To see the other types of publications on this topic, follow the link: Right to privacy of communication.

Dissertations / Theses on the topic 'Right to privacy of communication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Right to privacy of communication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Weston, Mindy. "The Right to Be Forgotten: Analyzing Conflicts Between Free Expression and Privacy Rights." BYU ScholarsArchive, 2017. https://scholarsarchive.byu.edu/etd/6453.

Full text
Abstract:
As modern technology continues to affect civilization, the issue of electronic rights grows in a global conversation. The right to be forgotten is a data protection regulation specific to the European Union but its consequences are creating an international stir in the fields of mass communication and law. Freedom of expression and privacy rights are both founding values of the United States which are protected by constitutional amendments written before the internet also changed those fields. In a study that analyzes the legal process of when these two fundamental values collide, this researc
APA, Harvard, Vancouver, ISO, and other styles
2

Bhaduri, Anuket. "User Controlled Privacy Protection in Location-Based Services." Fogler Library, University of Maine, 2003. http://www.library.umaine.edu/theses/pdf/BhaduriA2003.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Le, Poire Beth Ann 1964. "Communication strategies to restore or preserve informational and psychological privacy; the effects of privacy invasive questions in the health care context." Thesis, The University of Arizona, 1988. http://hdl.handle.net/10150/276798.

Full text
Abstract:
This investigation explored the role of informational and psychological privacy in the health context by examining the relationship between type of relationship (physician versus acquaintance), type of observation (self-report versus observation), and communication strategies used to restore or preserve privacy (interaction control, dyadic strategies, expressions of negative arousal, blocking and avoidance, distancing, and confrontation). It was hypothesized and confirmed that individuals report exhibiting more behaviors to restore or preserve informational privacy in response to an informatio
APA, Harvard, Vancouver, ISO, and other styles
4

Shade, Molly. "The Burner Project: Privacy and Social Control in a Networked World." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc801891/.

Full text
Abstract:
As mobile phones become increasingly ubiquitous in today’s world, academic and public audiences alike are curious about the interaction between mobile technologies and social norms. To investigate this phenomenon, I examined how individuals use technology to actively manage their communication behaviors. Through a three-month research project on usage patterns of Burner, a mobile application, this thesis explores the relationships among technology, culture, and privacy. Burner is a service that equips individuals with the means to create, maintain, and/or dissolve social ties by providing temp
APA, Harvard, Vancouver, ISO, and other styles
5

Приказнова, Л. С. "Проблемы нормативно-правового регулирования права личности на тайну связи". Thesis, Українська академія банківської справи Національного банку України, 2009. http://essuir.sumdu.edu.ua/handle/123456789/60302.

Full text
Abstract:
Современный человек не может представить своей жизни без использования средств связи. Телефонные переговоры, почтовые и телеграфные сообщения, мобильная телефонная связь и связь по сети Интернет – всё это является неотъемлемой частью жизнедеятельности современного человека. Но, в тоже время, не должен вызывать сомнений факт необходимости защиты передаваемой информации.
APA, Harvard, Vancouver, ISO, and other styles
6

Karlsson, Norman Nine. "Human Rights Law as an Intervention in Covert Surveillance of Communication : The Right to Private Life and Communication in Large-Scale Surveillance." Thesis, Örebro universitet, Institutionen för juridik, psykologi och socialt arbete, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-65708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hale-Ross, S. A. "The UK's legal response to terrorist communication in the 21st century : striking the right balance between individual privacy and collective security in the digital age." Thesis, Liverpool John Moores University, 2017. http://researchonline.ljmu.ac.uk/6726/.

Full text
Abstract:
The dynamics of private life have changed along with the vast advancements in 21st Century communications technology. Private conversations no longer simply take place in the citizens’ home or through using a landline telephone, but rather online through the Internet, social media and through the ever-growing list of chat applications available on the smartphone that allows encryption. However, what often follows the legitimate use of technological advancements is criminal, or in this case terrorist exploitation. In the digital age it has become increasingly easy for terrorist groups to commun
APA, Harvard, Vancouver, ISO, and other styles
8

Gondwe, Mimmy. "The Protection of Privacy in the Workplace: A Comparative Study." Stellenbosch : Stellenbosch University, 2011. http://hdl.handle.net/10019.1/17849.

