Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Privacy

Handbook of Research on ICTs for Human-Centered Healthcare and Social Care Services
The user act of seclude the information about himself and thereby reveal the information selectively.
Published in Chapter:
Privacy and Data Protection towards Elderly Healthcare
Ângelo Costa (University of Minho, Portugal), Francisco Andrade (University of Minho, Portugal), and Paulo Novais (University of Minho, Portugal)
DOI: 10.4018/978-1-4666-3986-7.ch017
Abstract
Developed societies are registering a dramatic change in terms of population evolution, the most important fact being the ageing population. An alarming fact is that the birth-rate is dropping very fast, inverting the ageing pyramid that used to have a higher incidence on the young population, now having a higher incidence in the older population. In the quest to provide answers to some problems the elderly population has, applications and projects arise from the Ambient Assisted Living area, providing services that help the user in his daily life, providing the needed help and trying to be as non-invasive as possible. The fact is that these systems operate optimally by using information about the user, assisting him according to his preferences. The data gathered for such events is highly personal and sensitive. This can cause a loss of privacy and affect personal data. In this chapter, the authors present an Ambient Assisted Living project towards assistance to an elderly population. The problems and possible solutions in the legal area towards loss of privacy and personal data and information use is also covered.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Concept of Mobile Agent-Based Electronic Marketplace – Safety Measures
To provide the necessary services, mechanisms and protocols for making legitimate agents and users anonymous, whilst ensuring that illegitimate agents and users are eliminated and/or exposed.
Full Text Chapter Download: US $37.50 Add to Cart
Chinese Smartphone Market Progress and Prospects
The state or condition of being free from being observed or disturbed by other people.
Full Text Chapter Download: US $37.50 Add to Cart
Futuristic Chatbots: Expectations and Directions for Accomplishment
Privacy focuses on preserving user data, establishing ethical data handling procedures, and maintaining users' confidentiality throughout AI interactions.
Full Text Chapter Download: US $37.50 Add to Cart
Role of Privacy and Trust in Mobile Business Social Networks
is the right of an individual to be secure from unauthorized access, disclosure and being able to control information about oneself that is contained in different documents/files, databases or Web-pages.
Full Text Chapter Download: US $37.50 Add to Cart
Technology and Terror
Right of peoples and their group to keep their own information from others.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Trustworthy Networks, Authentication, Privacy, and Security Models
Privacy is the fact of protecting personal data and information related to a communication entity to be collected from other entities that are not authorized. Privacy is sometimes related to anonymity and can be seen as an aspect of security.
Full Text Chapter Download: US $37.50 Add to Cart
Learning Analytics in the Monitoring of Learning Processes: 3D Educational Collaborative Virtual Environments
Related to with students because the aim is to analyse the information extracted in their learning process.
Full Text Chapter Download: US $37.50 Add to Cart
Technology Assessment
The ability of individuals or groups to keep information about themselves in a defined space and to prevent to make them visible to a broader audience. Privacy sometimes conflicts with security issues.
Full Text Chapter Download: US $37.50 Add to Cart
Multi-Perspectives of Cloud Computing Service Adoption Quality and Risks in Higher Education
Full Text Chapter Download: US $37.50 Add to Cart
Trust in an Enterprise World: A Survey
The claim of individuals, groups, or institutions to determine for themselves when, how and to what extent information about them is communicated to others.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy and Anonymity in Mobile Ad Hoc Networks
The right to informational self-determination, that is, individuals must be able to determine for themselves when, how, to what extent, and for what purpose personal information about them is communicated to others.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
The Evolutionary Path of Legal Responses to Cybercrime Threats Over the Last Decade
Refers to the general belief that certain items such as written materials, oral communications, and matters having to do with personal relationships are confidential and should remain so unless they are voluntarily divulged.
Full Text Chapter Download: US $37.50 Add to Cart
A New Approach in Cloud Computing User Authentication
It is the right to be free from secret surveillance and to determine whether, when, how, and to whom, one's personal or organizational information is to be revealed.
Full Text Chapter Download: US $37.50 Add to Cart
Trustworthy Artificial Intelligence and Machine Learning: Implications on Users' Security and Privacy Perceptions
Can be defined as the level of concern a consumer has regarding a potential infringement of their right to prohibit sharing personal information with third parties.
