Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Privacy practices.

Artykuły w czasopismach na temat „Privacy practices”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Privacy practices”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Smith, H. Jeff. "Privacy policies and practices." Communications of the ACM 36, no. 12 (December 1993): 104–22. http://dx.doi.org/10.1145/163298.163349.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Paasche-Orlow, Michael K., Dan M. Jacob, and Joshua N. Powell. "Notices of Privacy Practices." Medical Care 43, no. 6 (June 2005): 558–64. http://dx.doi.org/10.1097/01.mlr.0000163646.90393.e4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Schlueter, John P. "Private Practices." Nineteenth-Century Literature 66, no. 3 (December 1, 2011): 283–306. http://dx.doi.org/10.1525/ncl.2011.66.3.283.

Pełny tekst źródła
Streszczenie:
Abstract This essay uses selected works of Washington Irving and Ralph Waldo Emerson to delineate two different privacies. The first privacy is associated with secreted spaces, whether physical or personal, and is one that has been normalized. The other privacy is under-appreciated and far less understood: it is an unpredictable, speculative flight of what Irving calls “fancy.” The essay argues that each privacy comes with a distinct set of consequences. If we choose to associate privacy with secreted spaces, we ourselves become like texts, able to be read, and we then associate with others as
Style APA, Harvard, Vancouver, ISO itp.
4

Hsu, Chiung‐wen (Julia). "Privacy concerns, privacy practices and web site categories." Online Information Review 30, no. 5 (September 2006): 569–86. http://dx.doi.org/10.1108/14684520610706433.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Toy, Alan, David Lau, David Hay, and Gehan Gunasekara. "The views of privacy auditors regarding standards and methodologies." Meditari Accountancy Research 27, no. 3 (June 3, 2019): 366–98. http://dx.doi.org/10.1108/medar-07-2018-0367.

Pełny tekst źródła
Streszczenie:
Purpose This paper aims to uncover the practices of different privacy auditors to reveal the extent of any similarities in such practices. The purpose is to investigate the drivers of practices used by privacy auditors and to identify potential for improvements in the practice of privacy auditing so that privacy audits may better serve stakeholders. Design/methodology/approach Six semi-structured interviews with seven privacy auditors and regulators and an analyst across Australia, Canada, New Zealand and the USA are used as the basis for our analysis. Findings The study shows that some privac
Style APA, Harvard, Vancouver, ISO itp.
6

Mensch, Scott E., and LeAnn Wilkie. "Smart Phone Security Practices." International Journal of Cyber Behavior, Psychology and Learning 9, no. 3 (July 2019): 1–14. http://dx.doi.org/10.4018/ijcbpl.2019070101.

Pełny tekst źródła
Streszczenie:
Hand-held cell phone technology has been around for quite some time, however when Apple introduced the iPhone in 2007, the widespread adoption of smartphones took off. Smartphones allow users to communicate via talk, text and video; access personal and work e-mail and the Internet; run applications; make purchases; manage bank accounts; take pictures - and for many of us are an integral part of our everyday (The Privacy Rights Clearinghouse, 2018). Smartphones are “essentially tiny computers, we reach for these devices when we first wake up, bring them with us into the car, and often keep them
Style APA, Harvard, Vancouver, ISO itp.
7

Han, Ye, and T. Selwyn Ellis. "A Study of User Continuance Behavioral Intentions Toward Privacy-Protection Practices." Information Resources Management Journal 31, no. 2 (April 2018): 24–46. http://dx.doi.org/10.4018/irmj.2018040102.

Pełny tekst źródła
Streszczenie:
Prior research on privacy protective behaviors has found that online users irrationally trade protection for convenience, and so act against their own privacy preferences. The present article uses expectancy-confirmation theory (ECT) models to explain the continuance behavioral intentions of online users toward privacy-protection practices. It redefines convenience to highlight human behaviors involved in various stages of implementing privacy practices processes. The results show that earlier privacy practice experiences impact the present as well as the future protective behaviors of users,
Style APA, Harvard, Vancouver, ISO itp.
8

Hope, Joan. "Follow best practices for transparency about student privacy practices." Disability Compliance for Higher Education 20, no. 9 (March 17, 2015): 9. http://dx.doi.org/10.1002/dhe.30049.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Cohen, Julie E. "Turning Privacy Inside Out." Theoretical Inquiries in Law 20, no. 1 (March 16, 2019): 1–31. http://dx.doi.org/10.1515/til-2019-0002.