Full text
Abstract:
Thesis (LLD )--Stellenbosch University, 2011.<br>ENGLISH ABSTRACT: The importance of privacy lies in the fact that it represents the very idea of human dignity or the preservation of the ‘inner sanctum’. Not surprisingly, however, operational concerns of employers and technological developments combine continuously to challenge the preservation of privacy in the workplace. Employees the world over are exposed to numerous privacy invasive measures, including drug testing, psychological testing, polygraph testing, genetic testing, psychological testing, electronic monitoring and background
APA, Harvard, Vancouver, ISO, and other styles
9

Mason, Barbara Ann Borgstede. "Ethics, privacy, and confidentiality issues related to the application of information technology in health care /." free to MU campus, to others for purchase, 1999. http://wwwlib.umi.com/cr/mo/fullcit?p9962543.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Barnardt, Gerard Louis. "Electronic communication in the workplace : employer vs employee legal rights." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/49942.

Full text
Abstract:
Thesis (LLM)--University of Stellenbosch, 2004.<br>ENGLISH ABSTRACT: The monitoring of electronic communication is likely to face all employers sooner or later. The rapid advancement in technology aimed at helping to monitor electronic communication, makes it easier than ever before for employers to monitor the electronic communications of their employees. There are important questions to consider when dealing with the topic of monitoring electronic communication. Examples include "mayan employer legally monitor electronic communications?" and "how does monitoring affect the employee's
APA, Harvard, Vancouver, ISO, and other styles
11

Mabeka, Nombulelo Queen. "When does the conduct of an employer infringe on an employee's constitutional right to privacy when intercepting or monitoring electronic communications?" Thesis, University of the Western Cape, 2008. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_5883_1253850534.

Full text
Abstract:
<p>&quot<br>The Regulation of Interception of Communications and Provision of Communication Related Information Act 70 of 2002 (RICA) that regulates the monitoring of electronic communications has not yet been tested by our courts. This paper explores the likelihood of an infringement of an employee's right to privacy by an employer in the process of intercepting the latters electronic communications. It is argued that there is no explicit provision of the protection of the right to privacy that is provided in the LRA. It is further argued that the provisions of section 4, 5 and 6 of RICA as t
APA, Harvard, Vancouver, ISO, and other styles
12

Boucher, Duane Eric. "An information privacy model for primary health care facilities." Thesis, University of Fort Hare, 2013. http://hdl.handle.net/10353/d1007181.

Full text
Abstract:
The revolutionary migration within the health care sector towards the digitisation of medical records for convenience or compliance touches on many concerns with respect to ensuring the security of patient personally identifiable information (PII). Foremost of these is that a patient’s right to privacy is not violated. To this end, it is necessary that health care practitioners have a clear understanding of the various constructs of privacy in order to ensure privacy compliance is maintained. This research project focuses on an investigation of privacy from a multidisciplinary philosophical pe
APA, Harvard, Vancouver, ISO, and other styles
13

Fesehaye, Natsinet Tesfaye. "Interception of communication by South African government agencies vis-a-vis the right to privacy: The law and the practice in light of the South African Constitution and the International Convention on Civil and Political Rights (ICCPR)." University of the Western Cape, 2017. http://hdl.handle.net/11394/5906.

Full text
Abstract:
Magister Legum - LLM<br>The right to privacy is recognised as one of the most important individual rights. It is considered to be central to the protection of one's human dignity. It also forms the basis of any democratic society. Furthermore, it is linked to other basic rights, including the rights to freedom of expression and of association.1 The right to privacy is contained and recognised in almost every constitutional bill of rights and major international and regional conventions.2 It is also guaranteed expressly in the Universal Declaration of Human Rights,3 the European Conventi
APA, Harvard, Vancouver, ISO, and other styles
14

Neto, Newton Jancowski. "A (re)leitura do direito fundamental à informação e sua consequência sobre os direitos de personalidade: os avanços tecnológicos e midiáticos em busca da harmonia com os Direitos Fundamentais." Universidade do Vale do Rio dos Sinos, 2017. http://www.repositorio.jesuita.org.br/handle/UNISINOS/6371.