Full Text Chapter Download: US $37.50 Add to Cart
Effective, Privacy-First Display Advertising: Ambient Intelligence for Online Ambient Environments
Full Text Chapter Download: US $37.50 Add to Cart
Trustworthy Computing
The ability of the software product to keep private all confidential data by the users.
Full Text Chapter Download: US $37.50 Add to Cart
Peer-to-Peer Social Networks
The right to be secluded from the presence or view of others.
Full Text Chapter Download: US $37.50 Add to Cart
A P2P Architecture for Social Networking
The right to be secluded from the presence or view of others.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy-Conscious Data Mashup: Concepts, Challenges and Directions
Privacy can be defined as the right of individuals to determine for themselves when , how and to what extent information about them is communicated to others.
Full Text Chapter Download: US $37.50 Add to Cart
Adapting to Virtual Third-Space Language Learning Futures
“The interest that individuals have in sustaining a ‘personal space,’ free from interference by other people and organizations” (Clarke, 2006).
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Employee Privacy in Virtual Workplaces
Traditionally, the notion that one has the right to be left alone. Recognized under the Fourth Amendment to the U.S. Constitution as protecting individuals from unreasonable searches and seizures by the government. In the private sector, protects against unreasonable intrusions upon seclusion (see above).
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Privacy and Security Challenges in the Internet of Things
Ensuring privacy involves citizens having control over existing information about themselves and exercising this control in a consistent manner with their personal interests and values.
Full Text Chapter Download: US $37.50 Add to Cart
Social Networking and Privacy: A Contradiction?
Privacy is everyone’s right to determine what information about himself is communicated to others or used for which purpose.
Full Text Chapter Download: US $37.50 Add to Cart
The Emergence of Biobanks: Between Ethics, Risks, and Governance
Right to control who, when, how and to what extent personal information is communicated to others.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy Implications and Protection in the New Ubiquitous Web Environment
The ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively – the “right to be left alone”.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity: What Matters to Consumers – An Exploratory Study
Privacy is defined as a two-dimensional construct, involving physical space and information and is contingent on consumers and their individual experience.
Full Text Chapter Download: US $37.50 Add to Cart
Web Usage Mining and the Challenge of Big Data: A Review of Emerging Tools and Techniques
Refers to users’ concerns to share personal information and reveal their browsing habits. Users want that the information they share with the website will not be shared with a third-party.
Full Text Chapter Download: US $37.50 Add to Cart
Responsibilities and Liabilities with Respect to Catastrophes
Full Text Chapter Download: US $37.50 Add to Cart
Big Data Security: Challenges, Recommendations and Solutions
Privacy is the ability of individuals to seclude information about themselves. In other words, they selectively control its dissemination.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Does Interface Design Influence Consumers' Security Perception?
The state of being free from unwanted intrusions of others in one’s personal information.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
E-Government Service Adoption and the Impact of Privacy and Trust
A belief that personal information entered into an information system will remain private and secure.
Full Text Chapter Download: US $37.50 Add to Cart
Facial Recognition Technology: Ethical and Legal Implications
A personal right to keep one's personal matters, information, and relationships secret (Cambridge University Press, 2022b).
Full Text Chapter Download: US $37.50 Add to Cart
Privacy, Societal, and Ethical Concerns in Security
Quality or state of being apart from company of observation; freedom from unauthorized intrusion.
Full Text Chapter Download: US $37.50 Add to Cart
A Routine Activity Theory-Based Framework for Combating Cybercrime
The ability of an individual or group to seclude information about themselves or selectively reveal their information.
Full Text Chapter Download: US $37.50 Add to Cart
A Review of Security Challenges in Cloud Storage of Big Data
Privacy involves keeping the user data and integrity safe from external attack.
Full Text Chapter Download: US $37.50 Add to Cart
Well-Being and Home Environments
Desired degrees of control over contact with others.
Full Text Chapter Download: US $37.50 Add to Cart
Oblivion Is Full of Memory: Legal Issues Raised in the EU by the Right to Erasure
Broader than intimacy, it includes a set of more extended and global facets of the personality that isolated may lack intrinsic meaning but coherently linked cast a portrait of the personality that the individual has the right to keep reserved.
