• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 138
  • 19
  • 9
  • 9
  • 9
  • 9
  • 9
  • 8
  • 8
  • 6
  • 4
  • 4
  • 2
  • 2
  • 1
  • Tagged with
  • 206
  • 206
  • 62
  • 61
  • 53
  • 43
  • 33
  • 32
  • 29
  • 28
  • 28
  • 26
  • 26
  • 24
  • 23
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
141

Opvoeding tot menseregte : vryheid en privaatheid

Burger, Mara Rus 10 June 2014 (has links)
M.Ed. (Educational Psychology) / Education in human rights has been grossly neglected in the South African schooling system. The far-reaching changes that are currently being worked in this country, however, compel all educators to start instructing their students not only in their own rights, but also in the rights of their fellow-citizens. This study forms part of a greater research project that has been launched by the Department of Educational Sciences of the Rand Afrikaans University. The aim of this study was to establish to what extent pupils have been made aware of their right to freedom and privacy by the time they have reached Std. 10. The following aspects of the right to freedom and privacy were identified on the basis of a literature study: the right to protection of a person's body, freedom of speech and expression, freedom of association, freedom of thought, freedom of worship, freedom of movement and the right to privacy. Following the identification of the above-mentioned aspects, a questionnaire was compiled, the results of which were verified by the process of content validation. Hypotheses made on the bases of pender, age group and religious affiliation were tested and the confidence of the questionnaire was tested on the 1% and 5% level. The most important findings of the investigation are as follows: The high average values obtained in respect of all aspects of freedom and privacy indicate that the respondents attach much importance to and are well informed on their right to freedom and privacy. The fact that so many respondents attach much importance to the right to the protection of their bodies, to the right to associate with whomever they choose and to freedom of speech, shows these factors to be of vital importance to their education. It was found that female respondents were of the opinion that pupils were made more aware of their right to freedom and privacy by the time they had reached Std. 10 than their male counterparts. Significant differences of opinion were found to exist between teachers and pupils, the various age groups, language groups, religions and teachers with different teaching experiences and qualifications as regards the question to what extent schools have made children aware of their right to freedom and privacy by the time they have reached Std. 10. Respondents were of the opinion that neither media exposure (l.e. radio, television and newspapers) nor school education and guardianship had any significant influence on the extent to which pupils are informed on their right to freedom and privacy. It can be concluded, therefore, that greater awareness needs to be created at school level as far as the education of pupils as to their right to freedom and privacy is concerned. It is recommended, furthermore, that a counselling programme be launched that would enable teachers, parents and pupils to gain thorough knowledge of their right to freedom and privacy, and of their responsibility to exercise these rights.
142

In search of the common good : the ethics of disclosing personal information held in public archives

MacNeil, Heather Marie January 1987 (has links)
The right to privacy is the right of individuals to determine, within reasonable limits, the extent to which they are known to others. Over the last twenty years the enormous increase in the amount of personal information on citizens maintained in government record-keeping systems has led to increasing public concern for information privacy. Computer technology has contributed to the collection, preservation and use of massive bodies of highly detailed personal information documenting individual characteristics as well as a broad range of social transactions. Automated record-keeping systems permit the linking of personal information from a wide variety of government data banks, a capability which, civil libertarians fear, is vulnerable to abuse. The social contract underlying relations between citizens and the state requires that individuals surrender some measure of privacy in return for physical and social protection. But how far does that contract extend? Does the social contract which, implicitly, governs the collection of personal information in the interests of administering various social benefits, also entitle archivists, as the official keepers of government records, to permit subsequent uses of that information once its administrative usefulness has been exhausted? Social researchers, including social historians, take an affirmative position, arguing that the closure of records containing personal information is a violation of the principle of freedom of enquiry or the scholar's right to pursue and to communicate knowledge in the interest of a greater societal good. The question is, does freedom of enquiry possess the same moral value as the right to privacy? In situations where the two values conflict, where does the archivist's moral duty lie? The thesis will address these questions by examining the ethical justifications for and against research uses of personal information and the social role the archivist plays in mediating the competing moral claims for privacy and access. The thesis concludes that, in a democratic society, the right to privacy supersedes the scholar's freedom of enquiry. In situations where the two values conflict, archivists, as the public trustees of the record, must act on behalf of that public to ensure that the right to privacy is not violated. / Arts, Faculty of / Library, Archival and Information Studies (SLAIS), School of / Graduate
143

