., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United States. Congress. House. Committee on Rules. Providing for the consideration of H.R. 2369, the Wireless Privacy Enhancement Act of 1998: Report (to accompany H. Res. 377). U.S. G.P.O., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

United States. Congress. House. Committee on Rules. Providing for the consideration of H.R. 2369, the Wireless Privacy Enhancement Act of 1998: Report (to accompany H. Res. 377). U.S. G.P.O., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Right to privacy of communication"

1

Chałubińska-Jentkiewicz, Katarzyna. "Operational Activities and the Right to Privacy." In Cybersecurity in Poland. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78551-2_28.

Full text
Abstract:
AbstractThe confidentiality of the services and the lack of external control may lead to excessive autonomy or subjectification of the very purpose of operational activity and failure to exercise due restraint in encroaching on civil rights and liberties. Sometimes, such a situation may result from excessive ideological or political considerations in the operations of the executive authorities. In other words, the secrecy of operational control may lead to abuse. An additional aspect is the development of electronic communication facilities and the related cybercrime. The development of cybers
APA, Harvard, Vancouver, ISO, and other styles
2

Spinello, Richard. "The Right to Privacy in the Age of Digital Technology." In Computer Communications and Networks. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-08470-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Konrad, Marina, Sabine Koch-Sonneborn, and Christopher Lentzsch. "The Right to Privacy in Socio-Technical Smart Home Settings: Privacy Risks in Multi-Stakeholder Environments." In Communications in Computer and Information Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50732-9_71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

de Andrade, Norberto Nuno Gomes. "Data Protection, Privacy and Identity: Distinguishing Concepts and Articulating Rights." In IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20769-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hansen, Malte, and Andre Büttner. "Secure and Privacy-Preserving Authentication for Data Subject Rights Enforcement." In IFIP Advances in Information and Communication Technology. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57978-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Weippl, Edgar, and Sebastian Schrittwieser. "Introduction to Security and Privacy." In Introduction to Digital Humanism. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45304-5_26.

Full text
Abstract:
AbstractThis chapter on Security and Privacy builds on two aspects central to digital humanism: (1) self-determination and (2) humans in the center.Security refers to a system being in a state of protection against potential threats and risks; what this means specifically depends on the so-called security requirements (Bishop, IEEE Security and Privacy, 1(1), 67–69, 2003). Typically, this pertains to protecting data’s (1) confidentiality, (2) integrity, and (3) availability. Thus, security mechanisms are designed to prevent unauthorized access, use, disclosure, disruption, modification, or des
APA, Harvard, Vancouver, ISO, and other styles
7

Bieker, Felix. "The Court of Justice of the European Union, Data Retention and the Rights to Data Protection and Privacy – Where Are We Now?" In IFIP Advances in Information and Communication Technology. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18621-4_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Caristi, Dom, and William R. Davie. "Privacy." In Communication Law. Routledge, 2018. http://dx.doi.org/10.4324/9781315448367-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Caristi, Dom, William R. Davie, and Laurie Thomas Lee. "Privacy." In Communication Law, 3rd ed. Routledge, 2021. http://dx.doi.org/10.4324/9781003091660-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Caristi, Dom, William R. Davie, and Laurie Thomas Lee. "Privacy." In Communication Law, 4th ed. Routledge, 2025. https://doi.org/10.4324/9781003462989-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Right to privacy of communication"

1

Chandrashekar, Rakesh, Kirana Kumar, Sorabh Lakhanpal, Ankita Nainwal, Ali Albawi, and Kasapolgu Kalpana. "The Importance of Next-Gen Security in Protecting Privacy and Rights." In 2024 1st International Conference on Sustainable Computing and Integrated Communication in Changing Landscape of AI (ICSCAI). IEEE, 2024. https://doi.org/10.1109/icscai61790.2024.10867095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

El Refae, Ghaleb, Ahmad Ibrahim Aljumah, and Mohammed T. Nuseir. "Balancing AI Advancements and Data Privacy in Digital Marketing: A Conceptual Exploration of Ethical Considerations and Consumer Rights." In 2024 International Conference on Intelligent Computing, Communication, Networking and Services (ICCNS). IEEE, 2024. https://doi.org/10.1109/iccns62192.2024.10776477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Blair, Linnea. "Phone Right! How Outstanding Companies Use Telephone Communication." In Paint and Coatings Expo (PACE) 2007. SSPC, 2007. https://doi.org/10.5006/s2007-00010.