Full Text Chapter Download: US $37.50 Add to Cart
Bridging Provider-Centric and User-Centric Social Networks
The ability of a social network user in keeping control over who accesses which part of his information, including the social network’s provider, if any. Typically, the provider gives the user means to prevent other users from accessing his information. However, the user has no guarantees against abuse by the provider itself, which has access to every piece of information the user supplies. Privacy policies usually exist, but the user has no way to enforce compliance by the provider.
Full Text Chapter Download: US $37.50 Add to Cart
Security Issues in Cloud Computing
is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share common themes. When something is private to a person , it usually means there is something to them inherently special or sensitive. The domain of privacy partially overlaps security, including for instance the concepts of appropriate use, as well as protection of information. Privacy may also take the form of bodily integrity.
Full Text Chapter Download: US $37.50 Add to Cart
Supporting Participation in Online Social Networks
The right to be secluded from the presence or view of others.
Full Text Chapter Download: US $37.50 Add to Cart
Optimizing Knowledge Management During Crises
Personal information, both identifiable and health related, is kept secure and only shared with those the patient provides permission to view and use.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Privacy and the Identity Gap in Socio-Technical Systems
Liberal political theory recognizes this capacity in the rational individual and tends to advocate the protection of the individual’s ability to use this capacity. From this is derived the notion that privacy is one way in which the individual could be protected from becoming subject to manipulation by others. An important point is that the concept of privacy in this chapter is almost always informational privacy or privacy as it relates to information disclosed by an individual. How the concept of informational privacy is derived will be crucial to understanding the way in which other central concepts are used.
Full Text Chapter Download: US $37.50 Add to Cart
Security in Semantic Interoperation
Portions of a document can be set to private, so that they are invisible during the interoperation process.
Full Text Chapter Download: US $37.50 Add to Cart
Ethical Conflicts Regarding Technical Assistance Systems for the Elderly
the fundamental right of individuals to be free from intrusion or interference by others including the right to control information about oneself. Discussions in ethics and law together with the term privacy consider questions of confidentiality (the obligation to safeguard entrusted information) and protection of personal data (informational self-determination). The European-continental understanding (which often relates to the ethical principle of dignity) diverges from the North American understanding, largely.
Full Text Chapter Download: US $37.50 Add to Cart
Information Disclosure on Social Networking Sites: An Exploratory Survey of Factors Impacting User Behaviour on Facebook
The state of being secluded from unwarranted intrusion into one’s private affairs and not disturbed by other parties.
Full Text Chapter Download: US $37.50 Add to Cart
Data Protection and Data Security Regarding Grid Computing in Biomedical Research
The ability and/or right to protect the personal secrets; it extends to the ability and/or right to prevent invasions of the personal space (the exact definition varies from one country to another). Privacy is applicable to natural persons (human beings) but not to legal persons (such as corporations).
Full Text Chapter Download: US $37.50 Add to Cart
IoT-Enabled 5G Networks for Secure Communication
Full Text Chapter Download: US $37.50 Add to Cart
Towards Privacy Awareness in Future Internet Technologies
The ability to choose what data to expose to others and what data to keep from others.
Full Text Chapter Download: US $37.50 Add to Cart
Opportunities and Challenges of Social Media to the Islamic Banks in Indonesia
is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively.
Full Text Chapter Download: US $37.50 Add to Cart
Patient Privacy and Security in E-Health
The state of being free from being observed or disturbed by other people.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy Preservation in Information Systems
The requirement for an individual or group to shield private or personal information about them from being revealed.
Full Text Chapter Download: US $37.50 Add to Cart
Avoiding Pitfalls in Policy-Based Privacy Management
Privacy refers to the ability of individuals to control the collection, use, retention, and distribution of information about themselves.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
RFIDs and the Changing Marketplace
Area of information control involved with the right to be left alone; involved with the protections from intrusion and information gathering by others; an individuals’ ability to personally control information about themselves.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain in Smart Healthcare Systems: Hope or Despair?
Full Text Chapter Download: US $37.50 Add to Cart
Is “Privacy” a Means to Protect the Competition or Advance Objectives of Innovation and Consumer Welfare?
