• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 10
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 20
  • 20
  • 6
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

The cost of convenience the extent of the reasonable expectation of privacy in the internet age

Karpf, Justin 01 May 2013 (has links)
The thesis will conclude by identifying issues that courts and legislatures will have to address in the coming years to adequately deliver justice in a dynamic society that is prone to powerful technological change.; Though the Internet and social media are fairly recent developments, the legal principles and issues embodied in them are well-represented in the Constitution. Take, for example, the freedom of expression enumerated in the First Amendment. Though traditionally in print, pamphlets, and film, recent developments in technology such as Facebook and blogs have become the new standard forms of communication. Like the physical mediums that arose before them, issues arise of what limits, if any, should be placed on the speech. Given the guise of anonymity, people on the Internet have less accountability in the comments they make, which has led to things ranging from passionate political speech to what is known as cyber-bullying, which is online harassment that has led people to suicide. This thesis, however, will primarily focus on the Fourth Amendment's reasonable expectation of privacy. Because the information involved with the Internet and social media is digital, it is more difficult to identify when privacy has been breached. With a paper envelope, for example, one can tell if the seal was broken and the contents were potentially disclosed to an unwanted party. Electronically, however, no such seal exists to notify the sender or recipient of a communication. Furthermore, the Government has found itself under stricter scrutiny for searches with these new developments in technology; the lack of physical intrusion poses difficult questions for courts that must decide how far a reasonable expectation of privacy goes in the social media age. The thesis will also address how private companies obtain and use individuals' information through the services they provide and the issues that arise from them. Private companies have fewer restrictions than the Government, and both perspectives are important to keep in mind when trying to understand the policy implications rapid technological growth has brought about.
2

Privacy in the Age of the Internet

Russell, Bronwen Elizabeth 15 April 2009
This paper addresses the claim that there is zero privacy for Canadians on the internet. For the interpersonal computing era 1992 to 2007, the relationship between the three major agents (i.e., individual users, federal government, and business) operating on the internet was examined. Three questions guided the research: how has the popular press educated Canadians about internet privacy? what has been the response of the federal government? how have online companies protected the privacy of Canadians? Content analyses of (a) Macleans magazine, (b) the Privacy Commissioner's Annual Reports to Parliament, (c) and the privacy policies of the most visited websites were conducted. Complex Adaptive Systems theory indicated that privacy is an emergent property arising from the interaction of the agents and that the internet is an environment where the agents' interactions lead to limited privacy.
3

Privacy in the Age of the Internet

Russell, Bronwen Elizabeth 15 April 2009 (has links)
This paper addresses the claim that there is zero privacy for Canadians on the internet. For the interpersonal computing era 1992 to 2007, the relationship between the three major agents (i.e., individual users, federal government, and business) operating on the internet was examined. Three questions guided the research: how has the popular press educated Canadians about internet privacy? what has been the response of the federal government? how have online companies protected the privacy of Canadians? Content analyses of (a) Macleans magazine, (b) the Privacy Commissioner's Annual Reports to Parliament, (c) and the privacy policies of the most visited websites were conducted. Complex Adaptive Systems theory indicated that privacy is an emergent property arising from the interaction of the agents and that the internet is an environment where the agents' interactions lead to limited privacy.
4

Online corruption-reporting, internet censorship, and the limits of responsive authoritarianism

Hoskins, Jack 22 August 2017 (has links)
This thesis traces the development of the Chinese government’s attempts to solicit corruption reports from citizens via online platforms such as websites and smartphone applications. It argues that this endeavour has proven largely unsuccessful, and what success it has enjoyed is not sustainable. The reason for this failure is that prospective complainants are offered little incentive to report corruption via official channels. Complaints on social media require less effort and are more likely to lead to investigations than complaints delivered straight to the government, though neither channel is particularly effective. The regime’s concern for social stability has led to widespread censorship of corruption discussion on social media, as well as a slew of laws and regulations banning the behaviour. Though it is difficult to predict what the long-term results of these policies will be, it seems likely that the regime’s ability to collect corruption data will remain limited. / Graduate / 2018-07-14
5