Compliance of health professionals with patient confidentiality when using PACS and RIS

Mahlaola, Tintswalo Brenda 20 January 2015 (has links)
M.Tech. (Radiography) / The Radiology Information System and the Picture Archiving and Communication System have contributed to improved patient care by eradicating delays in the clinical management of patients. This is achieved by permitting access to instantaneous radiology interpretations and secondary consultations; creating a basis for teleradiology and reducing storage costs by replacing conventional archives with cheaper digital storage. However, the former has attributed to the recent rise in confidentiality breaches involving medical data in the United States of America. Yet, reports of this nature remain unknown in the South African context. Breaches by authorised users remain an under investigated issue and continue to threaten the confidentiality of data. This assumption was employed as the conceptual basis for this study while, the Theory of Planned Behaviour was utilised to generate probable causes of deviant behaviour. A sample of health professionals (n=115) and information technologists (n=2) was drawn to collect data. The extent of compliance was expressed as a percentage error of the discrepancy between the observed behaviour and the regulations stipulated by the Health Insurance Portability and Accountability Act. The independent variable (work practices) were categorised into access restriction, intrinsic security measures and the actual breach incidences. The non-parametric Chi-Square test was used to calculate statistical significance the correlational extent of which was determined using the phi coefficient. Both Research Settings indicated poor compliance (percentage errors of 67.3 and 70.37) with the mandated regulations. The study provides insight about the confidentiality status within the South African context. This is the kind of information sought by regulators to aid keep pace with the rapid advances in Information Technology.
144

New Surveillance Technologies and the Invasion of Privacy Rights

Simsek, Yilmaz 08 1900 (has links)
Definition of privacy has changed by the changes and improvements in information and surveillance technologies. These changes and improvement need new legal decisions for new kinds of privacy invasions. This study explores the scope of privacy right, particularly when a technological surveillance has occurred by law enforcement agencies. It focuses in particular on increasing law enforcements' surveillance technologies and devices that have the potential to impact citizens' information privacy. These increasing changes in surveillance technologies have important implications both for law enforcements and citizens. This study also discusses increasing law enforcement surveillance for the public's security, changes of the laws that allow law enforcements to use new surveillance powers as a war on terrorism, and the citizens concerns of information privacy. A particular attention is given to the recent public opinion surveys which show citizens' increasing privacy concerns. Finally, a set of recommendations to figure out security-privacy debate and reduce the privacy concerns of the citizens is offered.
145

The OECD cryptography policy guidelines and their implementation /

Jeppson, Jonas. January 2000 (has links)
No description available.
146

Advance passenger information passenger name record : privacy rights and security awareness

Banerjea-Brodeur, Nicolas Paul January 2003 (has links)
No description available.
147

Architectural correlates of privacy: the dynamics of privacy regulation

Johnson, Virginia Wilson 13 July 2007 (has links)
The study examines architectural correlates of privacy in an aerospace industry. Conceptual/theoretical notions are tested, whose ultimate value is the further refinement of privacy regulation, conceptually and operationally. Complexities of privacy as a concept and its regulation are clarified through theory and systematic information generated through the Heuristic Elicitation Methodology(HEM). The study demonstrates the usefulness and adaptability of the HEM to environmental design research. The conceptual model of privacy regulation presented in the study guided the research and extends theoretical considerations regarding social, behavioral, and environmental mechanisms operating within the context of culture that are employed to regulate privacy in work environments. The model posits a comprehensive framework of privacy regulation and suggests a more detailed method for classifying regulatory characteristics. The HEM provides a fairly definitive interpretation (i.e., understanding) of physical elements devised or deployed by designers that users perceive as regulating privacy, and where privacy fits into the users' perception of what is important in their work environments. The information gathered is directly applicable to space planning standards and design practices at the aerospace industry, and pending further research, perhaps to a variety of other situations. The study also lays the foundation for future research on the cultural variability of privacy regulation. The knowledge gained could be used to increase an organization's effectiveness by providing a framework for developing and then communicating culturally-sensitive space planning standards and design practices. In a broader context, the study stresses the importance of encompassing human values and technology in environmental design research. / Ph. D.
148

An empirical study of the impact of the Personal Data (Privacy) Ordinance on human resource management.

