Spelling suggestions: "subject:"privacy, light off."" "subject:"privacy, light oof.""
61 |
Communication strategies to restore or preserve informational and psychological privacy; the effects of privacy invasive questions in the health care contextLe Poire, Beth Ann, 1964- January 1988 (has links)
This investigation explored the role of informational and psychological privacy in the health context by examining the relationship between type of relationship (physician versus acquaintance), type of observation (self-report versus observation), and communication strategies used to restore or preserve privacy (interaction control, dyadic strategies, expressions of negative arousal, blocking and avoidance, distancing, and confrontation). It was hypothesized and confirmed that individuals report exhibiting more behaviors to restore or preserve informational privacy in response to an informationally privacy-invasive question posed by an acquaintance than by a physician. The hypothesis that presentation of an informationally privacy invasive question by the physician causes patients to exhibit more communication strategies after the privacy invasive question than before, was unsupported. Finally, the hypothesis that individuals actually exhibit more privacy restoration behaviors than they report using in a similar situation with their physician was also unsupported. Patients reported using more communication strategies than they actually exhibited. One confound to the self reports was that videotaped participants reported the use of fewer direct privacy restoring communication strategies than non-videotaped.
|
62 |
Ringing the bell; sounding the alarm a proposal for the simultaneous advancement of security and privacyNovak, Kneilan K. 03 1900 (has links)
CHDS State/Local / The need for domestic intelligence and information sharing to detect indications and warnings of terrorist acts and prevent them has raised privacy and civil liberties concerns. The relationship between national security and privacy and civil liberties is often modeled as a scale with security on one end and privacy and civil liberties on the other. Success is said to be achieved when security and privacy are balanced. This model forces these values to be traded in a zero-sum game. A new model that decreases the "cost" to privacy and increases the "value" to security is needed. Technological, policy and organizational innovation hold promise in designing new intelligence and information-sharing architectures capable of detecting indications and warnings of terrorism and protecting the privacy and civil liberties of Americans. Using government documents that articulate attributes for a terrorism early warning system and widely accepted privacy principles as design requirements, the thesis examines technologies that could meet the challenges of both security and privacy. Designing and building a system that supports both security and privacy will benefit both. The thesis argues, this system will enable the Nation to fight terrorism while upholding the liberties that form the core values of the American people. / Captain (Capt), US Northern Command (Northcom) - NORAD J5
|
63 |
Customer-centric data analysis. / 以顧客為本的數據分析 / CUHK electronic theses & dissertations collection / Yi gu ke wei ben de shu ju fen xiJanuary 2008 (has links)
With the advancement of information technology and declining hardware price, organizations and companies are able to collect large amount of personal data. Individual health records, product preferences and membership information are all converted into digital format. The ability to store and retrieve large amount of electronic records benefits many parties. Useful knowledge often hides in a large pool of raw data. In many customer-centric applications, customers want to find some "best" services according to their needs. However, since different customers may have different preferences to find "best" services, different services are suggested accordingly to different customers. In this thesis, we study models for different customer needs. Besides, customers also want to protect their individual privacy in many applications. In this thesis, we also study how individual privacy can be protected. / Wong, Chi Wing. / "June 2008." / Adviser: Ada Wai-Chee Fu. / Source: Dissertation Abstracts International, Volume: 70-03, Section: B, page: 1770. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (p. 133-137). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts in English and Chinese. / School code: 1307.
|
64 |
RFID in the retail sector a methodology for analysis of policy proposals and their implications for privacy, economic efficiency and security /Bitko, Gordon. January 2007 (has links)
Thesis (Ph.D.)--RAND Graduate School, 2007. / Includes bibliographical references.
|
65 |
Zivilrechtlicher Schutz gegen Nachstellen : Eine Untersuchung der zivilrechtlichen Auswirkungen des [paragraph sign] 238 Abs. 1 StGB unter besonderer Berücksichtigung journalistischer Recherchen /Kraus, Franziska. January 1900 (has links)
Thesis (doctoral)--Universität Konstanz, 2009. / Includes bibliographical references (p. [170]-176) and index.
|
66 |
Der vermögensrechtliche Zuweisungsgehalt des Persönlichkeitsrechts : Eine grundlagenorientierte Studie /An, Pyŏng-ha. January 1900 (has links)
Thesis (doctoral)--Universität Trier, 2009. / Includes bibliographical references (p. [195]-206) and index.
|
67 |
Beurteilungsspielraum zugunsten Privater : die Übertragung der herkömmlichen Rechtsfigur auf das Verfahren regulierter Selbstregulierung im Jugendmedienschutz-Staatsvertrag (JMStV) zugunsten von Einrichtungen der freiwilligen Selbstkontrolle (EFS) /Nell, Martin W. January 2010 (has links)
Thesis (doctoral)--Ludwig-Maximilians-Universität, München, 2009. / Includes bibliographical references (p. [407]-421) and index.
|
68 |
Essays on the role of institutions with persistent asymmetric information and imperfect commitmentMishra, Shreemoy, 1977- 25 September 2012 (has links)
This dissertation is a collection of three essays that study the market for consumer information. The first chapter studies the role of information intermediaries and their impact on consumer privacy. The second chapter presents an analysis of signaling in credit and insurance markets through default and repayment decisions. The third chapter studies some special topics such the manipulation of credit histories by fake borrowing or deletion of records. It also identifies a learning mechanism through which uninformed consumers can endogenously learn the link between credit market behavior and insurance market outcomes. / text
|
69 |
Review on effectiveness of policy on privacy protectionLam, Wai-hong., 林偉雄. January 2009 (has links)
published_or_final_version / Politics and Public Administration / Master / Master of Public Administration
|
70 |
A hippocratic privacy protection framework for relational databases.Oberholzer, Hendrik Johannes Gerhardus. January 2012 (has links)
Thesis (DTech. degree in Computer Science and Data Processing: Software Development.)--Tshwane University of Technology, 2012. / Based on the fundamental assumption that individuals view their privacy differently, this study attempts to find a solution on how to protect the personal information of an individual stored in a relational database system against privacy violations. Secondly, to determine how the Hippocratic principles can be effectively applied to give individuals better control over their personal information, while at the same time allowing the organisation to process its transactions on the same personalised information. In answering these problems, the study established a set of extended principles to which the collection and the use of personal data should strictly hold.
|
Page generated in 0.075 seconds