Results 1 - 10
of
1,082
Do Privacy Laws Affect the Location Decisions of Internet Firms? Evidence for Privacy
"... privacy laws affect the location decisions of internet firms? evidence for privacy havens ..."
Abstract
- Add to MetaCart
privacy laws affect the location decisions of internet firms? evidence for privacy havens
Impacts of Privacy Laws and Regulations on Personalized Systems
"... Since personalized systems collect and utilize personal data to individualize their interactions with each user, privacy issues arise. Prior research has studied impacts of users’ privacy preferences on personalized systems. In this paper, we focus on legal privacy requirements such as privacy laws ..."
Abstract
- Add to MetaCart
Since personalized systems collect and utilize personal data to individualize their interactions with each user, privacy issues arise. Prior research has studied impacts of users’ privacy preferences on personalized systems. In this paper, we focus on legal privacy requirements such as privacy laws
Impacts of Privacy Laws and Regulations on Personalized Systems
"... Since personalized systems collect and utilize personal data to individualize their interactions with each user, privacy issues arise. Prior research has studied impacts of users’ privacy preferences on personalized systems. In this paper, we focus on legal privacy requirements such as privacy laws ..."
Abstract
- Add to MetaCart
Since personalized systems collect and utilize personal data to individualize their interactions with each user, privacy issues arise. Prior research has studied impacts of users’ privacy preferences on personalized systems. In this paper, we focus on legal privacy requirements such as privacy laws
Experiences in the Logical Specification of the HIPAA and GLBA Privacy Laws
"... Despite the wide array of frameworks proposed for the formal specification and analysis of privacy laws, there has been comparatively little work on expressing large fragments of actual privacy laws in these frameworks. We attempt to bridge this gap by giving complete logical formalizations of the t ..."
Abstract
-
Cited by 17 (4 self)
- Add to MetaCart
Despite the wide array of frameworks proposed for the formal specification and analysis of privacy laws, there has been comparatively little work on expressing large fragments of actual privacy laws in these frameworks. We attempt to bridge this gap by giving complete logical formalizations
Inferential or Differential: Privacy Laws Dictate
"... So far, privacy models follow two paradigms. The first paradigm, termed inferential privacy in this paper, focuses on the risk due to statistical inference of sensitive information about a target record from other records in the database. The second paradigm, known as differential privacy, focuses o ..."
Abstract
- Add to MetaCart
So far, privacy models follow two paradigms. The first paradigm, termed inferential privacy in this paper, focuses on the risk due to statistical inference of sensitive information about a target record from other records in the database. The second paradigm, known as differential privacy, focuses
‘The gentlest of predations’: Photography and privacy law
, 2004
"... ‘The gentlest of predations’: Photography and privacy law In December 2004, Peter James Mackenzie, a labourer from the beachside suburb of Coogee in Sydney, pleaded guilty before a magistrate to a charge of offensive behaviour for photographing women who were bathing topless at the beach without the ..."
Abstract
- Add to MetaCart
‘The gentlest of predations’: Photography and privacy law In December 2004, Peter James Mackenzie, a labourer from the beachside suburb of Coogee in Sydney, pleaded guilty before a magistrate to a charge of offensive behaviour for photographing women who were bathing topless at the beach without
THE CONCEPT OF DATA PRIVACY LAW AND ITS APPLICATION TO THE INTERNET
"... Fellowship (project number FT120100583). The views expressed herein are those of the author and are not necessarily those of the Australian Research Council. Received:18 de junio de 2014 Accepted: 28 de junio de 2014 SUMARIO ..."
Abstract
- Add to MetaCart
Fellowship (project number FT120100583). The views expressed herein are those of the author and are not necessarily those of the Australian Research Council. Received:18 de junio de 2014 Accepted: 28 de junio de 2014 SUMARIO
protection. That is, Comprehensive Privacy Laws, Sectoral Privacy Laws, Privacy Self-Regulation, and
"... Abstract:- There are numerous information privacy approaches based on the four major models of privacy ..."
Abstract
- Add to MetaCart
Abstract:- There are numerous information privacy approaches based on the four major models of privacy
Altered States: State Health Privacy Laws and the Impact of the Federal
- Health Privacy Rule, 2 Yale J. of Health Policy, Law, and Ethics 325
, 2002
"... Medical records contain some of the most intimate details about an individual that can be found in a single place. Health information privacy is based on the principle that individuals should be able to exercise control over this intimate information, both by having full knowledge about what informa ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
the recent promulgation of the Federal Health Privacy Rule,' states have been the primary regulators of health information through their constitutions, common law, and statutory provisions. Although all three of these legal sources remain important, recent focus has been on the enactment of detailed
Legal Concepts Meet Technology: A 50-State Survey of Privacy Laws
"... Informational privacy consists of the ability to control how others use our personal information. Over the past several decades, we have lost a significant degree of control as a result of advances in information processing technology and the rise of the Internet. We pose two questions: (1) What leg ..."
Abstract
- Add to MetaCart
legal concepts of privacy and privacy protection have developed in response to changing technology? (2) Are these responses adequate? To answer these questions, we provide a detailed survey and analysis of current US state privacy and security laws, which illustrate the limits of current practical
Results 1 - 10
of
1,082