January 1998 (has links)
by Fung Cheuk-Hing, Wang Suk-Ching Anita. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1998. / Includes bibliographical references (leaves 87-89). / ABSTRACT --- p.ii / TABLE OF CONTENTS --- p.iii / LIST OF TABLES --- p.vi / LIST OF ABBREVIATIONS --- p.vii / ACKNOWLEDGMENT --- p.viii / Chapter / Chapter I. --- INTRODUCTION --- p.1 / Chapter II. --- LITERATURE REVIEW --- p.4 / Privacy Protection Act --- p.4 / A Survey of Privacy in the Workplace --- p.5 / Chapter III. --- PERSONAL DATA (PRIVACY) ORDINANCE --- p.8 / Events that led to the Enactment of the Ordinance --- p.8 / An Overview of the Ordinance --- p.10 / Chapter IV. --- METHODOLOGY --- p.14 / Chapter V. --- RESULTS --- p.17 / Privacy Commissioner's Office (PCO) --- p.17 / The Hong Kong Institute of Human Resource Management (IHRM) --- p.23 / Bank A --- p.26 / Recruitment and Selection --- p.26 / References --- p.27 / Employee Records --- p.28 / Data Relating to Ex-employees --- p.28 / Training and Development --- p.29 / Compensation and Benefits --- p.30 / Data Storage and Security --- p.30 / Data Transfer and Transmission --- p.30 / Appraisal and Potential Assessment --- p.30 / Disciplinary Records --- p.31 / Exit Interview --- p.31 / Others --- p.32 / Bank B --- p.33 / Recruitment and Selection --- p.33 / References --- p.34 / Employee Records --- p.34 / Data Relating to Ex-employees --- p.35 / Training and Development --- p.35 / Compensation and Benefits --- p.35 / Data Storage and Security --- p.35 / Data Transfer and Transmission --- p.36 / Appraisal and Potential Assessment/Disciplinary Records --- p.36 / Exit Interview --- p.36 / Others --- p.36 / Bank C --- p.37 / Recruitment and Selection --- p.38 / References --- p.38 / Employee Records --- p.38 / Data Relating to Ex-employees --- p.39 / Training and Development --- p.39 / Compensation and Benefits --- p.39 / Data Storage and Security --- p.39 / Data Transfer and Transmission --- p.40 / Appraisal and Potential Assessment --- p.40 / Disciplinary Records --- p.40 / Exit Interview --- p.40 / Others --- p.41 / Chapter VI. --- ANALYSIS OF RESULTS --- p.43 / "Overview of Bank A, B and C's Interview Results" --- p.43 / Evaluation on Compliance Level --- p.45 / Recruitment and Selection --- p.46 / References --- p.47 / Employee Records --- p.48 / Data Relating to Ex-employees --- p.48 / Training and Development --- p.49 / Compensation and Benefits --- p.49 / Data Storage and Security --- p.50 / Data Transfer and Transmission --- p.50 / Appraisal and Potential Assessment/Disciplinary Records --- p.50 / Exit Interview --- p.50 / General --- p.50 / Dynamics Between the PCO and Human Resource Practitioners --- p.51 / Dynamics Between the PCO and IHRM --- p.53 / Dynamics Between IHRM and Human Resource Practitioners --- p.53 / Comparison with Linowes' Survey Results --- p.54 / Chapter VII. --- RECOMMENDATIONS --- p.56 / Privacy Commissioner's Office (PCO) --- p.56 / The Hong Kong Institute of Human Resource Management (IHRM) --- p.57 / "Bank A, B and C" --- p.57 / Chapter VIII. --- LIMITATIONS --- p.59 / IX. CONCLUSIONS --- p.60 / APPENDIX --- p.62 / BIBLIOGRAPHY --- p.87
149

