Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Privacy Policies). Showing records 1 – 21 of 21 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Penn State University

1. Krych, Daniel Erle. An Exposure of Android Social Media Applications and the Data ISPs Can Collect.

Degree: 2017, Penn State University

 Social media applications play a key role in our day-to-day lives, using and handling sensitive/private data in their nature. Android applications continue to share data… (more)

Subjects/Keywords: Android security; Android privacy; Dynamic analysis; Social media; Privacy policies; Dshell

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Krych, D. E. (2017). An Exposure of Android Social Media Applications and the Data ISPs Can Collect. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/14730dek5156

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Krych, Daniel Erle. “An Exposure of Android Social Media Applications and the Data ISPs Can Collect.” 2017. Thesis, Penn State University. Accessed September 25, 2020. https://submit-etda.libraries.psu.edu/catalog/14730dek5156.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Krych, Daniel Erle. “An Exposure of Android Social Media Applications and the Data ISPs Can Collect.” 2017. Web. 25 Sep 2020.

Vancouver:

Krych DE. An Exposure of Android Social Media Applications and the Data ISPs Can Collect. [Internet] [Thesis]. Penn State University; 2017. [cited 2020 Sep 25]. Available from: https://submit-etda.libraries.psu.edu/catalog/14730dek5156.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Krych DE. An Exposure of Android Social Media Applications and the Data ISPs Can Collect. [Thesis]. Penn State University; 2017. Available from: https://submit-etda.libraries.psu.edu/catalog/14730dek5156

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Uppsala University

2. Birgisdottir, Johanna. Personalized Marketing : An invasion of privacy or an approved phenomenon? An empirical study of how organizations can respond to consumers’ concern over the threats of online privacy.

Degree: Business Studies, 2012, Uppsala University

  The authors of this study analysed the increasing use of personalized marketing and consumer concerns regarding the access to personal information. The purpose was… (more)

Subjects/Keywords: Facebook; Trust; Privacy Policies; Personal Data; Privacy Concern; Personalized Marketing.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Birgisdottir, J. (2012). Personalized Marketing : An invasion of privacy or an approved phenomenon? An empirical study of how organizations can respond to consumers’ concern over the threats of online privacy. (Thesis). Uppsala University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-176677

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Birgisdottir, Johanna. “Personalized Marketing : An invasion of privacy or an approved phenomenon? An empirical study of how organizations can respond to consumers’ concern over the threats of online privacy.” 2012. Thesis, Uppsala University. Accessed September 25, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-176677.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Birgisdottir, Johanna. “Personalized Marketing : An invasion of privacy or an approved phenomenon? An empirical study of how organizations can respond to consumers’ concern over the threats of online privacy.” 2012. Web. 25 Sep 2020.

Vancouver:

Birgisdottir J. Personalized Marketing : An invasion of privacy or an approved phenomenon? An empirical study of how organizations can respond to consumers’ concern over the threats of online privacy. [Internet] [Thesis]. Uppsala University; 2012. [cited 2020 Sep 25]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-176677.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Birgisdottir J. Personalized Marketing : An invasion of privacy or an approved phenomenon? An empirical study of how organizations can respond to consumers’ concern over the threats of online privacy. [Thesis]. Uppsala University; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-176677

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

3. Mazmudar, Miti. Mitigator: Privacy policy compliance using Intel SGX.

Degree: 2019, University of Waterloo

Privacy policies have been known to be hard to read and understand by internet users and yet users are obliged to accept these one-sided terms… (more)

Subjects/Keywords: Intel SGX; Privacy policies; Privacy-enhancing technologies; Trusted hardware platforms; source-code compliance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mazmudar, M. (2019). Mitigator: Privacy policy compliance using Intel SGX. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/14765

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mazmudar, Miti. “Mitigator: Privacy policy compliance using Intel SGX.” 2019. Thesis, University of Waterloo. Accessed September 25, 2020. http://hdl.handle.net/10012/14765.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mazmudar, Miti. “Mitigator: Privacy policy compliance using Intel SGX.” 2019. Web. 25 Sep 2020.

Vancouver:

Mazmudar M. Mitigator: Privacy policy compliance using Intel SGX. [Internet] [Thesis]. University of Waterloo; 2019. [cited 2020 Sep 25]. Available from: http://hdl.handle.net/10012/14765.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mazmudar M. Mitigator: Privacy policy compliance using Intel SGX. [Thesis]. University of Waterloo; 2019. Available from: http://hdl.handle.net/10012/14765

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

4. Dzananovic, Sandro. Privacy Policies : A comparison between large and small organizations.

Degree: 2018, Högskolan i Borås

  E-commerce and transaction on the internet is getting more and more common in every individual’s life. More than 40 % of the worldwide Internet… (more)

Subjects/Keywords: privacy policies; organization; personal information; Information Systems; Systemvetenskap, informationssystem och informatik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dzananovic, S. (2018). Privacy Policies : A comparison between large and small organizations. (Thesis). Högskolan i Borås. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-21034

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dzananovic, Sandro. “Privacy Policies : A comparison between large and small organizations.” 2018. Thesis, Högskolan i Borås. Accessed September 25, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-21034.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dzananovic, Sandro. “Privacy Policies : A comparison between large and small organizations.” 2018. Web. 25 Sep 2020.