Pełny tekst źródła
Streszczenie:
Abstract The problem of theorizing privacy moves on two levels, the first consisting of an inadequate conceptual vocabulary and the second consisting of an inadequate institutional grammar. Privacy rights are supposed to protect individual subjects, and so conventional ways of understanding privacy are subject-centered, but subject-centered approaches to theorizing privacy also wrestle with deeply embedded contradictions. And privacy’s most enduring institutional failure modes flow from its insistence on placing the individual and individualized control at the center. Strategies for rescuing p
Style APA, Harvard, Vancouver, ISO itp.
10

Culnan, Mary J., and Thomas J. Carlin. "Online privacy practices in higher education." Communications of the ACM 52, no. 3 (March 2009): 126–30. http://dx.doi.org/10.1145/1467247.1467277.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

Lauer, Thomas W., and Xiaodong Deng. "Building online trust through privacy practices." International Journal of Information Security 6, no. 5 (July 3, 2007): 323–31. http://dx.doi.org/10.1007/s10207-007-0028-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

NORD, CATHARINA. "Architectural space as a moulding factor of care practices and resident privacy in assisted living." Ageing and Society 31, no. 6 (March 14, 2011): 934–52. http://dx.doi.org/10.1017/s0144686x10001248.

Pełny tekst źródła
Streszczenie:
ABSTRACTThis article presents an analysis of privacy, care practices and architectural space in assisted living in Sweden. The presented research is a qualitative case study. Observations and personal interviews with staff as well as residents were the major data collection methods. The analysis revealed the evasiveness of a private–public dichotomy; that is, how privacy appears in public spaces and how private spaces became public under certain conditions. During the course of a day, the residents' privacy was qualified and structured by caring activities that took place in various spaces and
Style APA, Harvard, Vancouver, ISO itp.
13

Charlesworth, Andrew J. "Privacy, Personal Information and Employment." Surveillance & Society 1, no. 2 (September 1, 2002): 217–22. http://dx.doi.org/10.24908/ss.v1i2.3355.

Pełny tekst źródła
Streszczenie:
It is a widely accepted proposition, reflected in privacy-enhancing legislation and regulations, that individuals will have less privacy in their workplace activities than in their private lives. However, modern technologies and business practices have blurred the boundary between private life and workplace, and a re-evaluation of the traditional legislative and regulatory protections for privacy in employment is required.
Style APA, Harvard, Vancouver, ISO itp.
14

Coppens, Paulien, Carina Veeckman, and Laurence Claeys. "Privacy in location-based social networks: privacy scripts & user practices." Journal of Location Based Services 9, no. 1 (January 2, 2015): 1–15. http://dx.doi.org/10.1080/17489725.2015.1017015.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

Burton, Julian. "Privacy on their terms." Canadian Journal of Children's Rights / Revue canadienne des droits des enfants 5, no. 1 (November 9, 2018): 150–72. http://dx.doi.org/10.22215/cjcr.v5i1.1256.

Pełny tekst źródła
Streszczenie:
Respecting participants' privacy rights is a vital component of research ethics, but conventional practices in this area may falter when research focuses on groups whose experiences and concerns diverge from those deemed normative, or takes place in novel environments where information flows and functions in unexpected ways. This article examines the specific example of research with young people in digital social spaces, discussing how online youth communities construct and maintain privacy and arguing that choices regarding research practices should be made in response to contextualized unde
Style APA, Harvard, Vancouver, ISO itp.
16

Charbonneau, Deborah H. "Privacy Practices of Health Social Networking Sites." CIN: Computers, Informatics, Nursing 34, no. 8 (August 2016): 355–59. http://dx.doi.org/10.1097/cin.0000000000000249.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Pfleeger, S. L., and C. P. Pfleeger. "Harmonizing privacy with security principles and practices." IBM Journal of Research and Development 53, no. 2 (March 2009): 6:1–6:12. http://dx.doi.org/10.1147/jrd.2009.5429048.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Martin, David M., Richard M. Smith, Michael Brittain, Ivan Fetch, and Hailin Wu. "The privacy practices of Web browser extensions." Communications of the ACM 44, no. 2 (February 2001): 45–50. http://dx.doi.org/10.1145/359205.359226.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Jin, Haojian, Hong Shen, Mayank Jain, Swarun Kumar, and Jason I. Hong. "Lean Privacy Review: Collecting Users’ Privacy Concerns of Data Practices at a Low Cost." ACM Transactions on Computer-Human Interaction 28, no. 5 (October 31, 2021): 1–55. http://dx.doi.org/10.1145/3463910.