Full text
Abstract:
Submitted by JOSIANE SANTOS DE OLIVEIRA (josianeso) on 2017-06-23T13:22:29Z No. of bitstreams: 1 Newton Jancowski Neto_.pdf: 743576 bytes, checksum: 61e156111b259f9aa54418e151cc6d01 (MD5)<br>Made available in DSpace on 2017-06-23T13:22:29Z (GMT). No. of bitstreams: 1 Newton Jancowski Neto_.pdf: 743576 bytes, checksum: 61e156111b259f9aa54418e151cc6d01 (MD5) Previous issue date: 2017-03-07<br>Nenhuma<br>O objetivo do presente trabalho é o estudo acerca do direito à informação e seu confronto com o direito à privacidade frente aos avanços dos meios de comunicação, abarcando releitura frente
APA, Harvard, Vancouver, ISO, and other styles
15

Knutsson, Mikael. "Compliance with the General Data Protection Regulation: an exploratory case study on business systems’ adaptation." Thesis, KTH, Medieteknik och interaktionsdesign, MID, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209772.

Full text
Abstract:
Current moves into a heavily digitalized era has led to a phase where our privacy is being eroded as we hand over our personal data to organizations and their systems. At the same time, the applicable laws to give security to the individuals have failed to incorporate these legal developments. However, in April 2016 the European Union proposed a change to a new regulation called the General Data Protection Regulation (GDPR). The GDPR will be implemented and start to apply in May 2018, thus the main purpose of this study was to investigate how organizations can adapt to changing regulations on
APA, Harvard, Vancouver, ISO, and other styles
16

Tao, Ran. "The Right to Privacy." Scholarship @ Claremont, 2019. https://scholarship.claremont.edu/scripps_theses/1338.

Full text
Abstract:
Contemporary debates about the right to privacy were inaugurated by Samuel Warren and Louis Brandeis’ article on the topic. While Warren and Brandeis understand the right to privacy as a stand-alone right, J. J. Thomson interprets it as a cluster of rights that itself intersects with other rights. Despite such disagreement, both accounts point to a deep connection between property rights and one’s right to herself. A close examination of the Lockean and Kantian concepts of property confirms this. In particular, Arthur Ripstein’s Kantian account of innate right and property rights suggests that
APA, Harvard, Vancouver, ISO, and other styles
17

Spinks, Karolyn Annette. "The impact of the introduction of a pilot electronic health record system on general practioners' work practices in the Illawarra." Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060712.153053/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Lander, Angelina M. "Privacy, surveillance and the state a comparison of U.S. and British privacy rights /." Orlando, Fla. : University of Central Florida, 2009. http://purl.fcla.edu/fcla/etd/CFE0002772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Wolfson, Susan Ann. "The right to privacy and education." Thesis, University College London (University of London), 1989. http://discovery.ucl.ac.uk/10019704/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Gibb, Susan Jennifer. "Privacy and Australian law." Title page, contents and abstract only, 1987. http://web4.library.adelaide.edu.au/theses/09PH/09phg4372.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Slabačiauskas, Erikas. "Asmens duomenų apsauga žmogaus teisių kontekste." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2010. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2009~D_20100224_101520-37741.

Full text
Abstract:
Šiame darbe taikant tiek teorinius, tiek empirinius metodus, detaliai analizuojamas žmogaus teisių institutas, naujoji asmens duomenų apsauga Lietuvos elektroninėje erdvėje, kuri kol kas mokslinėje literatūroje buvo aptariama tik fragmentiškai, nors viešojoje erdvėje ši tema nuolat susilaukia pačių įvairiausių vertinimų. Nors darbe daugiausia koncentruojamasi į asmens duomenų prevencinių priemonių teisinio reglamentavimo prieštaringumus, atkreipiamas dėmesys ir į ginčytinų teisės normų pagrindu kylantį galimą konstitucingumo klausimą. Darbą sudaro dvi dalys. Pirmojoje aptariamos bendrosios žm
APA, Harvard, Vancouver, ISO, and other styles
22

Al-Rawashdeh, Sami H. "Is privacy brought home? : criminal justice and the right to privacy." Thesis, University of Aberdeen, 2003. http://digitool.abdn.ac.uk/R?func=search-advanced-go&find_code1=WSN&request1=AAIU176274.