A right recognized in the Charter of Fundamental Rights (2010) AU107: The in-text citation "Fundamental Rights (2010)" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. , and the GDPR. For many, it is a dynamic rights. The latest practice of the EU Member States indicated that privacy could be potentially used as expanding the theorems of harms.
Full Text Chapter Download: US $37.50 Add to Cart
Trust in Virtual Communities
A set of legal requirements and good practices with regard to the handling of personal data
Full Text Chapter Download: US $37.50 Add to Cart
The Social Impact of Artificial Intelligence
It is the personal information and data of individuals that no one has the right to know about without the permission of the concerned person him/herself.
Full Text Chapter Download: US $37.50 Add to Cart
Marketing Ethics: Digital Transformation and Privacy Ethics
It is the special informations that an individual wants to keep secret from others.
Full Text Chapter Download: US $37.50 Add to Cart
Emerging Role of Technology in Health Education for Youth
Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy-Preserving Data Mining
Individuals or groups’ right to control the flow of sensitive information about themselves.
Full Text Chapter Download: US $37.50 Add to Cart
AIoT Concepts and Integration: Exploring Customer Interaction, Ethics, Policy, and Privacy
It refers to safeguarding individuals' personal information from unwanted access or exposure, focusing on controlling one's data and guaranteeing confidentiality in different settings, such as technology and business.
Full Text Chapter Download: US $37.50 Add to Cart
Improving Patient Care With Telemedicine Technology
Medical privacy or health privacy is the practice of maintaining the security and confidentiality of patient records. It involves both the conversational discretion of health care providers and the security of medical records.
Full Text Chapter Download: US $37.50 Add to Cart
Security and Privacy on Personalized Multi-Agent System
Keeping information secret from all but those who are authorized to see it. The ability of individual to control the access others have to personal information about them and the expectation of anonymity, fairness and confidentiality.
Full Text Chapter Download: US $37.50 Add to Cart
Are We Followed in the Digital World?
Privacy is the sum of all the feelings and thoughts that one does not want to share with others in their living space and private life. In democratic societies, all individuals are given the right to Privacy. The person can share his/her information with others only at his/her request.
Full Text Chapter Download: US $37.50 Add to Cart
Spyware
The ability of an individual or group to not disclose information about themselves.
Published in Chapter: Spyware; From: Handbook of Research on Technoethics
Full Text Chapter Download: US $37.50 Add to Cart
E-Technology Challenges to Information Privacy
The claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others ( Westin, 1967 ).
Full Text Chapter Download: US $37.50 Add to Cart
Technology Assessment of Information and Communication Technologies
The ability of individuals or groups to control the use of personal information about themselves or to keep such information in a defined space.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Privacy Compliance Requirements in Workflow Environments
The claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.
Full Text Chapter Download: US $37.50 Add to Cart
Evolution of the Health Record as a Communication Tool to Support Patient Safety
The right of individuals for their information to be kept secure and confidential. Information is only disclosed when appropriate to do so such as providing ongoing care or when lawfully required.
Full Text Chapter Download: US $37.50 Add to Cart
E-Business Applications by the Food, Agro, and Marine Segments of Micro and Small Enterprises (MSEs)
The ability of an individual or organisation to isolate themselves or information about themselves and hence express themselves selectively is referred to as privacy.
Full Text Chapter Download: US $37.50 Add to Cart
Ambiguities in the Privacy Policies of Common Health and Fitness Apps
An individual's right to control how and to what extent information about him or her may be shared and acted upon by others.
Full Text Chapter Download: US $37.50 Add to Cart
Theory and Application of the Privacy Regulation Model
One of the most frequently used definitions of privacy by Alan Westin (1970) states: “Privacy is the claim of individuals to determine for themselves when, how and to what extent information about themselves is communicated to others.” This definition is applicable to many information technological contexts. One of the key elements of privacy is its dialectic nature.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy and Accessibility of Liberation Movement Archives of South Africa
This is archives materials restricted to access by certain individuals in organizations.
Full Text Chapter Download: US $37.50 Add to Cart
Making Cities Smarter: IoT and SDN Applications, Challenges, and Future Trends
Ability to hide data, information and express oneself selectively depending on the situation and the location.