Pełny tekst źródła
Streszczenie:
Today, industry practitioners (e.g., data scientists, developers, product managers) rely on formal privacy reviews (a combination of user interviews, privacy risk assessments, etc.) in identifying potential customer acceptance issues with their organization’s data practices. However, this process is slow and expensive, and practitioners often have to make ad-hoc privacy-related decisions with little actual feedback from users. We introduce Lean Privacy Review (LPR), a fast, cheap, and easy-to-access method to help practitioners collect direct feedback from users through the proxy of crowd work
Style APA, Harvard, Vancouver, ISO itp.
20

Hartman-Caverly, Sarah, and Alexandria Chisholm. "Privacy literacy instruction practices in academic libraries: Past, present, and possibilities." IFLA Journal 46, no. 4 (August 28, 2020): 305–27. http://dx.doi.org/10.1177/0340035220956804.

Pełny tekst źródła
Streszczenie:
This article explores the past, present, and possibilities of privacy and privacy literacy (PL) instruction in academic libraries. It surveys the scholarship on privacy and privacy literacy from the domains of philosophy, anthropology, history, law, education, and LIS. A privacy conceptual model is proposed demonstrating the zones of informational agency that privacy preserves, and a timeline of privacy and libraries documents key developments in privacy culture in the US. Findings from an original exploratory survey of privacy literacy instruction practices in academic libraries are discussed
Style APA, Harvard, Vancouver, ISO itp.
21

Chen, Wenhong, Gejun Huang, Joshua Miller, Kye-Hyoung Lee, Daniel Mauro, Bryan Stephens, and Xiaoqian Li. "“As We Grow, It Will Become a Priority”: American Mobile Start-Ups’ Privacy Practices." American Behavioral Scientist 62, no. 10 (July 12, 2018): 1338–55. http://dx.doi.org/10.1177/0002764218787867.

Pełny tekst źródła
Streszczenie:
Privacy has become a crucial issue of the digital age, with significant social, political, and economic ramifications. A growing body of literature has dedicated to the patterns, causes, and consequences of individuals’ privacy concerns, skills, and practices. Advancing a producer’s perspective, this research draws on in-depth interviews with 45 tech entrepreneurs to examine privacy practices of mobile start-ups in the United States. Results reveal (a) factors that contribute to the problematic status of privacy issues and (b) whether and how entrepreneurs leverage privacy management as a comp
Style APA, Harvard, Vancouver, ISO itp.
22

Culnan, Mary J. "Protecting Privacy Online: Is Self-Regulation Working?" Journal of Public Policy & Marketing 19, no. 1 (April 2000): 20–26. http://dx.doi.org/10.1509/jppm.19.1.20.16944.

Pełny tekst źródła
Streszczenie:
The author assesses the extent to which 361 consumer-oriented commercial Web sites post disclosures that describe their information practices and whether these disclosures reflect fair information practices. Although approximately 67% of the sites sampled post a privacy disclosure, only 14% of these disclosures constitute a comprehensive privacy policy. The study was initiated by the private sector as a progress report to the Federal Trade Commission (FTC) and is one in a series of efforts designed to assess whether consumer privacy can be protected through industry self-regulation or whether
Style APA, Harvard, Vancouver, ISO itp.
23

McQuay, Terry, and Ann Cavoukian. "A pragmatic approach to privacy risk optimization: privacy by design for business practices." Identity in the Information Society 3, no. 2 (July 11, 2010): 379–96. http://dx.doi.org/10.1007/s12394-010-0067-6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

Parsons, Christopher. "Beyond Privacy: Articulating the Broader Harms of Pervasive Mass Surveillance." Media and Communication 3, no. 3 (October 20, 2015): 1–11. http://dx.doi.org/10.17645/mac.v3i3.263.

