Spelling suggestions: "subject:"eprivacy"" "subject:"geoprivacy""
1 |
The meaning and use of privacy: A study of young adults.Newell, Patricia Brierley. January 1992 (has links)
Two hundred and forty-three young adults responded to an open and non-directive question asking them to describe an occasion when they required privacy, defined here as a condition of separation from the public domain, which is voluntary and temporary, and into which other persons, including the state, as representative of the public domain, do not justifiably intrude. A subsequent questionnaire established SES variables and the average frequency and duration of privacy experiences. 72.4% associated a desire for privacy with social antecedent conditions, 16% for task oriented purposes, 9.5% because of some organismic reason and 2.1% indicated aversive conditions of the physical environment such as noise. Results showed that 82% of all subjects required privacy due to adverse circumstances. A fairly large proportion, especially among females and minorities, were not able to achieve privacy although they required it. For the most part this was because they took no action. Although there were significant sex and race differences found for the process of acquiring privacy, there was marked similarity in the places and behaviours employed during privacy. There was one exception. Females mentioned safe places significantly more than males. Satisfactorily achieving privacy was associated with positive action in the case of 76 subjects, with psychological withdrawal by 17 subjects, with avoidance actions by 8 subjects and by no action by 7 subjects. Since 199 of the 243 subjects indicated initial negative affect and the majority of those achieving privacy indicated positive results, such as feeling better, more relaxed and confident and being ready to face the world again, it was felt that the results supported a systems model of privacy which fulfills a cross-cultural therapeutic function. From the systems perspective privacy is seen as fulfilling two functions; systems maintenance and systems development. Systems maintenance refers to the balancing act performed by the human body to remain within healthy operating limits. Systems development refers to the general tendency of mankind to extend boundaries, learn new skills, and progress towards self-actualisation. Results support a definition of privacy that reflects an interactive Person-Environment condition.
|
2 |
"Someone to watch over me?" Privacy and governance strategies for CCTV and emerging surveillance technologies /Zoufal, Donald R. January 2008 (has links) (PDF)
Thesis (M.S. or M.A in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2008. / Thesis Advisor(s): Bellavita, Christopher. "March 2008." Description based on title screen as viewed on May 7, 2008. Includes bibliographical references (p. 185-199). Also available in print.
|
3 |
Privacy protection standards for the information sharing environmentHolmstrup, Mark A. January 2009 (has links) (PDF)
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Bergin, Richard D. ; Josefek, Robert A. "September 2009." Description based on title screen as viewed on November 9, 2009. Author(s) subject terms: Information Sharing Environment, privacy, collaboration, constitutionality, Transportation Security Administration, Program Manager Information Sharing Environment, information sharing. Includes bibliographical references (p. 89-96). Also available in print.
|
4 |
A Privacy Calculus Model for Personal Mobile DevicesBott, Gregory J 11 August 2017 (has links)
Personal mobile devices (PMDs) initiated a multi-dimensional paradigmatic shift in personal computing and personal information collection fueled by the indispensability of the Internet and the increasing functionality of the devices. From 2005 to 2016, the perceived necessity of conducting transactions on the Internet moved from optional to indispensable. The context of these transactions changes from traditional desktop and laptop computers, to the inclusion of smartphones and tablets (PMDs). However, the traditional privacy calculus published by (Dinev and Hart 2006) was conceived before this technological and contextual change, and several core assumptions of that model must be re-examined and possibly adapted or changed to account for this shift. This paradigm shift impacts the decision process individuals use to disclose personal information using PMDs. By nature of their size, portability, and constant proximity to the user, PMDs collect, contain, and distribute unprecedented amounts of personal information. Even though the context within which people are sharing information has changed significantly, privacy calculus research applied to PMDs has not moved far from the seminal work by Dinev and Hart (2006). The traditional privacy calculus risk-benefit model is limited in the PMD context because users are unaware of how much personal information is being shared, how often it is shared, or to whom it is shared. Furthermore, the traditional model explains and predicts intent to disclose rather than actual disclosure. However, disclosure intentions are a poor predictor of actual information disclosure. Because of perceived indispensability of the information and the inability to assess potential risk, the deliberate comparison of risks to benefits prior to disclosure—a core assumption of the traditional privacy calculus—may not be the most effective basis of a model to predict and explain disclosure. The present research develops a Personal Mobile Device Privacy Calculus model designed to predict and explain disclosure behavior within the specific context of actual disclosure of personal information using PMDs.