Full text
Abstract:
This thesis is concerned with protection of the right to privacy in the English and Scottish criminal justice systems. The aim of this research is to consider the extent to which privacy has been recognised in both criminal justice systems. It analyses the extent to which the right to privacy is protected by the substantive criminal law of those jurisdictions, as well as in their criminal procedural law. A part of the examination will address the question of whether there should be a criminal offence of violating the privacy of another. The thesis is mainly devoted to addressing whether the ri
APA, Harvard, Vancouver, ISO, and other styles
23

Mitroff, Melanie. "Privacy : a constitutional right that threatens democracy /." Lynchburg, VA : Liberty University, 2007. http://digitalcommons.liberty.edu.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

jajodia(Mozika), Jyoti. "Emerging right to privacy : an Indian perspective." Thesis, University of North Bengal, 2002. http://ir.nbu.ac.in/handle/123456789/309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Heite, Martin. "Privacy, Constitutions and the Law of Torts: a Comparative and Theoretical Analysis of Protecting Personal Information Against Dissemination in New Zealand, the UK and the USA." University of Canterbury. Law, 2008. http://hdl.handle.net/10092/2955.

Full text
Abstract:
The New Zealand Court of Appeal has recently acknowledged the existence of a freestanding tort of invasion of privacy in Hosking v Runting. The tort is in its infancy and the courts are still grappling with essential problems, the most prominent of which is the conflict with countervailing interests in freedom of speech. In need of guidance, the courts turn to overseas authorities, predominantly from the United Kingdom and the United States of America. The commonly found descriptive nature of the comparison invites a broader analysis of these jurisdictions. In this thesis, I offer a theoretica
APA, Harvard, Vancouver, ISO, and other styles
26

Johnson, Virginia Wilson. "Architectural correlates of privacy : the dynamics of privacy regulation /." Diss., This resource online, 1990. http://scholar.lib.vt.edu/theses/available/etd-07132007-143142/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Marasinghe, S. C. "A child's right to privacy in international law." Thesis, University of Oxford, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.413108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Skahill, Tina M. "Striking the right balance : fusion centers and privacy." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5243.

Full text
Abstract:
CHDS State/Local<br>Approved for public release; distribution is unlimited<br>After the events of 9/11, the number of fusion centers rapidly multiplied. As a result, state and local agencies that operated the centers adopted a myriad of policies. This thesis seeks to answer how fusion centers can implement policies as to operational structure and transparency that simultaneously safeguard against abuse of citizens' privacy while facilitating the collection, maintenance, and dissemination of information. Two methods of research are utilized: policy analysis and policy options analysis. This
APA, Harvard, Vancouver, ISO, and other styles
29

Bare, Christian. "The Undisclosed Dangers of Parental Sharing on Social Media: A Content Analysis of Sharenting Images on Instagram." Digital Commons @ East Tennessee State University, 2020. https://dc.etsu.edu/etd/3732.

Full text
Abstract:
Sharenting is a new term used to define the action of parents posting about their children online. Social media provides parents with an easy to use outlet for image distribution to all family and friends that simultaneously archives the images into a digital baby book. While convenient, once publicly posted anyone can gain access to the images of the children. Instagram is a favorable social media channel for sharenting. A popular hashtag on Instagram, #letthembelittle, contains 8 million posts dedicated to child imagery. A set of 300 randomly selected images under the hashtag were coded. Ima
APA, Harvard, Vancouver, ISO, and other styles
30

Dayan, Michael Oved. "Privacy boundaries : stories of protecting personal autonomy in the information age." Thesis, McGill University, 2004. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=85147.

Full text
Abstract:
In 1890, lawyers Samuel Warren and Louis Brandeis conceived of a "sacred" right, the right to "be let alone." They argued for this right as a measure of "retreat from the world" for protection of an individual's "inviolate personality." Their argument was born in response to intrusions made possible with technological developments in printing and photography. For over a 100-year period, the concept of privacy has received attention from a multi-disciplinary collection of scholars. Despite this significant attention, however, relatively little consideration has been paid to conceptualiz
APA, Harvard, Vancouver, ISO, and other styles
31

Crounse, Shane. "The fair information principles : a comparison of U.S. and Canadian privacy policy as applied to the private sector /." Online version of thesis, 2009. http://hdl.handle.net/1850/8638.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Lonka, Anna. "Profiling through Ultrasound Technoogy, the Right to Privacy and the Right to Data Protection." Thesis, Stockholms universitet, Juridiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-154902.