A study on database marketing practices that raise consumer privacy concern : a proposed model for regulating database marketing practices in South Africa

Visser, Diane 12 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2002. / ENGLISH ABSTRACT: One of the phenomena's in the marketing industry of the past decade is the increased use of database marketing. Database marketing involves the collection, processing and dissemination of vast amounts of consumer information in order to compile detailed consumer databases. The increasing popularity of database marketing can be attributed to various factors. Consumer information can now be obtained easier, cheaper and faster due to the availability of information technology. It has become easier to segment consumer markets and it is possible to identify consumer trends. It is possible to make predictions of consumer behaviour or buying patterns because consumer databases provide a more complete consumer profile with information ranging from demographics, psycho graphics to life-style information. Database technology improves the efficiency and effectiveness of marketing campaigns because marketers can analyse the available information and select the most appropriate marketing strategies and tactics, while concentrating efforts on the most profitable consumer. Marketers therefore waste less effort, money, and other resources by not promoting to individuals who are unlikely to react upon such offers. Widespread databases assist marketers in offering products that are more reasonably priced and more precisely tailored for smaller, more homogeneous market segments. Improved product and service offerings as well as the availability of a wider variety of products and services will likely result in higher consumer satisfaction and could build consumer loyalty. Therefore, marketers use consumer information to improve the overall marketing strategy and individual customer service. Consumers are concerned about database marketing practices because consumers believe some data practices invade personal privacy. The need for privacy has always been inherent to human nature and the concept of privacy dates back to early mankind. One should however differentiate between an individual's basic need for privacy from a general perspective and privacy within a consumer-marketer context. Privacy from a general perspective refers to one's territoriality and need for physical seclusion, whereas consumer privacy mainly relate to the privacy of personal information. Bennett, as well as Stone and Stone proposed that a state of privacy exist when a consumer can control social interaction, unwanted external stimuli, and the dissemination of personal information as well as being able to make independent decisions without outside interference. Consumers' need for privacy is however, in conflict with the need for social interaction and the need to participate in commercial exchange relationships. The more a person interacts with other members of society, the more the person could expect to compromise some privacy. This implies that when consumers participate in a business transaction, or where an exchange relationship exists between the database marketer and consumer, consumers could expect that a degree of privacy will be lost. Consumer groups however, argue that some marketing practices invade the reasonable amount of privacy consumers should be able to expect. The raising consumer concern for privacy is attributable to several reasons. The primary driver of consumer concern is the general lack of knowledge on data collection and use. Other reasons for the raising privacy concern include the type of information collected and the amount of control consumers have over subsequent use of data; the use of personal information to identify specific individuals; collection and use of sensitive information, such as medical and financial data; the volume of information collected and used; secondary information use; the use and dissemination of inaccurate databases; the collection and use of children's data; the lack of tangible benefits received in exchange for information provided; and the use of consumer information for financial gain. Consumers have also expressed concern about electronic database marketing practices because of the secrecy in data collection and use. However, privacy concerns may vary depending on consumers' cultural orientation, age, perception on what constitutes good marketing ethics or the specific methods employed to obtain consumer