Pełny tekst źródła
Streszczenie:
This article begins by recounting a series of mass surveillance practices conducted by members of the “Five Eyes” spying alliance. While boundary- and intersubjectivity-based theories of privacy register some of the harms linked to such practices I demonstrate how neither are holistically capable of registering these harms. Given these theories’ deficiencies I argue that critiques of signals intelligence surveillance practices can be better grounded on why the practices intrude on basic communicative rights, including those related to privacy. The crux of the argument is that pervasive mass su
Style APA, Harvard, Vancouver, ISO itp.
25

Hosseini, Henry, Martin Degeling, Christine Utz, and Thomas Hupperich. "Unifying Privacy Policy Detection." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (July 23, 2021): 480–99. http://dx.doi.org/10.2478/popets-2021-0081.

Pełny tekst źródła
Streszczenie:
Abstract Privacy policies have become a focal point of privacy research. With their goal to reflect the privacy practices of a website, service, or app, they are often the starting point for researchers who analyze the accuracy of claimed data practices, user understanding of practices, or control mechanisms for users. Due to vast differences in structure, presentation, and content, it is often challenging to extract privacy policies from online resources like websites for analysis. In the past, researchers have relied on scrapers tailored to the specific analysis or task, which complicates co
Style APA, Harvard, Vancouver, ISO itp.
26

Barbosa, Natã M., Joon S. Park, Yaxing Yao, and Yang Wang. "“What if?” Predicting Individual Users’ Smart Home Privacy Preferences and Their Changes." Proceedings on Privacy Enhancing Technologies 2019, no. 4 (October 1, 2019): 211–31. http://dx.doi.org/10.2478/popets-2019-0066.

Pełny tekst źródła
Streszczenie:
Abstract Smart home devices challenge a long-held notion that the home is a private and protected place. With this in mind, many developers market their products with a focus on privacy in order to gain user trust, yet privacy tensions arise with the growing adoption of these devices and the risk of inappropriate data practices in the smart home (e.g., secondary use of collected data). Therefore, it is important for developers to consider individual user preferences and how they would change under varying circumstances, in order to identify actionable steps towards developing user trust and ex
Style APA, Harvard, Vancouver, ISO itp.
27

Odella, Francesca. "Privacy Awareness and the Networking Generation." International Journal of Technoethics 9, no. 1 (January 2018): 51–70. http://dx.doi.org/10.4018/ijt.2018010105.

Pełny tekst źródła
Streszczenie:
The article discusses the social and privacy implications of children's access to the internet and to information technologies of communication (ITCS) services. The growing rate of children online represents an epochal change for issues related to their personal safety and protection, as well as for their privacy rights and chances of improved life. In order to better understand the long term privacy implications of these phenomena the discussion reviews sociological studies that have investigated the structure of friendships networks among adolescents, and describes theoretical frames adopted
Style APA, Harvard, Vancouver, ISO itp.
28

Sheehan, Kim Bartel, and Timothy W. Gleason. "Online Privacy: Internet Advertising Practitioners' Knowledge and Practices." Journal of Current Issues & Research in Advertising 23, no. 1 (March 2001): 31–41. http://dx.doi.org/10.1080/10641734.2001.10505112.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Dowling, Thomas. "Protecting patron privacy: Safe practices for public computers." Technical Services Quarterly 33, no. 2 (March 21, 2016): 214–15. http://dx.doi.org/10.1080/07317131.2016.1135018.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
30

Dewi, Sinta. "Balancing privacy rights and legal enforcement: Indonesian practices." International Journal of Liability and Scientific Enquiry 5, no. 3/4 (2012): 232. http://dx.doi.org/10.1504/ijlse.2012.051961.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Weber, R. H. "Privacy management practices in the proposed EU regulation." International Data Privacy Law 4, no. 4 (September 4, 2014): 290–97. http://dx.doi.org/10.1093/idpl/ipu018.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Smith, H. Jeff, Sandra J. Milberg, and Sandra J. Burke. "Information Privacy: Measuring Individuals' Concerns about Organizational Practices." MIS Quarterly 20, no. 2 (June 1996): 167. http://dx.doi.org/10.2307/249477.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Schellenberg, Kathryn. "Police Information Systems, Information Practices and Individual Privacy." Canadian Public Policy / Analyse de Politiques 23, no. 1 (March 1997): 23. http://dx.doi.org/10.2307/3552129.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Millar, Sheila A. "Privacy and security: Best practices for global security." Journal of International Trade Law and Policy 5, no. 1 (May 31, 2006): 36–49. http://dx.doi.org/10.1108/14770020680000539.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

