Spelling suggestions: "subject:"privacy, light off."" "subject:"privacy, light oof.""
21 |
The study of privacy and security in B2C e-commerce environment /Lallmahamood, Muniruddeen. Unknown Date (has links)
While Business-to-Consumer (B2C) e-commerce has increased sales opportunities for the seller, it has also created new threats for potential customers, one of which is their privacy invasion. Personal information privacy is becoming a matter of increasing concern over the Internet. In this review, a description of privacy concerns is attempted and empirical studies in this area are reviewed. The descriptive review includes the antecedents of privacy and security concerns, and privacy assurances. A description of privacy and security concern perspectives and dimensions is also reported in the area of current e-commerce development and policies in Malaysia. The conclusion for the study suggests that privacy assurances, such as Web privacy policy, legislation, and Internet seal of approval will contribute to reduce these perceived threats. It also appears that online privacy concerns are still not solved if personal information is not secured when the above policies and regulations cannot enforce the principles of data privacy. This implies that online security is an important feature to protect and secure personal information. Thus, privacy and security concerns can be a major critical risk factor for the success of B2C e-commerce. No prior studies have yet addressed the issue of privacy concerns in Malaysia. This may therefore need further research to understand the current practices here. / Thesis (DBA(DoctorateofBusinessAdministration))--University of South Australia, 2005.
|
22 |
Zulässigkeit von Identitätsfeststellungen mittels biometrischer Systeme durch öffentliche Stellen /Meuth, Lotte. January 2006 (has links) (PDF)
Univ., Diss.--Freiburg i.Br., 2005. / Literaturverz. S. [259] - 277.
|
23 |
A study of country-level factors associated with governmental violations of the integrity of the body/security of the personSteen, Julie Allison. Harrison, Dianne F. January 2003 (has links)
Thesis (Ph. D.)--Florida State University, 2003. / Advisor: Dr. Dianne F. Harrison, Florida State University, School of Social Work. Title and description from dissertation home page (viewed Sept. 08, 2004). Includes bibliographical references.
|
24 |
Her body, his choice? comparing men's and women's claims to procreative privacy /Lamboy, Lillian Michaela. January 2010 (has links)
Honors Project--Smith College, Northampton, Mass., 2010. / Includes bibliographical references (p. 99-106).
|
25 |
Liberal privacy and women a broken promise /Theis, Adriane. January 2006 (has links)
Thesis (B.A.)--Haverford College, Dept. of Political Science, 2006. / Includes bibliographical references.
|
26 |
The relationship of values and norms an analysis of personal freedom in law /Hession, Mark R. January 1986 (has links)
Thesis (J.C.L.)--Catholic University of America, 1986. / Includes bibliographical references (leaves 65-72).
|
27 |
Balancing freedom of the press and the right to privacy : lessons for ChinaSun, Zhendong, 1978- January 2006 (has links)
The conflict inherent in balancing freedom of the press and the right to privacy invariably presents some controversial legal issues. In addressing the legal dilemmas posed by these competing interests, an in-depth analysis of the conceptual value of these two equally important rights becomes a preliminary starting point. Through its exploration of the history and development of the press and privacy laws in both the United States and Canada, this thesis examines the fundamental values enshrined in these two rights. The author holds that the freedom of the press contains no privilege under the law, but that it serves as the means to promote the public's right to know in a democratic society, while the right to privacy offers an individual the autonomy to regulate his private affairs. By analyzing arguments of "pubic interest," "public figure," and "public privacy," the author compares the theoretical approaches to and practical attempts at striking a balance between the interests of the press and the privacy of the individual in the United States and Canada. Finally, the essay proposes how these experiences may contribute to the construction of relevant Chinese laws.
|
28 |
Balancing freedom of the press and the right to privacy : lessons for ChinaSun, Zhendong, 1978- January 2006 (has links)
No description available.
|
29 |
The rise of open-street CCTV surveillance in CanadaWalby, Kevin. 10 April 2008 (has links)
No description available.
|
30 |
Reconceptualise investigatory powers again? : an argument for a comprehensive single statute regulating the acquisition of expression-related data for investigative purposes by UK public authoritiesGlover, Philip Bruce January 2015 (has links)
Communications-related investigatory powers are ostensibly regulated within the Regulation of Investigatory Powers Act (RIPA) 2000, under the descriptive headings: 'interception of communications'; 'acquisition and disclosure of communications data' and 'investigation of data protected by encryption'. The scope, legality and extent of these hitherto infrequently examined powers experienced increased scrutiny following the controversial 2013 disclosures of fugitive United States National Security Agency contractor Edward Snowden, scrutiny generally founded on subjective conceptions of 'privacy', 'intrusiveness' or 'security'. This research however, adopts 'communications' as its conceptual common denominator. It comprehensively explores the separate politico-legal evolution of RIPA's communications-related investigatory powers, whilst identifying and critically analysing alternative statutory provisions that permit circumvention of RIPA's purported human rights-centric integrity. The detailed chronology provides conclusive evidence that current UK Secretaries of State and their executive agencies possess virtually unlimited communications-related information acquisition powers bequeathed by their predecessors. Perhaps more importantly, its simultaneous exposure of an executive culture of secrecy and deference to the UK's intelligence community assists in explaining why any fettering of the current powers will be so difficult to achieve. Drawing from Intelligence Studies, Information Science and Computer Science, this research logically deconstructs RIPA's communications-related powers, finding them more accurately describable as narrowly defined techniques facilitating the acquisition of communications-related data. Consequently, RIPA fails to envisage or regulate all types of acquisition, such as that obtained extra-jurisdictionally or via Computer Network Exploitation, thus partially legitimizing the status quo. The research also examines RIPA's seemingly all-encompassing definition of 'communication', finding it under-utilised, in that communications from the mind into electronic storage ('expression-related data') are not included. Consequently, the boundaries between 'communication', 'expression' and 'property,' and between RIPA's powers and those enabling Computer Network Exploitation are currently unnecessarily complicated. It concludes by recommending the enactment of a single statute regulating all investigative expression-related data acquisition.
|
Page generated in 0.0429 seconds