Vancouver:

Dzananovic S. Privacy Policies : A comparison between large and small organizations. [Internet] [Thesis]. Högskolan i Borås; 2018. [cited 2020 Sep 25]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-21034.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dzananovic S. Privacy Policies : A comparison between large and small organizations. [Thesis]. Högskolan i Borås; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-21034

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade Federal do Maranhão

5. SIMARA VIEIRA DA ROCHA. ELICITAÇÃO DE REQUISITOS BASEADA EM OBJETIVOS PARA POLÍTICAS DE SEGURANÇA E PRIVACIDADE EM COMÉRCIO ELETRÔNICO.

Degree: 2005, Universidade Federal do Maranhão

This work describes a method for the elicitation of requirements based on goals for electronic commerce systems in agreement with security and privacy polices of… (more)

Subjects/Keywords: Políticas de Segurança; Requirements; Elicitação; Goal; Requisitos; SISTEMAS DE COMPUTACAO; Security; Objetivos; Privacy Policies; Privacidade; Elicitation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

ROCHA, S. V. D. (2005). ELICITAÇÃO DE REQUISITOS BASEADA EM OBJETIVOS PARA POLÍTICAS DE SEGURANÇA E PRIVACIDADE EM COMÉRCIO ELETRÔNICO. (Thesis). Universidade Federal do Maranhão. Retrieved from http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=272

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

ROCHA, SIMARA VIEIRA DA. “ELICITAÇÃO DE REQUISITOS BASEADA EM OBJETIVOS PARA POLÍTICAS DE SEGURANÇA E PRIVACIDADE EM COMÉRCIO ELETRÔNICO.” 2005. Thesis, Universidade Federal do Maranhão. Accessed September 25, 2020. http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=272.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

ROCHA, SIMARA VIEIRA DA. “ELICITAÇÃO DE REQUISITOS BASEADA EM OBJETIVOS PARA POLÍTICAS DE SEGURANÇA E PRIVACIDADE EM COMÉRCIO ELETRÔNICO.” 2005. Web. 25 Sep 2020.

Vancouver:

ROCHA SVD. ELICITAÇÃO DE REQUISITOS BASEADA EM OBJETIVOS PARA POLÍTICAS DE SEGURANÇA E PRIVACIDADE EM COMÉRCIO ELETRÔNICO. [Internet] [Thesis]. Universidade Federal do Maranhão; 2005. [cited 2020 Sep 25]. Available from: http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=272.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

ROCHA SVD. ELICITAÇÃO DE REQUISITOS BASEADA EM OBJETIVOS PARA POLÍTICAS DE SEGURANÇA E PRIVACIDADE EM COMÉRCIO ELETRÔNICO. [Thesis]. Universidade Federal do Maranhão; 2005. Available from: http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=272

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Cincinnati

6. Mysore Gopinath, Abhijith Athreya. Automatic Detection of Section Title and Prose Text in HTML Documents Using Unsupervised and Supervised Learning.

Degree: MS, Engineering and Applied Science: Computer Science, 2018, University of Cincinnati

 Web documents are one of the most important sources of obtaining publicly available information, and researchers in need of textual data often scour the web… (more)

Subjects/Keywords: Computer Science; HTML Structure Analysis; Natural Language Processing; Topicality Detection in HTML; Machine Learning; Privacy Policies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mysore Gopinath, A. A. (2018). Automatic Detection of Section Title and Prose Text in HTML Documents Using Unsupervised and Supervised Learning. (Masters Thesis). University of Cincinnati. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535371714338677

Chicago Manual of Style (16th Edition):

Mysore Gopinath, Abhijith Athreya. “Automatic Detection of Section Title and Prose Text in HTML Documents Using Unsupervised and Supervised Learning.” 2018. Masters Thesis, University of Cincinnati. Accessed September 25, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535371714338677.

MLA Handbook (7th Edition):

Mysore Gopinath, Abhijith Athreya. “Automatic Detection of Section Title and Prose Text in HTML Documents Using Unsupervised and Supervised Learning.” 2018. Web. 25 Sep 2020.

Vancouver:

Mysore Gopinath AA. Automatic Detection of Section Title and Prose Text in HTML Documents Using Unsupervised and Supervised Learning. [Internet] [Masters thesis]. University of Cincinnati; 2018. [cited 2020 Sep 25]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535371714338677.