An Empirical Investigation of the Relationship between Computer Self-Efficacy and Information Privacy Concerns

Awwal, Mohammad Abdul 01 January 2011 (has links)
The Internet and the growth of Information Technology (IT) and their enhanced capabilities to collect personal information have given rise to many privacy issues. Unauthorized access of personal information may result in identity theft, stalking, harassment, and other invasions of privacy. Information privacy concerns are impediments to broad-scale adoption of the Internet for purchasing decisions. Computer self-efficacy has been shown to be an effective predictor of behavioral intention and a critical determinant of intention to use Information Technology. This study investigated the relationship between an individual's computer self-efficacy and information privacy concerns; and also examined the differences among different age groups and between genders regarding information privacy concerns and their relationships with computer self-efficacy. A paper-based survey was designed to empirically assess computer self-efficacy and information privacy concerns. The survey was developed by combining existing validated scales for computer self-efficacy and information privacy concerns. The target population of this study was the residents of New Jersey, U.S.A. The assessment was done by using the mall-intercept approach in which individuals were asked to fill out the survey. The sample size for this study was 400 students, professionals, and mature adults. The Shapiro-Wilk test was used for testing data normality and the Spearman rank-order test was used for correlation analyses. MANOVA test was used for comparing mean values of computer self-efficacy and information privacy concerns between genders and among age groups. The results showed that the correlation between computer self-efficacy and information privacy concerns was significant and positive; and there were differences between genders and among age groups regarding information privacy concerns and their relationships with computer self-efficacy. This study contributed to the body of knowledge about the relationships among antecedents and consequences of information privacy concerns and computer self-efficacy. The findings of this study can help corporations to improve e-commerce by targeting privacy policy-making efforts to address the explicit areas of consumer privacy concerns. The results of this study can also help IT practitioners to develop privacy protection tools and processes to address specific consumer privacy concerns.
6

An Empirical Investigation of Internet Privacy: Customer Behaviour, Companies’ Privacy Policy Disclosures, and a Gap

No, Won Gyun 09 1900 (has links)
Privacy emerges as a critical issue in an e-commerce environment because of a fundamental tension among corporate, consumer, and government interests. By reviewing prior Internet-privacy research in the fields of information systems, business, and marketing published between 1995 and 2006, we consider the following research questions: 1) how an individual’s privacy behaviour is affected by privacy policy disclosures and by the level of the individual’s involvement regarding the sensitivity of personal information; 2) how companies’ privacy policies vary with respect to regulatory approaches and cultural values; and 3) whether there is a gap between the privacy practices valued by individuals and those emphasized by companies. A three-stage study is conducted to answer these questions. The first two stages, consisting of a Web-based survey and an online ordering experiment with 210 participants, found that individuals are more likely to read the privacy policy statements posted on Web sites and less likely to provide personal information, when they are under a high privacy involved situation as compared to being in a low privacy involved situation. However, the existence of a privacy seal did not affect individuals’ behaviour, regardless of involvement conditions. This study also found a gap between self-reported privacy behaviour and actual privacy behaviour. When individuals were requested to provide personal information, their privacy policy statement reading behaviour was close to their self-report behaviour. However, their personal information providing behaviour was different from their self-reported behaviour. The third stage, which entailed the study of 420 privacy policies spanning six countries and two industries, showed that privacy policies vary across countries, as well as with varying governmental involvement and cultural values in those countries. Finally, the analysis of all the three stages revealed a gap between individuals’ importance ratings of companies’ privacy practices and policies that companies emphasize in their privacy disclosures.
7

An Empirical Investigation of Internet Privacy: Customer Behaviour, Companies’ Privacy Policy Disclosures, and a Gap