Full Text Chapter Download: US $37.50 Add to Cart
Shaping Regulation in the Australian Mobile Industry
Privacy is the right of individuals to be left alone and to exercise control over one’s personal information. Privacy includes information privacy which represents the way in which organizations handle an individual’s personal information.
Full Text Chapter Download: US $37.50 Add to Cart
Trust Concerns of the Customers in E-Commerce Market Space by Indian Customers
Ability of an individual/group of people to be able to hide significant information about themselves while revealing minimal and selective information required.
Full Text Chapter Download: US $37.50 Add to Cart
The Ambivalences of Smart Cities
When defining privacy, it is necessary to differentiate what is privacy in general from the concept that privacy has acquired in the digital universe. In this, privacy refers to informational privacy and is defined as a universal right of network users’ data protection so that there is no damage to private life, honor or other damages involving legal issues.
Full Text Chapter Download: US $37.50 Add to Cart
Is Somebody Spying on Us?: Social Media Users' Privacy Awareness
Privacy is a concept that varies from person to person and in which individuals are not to specify its borders. Rather it is determined by socio-cultural sphere as well.
Full Text Chapter Download: US $37.50 Add to Cart
Ethical Ambiguities in the Privacy Policies of Mobile Health and Fitness Applications
An individual's right to control how and to what extent information about him or her may be shared and acted upon by others.
Full Text Chapter Download: US $37.50 Add to Cart
A Utility Theory of Privacy and Information Sharing
Is a core human value as people choose what information to share with whom and like to protect some parts of their selves in secrecy. Protecting people’s privacy is a codified virtue around the world to uphold the individual’s dignity.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy in the Digital World
The right of individuals to control or influence what information related to them may be collected and stored, by whom, and to whom that information may be disclosed.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy Concerns for Web Logging Data
“The claim of an individual to determine what information about himself or herself should be known to others.” (Westin, 2003).
Full Text Chapter Download: US $37.50 Add to Cart
Gauging the Scale of Intertwinement: Juggling Between the Use of Biometric Data and Right to Privacy
It is s state of controlling your own information and space and one has the absolute right over the same.
Full Text Chapter Download: US $37.50 Add to Cart
Tailoring Privacy-Aware Trustworthy Cooperating Smart Spaces for University Environments
The right of individuals to protect their ability to selectively reveal information about themselves so as to negotiate social relationships most advantageous to them.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy Concerns in the VR and AR Applications in Creative Cultural Industries: A Text Mining Study
Privacy is a term that describe people’s right to be let alone, or their freedom from outside interference or intrusion without their prior consent.
Full Text Chapter Download: US $37.50 Add to Cart
Big Data Security Management
An individual’s right to safeguard personal information in accordance with law and regulations.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy and Intimacy Concerns in Digital Marketing: Literature Review
A perception of selective control over a set of information that a person considers his private life and has the right to protect and control by choosing with whom and how he shares it.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Security and Privacy Issues in the Internet of Things
It is the ability to control who can access the data on the system. Only the authorized users must be able to access the data.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy, Trust, and Business Ethics for Mobile Business Social Networks
The right of an individual to be secure from unauthorized access, disclosure and being able to control information about oneself that is contained in different documents/files, databases or Web-pages.
Full Text Chapter Download: US $37.50 Add to Cart
Ethics of Social Media Research
Refers to the right to be let alone, or freedom from interference or intrusion.
Full Text Chapter Download: US $37.50 Add to Cart
Secure Routing with Reputation in MANET
The ability of keeping secret someone’s identity, resources, or actions. It is realized by anonymity and pseudonymity.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy Enhancing Technologies in Biometrics
Right of the individual to make decisions, to have his own personal spaces, to forbid further communication of observable events, and to limit access to personal information
Full Text Chapter Download: US $37.50 Add to Cart
M-Learning: Exploring the Use of Mobile Devices and Social Media
The protection of personal data and information from unauthorized collection and use
Full Text Chapter Download: US $37.50 Add to Cart
Security and Privacy Issues in IoT: A Platform for Fog Computing
Various techniques used to protect private data.
Full Text Chapter Download: US $37.50 Add to Cart
Spotted: Connecting People, Locations, and Real-World Events in a Cellular Network
The protection of sensitive personal information that customers provide during the communications transaction.