Full text
Abstract:
The right to private and family life and the right to the protection of personal data are two fundamental rights of the EU. The protection of these rights is addressed in the new General Data Protection Regulation (GDPR), the Directive on Privacy and Electronic Communications (ePrivacyDirective) and the upcoming new Regulation on Privacy and Electronic Communications (draft ePrivacy Regulation). In this thesis these three legal acts are evaluated in light of profiling through ultrasound tracking technology. Their technology neutrality and their functioning as safeguards of the two fundamental
APA, Harvard, Vancouver, ISO, and other styles
33

Fischer-Hübner, Simone. "IT-security and privacy : design and use of privacy-enhancing security mechanisms /." Berlin [u.a.] : Springer, 2001. http://www.loc.gov/catdir/enhancements/fy0812/2001034161-d.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Kunz, Thea. "Celebrating Privacy Day: The Right to be forgotten and individual Privacy in the digital Age." Thesis, Uppsala universitet, Medier och kommunikation, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-356108.

Full text
Abstract:
This thesis explores the current status of privacy in the context of the upcoming implementation of the General Data Protection Regulation (GDPR) and, more precisely, focuses on the redefined Right to be forgotten as its most controversial component. Norman Fairclough’s three-dimensional model of critical discourse analysis was deployed to show how the Right to be forgotten is reshaping the privacy discourse in the age of big data, digitalization, surveillance and data driven business. Qualitative content analysis was used to serve critical discourse analysis as the first stage of the three di
APA, Harvard, Vancouver, ISO, and other styles
35

Maciejewski, Robert. "Privacy aspects of digital communication." St. Gallen, 2007. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/01665892002/$FILE/01665892002.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Rossi, Julien. "Protection des données personnelles et droit à la vie privée : enquête sur la notion controversée de « donnée à caractère personnel »." Thesis, Compiègne, 2020. http://www.theses.fr/2020COMP2549.

Full text
Abstract:
La menace qu’Internet et les technologies numériques de l’information et de la communication en général font ou feraient peser sur la vie privée soulève de nombreux débats, tant dans la presse qu’au niveau politique. L’affaire Snowden en 2013, puis l’adoption en 2016 du Règlement général de protection des données (RGPD), ont renforcé la visibilité de ces controverses dans l’espace public. Cette thèse part d’une triple interrogation : pouvons-nous définir ce qu’est la « vie privée », existe-t-il un consensus autour de la question, et ce consensus évolue-t-il avec des évolutions de notre milieu
APA, Harvard, Vancouver, ISO, and other styles
37

Boshego, Ngwanathaba Angelinah. "Balancing the right to freedom of expression with the right to privacy for public figures." Diss., University of Pretoria, 2017. http://hdl.handle.net/2263/62559.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Black, Gillian. "Right of publicity in Scots law." Thesis, University of Edinburgh, 2009. http://hdl.handle.net/1842/5943.

Full text
Abstract:
This thesis examines publicity exploitation in practice and the possible legal response of Scots law to that exploitation. It argues that the common law in Scotland is not capable of providing a coherent and principled right of publicity for individuals, and that a statutory right is instead required. By examining the nature of publicity exploitation and the activities that constitute publicity, it becomes clear that there are a number of different methods by which an individual’s “persona” – name, image, identity and reputation – can be used to enhance the goods and services of others, and th
APA, Harvard, Vancouver, ISO, and other styles
39

Theis, Adriane. "Liberal privacy and women a broken promise /." Diss., Connect to the thesis, 2006. http://hdl.handle.net/10066/726.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

González, Blesa Francisco Javier. "Las intervenciones telefónicas en el proceso penal : revisión de un debate." Doctoral thesis, Universitat Abat Oliba, 2017. http://hdl.handle.net/10803/454990.

Full text
Abstract:
La investigació d'alguns delictes en el procés penal requereix envair la intimitat i el dret al secret de les comunicacions dels individus. La reforma de la LO nº 13/2015, de 5 d'octubre, ha introduït canvis jurídics, substantius i processals en molts aspectes relatius a la manera de materialitzar la mesura d'ingerència en aquest dret fonamental, ja que la intervenció telefònica afecta directament a l'esfera de privacitat del subjecte. En la present tesi analitzarem el context problemàtic; és a dir, si la nova normativa ha fet vessar tant les exigències jurisprudencials dels nostres tri
APA, Harvard, Vancouver, ISO, and other styles
41

Kittichokechai, Kittipong. "Communication With Reconstruction and Privacy Constraints." Doctoral thesis, KTH, Kommunikationsteori, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-145134.

