Spelling suggestions: "subject:"privacy light"" "subject:"privacy might""
11 |
Workplace discipline and the right to privacy.Mookodi, Masego Magdaline. January 2004 (has links)
No abstract available. / Thesis (LL.M.)-University of KwaZulu-Natal, Durban, 2004.
|
12 |
Balancing freedom of the press and the right to privacy lessons for China /Sun, Zhendong. January 1900 (has links)
Thesis (LL.M.)--McGill University (Canada), 2006. / Includes bibliographical references.
|
13 |
A privacy law for Wisconsn the role of the press /Eakins, Jan M. January 1976 (has links)
Thesis--Wisconsin. / Includes bibliographical references (leaves 258-261).
|
14 |
Das Persönlichkeitsrecht im Privatrecht der VR China eine Studie unter besonderer Berücksichtigung der juristischen Personen /Werthwein, Simon. January 2009 (has links)
Überarb. Diss. Univ. Passau, 2008/2009.
|
15 |
Can confidentiality in Hong Kong arbitration proceedings be sufficiently protected?Siu, David Chi Ho. January 2005 (has links) (PDF)
Thesis (M.A.)--City University of Hong Kong, 2005. / Title from title screen (viewed on 27 Mar. 2006) "MA in arbitration and dispute resolution." Includes bibliographical references.
|
16 |
Technology's role in the social construction of American privacy, 1890-presentStevens, John Richard, Tankard, James W. January 2004 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2004. / Supervisor: James W. Tankard. Vita. Includes bibliographical references. Also available from UMI.
|
17 |
The Infopriv model for information privacyDreyer, Lucas Cornelius Johannes 20 August 2012 (has links)
D.Phil. (Computer Science) / The privacy of personal information is crucial in today's information systems. Traditional security models are mainly concerned with the protection of information inside a computer system. These models assume that the users of a computer system are trustworthy and will not disclose information to unauthorised parties. However, this assumption does not always apply to information privacy since people are the major cause of privacy violations. Alternative models are, therefore, needed for the protection of personal information in an environment.
|
18 |
Privacy boundaries : stories of protecting personal autonomy in the information ageDayan, Michael Oved January 2004 (has links)
No description available.
|
19 |
Privacy and Australian lawGibb, Susan Jennifer. January 1987 (has links) (PDF)
Includes abstract. Includes bibliography.
|
20 |
The right of publicity in the global market : is James Dean a living dead even in Korea? /Nam, Hyung Doo. January 2005 (has links)
Thesis (Ph. D.)--University of Washington, 2005. / Vita. Includes bibliographical references (leaves 325-349).
|
Page generated in 0.0561 seconds