data. One could distinguish between several consumer clusters when considering consumers" attitudes on database marketing practices and personal privacy. In this regard the typical South African consumer is classified as a "pragmatist". Pragmatists are concerned with privacy to the extent they are exposed to database marketing activities. The South African database marketing industry is still in its infancy phase and as the industry progress, and consumers become more knowledgeable, privacy concerns are likely to increase. It is important to address the issues that raise consumer privacy concerns and to find solutions for ensuring sustainable database marketing practice in future. Marketers' information needs and consumers' privacy needs should somehow be balanced in order to withhold government intervention. Compromises from both sides are necessary to reach a more balanced relationship between the two parties. The successful outcome of the privacy debate will depend on marketers' understanding of consumer privacy issues and by addressing these accordingly.Several approaches exist for regulating database marketing practices that invade consumer privacy: the implementation of information technology, self-regulation and government intervention. Self-regulation is preferred for regulating database marketing practices, whereas privacy-enhancing information technology is recommended as a supplemental tool for protecting consumer privacy. Government regulating seems to be the last resort because of unnecessary restrictions that might be imposed on database marketing activities. Recommended models for regulating database marketing activities and for protecting consumer privacy in South Africa are the Registration Model, together with elements of the Data Commissioner Model. These models were proposed after careful consideration of characteristics, unique to the South African database marketing industry. The models place the responsibility for data protection with the database marketer and the South African government, rather than with the consumer. The Registration Model and the Data Commissioner Model seems a viable combination for implementation in South Africa because these models acknowledge the fact that South African pragmatic consumers are not well educated and informed enough on privacy invading database marketing practices. This combination rarely involves any consumer participation and therefore suits the typical apathetic nature of South African consumers. The Registration Model acts like a notice system where an agency, currently the Direct Marketing Association of South Africa, develops principles of fair information practices to which registered marketers need to comply with. A commission, an element of the Data Commissioner Model, has power to investigate consumer complaints, constrain development of databases, review data practices and advise on improvements on data collectors' systems. The commission could also monitor advancements in information technology that may enhance consumer privacy. The only problem with these models seems to be that the agency and or the commission have no authoritative power to enforce compliance with principles and codes of conduct. Industry self-regulation in conjunction with some governmental control and the application of information technology seems to be useful in providing adequate levels of consumer privacy and data protection. Such a combination might strike a balance between South African consumers' need for privacy and South African marketers' need for consumer information. / AFRIKAANSE OPSOMMING: Een van die verskynsels in die bemarkingsindustrie oor die afgelope dekade is die toenemende gebruik van databasisbemarking. Databasisbemarking behels die insameling, prosessering en verspreiding van groot hoeveelhede verbruikersinligting met die doelom gedetailleerde verbruikersdatabasisse saam te stel. Die toenemende gewildheid van databasisbemarking kan toegeskryf word aan verskeie faktore. Inligtingstegnologie maak dit baie makliker, goedkoper en vinniger om verbruikersinligting te bekom. Dit raak al hoe makliker om verbruikersmarkte te segmenteer en dit is moontlik om verbruikers tendense te identifiseer. Voorspellings kan ook gemaak word ten opsigte van verbruikersgedrag en aankooppatrone omdat die omvang van inligting in verbruikersdatabasisse strek vanaf demografiese, psigografiese tot lewenstylinligting en daarom 'n baie meer volledige verbruikersprofiel bied. Databasistegnologie verbeter die doeltreffendheid