Council of Science Editors:

Mysore Gopinath AA. Automatic Detection of Section Title and Prose Text in HTML Documents Using Unsupervised and Supervised Learning. [Masters Thesis]. University of Cincinnati; 2018. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535371714338677


University of Bridgeport

7. Alshugran, Tariq. Privacy Preserving HIPAA-Compliant Access Control Model for Web Services .

Degree: 2019, University of Bridgeport

 Software applications are developed to help companies and organizations process and manage data that support their daily operations. However, this data might contain sensitive clients’… (more)

Subjects/Keywords: Access control; Data modeling; Federal regulations; Health insurance portability and accountability act of 1996 (HIPAA); Privacy policies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alshugran, T. (2019). Privacy Preserving HIPAA-Compliant Access Control Model for Web Services . (Thesis). University of Bridgeport. Retrieved from https://scholarworks.bridgeport.edu/xmlui/handle/123456789/4001

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alshugran, Tariq. “Privacy Preserving HIPAA-Compliant Access Control Model for Web Services .” 2019. Thesis, University of Bridgeport. Accessed September 25, 2020. https://scholarworks.bridgeport.edu/xmlui/handle/123456789/4001.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alshugran, Tariq. “Privacy Preserving HIPAA-Compliant Access Control Model for Web Services .” 2019. Web. 25 Sep 2020.

Vancouver:

Alshugran T. Privacy Preserving HIPAA-Compliant Access Control Model for Web Services . [Internet] [Thesis]. University of Bridgeport; 2019. [cited 2020 Sep 25]. Available from: https://scholarworks.bridgeport.edu/xmlui/handle/123456789/4001.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alshugran T. Privacy Preserving HIPAA-Compliant Access Control Model for Web Services . [Thesis]. University of Bridgeport; 2019. Available from: https://scholarworks.bridgeport.edu/xmlui/handle/123456789/4001

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Guelph

8. Kaur, Jasmin. A Semantic-based Approach to Reduce the Reading Time of Privacy Policies.

Degree: MS, School of Computer Science, 2020, University of Guelph

Privacy policy is a legal document in which the users are informed about the data practices used by the organizations. Past research indicates that the… (more)

Subjects/Keywords: Privacy policies; topic modelling; keyword analysis; seed keywords; ontology; competency questions; validating ontology; user study; task based user study

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kaur, J. (2020). A Semantic-based Approach to Reduce the Reading Time of Privacy Policies. (Masters Thesis). University of Guelph. Retrieved from https://atrium.lib.uoguelph.ca/xmlui/handle/10214/17711

Chicago Manual of Style (16th Edition):

Kaur, Jasmin. “A Semantic-based Approach to Reduce the Reading Time of Privacy Policies.” 2020. Masters Thesis, University of Guelph. Accessed September 25, 2020. https://atrium.lib.uoguelph.ca/xmlui/handle/10214/17711.

MLA Handbook (7th Edition):

Kaur, Jasmin. “A Semantic-based Approach to Reduce the Reading Time of Privacy Policies.” 2020. Web. 25 Sep 2020.

Vancouver:

Kaur J. A Semantic-based Approach to Reduce the Reading Time of Privacy Policies. [Internet] [Masters thesis]. University of Guelph; 2020. [cited 2020 Sep 25]. Available from: https://atrium.lib.uoguelph.ca/xmlui/handle/10214/17711.

Council of Science Editors:

Kaur J. A Semantic-based Approach to Reduce the Reading Time of Privacy Policies. [Masters Thesis]. University of Guelph; 2020. Available from: https://atrium.lib.uoguelph.ca/xmlui/handle/10214/17711

9. Gerl, Armin. Modelling of a privacy language and efficient policy-based de-identification : Modélisation d'un langage de confidentialité et politique efficace de désidentifacation (d'anonymisation).

Degree: Docteur es, Informatique, 2019, Lyon; Universität Passau (Deutscheland)

De nos jours, les informations personnelles des utilisateurs intéressent énormément les annonceurs et les industriels qui les utilisent pour mieux cibler leurs clients et pour… (more)

Subjects/Keywords: Internet; Protection de la vie privée; Informations personnelles; Conformité; Normes; Droit à la vie privée; Rgpd; Layered Privacy Language; Protection des données; Personnalisation de données; Identification; Web; Privacy protection; Privacy Preservation; Person re-Identification; Conformity; Standards; Legal privacy policies; Layered Privacy Language; Data protection; Data personalization; Identification; 025.040 72

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gerl, A. (2019). Modelling of a privacy language and efficient policy-based de-identification : Modélisation d'un langage de confidentialité et politique efficace de désidentifacation (d'anonymisation). (Doctoral Dissertation). Lyon; Universität Passau (Deutscheland). Retrieved from http://www.theses.fr/2019LYSEI105

Chicago Manual of Style (16th Edition):

Gerl, Armin. “Modelling of a privacy language and efficient policy-based de-identification : Modélisation d'un langage de confidentialité et politique efficace de désidentifacation (d'anonymisation).” 2019. Doctoral Dissertation, Lyon; Universität Passau (Deutscheland). Accessed September 25, 2020. http://www.theses.fr/2019LYSEI105.

MLA Handbook (7th Edition):

Gerl, Armin. “Modelling of a privacy language and efficient policy-based de-identification : Modélisation d'un langage de confidentialité et politique efficace de désidentifacation (d'anonymisation).” 2019. Web. 25 Sep 2020.

Vancouver:

Gerl A. Modelling of a privacy language and efficient policy-based de-identification : Modélisation d'un langage de confidentialité et politique efficace de désidentifacation (d'anonymisation). [Internet] [Doctoral dissertation]. Lyon; Universität Passau (Deutscheland); 2019. [cited 2020 Sep 25]. Available from: http://www.theses.fr/2019LYSEI105.

Council of Science Editors:

Gerl A. Modelling of a privacy language and efficient policy-based de-identification : Modélisation d'un langage de confidentialité et politique efficace de désidentifacation (d'anonymisation). [Doctoral Dissertation]. Lyon; Universität Passau (Deutscheland); 2019. Available from: http://www.theses.fr/2019LYSEI105


Brigham Young University

10. Walker, Daniel David. Or Best Offer: A Privacy Policy Negotiation Protocol.

Degree: MS, 2007, Brigham Young University

 Users today are concerned about how their information is collected, stored and used by Internet sites. Privacy policy languages, such as the Platform for Privacy(more)

Subjects/Keywords: privacy; p3p; privacy policies; privacy policy negotiation; utility; Pareto-optimality; Pareto-efficiency; policy; negotiation; protocol; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Walker, D. D. (2007). Or Best Offer: A Privacy Policy Negotiation Protocol. (Masters Thesis). Brigham Young University. Retrieved from https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=2015&context=etd

Chicago Manual of Style (16th Edition):

Walker, Daniel David. “Or Best Offer: A Privacy Policy Negotiation Protocol.” 2007. Masters Thesis, Brigham Young University. Accessed September 25, 2020. https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=2015&context=etd.

MLA Handbook (7th Edition):

Walker, Daniel David. “Or Best Offer: A Privacy Policy Negotiation Protocol.” 2007. Web. 25 Sep 2020.

Vancouver:

Walker DD. Or Best Offer: A Privacy Policy Negotiation Protocol. [Internet] [Masters thesis]. Brigham Young University; 2007. [cited 2020 Sep 25]. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=2015&context=etd.

Council of Science Editors:

Walker DD. Or Best Offer: A Privacy Policy Negotiation Protocol. [Masters Thesis]. Brigham Young University; 2007. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=2015&context=etd

11. Afsahi, Afshan. Social Networking Dilemmas for Psychologists: Privacy, Professionalism, Boundary Issues, and Policies.

Degree: Psy. D., Antioch New England: Clinical Psychology, 2015, Antioch University

 Technological advancements have had positive and negative effects on the clinical practice of psychology. Increasing use of social networking websites has created new ethical issues… (more)

Subjects/Keywords: Clinical Psychology; privacy; professionalism; therapeutic boundaries; policies; social networks

Privacy, Confidentiality, Professionalism, Therapeutic Boundaries, Policies SOCIAL NETWORKING… …30 Table 2. Privacy and Confidentiality… …60 Table 8. Respondent Age & Utilization of Privacy Settings to Keep Information Private… …66 Table 12. Respondent Age & the Level of Privacy Settings on Personal Profile… …72 Table 15. Respondent Age & Tendency to Keep Up-to-date with Privacy Options on… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Afsahi, A. (2015). Social Networking Dilemmas for Psychologists: Privacy, Professionalism, Boundary Issues, and Policies. (Doctoral Dissertation). Antioch University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=antioch1418128099

Chicago Manual of Style (16th Edition):

Afsahi, Afshan. “Social Networking Dilemmas for Psychologists: Privacy, Professionalism, Boundary Issues, and Policies.” 2015. Doctoral Dissertation, Antioch University. Accessed September 25, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=antioch1418128099.

MLA Handbook (7th Edition):

Afsahi, Afshan. “Social Networking Dilemmas for Psychologists: Privacy, Professionalism, Boundary Issues, and Policies.” 2015. Web. 25 Sep 2020.

Vancouver:

Afsahi A. Social Networking Dilemmas for Psychologists: Privacy, Professionalism, Boundary Issues, and Policies. [Internet] [Doctoral dissertation]. Antioch University; 2015. [cited 2020 Sep 25]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=antioch1418128099.

Council of Science Editors:

Afsahi A. Social Networking Dilemmas for Psychologists: Privacy, Professionalism, Boundary Issues, and Policies. [Doctoral Dissertation]. Antioch University; 2015. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=antioch1418128099


Brigham Young University

12. Leithead, Travis S. Challenging Policies That Do Not Play Fair: A Credential Relevancy Framework Using Trust Negotiation Ontologies.

Degree: MS, 2005, Brigham Young University

  This thesis challenges the assumption that policies will "play fair" within trust negotiation. Policies that do not "play fair" contain requirements for authentication that… (more)

Subjects/Keywords: trust negotiation; policies; malicious; attacks; framework; privacy; security; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Leithead, T. S. (2005). Challenging Policies That Do Not Play Fair: A Credential Relevancy Framework Using Trust Negotiation Ontologies. (Masters Thesis). Brigham Young University. Retrieved from https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=1644&context=etd

Chicago Manual of Style (16th Edition):

Leithead, Travis S. “Challenging Policies That Do Not Play Fair: A Credential Relevancy Framework Using Trust Negotiation Ontologies.” 2005. Masters Thesis, Brigham Young University. Accessed September 25, 2020. https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=1644&context=etd.

MLA Handbook (7th Edition):

Leithead, Travis S. “Challenging Policies That Do Not Play Fair: A Credential Relevancy Framework Using Trust Negotiation Ontologies.” 2005. Web. 25 Sep 2020.

Vancouver:

Leithead TS. Challenging Policies That Do Not Play Fair: A Credential Relevancy Framework Using Trust Negotiation Ontologies. [Internet] [Masters thesis]. Brigham Young University; 2005. [cited 2020 Sep 25]. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=1644&context=etd.

Council of Science Editors:

Leithead TS. Challenging Policies That Do Not Play Fair: A Credential Relevancy Framework Using Trust Negotiation Ontologies. [Masters Thesis]. Brigham Young University; 2005. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=1644&context=etd

13. Dari Bekara, Kheira. Protection des données personnelles côté utilisateur dans le e-commerce : Personal user data protection in the e-commerce.

Degree: Docteur es, Informatique et réseaux, 2012, Evry, Institut national des télécommunications

L’informatique et Internet en particulier favorisent grandement la collecte de données à l'insu de l'utilisateur, leur divulgation à des tiers et le croisement des données.… (more)

Subjects/Keywords: Vie privée; E-commerce; Données personnelles; Protection des données; XPACML; Négociation de politiques; P3P; Théorie des jeux; Privacy; E-commerce; Personal data; Data protection; XPACML; Policies negociation; P3P; Game theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dari Bekara, K. (2012). Protection des données personnelles côté utilisateur dans le e-commerce : Personal user data protection in the e-commerce. (Doctoral Dissertation). Evry, Institut national des télécommunications. Retrieved from http://www.theses.fr/2012TELE0045

Chicago Manual of Style (16th Edition):

Dari Bekara, Kheira. “Protection des données personnelles côté utilisateur dans le e-commerce : Personal user data protection in the e-commerce.” 2012. Doctoral Dissertation, Evry, Institut national des télécommunications. Accessed September 25, 2020. http://www.theses.fr/2012TELE0045.

MLA Handbook (7th Edition):

Dari Bekara, Kheira. “Protection des données personnelles côté utilisateur dans le e-commerce : Personal user data protection in the e-commerce.” 2012. Web. 25 Sep 2020.

Vancouver:

Dari Bekara K. Protection des données personnelles côté utilisateur dans le e-commerce : Personal user data protection in the e-commerce. [Internet] [Doctoral dissertation]. Evry, Institut national des télécommunications; 2012. [cited 2020 Sep 25]. Available from: http://www.theses.fr/2012TELE0045.

Council of Science Editors:

Dari Bekara K. Protection des données personnelles côté utilisateur dans le e-commerce : Personal user data protection in the e-commerce. [Doctoral Dissertation]. Evry, Institut national des télécommunications; 2012. Available from: http://www.theses.fr/2012TELE0045

14. Parker-Stewart, LaTrice D. Computer Security Policy: Preventing Vulnerabilities and the Impact of Selective Enforcement On an Organization.

Degree: 2011, Regis University

 This project focuses on the importance of a computer security policy as a whole. It also looks at how security policies assist in preventing vulnerabilities… (more)

Subjects/Keywords: Computer Sciences; Physical Sciences and Mathematics; computer security policy; employee privacy; organizational policies; Information Assurance thesis; College for Professional Studies; MS Information Assurance; School of Computer & Information Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Parker-Stewart, L. D. (2011). Computer Security Policy: Preventing Vulnerabilities and the Impact of Selective Enforcement On an Organization. (Thesis). Regis University. Retrieved from http://epublications.regis.edu/theses/480

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Parker-Stewart, LaTrice D. “Computer Security Policy: Preventing Vulnerabilities and the Impact of Selective Enforcement On an Organization.” 2011. Thesis, Regis University. Accessed September 25, 2020. http://epublications.regis.edu/theses/480.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Parker-Stewart, LaTrice D. “Computer Security Policy: Preventing Vulnerabilities and the Impact of Selective Enforcement On an Organization.” 2011. Web. 25 Sep 2020.