ROTFELD, HERBERT JACK. "Privacy Crimes, Annoyances and Self-Defeating Business Practices." Journal of Consumer Affairs 43, no. 3 (September 2009): 538–42. http://dx.doi.org/10.1111/j.1745-6606.2009.01154.x.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Wang, Shu-Ching, and Jen-Her Wu. "Proactive privacy practices in transition: Toward ubiquitous services." Information & Management 51, no. 1 (January 2014): 93–103. http://dx.doi.org/10.1016/j.im.2013.09.005.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Karyda, Maria, Stefanos Gritzalis, Jong Hyuk Park, and Spyros Kokolakis. "Privacy and fair information practices in ubiquitous environments." Internet Research 19, no. 2 (April 3, 2009): 194–208. http://dx.doi.org/10.1108/10662240910952346.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Schwaig, Kathy Stewart, Gerald C. Kane, and Veda C. Storey. "Privacy, fair information practices and the fortune 500." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 36, no. 1 (February 7, 2005): 49–63. http://dx.doi.org/10.1145/1047070.1047075.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Bui, Duc, Kang G. Shin, Jong-Min Choi, and Junbum Shin. "Automated Extraction and Presentation of Data Practices in Privacy Policies." Proceedings on Privacy Enhancing Technologies 2021, no. 2 (January 29, 2021): 88–110. http://dx.doi.org/10.2478/popets-2021-0019.

Pełny tekst źródła
Streszczenie:
Abstract Privacy policies are documents required by law and regulations that notify users of the collection, use, and sharing of their personal information on services or applications. While the extraction of personal data objects and their usage thereon is one of the fundamental steps in their automated analysis, it remains challenging due to the complex policy statements written in legal (vague) language. Prior work is limited by small/generated datasets and manually created rules. We formulate the extraction of fine-grained personal data phrases and the corresponding data collection or shar
Style APA, Harvard, Vancouver, ISO itp.
40

LaMonica, Haley M., Anna E. Roberts, Grace Yeeun Lee, Tracey A. Davenport, and Ian B. Hickie. "Privacy Practices of Health Information Technologies: Privacy Policy Risk Assessment Study and Proposed Guidelines." Journal of Medical Internet Research 23, no. 9 (September 16, 2021): e26317. http://dx.doi.org/10.2196/26317.

Pełny tekst źródła
Streszczenie:
Background Along with the proliferation of health information technologies (HITs), there is a growing need to understand the potential privacy risks associated with using such tools. Although privacy policies are designed to inform consumers, such policies have consistently been found to be confusing and lack transparency. Objective This study aims to present consumer preferences for accessing privacy information; develop and apply a privacy policy risk assessment tool to assess whether existing HITs meet the recommended privacy policy standards; and propose guidelines to assist health profess
Style APA, Harvard, Vancouver, ISO itp.
41

Shipp, Laura, and Jorge Blasco. "How private is your period?: A systematic analysis of menstrual app privacy policies." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (October 1, 2020): 491–510. http://dx.doi.org/10.2478/popets-2020-0083.

Pełny tekst źródła
Streszczenie:
AbstractMenstruapps are mobile applications that can track a user’s reproductive cycle, sex life and health in order to provide them with algorithmically derived insights into their body. These apps are now hugely popular, with the most favoured boasting over 100 million downloads. In this study, we investigate the privacy practices of a set of 30 Android menstruapps, a set which accounts for nearly 200 million downloads.We measured how the apps present information and behave on a number of privacy related topics, such as the complexity of the language used, the information collected by them,
Style APA, Harvard, Vancouver, ISO itp.
42

Hollenbaugh, Erin E. "Privacy Management Among Social Media Natives: An Exploratory Study of Facebook and Snapchat." Social Media + Society 5, no. 3 (April 2019): 205630511985514. http://dx.doi.org/10.1177/2056305119855144.