en effektiwiteit van bemarkingsveldtogte omdat bemarkers beskikbare inligting kan analiseer en die mees gepaste bemarkingstrategieë en taktieke kan selekteer, terwyl programme gerig kan word op die mees winsgewinde verbruiker. Bemarkers sal dus minder moeite, geld en ander hulpbronne vermors deurdat bemarkingsprogramme nie gerig word op individue wat heel waarskynlik nie op sulke aanbiedinge sal reageer nie. Omvangryke databasisse help bemarkers om goedkoper produkte te bied wat meer presies ontwerp is op kleiner, meer homogene marksegmente te dien. Verbeterde produk en diens aanbiedinge tesame met die beskikbaarheid van 'n wyer verskeidenheid van produkte en dienste, sal heel waarskynlik hoër verbruikersatisfaksie tot gevolg hê en kan verbruikerslojaliteit bewerkstellig. Dus, bemarkers gebruik verbruikersinligting om die algehele bemarkingstrategie en individuele diens aan verbruikers te verbeter. Verbruikers het belang by databasis bemarkingspraktyke omdat verbruikers glo dat sommige data praktyke inbreuk maak op persoonlike privaatheid. Die behoefte aan privaatheid was nog altyd inherent aan die menslike natuur en die konsep van privaatheid dateer terug tot vroeë beskawings. Daar behoort egter 'n onderskeid getref te word tussen 'n individu se basiese behoefte aan privaatheid vanuit 'n algemene perspektief en privaatheid vanaf 'n verbruiker-bemarker konteks. Privaatheid, vanaf 'n algemene perspektief, verwys na 'n individu se persoonlike ruimte en die behoefte aan fisiese afsondering, teenoor verbruikersprivaatheid wat hoofsaaklik verband hou met die privaatheid van persoonlike inligting. Bennett, sowel as Stone en Stone het voorgestel dat 'n mate van privaatheid heers wanneer 'n verbruiker beheer het oor sosiale interaksies, ongewenste eksterne prikkels, die verspreiding van persoonlike inligting, sowel as om in staat te wees om onafhanklike besluite te neem sonder invloed van buite. Verbruikers se behoefte aan privaatheid is egter in konflik met die behoefte aan sosiale interaksie en die behoefte om deel te neem aan kommersiële transaksies. Hoe meer 'n persoon in wisselwerking tree met ander lede van die gemeenskap, hoe meer kan die persoon verwag om 'n mate van privaatheid op te offer. Dit impliseer dat wanneer verbruikers deelneem in 'n besigheidstransaksie of waar 'n ruilverhouding bestaan tussen die databasisbemarker en verbruiker, kan verbruikers verwag dat 'n mate van privaatheid verlore sal gaan. Verbruikers kan 'n redelike mate van privaatheid verwag, maar verbruikersgroepe argumenteer dat sommige bemarkingspraktyke inbreuk maak op hierdie redelike verwagting van privaatheid. Die toenemende verbruikersbelang by privaatheid is toeskryfbaar aan verskeie redes. Die primêre dryfkrag agter verbruikers se belang is die algemene gebrek aan kennis oor data insameling en gebruik. Ander redes wat bydrae tot die toenemende belang by privaatheid sluit in die tipe inligting ingesamel en die hoeveelheid beheer verbruikers het oor die daaropeenvolgende gebruik van data; die gebruik van persoonlike inligting om spesifieke individue te identifiseer; die insameling en gebruik van sensitiewe inligting, soos byvoorbeeld mediese en finansiële data; die hoeveelheid inligting wat ingesamel en gebruik word; sekondêre gebruik van inligting; die gebruik en verspreiding van onakkurate databasisse; en die insameling en gebruik van verbruikersinligting om finansieël voordeel daaruit te trek. Verbruikers het ook belang getoon teenoor elektroniese databasis bemarkingspraktyke as gevolg van die geheimhouding oor data insameling en gebruik. Die belang by privaatheid mag egter varieër afhangende van verbruikers se kulturele oriëntasie, ouderdom, persepsie van wat goeie bemarkingsetiek behels of die spesifieke metodes gebruik om data aangaande verbruikers te bekom. Daar kan onderskei word tussen verskeie verbruikersgroepe wanneer verbruikershoudings teenoor databasis bemarkingspraktyke en persoonlike privaatheid oorweeg word. In hierdie verband kan die tipiese Suid-Afrikaanse verbruiker geklassifiseer word as 'n pragmatis. Pragmatiste is besorg oor privaatheid tot die mate waartoe hulle blootgestel is aan databasisbemarkingsaktiwiteite. Die Suid-Afrikaanse databasis industrie is nog in die beginfase en soos die industrie groei en verbruikers meer ingelig raak, sal besorgdheid oor privaatheid heelwaarskynlik ook toeneem. Dit is belangrik om die kwessies wat besorgdheid oor verbruikersprivaatheid veroorsaak aan te spreek en om oplossings te vind om volhoubare databasisbemarkingspraktyke in die toekoms te verseker. Daar moet gepoog word om bemarkers se behoefte aan inligting en verbruikers se behoefte aan privaatheid in ewewig te bring om sodoende owerheidsinmenging te voorkom. Opofferings van beide partye is nodig om 'n meer gebalanseerde verhouding tussen die twee partye te bewerkstellig. Die suksesvolle uitkoms van die privaatheidsdebat sal afhang van bemarkers se begrip vir verbruikersprivaatheidskwessies en om dit dienooreenkomstig aan te spreek. Die regulering van databasisbemarkingspraktyke wat inbreuk maak op verbruikersprivaatheid kan verskillend benader word: die implementering van inligtingstegnologie, self-regulering en owerheids-inmenging. Self-regulering word verkies as basis om databasisbemarkingspraktyke te reguleer, terwyl privaatheids-bevorderende inligtingstegnologie aanbeveel word as bykomende gereedskap om verbruikersprivaatheid te beskerm. Owerheidsregulering word gesien as die laaste uitweg as gevolg van onnodige beperkinge wat dit mag plaas op databasisbemarkingsaktiwitei te. Die voorgestelde modelle vir die regulering van databasis bemarkingsaktiwiteite en vir die beskerming van verbruikersprivaatheid in Suid Afrika, is die Registrasie Model, tesame met elemente van die Data Kommissaris Model. Hierdie modelle is voorgestel nadat eienskappe, uniek aan die Suid Afrikaanse databasisbemarkingsindustrie, deeglik oorweeg IS. Die modelle plaas die verantwoordelikheid van data beskerming in die hande van die databasisbemarker en die Suid-Afrikaanse owerheid, eerder as by die verbruiker. Die Registrasie Model en die Data Kommissaris Model blyk 'n uitvoerbare kombinasie vir implementering in Suid Afrika te wees, omdat hierdie modelle die feit inagneem dat Suid Afrikaanse pragmatiese verbruikers nie goed genoeg opgevoed en ingelig is oor die databasisbemarkingsaktiwiteite wat inbreuk maak op privaatheid nie. Hierdie kombinasie behels selde verbruikersdeelname en is daarom gepas by die tipiese apatiese aard van Suid Afrikaanse verbruikers. Die Registrasie Model dien as 'n kennisgee-stelsel waar 'n agentskap, tans die Direkte Bemarkings Assosiasie van Suid Afrika, beginsels vir regverdige inligtingspraktyke ontwikkel waaraan geregistreerde databasisbemarkers moet voldoen. 'n Kommissie, 'n element van die Data Kommissaris Model, het mag om verbruikersklagtes te ondersoek, die ontwikkelling van databasisse aan bande te lê en om datapraktyke te hersien en advies te gee oor verbeteringe in die stelsels van data-insamelaars. Die kommissie kan ook ontwikkelinge in inligtingstegnologie wat verbruikersprivaatheid bevorder, monitor. Die enigste probleem met hierdie modelle blyk te wees dat die agenstkap en die kommissie geen gesag het om te verseker dat beginsels en kodes van goeie gedrag afgedwing word nie. Industrie self-regulering, tesame met 'n mate van owerheidsbeheer en die implementering van inligtingstegnologie blyk nuttig te wees om voldoende vlakke van verbruikers-privaatheid en data beskerming te verseker. Dié kombinasie kan moontlik 'n balans vind tussen Suid Afrikaanse verbruikers se behoefte aan privaatheid en Suid Afrikaanse bemarkers se behoefte aan verbruikersinligting.
150

Changing Privacy Concerns in the Internet Era.

Demir, Irfan 08 1900 (has links)
Privacy has always been a respected value regardless of national borders, cultural differences, and time in every society throughout history. This study focuses on the unprecedented changes in the traditional forms of privacy and consequent concerns with regard to invasion of privacy along with the recent emergence and wide use of the Internet. Government intrusion into private domains through the Internet is examined as a major concern. Privacy invasions by Web marketers, hacker threats against privacy, and employer invasion of employee privacy at the workplace are discussed respectively. Then a set of possible solutions to solve the current problems and alleviate the concerns in this field is offered. Legal remedies that need to be performed by the government are presented as the initial solution. Then encryption is introduced as a strong technical method that may be helpful. Finally, a set of individual measures emphasized as complementary practical necessities. Nevertheless, this study indicates that technology will keep making further changes in the form and concerns of privacy that possibly may outdate these findings in the near future, however, privacy itself will always remain as a cherished social value as it has always been so far.

Page generated in 0.0839 seconds