Vancouver:

Parker-Stewart LD. Computer Security Policy: Preventing Vulnerabilities and the Impact of Selective Enforcement On an Organization. [Internet] [Thesis]. Regis University; 2011. [cited 2020 Sep 25]. Available from: http://epublications.regis.edu/theses/480.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Parker-Stewart LD. Computer Security Policy: Preventing Vulnerabilities and the Impact of Selective Enforcement On an Organization. [Thesis]. Regis University; 2011. Available from: http://epublications.regis.edu/theses/480

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Luleå University of Technology

15. Boström, Lisa. Visualizing privacy : design and development of a privacy management component.

Degree: 2006, Luleå University of Technology

This Master’s Thesis in Media Engineering has been performed at Ericsson in Stockholm, Sweden. Advances in technology and new services for mobile systems come… (more)

Subjects/Keywords: Technology; Privacy; Human Computer Interaction; Privacy Policies; Management; Conceptual Models; Visualization; Graphical User; Interface; Teknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Boström, L. (2006). Visualizing privacy : design and development of a privacy management component. (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-47036

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Boström, Lisa. “Visualizing privacy : design and development of a privacy management component.” 2006. Thesis, Luleå University of Technology. Accessed September 25, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-47036.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Boström, Lisa. “Visualizing privacy : design and development of a privacy management component.” 2006. Web. 25 Sep 2020.

Vancouver:

Boström L. Visualizing privacy : design and development of a privacy management component. [Internet] [Thesis]. Luleå University of Technology; 2006. [cited 2020 Sep 25]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-47036.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Boström L. Visualizing privacy : design and development of a privacy management component. [Thesis]. Luleå University of Technology; 2006. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-47036

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

16. Oggolder, Michael. A Privacy-Policy Language and a Matching Engine for U-PrIM.

Degree: Mathematics and Computer Science, 2013, Karlstad University

  A privacy-policy matching engine may support users in determining if their privacy preferencesmatch with a service provider’s privacy policy. Furthermore, third parties, such asData… (more)

Subjects/Keywords: privacy; privacy policies; policy matching engine; data protection; Computer Sciences; Datavetenskap (datalogi)

…third of Internet users do not read privacy policies at all and 24% read them without fully… …Directive (DPD) [Eur95], compel service providers to provide privacy policies… …Privacy policies are usually long and written using legal terms, resulting in them rarely being… …privacy policies. First, we introduce the Platform for Privacy Preferences Project (P3P… …Web Consortium (W3C). It enables websites to express their privacy policies in a… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Oggolder, M. (2013). A Privacy-Policy Language and a Matching Engine for U-PrIM. (Thesis). Karlstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-26512

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Oggolder, Michael. “A Privacy-Policy Language and a Matching Engine for U-PrIM.” 2013. Thesis, Karlstad University. Accessed September 25, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-26512.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Oggolder, Michael. “A Privacy-Policy Language and a Matching Engine for U-PrIM.” 2013. Web. 25 Sep 2020.

Vancouver:

Oggolder M. A Privacy-Policy Language and a Matching Engine for U-PrIM. [Internet] [Thesis]. Karlstad University; 2013. [cited 2020 Sep 25]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-26512.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Oggolder M. A Privacy-Policy Language and a Matching Engine for U-PrIM. [Thesis]. Karlstad University; 2013. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-26512

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

17. Verest, Job. Exploring the Privacy-Security Antinomy: A Case Study of the Privacy-Privacy Trade-Offs in US Intelligence Policies.

Degree: 2019, Leiden University

 This study analyses the conflicts and trade-offs of the concept of privacy with itself, as privacy can be seen as an umbrella term with many… (more)

Subjects/Keywords: Privacy; Security; US Intelligence Policies; USA Freedom Act; Privacy-Privacy Trade-Offs; Snowden Revelations; Intelligence Community; Civil Liberties

privacy-privacy trade-offs which could be the result from governmental policies: 1)… …characteristics. This means that privacy is violated, while it does not necessarily lead to increased… …Miller, 2016). Privacy is not only violated in the collection step, but as well in other… …privacy is violated (Liang et al., 2018). 2.2. Privacy Turn The UN Special Rapporteur… …on Privacy, Joseph Cannataci, already stated that there is not a clear definition of… 

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Verest, J. (2019). Exploring the Privacy-Security Antinomy: A Case Study of the Privacy-Privacy Trade-Offs in US Intelligence Policies. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/69796

Chicago Manual of Style (16th Edition):

Verest, Job. “Exploring the Privacy-Security Antinomy: A Case Study of the Privacy-Privacy Trade-Offs in US Intelligence Policies.” 2019. Masters Thesis, Leiden University. Accessed September 25, 2020. http://hdl.handle.net/1887/69796.