Full text
Abstract:
Abstract Painting Contractors generate more business and provide exceptional customer service by training themselves and the people who work for them to employ some easy to implement performance standards that get outstanding results.
APA, Harvard, Vancouver, ISO, and other styles
4

Sathiyapriya, K., R. Kavin Aravindhan, B. Kireshvanth, Yadav Ranganathan, and P. Hardik. "Privacy-Preserving Social Network Clustering Using Differential Privacy." In 2024 International Conference on Smart Systems for Electrical, Electronics, Communication and Computer Engineering (ICSSEECC). IEEE, 2024. http://dx.doi.org/10.1109/icsseecc61126.2024.10649423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhou, Hanlei, and Jie Kong. "Distributed Differential Privacy for Federated Learning: A Privacy-Enhancing Approach." In 2024 4th International Conference on Artificial Intelligence, Robotics, and Communication (ICAIRC). IEEE, 2024. https://doi.org/10.1109/icairc64177.2024.10900017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Staparski, Tamara, and Valentina Ranaldi. "Council of Europe approach towards the right to privacy in digital domain: Recent development." In XXI međunarodni naučni skup Pravnički dani - Prof. dr Slavko Carić, na temu: Odgovori pravne nauke na izazove savremenog društva. Faculty of Law for Commerce and Judiciary, Novi Sad, 2024. http://dx.doi.org/10.5937/pdsc24371s.

Full text
Abstract:
Modern technology is an essential component of modern life, and there is a strong connection between our physical reality and our digital world. Communication is a fundamental attribute of individuals and an integral aspect of social interaction, employment, and overall existence. In today's society, communication through social networks, emails, and Instant Messaging applications (IM) is an integral part of a modern individual's daily life. The IMs are the most accessible, widely used, and cost-effective means of transmitting and receiving information. Since that information reveals and conta
APA, Harvard, Vancouver, ISO, and other styles
7

Domazet, Sinisa. "INTERNET OF THINGS AND THE RIGHT TO PRIVACY." In SECURITY AND CRISIS MANAGEMENT - THEORY AND PRACTICE. RASEC, 2024. https://doi.org/10.70995/qeue9956.

Full text
Abstract:
The dynamic development of information and communication technologies has led to the rapid development of the Internet of Things. Undoubtedly, the Internet of Things has brought numerous novelties in the functioning of modern man, but numerous challenges have also appeared in connection with these technologies. They relate to the protection of personal data, intellectual property rights, product liability, consumer rights and the like. The goal of the research in the paper is to analyze the relationship between the obligation to protect personal data and the Internet of Things, while pointing
APA, Harvard, Vancouver, ISO, and other styles
8

Kambovski, Igor. "ZAŠTITA PRIVATNOSTI I LIČNIH PODATAKA OD STRANE TRGOVACA KOD ELEKTRONSKE TRGOVINE." In 14 Majsko savetovanje. University of Kragujevac, Faculty of Law, 2018. http://dx.doi.org/10.46793/xivmajsko.943k.

Full text
Abstract:
In the context of the protection of one of the fundamental human rights - the right to privacy and the protection of personal data and identity, this report provides a brief overview of the procedure which the company that offers products and services through the Internet, or everybody interested who wanted to buy something over e-commerce, must know and respect. Protection of privacy represents a legitimate and human imperative in contemporary world and in every democratic society. Personal data represents the highest stage of private ownership. We are witnesses of dangerous unauthorized incu
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Huancheng, and Xiaolong Liu. "The protection of the privacy right in electronic commerce." In 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet). IEEE, 2012. http://dx.doi.org/10.1109/cecnet.2012.6201744.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kasera, Shruti, Anita Gehlot, Vaibhav Uniyal, Shweta Pandey, Gunjan Chhabra, and Kapil Joshi. "Right to Digital Privacy: A Technological Intervention of Blockchain and Big Data Analytics." In 2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA). IEEE, 2023. http://dx.doi.org/10.1109/icidca56705.2023.10100229.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Right to privacy of communication"

1

Perdigão, Rui A. P. Beyond Quantum Security with Emerging Pathways in Information Physics and Complexity. Synergistic Manifolds, 2022. http://dx.doi.org/10.46337/220602.

Full text
Abstract:
Information security and associated vulnerabilities have long been a pressing challenge, from the fundamental scientific backstage to the frontline across the most diverse sectors of society. At the tip of the iceberg of this problem, the citizens immediately feel that the reservation of privacy and the degradation of the quality and security of the information and communication on which they depend for the day-to-day activities, already of crucial relevance, are at stake. Naturally though, the challenges do not end there. There is a whole infrastructure for storing information, processing and
APA, Harvard, Vancouver, ISO, and other styles
2

Gerhart, Kenneth R. U.S. Strategic Communication: Getting It Right. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada479692.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kukutai, Tahu, Shemana Cassim, Vanessa Clark, et al. Māori data sovereignty and privacy. Te Ngira Institute for Population Research, 2023. https://doi.org/10.15663/j21.35481.