Pełny tekst źródła
Streszczenie:
Guided by communication privacy management theory, this study tested network size, network diversity, privacy concerns, and privacy management practices in and between Facebook and Snapchat for social media natives. A cross-sectional survey of 273 college students (predominately Caucasian, female, 18- to 20 years old) showed that audiences were larger and more diverse in Facebook than Snapchat. Snapchat users with larger friend lists and lower privacy concerns reported more shared boundary ownership, whereas those with more diverse networks reportedly used more open friending practices to expa
Style APA, Harvard, Vancouver, ISO itp.
43

König, Katharina, and Florence Oloff. "Mobile Medienpraktiken im Spannungsfeld von Öffentlichkeit, Privatheit und Anonymität." Journal für Medienlinguistik 2, no. 2 (September 27, 2019): 1–27. http://dx.doi.org/10.21248/jfml.2019.9.

Pełny tekst źródła
Streszczenie:
This contribution aims to describe privacy, publicness and anonymity as essential dimensions for doing media linguistics. These dimensions are not inherent in and predetermined by the technical features and forms of communication, but are used by the participants as an orientation grid for shaping their online and offline practices in and with mobile media. Considering both mobile media use in the public realm and the dissemination of increasingly private content in social media (which is said to lead to ‘blurred boundaries’ between the private and the public), this paper provides a brief over
Style APA, Harvard, Vancouver, ISO itp.
44

König, Katharina, and Florence Oloff. "Mobile Medienpraktiken im Spannungsfeld von Öffentlichkeit, Privatheit und Anonymität." Journal für Medienlinguistik 2, no. 2 (September 27, 2019): 1–27. http://dx.doi.org/10.21248/jfml.2019.9.

Pełny tekst źródła
Streszczenie:
This contribution aims to describe privacy, publicness and anonymity as essential dimensions for doing media linguistics. These dimensions are not inherent in and predetermined by the technical features and forms of communication, but are used by the participants as an orientation grid for shaping their online and offline practices in and with mobile media. Considering both mobile media use in the public realm and the dissemination of increasingly private content in social media (which is said to lead to ‘blurred boundaries’ between the private and the public), this paper provides a brief over
Style APA, Harvard, Vancouver, ISO itp.
45

Kitsos, Panagiotis, and Aikaterini Yannoukakou. "Privacy in the 21st Century." International Journal of E-Politics 4, no. 3 (July 2013): 15–29. http://dx.doi.org/10.4018/jep.2013070102.

Pełny tekst źródła
Streszczenie:
The events of 9/11 along with the bombarding in Madrid and London forced governments to resort to new structures of privacy safeguarding and electronic surveillance under the common denominator of terrorism and transnational crime fighting. Legislation as US PATRIOT Act and EU Data Retention Directive altered fundamentally the collection, processing and sharing methods of personal data, while it granted increased powers to police and law enforcement authorities concerning their jurisdiction in obtaining and processing personal information to an excessive degree. As an aftermath of the resulted
Style APA, Harvard, Vancouver, ISO itp.
46

Adorjan, Michael, and Rosemary Ricciardelli. "A New Privacy Paradox? Youth Agentic Practices of Privacy Management Despite “Nothing to Hide” Online." Canadian Review of Sociology/Revue canadienne de sociologie 56, no. 1 (January 15, 2019): 8–29. http://dx.doi.org/10.1111/cars.12227.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Barhamgi, Mahmoud, Arosha K. Bandara, Yijun Yu, Khalid Belhajjame, and Bashar Nuseibeh. "Protecting Privacy in the Cloud: Current Practices, Future Directions." Computer 49, no. 2 (February 2016): 68–72. http://dx.doi.org/10.1109/mc.2016.59.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

Dias, Gonçalo Paiva, Hélder Gomes, and André Zúquete. "Privacy policies and practices in Portuguese local e-government." Electronic Government, an International Journal 12, no. 4 (2016): 301. http://dx.doi.org/10.1504/eg.2016.080430.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

Zúquete, André, Gonçalo Paiva Dias, and Hélder Gomes. "Privacy policies and practices in Portuguese local e-government." Electronic Government, an International Journal 12, no. 4 (2016): 301. http://dx.doi.org/10.1504/eg.2016.10001404.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
50

Kemp, Katharine. "Concealed data practices and competition law: why privacy matters." European Competition Journal 16, no. 2-3 (September 1, 2020): 628–72. http://dx.doi.org/10.1080/17441056.2020.1839228.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!