Spelling suggestions: "subject:"privacy, light off"" "subject:"privacy, light oof""
161 |
Die Veröffentlichung von Namen in gerichtlichen Entscheidungen /Knerr, Gerhard. January 2004 (has links) (PDF)
Univ., Diss.--Saarbrücken, 2002.
|
162 |
An investigation of issues of privacy, anonymity and multi-factor authentication in an open environmentMiles, Shaun Graeme 20 June 2012 (has links)
This thesis performs an investigation into issues concerning the broad area ofIdentity and Access Management, with a focus on open environments. Through literature research the issues of privacy, anonymity and access control are identified. The issue of privacy is an inherent problem due to the nature of the digital network environment. Information can be duplicated and modified regardless of the wishes and intentions ofthe owner of that information unless proper measures are taken to secure the environment. Once information is published or divulged on the network, there is very little way of controlling the subsequent usage of that information. To address this issue a model for privacy is presented that follows the user centric paradigm of meta-identity. The lack of anonymity, where security measures can be thwarted through the observation of the environment, is a concern for users and systems. By an attacker observing the communication channel and monitoring the interactions between users and systems over a long enough period of time, it is possible to infer knowledge about the users and systems. This knowledge is used to build an identity profile of potential victims to be used in subsequent attacks. To address the problem, mechanisms for providing an acceptable level of anonymity while maintaining adequate accountability (from a legal standpoint) are explored. In terms of access control, the inherent weakness of single factor authentication mechanisms is discussed. The typical mechanism is the user-name and password pair, which provides a single point of failure. By increasing the factors used in authentication, the amount of work required to compromise the system increases non-linearly. Within an open network, several aspects hinder wide scale adoption and use of multi-factor authentication schemes, such as token management and the impact on usability. The framework is developed from a Utopian point of view, with the aim of being applicable to many situations as opposed to a single specific domain. The framework incorporates multi-factor authentication over multiple paths using mobile phones and GSM networks, and explores the usefulness of such an approach. The models are in tum analysed, providing a discussion into the assumptions made and the problems faced by each model. / Adobe Acrobat Pro 9.5.1 / Adobe Acrobat 9.51 Paper Capture Plug-in
|
163 |
A sociological study of employees' perceptions of electronic surveillance in public FET institutions in the Eastern Cape Province, South AfricaJonas, Randolph Patrick January 2014 (has links)
The perceptions of employees regarding electronic surveillance in the workplace were studied using a mixed method approach. The change that permeates society and organisations have not escaped public FET institutions in South Africa. These changes such as computerisation of work and the employment of electronic surveillance, have implications for management, control, privacy, productivity and trust in the workplace. Yet, public FET institutions are not performing to the expected standards. Surveillance of work and employees at these institutions are interventions of management to ensure organisational goals are achieved. Despite the prevalence of electronic surveillance in the workplace, employee perceptions and their lived experiences thereof are seldom reported. Published research barely focuses on employees’ perceptions of electronic surveillance in the workplace, and instead offers a perfunctory look at the perceptual dimensions. Employees’ perceptions reflects their lived experiences in the workplace and yield a foundational understanding of workplace dynamics and organisational behaviour. The perceptions of employees regarding electronic surveillance were viewed through the lens of quantitative and qualitative analysis to give statistical and thick descriptions respectively to augment better understanding. The study therefore provides a descriptive account of employees’ perceptions of electronic surveillance and its effects. Specifically the study examined employee perceptions of electronic surveillance as a control measure of management, as an intrusion of employee privacy and impacting on the trust relationship and productivity. An extensive review of the literature provided the basis for the research questions and eight hypotheses were proposed. A survey, by means of an electronic questionnaire, was conducted to test the hypotheses using a random sample of employees at three public FET institutions in the Eastern Cape Province, South Africa. The results are presented followed by a discussion, conclusions and limitations. Suggestions and recommendations for future research are also indicated. The central thesis of the study is presented, namely that electronic surveillance is experienced as a measure of management to control workers and that privacy as well trust, as an element of the employment relationship, are influenced by it. Further findings indicated that there are no statistically significant differences in the responses of the three job categories namely lecturers, managers and administration and support staff. Interviews were also conducted and the data from the interviews reported the depth and breadth of the perceptions of a small sample of employees who related their experiences and situations in terms of the key themes of electronic surveillance as control and an intrusion of their right to privacy, trust and productivity. The findings indicate that acceptance of electronic surveillance is contingent upon contextual factors and the meaning people assign to their situations. Privacy concerns were limited to personal information, fairness and dignity. The link between electronic surveillance and control and discipline is reported in the responses. The findings indicate that perceptions of electronic surveillance as managerial control is related to the lived experiences of employees. Employees voiced positive perceptions of electronic surveillance in cases where management clearly communicates the purpose to the employees. The study of the subjective experiences of employees in workplaces under electronic surveillance thus helped to illuminate the intricacies of employment relationships in the changing world of work. The study findings widen the knowledge base on organisational behaviour and is essential for human resources management and organisational development interventions. Human rights and ethics are part of the sense making process when employees construct social reality. Management and control is redefined in various terms and has implications for change management strategies and organisational development practises in globalising and network society. The study raises the critical question whether electronic surveillance as an adjunct for bureaucratic control is still relevant in a changing world of work where good faith, trust and confidence are still highly valued. The insights into the role of trust in the employment relationship is important for managing public institutions in complex settings. Management must be aware of the differences in the lived experiences of employees when dealing with workplace issues.