Full text
Abstract:
Privacy is a fundamental human right. One of its most important aspects is information privacy – providing individuals with control over the way in which their personal data is collected, used, disclosed and otherwise handled. Existing information privacy regulation neither recognises nor protects the collective privacy rights of Indigenous peoples. This paper explores Indigenous data privacy, and the challenges and opportunities, in the context of Aotearoa. It has two aims: to identify gaps in existing data privacy approaches with regards to Indigenous data, and to provide a foundation for pr
APA, Harvard, Vancouver, ISO, and other styles
4

Vincent, Charles, Madjid Tavana, and Tatiana Gherman. The Right To Be Forgotten – Is Privacy Sold Out in the Big Data Age? CENTRUM Catolica Graduate Business School, 2014. http://dx.doi.org/10.7835/ccwp-2014-02-0006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cachalia, Firoz, and Jonathan Klaaren. Digitalisation, the ‘Fourth Industrial Revolution’ and the Constitutional Law of Privacy in South Africa: Towards a public law perspective on constitutional privacy in the era of digitalisation. Digital Pathways at Oxford, 2021. http://dx.doi.org/10.35489/bsg-dp-wp_2021/04.

Full text
Abstract:
In this working paper, our focus is on the constitutional debates and case law regarding the right to privacy, adopting a method that is largely theoretical. In an accompanying separate working paper, A South African Public Law Perspective on Digitalisation in the Health Sector, we employ the analysis developed here and focus on the specific case of digital technologies in the health sector. The topic and task of these papers lie at the confluence of many areas of contemporary society. To demonstrate and apply the argument of this paper, it would be possible and valuable to extend its analysis
APA, Harvard, Vancouver, ISO, and other styles
6

Guy, Hannah V., and Ozge Ozduzen. Mainstreaming, Gender and Communication in the UK. Glasgow Caledonian University, 2025. https://doi.org/10.59019/b47sx620.

Full text
Abstract:
The DRad 5.2 UK country report studies the online agents of far-right extremism and the ways in which citizens and members of civil society attempt to tackle social and political problems related to radicalisation in the UK. By looking at the patterns of visual political communication on social media platforms, the report showcases everyday expressions of sexism, misogyny, transphobia, and racialisation in the UK. In doing so, it aims to provide a scholarly discussion on the textual and visual affordances pertinent to social media platforms that help reproduce existing power structures and soc
APA, Harvard, Vancouver, ISO, and other styles
7

Sargi, Islam. Discourse and Ideologies of the Radical Right. European Center for Populism Studies (ECPS), 2024. https://doi.org/10.55271/br0023.

Full text
Abstract:
Teun A. van Dijk’s book explores how radical right parties adapt their discourses to cultural, economic, and historical contexts in Chile, Spain, Sweden, and the Netherlands. Integrating discourse studies with social cognition theories, van Dijk reveals how nationalism, anti-globalism, and sociocultural backlash drive these narratives. With a focus on populism as a strategic discourse rather than ideology, the book underscores the dynamics of ingroup/outgroup rhetoric and its role in mobilizing support. While highlighting ideological clustering, the work offers valuable insights for scholars o
APA, Harvard, Vancouver, ISO, and other styles
8

Eastman, Brittany. Legal Issues Facing Automated Vehicles, Facial Recognition, and Privacy Rights. SAE International, 2022. http://dx.doi.org/10.4271/epr2022016.

Full text
Abstract:
Facial recognition software (FRS) is a form of biometric security that detects a face, analyzes it, converts it to data, and then matches it with images in a database. This technology is currently being used in vehicles for safety and convenience features, such as detecting driver fatigue, ensuring ride share drivers are wearing a face covering, or unlocking the vehicle. Public transportation hubs can also use FRS to identify missing persons, intercept domestic terrorism, deter theft, and achieve other security initiatives. However, biometric data is sensitive and there are numerous remaining
APA, Harvard, Vancouver, ISO, and other styles
9

Cantor, Amy G., Rebecca M. Jungbauer, Andrea C. Skelly, et al. Respectful Maternity Care: Dissemination and Implementation of Perinatal Safety Culture To Improve Equitable Maternal Healthcare Delivery and Outcomes. Agency for Healthcare Research and Quality (AHRQ), 2024. http://dx.doi.org/10.23970/ahrqepccer269.

Full text
Abstract:
Objective. To summarize current research defining and measuring respectful maternity care (RMC) and evaluate the effectiveness of RMC and implementation strategies to improve health outcomes, particularly for populations at risk for health disparities. Data sources. Ovid MEDLINE®, Embase®, and Cochrane CENTRAL from inception to November 2022 and SocINDEX to July 2023; manual review of reference lists and responses to a Federal Register Notice. Review methods. Dual review of eligible abstracts and full-text articles using predefined criteria. Data abstraction and quality assessment dual reviewe
APA, Harvard, Vancouver, ISO, and other styles
10

Lewis, Morgan. Understanding Climate Skepticism: A Rhetorical Analysis of Climate Communication by PiS, AfD, and SD. European Center for Populism Studies (ECPS), 2025. https://doi.org/10.55271/pp0047.

Full text
Abstract:
Two major global challenges of recent decades are climate change and populism. While there is a strong scientific consensus on anthropogenic climate change, social science research highlights how climate change and policy reforms have provoked significant backlash within populist discourse. Despite the clear intersection of these phenomena and the threats they pose to modern democracy, limited literature explores this relationship. This article examines the mechanisms by which right-wing populist (RWP) parties promote climate skepticism or hostility to climate policies. Focusing on the Law and
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!