scroll to top
0

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "Right to privacy"

1 - 10 of 36,756 results for
 "Right to privacy"
Results per page:

A Blockchain-Based Framework for Secure Storage and Sharing of Resumes.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua. 2022, Vol. 72 Issue 3, p5395-5413. 19p.

Abstract: In response to problems in the centralized storage of personal resumes on third-party recruitment platforms, such as inadequate privacy protection, inability of individuals to accurately authorize downloads, and inability to determine who downloaded th...

Privacy Law Protection Based on the Information Security Assurance Algorithm.

Publication Type: Academic Journal

Source(s): Computational Intelligence & Neuroscience. 9/9/2022, p1-11. 11p.

Abstract: With the continuous development of network technology, the production and lifestyle of human beings are also quietly changing. People find that the network makes life faster and more convenient and also makes our life more "transparent." The openness, ...

From Privacy to Social Legibility.

Publication Type: Academic Journal

Source(s): Surveillance & Society. 2022, Vol. 20 Issue 3, p302-305. 4p.

Authors:

Abstract: This paper draws upon James Scott's Seeing Like a State (1998) to argue that privacy law currently suffers from (at least) three defects: a focus on the legibility of individuals that is too narrow, a focus on collection and subsequent use of data that...

Industrial Internet of Things Anti-Intrusion Detection System by Neural Network in the Context of Internet of Things for Privacy Law Security Protection.

Publication Type: Academic Journal

Source(s): Wireless Communications & Mobile Computing. 6/6/2022, p1-17. 17p.

Authors:

Abstract: Today, the Industrial Internet of Things (IIoT) and network technology are highly developed, and network data breaches occur every year. Therefore, an anti-intrusion detection system has been established to improve the privacy law security protection o...

Mobile-App Privacy Nutrition Labels Missing Key Ingredients for Success: Android and iOS privacy labels confuse developers and end users.

Publication Type: Periodical

Source(s): Communications of the ACM. Nov2022, Vol. 65 Issue 11, p26-28. 3p.

Abstract: The article analyzes the attempt of the Android and iOS mobile operating systems to format mobile app privacy notices in a simple format resembling nutrition labels, in order to provide consumers with the information they need to make informed decision...

This law makes it illegal for companies to collect third-party data to profile you. But they do anyway.

Publication Type: Periodical

Source(s): Conversation (Conversation Media Group Ltd). 9/20/2022, p1-6. 6p. 2 Color Photographs.

Authors:

Abstract: This law makes it illegal for companies to collect third-party data to profile you. Aside from data brokers, companies also exchange information with each other about their respective customers to get extra information on customers' lives. Data enrichm...

Goodbye to Publications, or Confessions of a Privacy Law Scholar.

Publication Type: Academic Journal

Source(s): Surveillance & Society. 2022, Vol. 20 Issue 3, p312-316. 5p.

Authors:

Abstract: Privacy and surveillance scholars, myself included, publish too much and read too little. That is basically the abstract for this opinion piece. So, if you've got the message, you can stop reading. On second thoughts, if you've got the message, maybe y...

REFRESH THE REASONABLE EXPECTATION: THE KEY TO THE MODERN PRIVACY RULES.

Publication Type: Academic Journal

Source(s): Journal of Internet Law. Jan2023, Vol. 26 Issue 5, p1-19. 15p.

Authors:

Abstract: The article discusses the legal practice shared context to promote information flow and reuse the personal information, protected by the right to privacy. Topics include tradeoff hidden behind a balancing of interests appears to lead to a compromise on...

Is there respectful maternity care in Poland? Women's views about care during labor and birth.

Publication Type: Academic Journal

Source(s): BMC pregnancy and childbirth [BMC Pregnancy Childbirth] 2019 Dec 23; Vol. 19 (1), pp. 520. Date of Electronic Publication: 2019 Dec 23.

Abstract: Background: Abuse against women in labor starts with subtle forms of discrimination that can turn into overt violence. Therefore it is crucial to work towards prevention and elimination of disrespect and ill-treatment in medical facility perinatal care...

Incorporating 'Fashion Identity' Into the Right to Privacy.

Publication Type: Academic Journal

Source(s): Law, Technology & Humans. 2022, Vol. 4 Issue 1, p102-116. 15p.

Authors:

Abstract: We need a concept of the right to privacy and identity that incorporates an individual's perception and selfrelationality. This paper scrutinises the meaning of the right to privacy in terms of identity construction, focusing on the meaning of 'identit...

sponsored