Seven Types of Privacy

نویسندگان

  • Rachel L. Finn
  • David Wright
  • Michael Friedewald
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

Adjustment Mechanisms of Privacy in extroverted homes of Gilan (Case Study: Rural Homes)

Privacy as a human need, is the result of adjustment of the interaction between human environment, which under the influence of current patterns of activity and cultural background, leads to a favorable atmosphere. Adjusting the privacy in Iranian homes is one of the fundamental features of Iranian architecture, which has had a profound effect on the formation of the spatial organization and th...

متن کامل

بازشناسی تأثیر شغل و سطح اجتماعی مالکان مسلمان خانه‌های قجری بوشهر در شکل‌گیری سلسله‌مراتب محرمیّت فضای ورودی

Privacy is one of the basic principles of Islamic architecture. Islamic texts like Quran and Hadiths indicate that privacy is an important subject in the house which provides peace for the family. The houses that are built in Islamic era represent this principle, but unfortunately, this important architectural principle is nowadays ignored in houses. Therefore, reviewing the privacy principle i...

متن کامل

Lexical Similarity of Information Type Hypernyms, Meronyms and Synonyms in Privacy Policies

Privacy policies are used to communicate company data practices to consumers and must be accurate and comprehensive. Each policy author is free to use their own nomenclature when describing data practices, which leads to different ways in which similar information types are described across policies. A formal ontology can help policy authors, users and regulators consistently check how data pra...

متن کامل

Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes

This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a classification of threat models in 4G and 5G cellular networks in four categories, including, attacks again...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013