MLA Handbook (7th Edition):

Verest, Job. “Exploring the Privacy-Security Antinomy: A Case Study of the Privacy-Privacy Trade-Offs in US Intelligence Policies.” 2019. Web. 25 Sep 2020.

Vancouver:

Verest J. Exploring the Privacy-Security Antinomy: A Case Study of the Privacy-Privacy Trade-Offs in US Intelligence Policies. [Internet] [Masters thesis]. Leiden University; 2019. [cited 2020 Sep 25]. Available from: http://hdl.handle.net/1887/69796.

Council of Science Editors:

Verest J. Exploring the Privacy-Security Antinomy: A Case Study of the Privacy-Privacy Trade-Offs in US Intelligence Policies. [Masters Thesis]. Leiden University; 2019. Available from: http://hdl.handle.net/1887/69796

18. Borking, J.J.F.M. Privacyrecht is code. Over het gebruik van Privacy Enhancing Technologies.

Degree: 2010, Kluwer

 Omgevingsanalyse van onze samenleving toont aan dat door de toenemende informatisering privacyproblemen (identiteitsfraude, datalekken) zullen toenemen. Door gegevensontdekkende-, gegevensvolgende- en gegevenskoppelende technologieën erodeert de privacy(more)

Subjects/Keywords: Privacy law; Privacy enhancing technologies; Legal specifications; Surveillance state; Privacy risk analysis, Privacy ontologies, Identity protector; Obligation management system, Data track; Sticky policies; Pseudo-identities; Adoption factors; Organizational maturity, Return on investment for privacy investments; S-curves, Ambient intelligence; Privacy law; Privacy enhancing technologies; Legal specifications; Surveillance state; Privacy risk analysis, Privacy ontologies, Identity protector; Obligation management system, Data track; Sticky policies; Pseudo-identities; Adoption factors; Organizational maturity, Return on investment for privacy investments; S-curves, Ambient intelligence

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Borking, J. J. F. M. (2010). Privacyrecht is code. Over het gebruik van Privacy Enhancing Technologies. (Doctoral Dissertation). Kluwer. Retrieved from http://hdl.handle.net/1887/15660

Chicago Manual of Style (16th Edition):

Borking, J J F M. “Privacyrecht is code. Over het gebruik van Privacy Enhancing Technologies.” 2010. Doctoral Dissertation, Kluwer. Accessed September 25, 2020. http://hdl.handle.net/1887/15660.

MLA Handbook (7th Edition):

Borking, J J F M. “Privacyrecht is code. Over het gebruik van Privacy Enhancing Technologies.” 2010. Web. 25 Sep 2020.

Vancouver:

Borking JJFM. Privacyrecht is code. Over het gebruik van Privacy Enhancing Technologies. [Internet] [Doctoral dissertation]. Kluwer; 2010. [cited 2020 Sep 25]. Available from: http://hdl.handle.net/1887/15660.

Council of Science Editors:

Borking JJFM. Privacyrecht is code. Over het gebruik van Privacy Enhancing Technologies. [Doctoral Dissertation]. Kluwer; 2010. Available from: http://hdl.handle.net/1887/15660

19. Diallo, Mamadou Hassimiou. User-Centric Security and Privacy Approaches in Untrusted Environments.

Degree: Computer Science, 2018, University of California – Irvine

 Internet based information systems (and applications) such as cloud and Internet of Things (IoT) systems have evolved significantly in recent years due to advances in… (more)

Subjects/Keywords: Computer science; Cloud Systems and Applications; Cryptographic schemes; Internet of Things; Parallel and Distributed Systems; Privacy Policies; Security; Privacy; and Trust

…Cluster Computing Journal 2017 REFEREED CONFERENCE PUBLICATIONS Trustworthy Privacy Policy… …privacy in cloud applications IEEE 5th International Conference on Cloud Computing (CLOUD… …applications. xiii ABSTRACT OF THE DISSERTATION User-Centric Security and Privacy Approaches in… …security and privacy of their data at the service providers. Existing practice requires users to… …implicitly trust the service providers and their security policies in managing and protecting users… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Diallo, M. H. (2018). User-Centric Security and Privacy Approaches in Untrusted Environments. (Thesis). University of California – Irvine. Retrieved from http://www.escholarship.org/uc/item/2vz627xr

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Diallo, Mamadou Hassimiou. “User-Centric Security and Privacy Approaches in Untrusted Environments.” 2018. Thesis, University of California – Irvine. Accessed September 25, 2020. http://www.escholarship.org/uc/item/2vz627xr.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Diallo, Mamadou Hassimiou. “User-Centric Security and Privacy Approaches in Untrusted Environments.” 2018. Web. 25 Sep 2020.