|
164 |
Das Privatleben Prominenter als Verfassungsproblem : ein Rechtsvergleich mit Frankreich und England unter Einbezug von Internetpublikationen /Straky, Randolf. January 2006 (has links) (PDF)
Univ., Diss.--Mannheim, 2005. / Literaturverz. S. 237 - 261.
|
165 |
Electronic communication in the workplace : employer vs employee legal rightsBarnardt, Gerard Louis 04 1900 (has links)
Thesis (LLM)--University of Stellenbosch, 2004. / ENGLISH ABSTRACT: The monitoring of electronic communication is likely to face all employers sooner or
later. The rapid advancement in technology aimed at helping to monitor electronic
communication, makes it easier than ever before for employers to monitor the
electronic communications of their employees.
There are important questions to consider when dealing with the topic of monitoring
electronic communication. Examples include "mayan employer legally monitor
electronic communications?" and "how does monitoring affect the employee's right to
privacy?"
This thesis is an attempt to answer these and other related questions by analysing,
inter alia, South African legislation, the Constitution and case law, as well as
comparing the law as it applies in the United Kingdom and the United States of
America.
The analysis and conclusion offered in this thesis aim to provide theoretical
consideration to academics and practical application for employers that are faced with
the reality of monitoring electronic communications. / AFRIKAANSE OPSOMMING: Alle werkgewers sal waarskynlik die een of ander tyd met die monitering van
elektroniese kommunikasie gekonfronteer word. Die snelle voortuitgang in tegnologie
wat daarop gemik is om te help met die monitering van elektroniese kommunikasie,
maak dit vir werkgewers makliker as ooit tevore om sodanige kommunikasies van
hulle werknemers te monitor.
Daar is egter belangrike vrae wat oorweeg moet word wanneer die onderwerp van
monitering van elektroniese kommunikasie ter sprake kom. Voorbeelde hiervan is
"mag 'n werknemer regtens elektroniese kommunikasies monitor?" en "hoe raak
monitering die werknemer se reg tot privaatheid?"
Hierdie tesis is 'n poging om hierdie en ander verwante vrae te beantwoord deur die
ontleding van, onder andere, Suid-Afrikaanse wetgewing, die Grondwet en die reg
soos deur hofuitsprake ontwikkel, sowel as vergelyking van die reg soos wat dit van
toepassing is in die Verenigde Koninkryk en die Verenigde State van Amerika.
Die ontleding en gevolgtrekking wat in hierdie tesis aangebied word, is gemik op die
verskaffing van teoretiese oorweging aan akademici en praktiese toepassing vir
werkgewers wat met die realiteit van die monitering van elektroniese kommunikasies
gekonfronteer word.
|
166 |
The Protection of Privacy in the Workplace: A Comparative StudyGondwe, Mimmy 12 1900 (has links)
Thesis (LLD )--Stellenbosch University, 2011. / ENGLISH ABSTRACT: The importance of privacy lies in the fact that it represents the very idea of human dignity or
the preservation of the ‘inner sanctum’. Not surprisingly, however, operational concerns of
employers and technological developments combine continuously to challenge the
preservation of privacy in the workplace. Employees the world over are exposed to numerous
privacy invasive measures, including drug testing, psychological testing, polygraph testing,
genetic testing, psychological testing, electronic monitoring and background checks. Hence,
the issue at the heart of this dissertation is to determine to what extent privacy is protected in
the South African workplace given advancements in technology and the implications (if any)
for the right to privacy as such.