No, Won Gyun 09 1900 (has links)
Privacy emerges as a critical issue in an e-commerce environment because of a fundamental tension among corporate, consumer, and government interests. By reviewing prior Internet-privacy research in the fields of information systems, business, and marketing published between 1995 and 2006, we consider the following research questions: 1) how an individual’s privacy behaviour is affected by privacy policy disclosures and by the level of the individual’s involvement regarding the sensitivity of personal information; 2) how companies’ privacy policies vary with respect to regulatory approaches and cultural values; and 3) whether there is a gap between the privacy practices valued by individuals and those emphasized by companies. A three-stage study is conducted to answer these questions. The first two stages, consisting of a Web-based survey and an online ordering experiment with 210 participants, found that individuals are more likely to read the privacy policy statements posted on Web sites and less likely to provide personal information, when they are under a high privacy involved situation as compared to being in a low privacy involved situation. However, the existence of a privacy seal did not affect individuals’ behaviour, regardless of involvement conditions. This study also found a gap between self-reported privacy behaviour and actual privacy behaviour. When individuals were requested to provide personal information, their privacy policy statement reading behaviour was close to their self-report behaviour. However, their personal information providing behaviour was different from their self-reported behaviour. The third stage, which entailed the study of 420 privacy policies spanning six countries and two industries, showed that privacy policies vary across countries, as well as with varying governmental involvement and cultural values in those countries. Finally, the analysis of all the three stages revealed a gap between individuals’ importance ratings of companies’ privacy practices and policies that companies emphasize in their privacy disclosures.
8

Das Websurfen und der Datenschutz : ein Rechtsvergleich unter besonderer Berücksichtigung der Zulässigkeit sogenannter Cookies und Web Bugs am Beispiel des deutschen und U.S.-amerikanischen Rechts /

Wagner, Sylke. January 2006 (has links) (PDF)
Univ., Diss.--Mainz, 2005. / Literaturverz. S. 17 - 43.
9

Reklam, integritetsintrång? : En studie om integritet och attityd till individanpassad marknadsföring

Nilsson, Tigge, Westermark, Alexander January 2020 (has links)
Mer och mer konsumentdata blir tillgängligt för marknadsförare vilket öppnar upp för individanpassad marknadsföring (IM) riktad mot konsumenter. Syftet med denna studie har varit att undersöka hur attityden till påverkas av personlig integritet samt hur attityden till IM skiljer sig mellan individer. Genom sju intervjuer med individer från Generation Y som har växt upp i linje med digitaliseringen och har tidigare erfarenhet av individanpassad marknadsföring, samlades information in som senare tolkades och analyserades. Studien påvisar att attityden till IM kan påverkas av personlig integritet på olika sätt, till exempel när individen inte är medveten om att datan har använts. Vidare visar studien att attityden till IM kan skilja sig mellan individer beroende på hur relevant ett meddelande är för mottagaren.
10

Adpocalypse : The new privacy legislations’ impact on digital advertisement in Sweden

Hansson, Rebecca January 2022 (has links)
2020 and 2021 were shocking years for advertising and digital marketing since both Apple and Google announced that they would limit third-party tracking. Google and Apple’s news created turmoil in the marketing business sector since advertisers no longer will be able to target and track the success of their digital ads as efficiently and effectively. In addition, there will be significant changes in the industry since these new privacy rules mean that there will be an inability of personalisation and just-in-time targeting for digital marketing, and advertisers have dubbed this situation the “adpocalypse.”  Both secondary and primary data were collected to answer the research question, how have the new privacy rules and regulations impacted the different steps of the AIDA model in digital media planning for digital advertising. Secondary data has been collected from business journals and academic journals, and the primary data has been collected through in-depth interviews. Further, the research is exploratory and explores the research question to give the reader a greater understanding of the subject area.   The following can be concluded from the research. Internet privacy rules and regulations will impact awareness, and it will be more challenging for companies to create awareness for their product offerings. Awareness will be heavily built on brand recognition, and the strategies for this step will revert to more traditional methods.  Interest would be affected since companies no longer will be able to follow up on their communication strategies as effectively. This research showed that the further down the company’s sales funnel, the more impacted the strategies. Further, desire would be more challenging for companies to create since retargeting, just-in-time targeting, and micro-targeting would no longer be possible in the same manner. Lastly, since action results from desire, this step would be heavily impacted.

Page generated in 0.07 seconds