Vancouver:

Diallo MH. User-Centric Security and Privacy Approaches in Untrusted Environments. [Internet] [Thesis]. University of California – Irvine; 2018. [cited 2020 Sep 25]. Available from: http://www.escholarship.org/uc/item/2vz627xr.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Diallo MH. User-Centric Security and Privacy Approaches in Untrusted Environments. [Thesis]. University of California – Irvine; 2018. Available from: http://www.escholarship.org/uc/item/2vz627xr

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

20. Butosi, Craig. Social Net-working: Exploring the Political Economy of the Online Social Network Industry.

Degree: 2012, University of Western Ontario

 This study explores the nascent political economy of the online social network industry. Exemplars of online social networking, Facebook and Twitter have often been understood… (more)

Subjects/Keywords: digital labour; Marxist political economy; political economy of communication; Karl Marx; Norman Fairclough; critical discourse analysis; labour theory of value; Facebook; Twitter; social networking; employment; Internet privacy; privacy policies; terms of service; commodification; user-generated content; audience commodity; Communication

…inquiry social network privacy and terms of use policies. Despite this research lacuna, analyses… …savoury characteristics, such as privacy abuses for capital gains and relatively exploitative… …close, critical reading of Facebook and Twitter’s privacy policy and terms of use contracts… …rather than merely protecting user privacy, is to legally (re)produce and to sustain… …user accepts the data collection practices of these sites, whether they read the privacy… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Butosi, C. (2012). Social Net-working: Exploring the Political Economy of the Online Social Network Industry. (Thesis). University of Western Ontario. Retrieved from https://ir.lib.uwo.ca/etd/693

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Butosi, Craig. “Social Net-working: Exploring the Political Economy of the Online Social Network Industry.” 2012. Thesis, University of Western Ontario. Accessed September 25, 2020. https://ir.lib.uwo.ca/etd/693.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Butosi, Craig. “Social Net-working: Exploring the Political Economy of the Online Social Network Industry.” 2012. Web. 25 Sep 2020.

Vancouver:

Butosi C. Social Net-working: Exploring the Political Economy of the Online Social Network Industry. [Internet] [Thesis]. University of Western Ontario; 2012. [cited 2020 Sep 25]. Available from: https://ir.lib.uwo.ca/etd/693.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Butosi C. Social Net-working: Exploring the Political Economy of the Online Social Network Industry. [Thesis]. University of Western Ontario; 2012. Available from: https://ir.lib.uwo.ca/etd/693

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

21. Kirley, Elizabeth Anne. Reputational Privacy and the Internet: A Matter for Law?.

Degree: PhD, Law, 2015, York University

 Reputation - we all have one. We do not completely comprehend its workings and are mostly unaware of its import until it is gone. When… (more)

Subjects/Keywords: International law; Web studies; Information technology; Comparative law; Internet law; Social media; European Union; European Union Regulation on Data Protection; Do Not Track policies; Data minimization; Internet of Things; Google Spain; Right to be forgotten; le droit a l'oubli; Max Mosley; Facebook; LinkedIn; Anonymization; Deanonymization; Disinhibition; Anonymity; New media; Digital speech; Reputation; Memory; Privacy; Criminal defamation; Defamation; Breach of confidentiality; Big data; Cookies; Choice of law; Insult laws; Opinion

…and can involve even further invasions of the victim’s privacy. Such efforts are, on balance… …or their lack of privacy mechanisms for their online accounts. Options for self-help are… …online breaches of our reputational privacy. I devise that term to define a space we envision… …consent that impede our privacy. While recognizing that not all reputational impacts are related… …to privacy breaches, the latter are considered by this study because they put our private… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kirley, E. A. (2015). Reputational Privacy and the Internet: A Matter for Law?. (Doctoral Dissertation). York University. Retrieved from http://hdl.handle.net/10315/30120

Chicago Manual of Style (16th Edition):

Kirley, Elizabeth Anne. “Reputational Privacy and the Internet: A Matter for Law?.” 2015. Doctoral Dissertation, York University. Accessed September 25, 2020. http://hdl.handle.net/10315/30120.

MLA Handbook (7th Edition):

Kirley, Elizabeth Anne. “Reputational Privacy and the Internet: A Matter for Law?.” 2015. Web. 25 Sep 2020.

Vancouver:

Kirley EA. Reputational Privacy and the Internet: A Matter for Law?. [Internet] [Doctoral dissertation]. York University; 2015. [cited 2020 Sep 25]. Available from: http://hdl.handle.net/10315/30120.

Council of Science Editors:

Kirley EA. Reputational Privacy and the Internet: A Matter for Law?. [Doctoral Dissertation]. York University; 2015. Available from: http://hdl.handle.net/10315/30120

.