Full text
Abstract:
Communication networks are an integral part of the Internet of Things (IoT) era. They enable endless opportunities for connectivity in a wide range of applications, leading to advances in efficiency of day-to-day life. While creating opportunities, they also incur several new challenges. In general, we wish to design a system that performs optimally well in all aspects. However, there usually exist competing objectives which lead to tradeoffs. In this thesis, driven by several applications, new features and objectives are included into the system model, making it closer to reality and needs. T
APA, Harvard, Vancouver, ISO, and other styles
42

Paton, Elizabeth Katrine. "Privacy law and the media." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/28826.

Full text
Abstract:
This thesis explores the issue of how to reconcile the value of individual privacy with that of freedom of speech. It argues that there ought to be legal protection against invasion of privacy by the media, and that such protection should be seen as complementary to a system of free expression rather than opposed to such a system. A definition of privacy is outlined which, it is contended, meets the criteria for a coherent, neutral definition. Various reasons for valuing privacy and in favour of protecting the individual's reasonable expectations of privacy are identified. It is argued that l
APA, Harvard, Vancouver, ISO, and other styles
43

Hunt, Christopher Douglas Lorne. "Justifying and structuring a principled common law privacy tort." Thesis, University of Cambridge, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.607899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Nam, Hyung Doo. "The right of publicity in the global market : is James Dean a living dead even in Korea? /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/9613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Lukman, Joshua R. "Right to publicity and privacy versus first amendment freedom of speech." Honors in the Major Thesis, University of Central Florida, 2003. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/323.

Full text
Abstract:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf.edu/Systems/DigitalInitiatives/DigitalCollections/InternetDistributionConsentAgreementForm.pdf You may also contact the project coordinator, Kerri Bottorff, at kerri.bottorff@ucf.edu for more information.<br>Bachelors<br>Health and Public Affairs<br>Legal Studies
APA, Harvard, Vancouver, ISO, and other styles
46

Hedefine, Eeva Kaarina. "Personal Privacy Protection within Pervasive RFID Environments." Fogler Library, University of Maine, 2006. http://www.library.umaine.edu/theses/pdf/HedefineEK2006.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Janz, Linda, and University of Lethbridge Faculty of Arts and Science. "Privacy and the internet : differences in perspectives." Thesis, Lethbridge, Alta. : University of Lethbridge, Faculty of Arts and Science, 1997, 1997. http://hdl.handle.net/10133/64.

Full text
Abstract:
This study examined results of a World Wide Web survey that used the framework of domain theory of moral development to examine attitudes of Internet users assuming perspectives of victims, aggressors and bystanders toward privacy issues. The effect of a monetary incentive was tested on two perspectives; effects of three moderating variables, employment status, newsgroup/mailing list membership and culture, were also tested. In the process of examing interactions, an evaluation determined if changes in attitudes indicated movement along a morality continuum. Results show that victims are more
APA, Harvard, Vancouver, ISO, and other styles
48

Coopamootoo, P. L. "Effective online privacy mechanisms with persuasive communication." Thesis, Cranfield University, 2016. http://dspace.lib.cranfield.ac.uk/handle/1826/10265.

Full text
Abstract:
This thesis contributes to research by taking a social psychological perspective to managing privacy online. The thesis proposes to support the effort to form a mental model that is required to evaluate a context with regards to privacy attitudes or to ease the effort by biasing activation of privacy attitudes. Privacy being a behavioural concept, the human-computer interaction design plays a major role in supporting and contributing to end users’ ability to manage their privacy online. However, unless privacy attitudes are activated or made accessible, end users’ behaviour would not necessari
APA, Harvard, Vancouver, ISO, and other styles
49

Paverd, Andrew James. "Enhancing communication privacy using trustworthy remote entities." Thesis, University of Oxford, 2015. https://ora.ox.ac.uk/objects/uuid:66ce7364-9562-4441-957a-a940e4a50784.

Full text
Abstract:
Communication privacy is the property of a communication system that enables two or more distrusting participants to exchange information without compromising their privacy, with respect to internal and external adversaries. It encompasses aspects of anonymous communication as well as data privacy. A real-world example of the need for communication privacy is the smart energy grid, in which networked smart meters frequently measure energy consumption and communicate with grid operators. Privacy concerns arise from the possible inference of sensitive information from these measurements. Using s
APA, Harvard, Vancouver, ISO, and other styles
50

Du, Jing. "Privacy protection in location-based applications." HKBU Institutional Repository, 2007. http://repository.hkbu.edu.hk/etd_ra/816.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!