A secondary aim of the dissertation is to attempt to provide a realistic balance between the
privacy concerns of employees and the operational needs of employers in this technological
age. As such the main focus of dissertation falls within the sphere of employment law. In
order to provide an answer to the research issue discussed above, the dissertation addresses
five ancillary or interrelated issues. First, the broad historical development of the legal
protection of privacy is traced and examined. Second, a workable definition of privacy is
identified with reference to academic debate and comparative legislative and judicial
developments. Third, those policies and practices, which would typically threaten privacy in
the employment sphere are identified and briefly discussed. Fourth, a detailed evaluation of
the tension between privacy and a number of selected policies and practices in selected
countries is provided. More specifically, the dissertation considers how these policies and
practices challenge privacy, the rationale for their existence and, if applicable, how these
policies and practices – if necessary through appropriate regulation – may be accommodated
while simultaneously accommodating both privacy and the legitimate concerns of employers.
The selection of these practices and policies is guided by two considerations. At the first level
the emphasis is on those challenges to privacy, which can be traced back to technological
developments and which, as such, foster new and unique demands to the accommodation of
privacy in the workplace. The secondary emphasis is on those policies, which are
representative of the fundamental challenges created by new technologies to privacy.
To effectively address the above issues the dissertation uses the traditional legal methodology
associated with comparative legal research, which includes a literature review of applicable
law and legal frame work and a review of relevant case law and a comparative study of
selected foreign jurisdictions. / AFRIKAANSE OPSOMMING: Geen opsomming / Fulbright Foundation / Stellenbosch University / Mellon Foundation / NFR
|
167 |
Whistleblower protection programs compromise the reported taxpayer's privacyAndonie, Luisa 25 April 2017 (has links) (PDF)
The United States Whistleblower Program’s inadequate protections have placed the privacy and confidentiality rights of United States taxpayers in a vulnerable state. By using the United States Whistleblower Program as an example, this paper seeks to illustrate the risk of eroding the confidentiality and privacy rights of the taxpayer, which is a risk that other national and international governments should likewise attempt to mitigate in their own whistleblower protection programs.
|
168 |
American Courts and Privacy of the BodyBason, Jim 08 1900 (has links)
The right to be let alone has been developing throughout history to offset the seemingly relentless encroachments by government in efforts to regulate "morality," and by governmental and/or business uses of technological advancements to control the individuals privacy. Thus, the espoused constitutional right of privacy has come to be the way for individuals (and groups) to stave off society's attempts to control or divert the individual from his right to be let alone.
This work examines both state and federal court cases in an attempt to show that privacy has come to be a basic, constitutional right to be used against society's intrusions in areas of personal and sexual privacy.
|
169 |
The Burner Project: Privacy and Social Control in a Networked WorldShade, Molly 05 1900 (has links)
As mobile phones become increasingly ubiquitous in today’s world, academic and public audiences alike are curious about the interaction between mobile technologies and social norms. To investigate this phenomenon, I examined how individuals use technology to actively manage their communication behaviors. Through a three-month research project on usage patterns of Burner, a mobile application, this thesis explores the relationships among technology, culture, and privacy. Burner is a service that equips individuals with the means to create, maintain, and/or dissolve social ties by providing temporary, disposable numbers to customers. The application offers a way to communicate without relying on a user’s personal phone number. In other words, Burner acts as a “privacy layer” for mobile phones. It also provides a valuable platform to examine how customers use the application as a strategy for communication management. This thesis represents a marriage of practice and theory: (1) As an applied enterprise, the project was constructed as a customer needs assessment intending to examine how the service was situated in the lives of its users. The findings have successfully been applied to my client’s company strategy and have led to a more informed customer approach. (2) As an academic endeavor, this research contributes to existing scholarship in anthropology, computer-mediated communication, privacy, and design. The results provide rich fodder for discussions about the impact of mobile communication and services.
|
170 |
Coming Soon From a Screen Near You: The Camera’s Gaze in the Age of SurveillanceUnknown Date (has links)
Within the past thirty years, privacy concerns among American citizens are rising
with counter-terrorist surveillance going beyond targeting people of interest. These
concerns are reflected in American cinema where many contemporary films have
explored surveillance in society. The textual analyses presented in the thesis will focus on
three such films, Strange Days (1995), Southland Tales (2005), and Nightcrawler (2014).
Throughout this thesis, I examine how each of these films offers a unique, reflexive take
on surveillance, adhering to generative mechanisms that evoke differing attitudes about
surveillance through their form. My analysis draws on Laura Mulvey and Patricia Pisters’
theories on the gaze to understand the politics of looking in contemporary surveillance
cinema and highlight how cinematic scopophilia evolved into a networked perspective.
My analysis suggests that the politics of surveillance cinema is reflected in these films as
their differences mirror the changing perception of surveillance and the gaze over time. / Includes bibliography. / Thesis (M.A.)--Florida Atlantic University, 2016. / FAU Electronic Theses and Dissertations Collection
|
Page generated in 0.0745 seconds