Full Text Chapter Download: US $37.50 Add to Cart
DNA Databases for Criminal Investigation
As a legal concept is a personnel right inherent to human dignity. Includes intimacy, private life, honor people. Consequently individuals have the right to decide which personal information is kept under his sole control, as they have the right to communicate to whom, when, where and under what conditions personal information should be disclosed.
Full Text Chapter Download: US $37.50 Add to Cart
Hexa-Dimension Metric, Ethical Matrix, and Cybersecurity
Is not the same as being alone; it is about one’s “zone of inaccessibility” or “right to be left alone”. Intruding into that zone is a violation of privacy and ignoring that right is an act of bullying, both are subject criminal charges.
Full Text Chapter Download: US $37.50 Add to Cart
An Interoperable Cross-Context Architecture to Manage Distributed Personal E-Health Information
Privacy is the right of an entity - in this context usually a natural person - to decide when and on what terms its attributes should be revealed. In an IDM context, privacy is mostly used as a synonym of informational privacy, i.e., the interest of a natural person to control, or at least significantly influence the handling of data about themselves, also taking into account the nature of the applicable attributes and the entity in charge of data management.
Full Text Chapter Download: US $37.50 Add to Cart
Advances in Information, Security, Privacy & Ethics: Use of Cloud Computing For Education
The ability to have personal information used appropriately and without ongoing observation.
Full Text Chapter Download: US $37.50 Add to Cart
Opportunities and Challenges for Electronic Health Record: Concepts, Costs, Benefits, and Regulation
Means a personnel right inherent to human dignity. Includes intimacy, private life and honor people. Consequently individuals have the right to informational self-determination, that is, individuals have the right to determine and control the use of your personal data.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy-Aware Access Control
The claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.
Full Text Chapter Download: US $37.50 Add to Cart
Middleware for Preserving Privacy in Big Data
The right of an individual to decide on the time (when), the way (how), and the extent to which information about them can be shared/communicated with others. The notion of privacy varies among different countries, cultures, and jurisdictions.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy-Preserving Estimation
Privacy is the desire of individuals to control their personal information. Generally, in the SDL literature, it relates to the identity of an individual, while confidentiality relates to specific information about the individual (such as salary).
Full Text Chapter Download: US $37.50 Add to Cart
Exploring Mobile Users' Daily Experiences in the United States and Taiwan: An Experience Sampling Method to Study Privacy Concerns in Location-Based Marketing Applications
Privacy is a term that describe people’s right to be let alone, or their freedom from outside interference or intrusion without their prior consent from any noon-profit, profit-making, or government entities.
Full Text Chapter Download: US $37.50 Add to Cart
Anonymity and Pseudonymity in Data-Driven Science
The state in which an individual is able to hold back information so that it will not leak into public.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Ethical Considerations for Artificial Intelligence in Educational Assessments
This ethics principle relates to the protection of data subjects against injurious effects from the use of personal information applied in AI systems, without unduly affecting regulatory compliance tied to privacy and restricting AI development.
Full Text Chapter Download: US $37.50 Add to Cart
Which Rights for Which Subjects? Genetic Confidentiality and Privacy in the Post-Genomic Era
As fundamental human rights, encompasses both the right for the individual to control some aspects of his personality he projects on the world, and a right to freely develop his personality without excessive interference by the State or by others in matters that are of his exclusive concern.
Full Text Chapter Download: US $37.50 Add to Cart
Strategic Planning for Cloud Computing Adoption in STEM Education: Finding Best Practice Solutions
The ability of an individual or group to control or conceal information about themselves.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Crimes: Types, Sizes, Defence Mechanism, and Risk Mitigation
This is the right of individuals to keep personal information private. Regulation, law and constitution regulate the access to the data collected by government about citizens. The citizen also has the right to know about the information and data collected by the government about the citizen.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Blockchains for Use in Construction and Engineering Projects
Is required by the chain transactors to conceal their identities on the network. While members of the network may examine the transactions, the transactions can’t be linked to the transactor without special privilege. Data as well as transaction details can also be held privately.