|
5 |
Privacy, surveillance and the state a comparison of U.S. and British privacy rights /Lander, Angelina M. January 2009 (has links)
Thesis (M.A.)--University of Central Florida, 2009. / Adviser: Barbara Sgouraki Kinsey. Includes bibliographical references (p. 64-67).
|
6 |
Privacy boundaries : stories of protecting personal autonomy in the information ageDayan, Michael Oved January 2004 (has links)
In 1890, lawyers Samuel Warren and Louis Brandeis conceived of a "sacred" right, the right to "be let alone." They argued for this right as a measure of "retreat from the world" for protection of an individual's "inviolate personality." Their argument was born in response to intrusions made possible with technological developments in printing and photography. For over a 100-year period, the concept of privacy has received attention from a multi-disciplinary collection of scholars. Despite this significant attention, however, relatively little consideration has been paid to conceptualizations of privacy in the everyday. My dissertation utilizes the focus group method to access individuals' stories about privacy in everyday lives. The unit of the story is important because it contains rich connotative language, imbued with meaning. My method of analysis is inspired primarily by Michel de Certeau and Clifford Geertz. This analysis reveals four significant themes, all linking back to Warren and Brandeis's original conceptualization in thinking about privacy in the everyday: it is associated with fears, it is considered a defence against surveillance, it is conceived of in metaphorical terms as a protective boundary, and it protects personal information and individual autonomy. This dissertation explores how individuals articulate these themes. It finds that individuals apply the language of space as a framework in which to believe their privacy is protected from surveillance.
|
7 |
Privacy boundaries : stories of protecting personal autonomy in the information ageDayan, Michael Oved January 2004 (has links)
No description available.
|
8 |
Glass houses: the end of privacySinkovits, Angela M. 01 January 2000 (has links)
As we enter the 21 st Century, individuals are faced with an enormous threat to privacy that affects almost every human being. Due to technological advances, virtually everyone will be influenced by the course that is set over the next few years concerning the dissemination of private information. The revolution of information technology resembles the Industrial Revolution in that parameters·are largely unknown and unregulated. In addition, the self-regulation of business presents a similar conflict between profit and public protection. Privacy guidelines that the legislature, judiciary, and industry establish in the early part of this century will affect humanity as the advent of labor laws did in the 20th Century. In this work, the threat to privacy, the problems associated with the control of information transfer, and the comprehensive European Union approach will be examined.
|
9 |
The effect of effort, control and value frames on online users privacy decisionHögberg, Johan January 2013 (has links)
A frame refers to a decision maker’s perception of a decision problem. Frames affect outcomes of decisions and are partially controlled by how decision problems are formulated. This study investigated the effect of framing alternatives in a privacy decision as gaining or losing value, need to make an effort and gaining control in an online environment. Also a structure among the many effects found in earlier research concerning privacy in the context of Internet based services was sought. For these purposes two experiments and one survey were conducted at a university in Sweden. The study included 238 individuals, 197 of them being in the age range of 19-30. The participants were approached in public areas at the University and were asked to register on a fictive online cloud service. During registration they got a choice of registering automatically with little control and manually with control over what information would be published. The most salient effect found was the impact of framing the low control alternative as time saving, meaning that the participants were willing to give up privacy to save time. The practical implication of these results would be for developers of new online services to focus on making it easy and time efficient to take control over private information. For value and control frames no significant effects were found. Also exploring the result of the survey, a structure with the two components online concern and willingness to take risk online were found.
|
10 |
Privacy and Australian law /Gibb, Susan Jennifer. January 1987 (has links) (PDF)
Thesis (Ph. D.)--University of Adelaide, 1987. / Includes abstract. Includes bibliographical references.
|
Page generated in 0.041 seconds