Full Text Chapter Download: US $37.50 Add to Cart
Individual Privacy Should Be an Institutional Value: Socio-Technical Design of University Data Collection Systems
Data privacy pertains to safeguarding personal information against illegal or improper utilization. Online survey anonymity exemplifies this phenomenon.
Full Text Chapter Download: US $37.50 Add to Cart
Agent-Based Social Networks
The right to be secluded from the presence or view of others.
Full Text Chapter Download: US $37.50 Add to Cart
Voyeurism in Social Networks and Changing the Perception of Privacy on the Example of Instagram
Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share common themes. When something is private to a person, it usually means that something is inherently special or sensitive to them. The domain of privacy partially overlaps with security (confidentiality), which can include the concepts of appropriate use, as well as protection of information. Privacy may also take the form of bodily integrity. Privacy may be voluntarily sacrificed, normally in exchange for perceived benefits and very often with specific dangers and losses, although this is a very strategic view of human relationships.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy, Contingency, Identity, and the Group
According to the Merriam-Webster online dictionary, privacy is defined as “the quality or state of being apart from company or observation.” One feels that privacy is needed when one feels that there is something about oneself that needs to be kept away from the eyes of others. The chapter develops the notion of ‘group privacy,’ which is the privacy belonging to a group of individuals, such as ethnic groups or close communities or the family, rather than to particular individuals.
Full Text Chapter Download: US $37.50 Add to Cart
Dataveillance in the Workplace: Privacy Threat or Market Imperative?
Full Text Chapter Download: US $37.50 Add to Cart
Exploring the Intersection of Digital Marketing and Retail: Challenges and Opportunities in AI, Privacy, and Customer Experience
The ability to control and protect personal information from being disclosed or misused by unauthorized parties.
Full Text Chapter Download: US $37.50 Add to Cart
A Safer Place for Women: Online Education
A condition where one’s identity is concealed from others.
Full Text Chapter Download: US $37.50 Add to Cart
The Gatekeepers of Cyberspace: Surveillance, Control, and Internet Regulation in Brazil
Full Text Chapter Download: US $37.50 Add to Cart
Privacy Issues in Public Web Sites
The claim of individuals, groups or institutions to determine for themselves when, how and to what extent information about them is communicated to others.
Full Text Chapter Download: US $37.50 Add to Cart
Moving Towards Internet of Behaviors: Transforming Business Models With Blockchain
The status or situation where one's personal information, activities, or confidential matters are shielded from unauthorized intrusion, surveillance, or disclosure.
Full Text Chapter Download: US $37.50 Add to Cart
Secure Architecture for Cloud Environment
The ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively.
Full Text Chapter Download: US $37.50 Add to Cart
Security Policy Issues in Internet Banking in Malaysia
The ability to prevent the unlawful or unethical use of information or data.
Full Text Chapter Download: US $37.50 Add to Cart
The Ethical Consideration of Using Artificial Intelligence (AI) in Medicine
Fundamentally, it is about safeguards against unauthorized access and information collecting. It has typically been characterized in terms of people's capacity to exercise personal control over information about themselves.
Full Text Chapter Download: US $37.50 Add to Cart
Impact of Information Technology on Patient Confidentiality Rights: A Perspective
The right of individuals, in the exercise of their autonomy, to control access to their private personal information by others.
Full Text Chapter Download: US $37.50 Add to Cart
Understanding Adverse Effects of E-Commerce
Privacy is defined as an individual’s right to be left alone, free from
Full Text Chapter Download: US $37.50 Add to Cart
Social Media as Mirror of Society
Refers to the right to be let alone, or freedom from interference or intrusion.
Full Text Chapter Download: US $37.50 Add to Cart
Internet of Things: Architecture, Challenges, and Future Directions
It ensures that IoT system will follow the rules and policies of privacy and allows the users to oversight the important information and data.
Full Text Chapter Download: US $37.50 Add to Cart
Ethics in Predictive Learning Analytics: An Empirical Case Study on Students Perceptions in a Northern Irish University
Generally, privacy refers to a living concept made out of continuous personal boundary negotiations with the surrounding ethical environment; it is an intrinsic part of a person's identity and integrity. In the context of LA, privacy is defined as the regulation of how personal digital information is being observed by the self or distributed to other observers.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR