Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Privacy" wg kryterium: Temat


Tytuł:
Prywatność w pracy
Privacy at Work
Autorzy:
Chrabonszczewski, Maciej
Powiązania:
https://bibliotekanauki.pl/articles/469102.pdf
Data publikacji:
2009
Wydawca:
Polska Akademia Nauk. Instytut Filozofii i Socjologii PAN
Tematy:
privacy
privacy right
monitoring
information technology
code ethics
invasion of privacy
Opis:
The purpose of the paper is to explore the conflict between the employee’s privacy protection and the employer’s interests and to show how this conflict can be soften. In the first part of the paper an essence of the conflict is presented. The second part is devoted to analysis of several spheres in which the employee’s privacy can be violated. Some ways to protect employee’s privacy by the codes of ethics and legal norms are regarded in the last part of the paper.
Źródło:
Prakseologia; 2009, 149; 205-239
0079-4872
Pojawia się w:
Prakseologia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Projekt stanowiska Sejmu w sprawie o sygn. akt K 13/13
The case concerning the application of the Human Rights Defender of 8 April 2013 (Ref. No. C 13/13), concerning the Act of 26 October 1982 on Upbringing in Sobriety and Counteracting Alcoholism
Autorzy:
Kaleta, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/12711937.pdf
Data publikacji:
2013
Wydawca:
Kancelaria Sejmu. Biuro Analiz Sejmowych
Tematy:
alcoholism
privacy policy
Privacy Rights
Constitutional Tribunal
Opis:
The case no. K 13/13 concerns the competence of the municipal committee on alcohol problems to take steps towards the ruling on the use of compulsory treatment for drug addiction treatment institution in relation to alcohol addicted persons. According to the author, the contested regulations are imprecise and – in particular – disproportionately interfere with the privacy of citizens.
Źródło:
Zeszyty Prawnicze BAS; 2013, 4(40); 273-293
1896-9852
2082-064X
Pojawia się w:
Zeszyty Prawnicze BAS
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Encryption for the masses? An analysis of PGP key usage
Autorzy:
Braun, Sven
Oostveen, Anne-Marie
Powiązania:
https://bibliotekanauki.pl/articles/691346.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
Email communication, Pretty Good Privacy, Privacy Enhancing Technologies, privacy self-management, encryption, usability
Opis:
Despite the rise of alternatives, email remains integral to technology-mediated communication. To protect email privacy the encryption software Pretty Good Privacy (PGP) has been considered the first choice for individuals since 1991. However, there is little scholarly insight into the characteristics and motivations for the people using PGP. We seek to shed light on social aspects of PGP: who is using PGP for encrypted email communication, how and why? By understanding those using the technology, questions on the motivations, usability, and the political dimension of communication encryption can be contextualized and cautiously generalized to provide input for the design of privacy-enhancing technologies. We have greatly extended the scale and scope of existing research by conducting a PGP key analysis on 4.27 million PGP public keys complemented by a survey filled out by former and current PGP users (N = 3,727). We show that a relatively small homogeneous population of mainly western, technically skilled, and moderately politically active males is using PGP for privacy self-management. Additionally, findings from existing research identifying poor usability and a lack of understanding of the underlying mechanisms of PGP can be confirmed.
Źródło:
Mediatization Studies; 2018, 2
2451-1188
Pojawia się w:
Mediatization Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Privacy Awareness Monitoring
Monitorowanie znaczenia prywatności
Autorzy:
Pańkowska, Małgorzata
Powiązania:
https://bibliotekanauki.pl/articles/1923772.pdf
Data publikacji:
2019-11-29
Wydawca:
Uniwersytet Warszawski. Wydawnictwo Naukowe Wydziału Zarządzania
Tematy:
privacy monitoring
privacy awareness
privacy aware monitoring
privacy paradox
social media
monitorowanie prywatności
znaczenie prywatności
monitorowanie znaczenia prywatności
paradoks prywatności
media społecznościowe
Opis:
In this paper, monitoring is perceived as a way to observe how people change their attitude towards privacy, particularly in the Internet circumstances. The paper aims to analyze privacy awareness and the privacy paradox. A systematic literature review provides the background on the privacy issues in the Internet environment. Beyond that, the paper covers a survey on the perception of new media by students from Poland, Bulgaria, and Colombia. The systematic literature review and the student privacy awareness survey revealed the relative value of privacy and its dependence on security. The discussion included in this paper concerns the privacy paradox, which can possibly be resolved by separation, exclusion, integration, and connection. The literature survey has allowed to present privacy in different aspects, i.e. protection modeling, tools and techniques. Researchers focus on protection systems, but they do not reveal reactions of users of the proposed solutions. On the other hand, proponents of the Internet communication encourage people to reveal personal data, without sufficient warning about the consequences of data exposure. The privacy paradox considerations are expected to be valuable for practitioners of the organizational design because they are to be asked to cope with the privacy ambidexterity and to develop the corresponding business processes. The important issue, i.e. the privacy paradox, is placed in contradictory concepts (i.e. freedom of exposure and protection from disclosure). The paradox is valuable as a prerequisite for further considerations on privacy in information management. In this paper, the privacy paradox is used as a strategy for theorizing on privacy.
W artykule monitorowanie jest postrzegane jako sposób obserwacji zmiany stosunku ludzi do prywatności, szczególnie w środowisku Internetu. Celem artykułu jest badanie znaczenia prywatności i analiza paradoksu prywatności. Systematyczny przegląd literatury zapewnia podstawową wiedzę na temat interpretacji prywatności w środowisku Internetu. Artykuł zawiera ponadto wyniki badania ankietowego na temat postrzegania nowych mediów przez studentów z Polski, Bułgarii i Kolumbii. Systematyczny przegląd literatury i badanie ankietowe znaczenia prywatności dla studentów ujawniły, że zagadnienia prywatności i bezpieczeństwa analizowane są jako współwystępujące. W artykule przedstawiono cztery sposoby traktowania tego współwystępowania: rozdzielenie, wykluczenie, integrację i dynamiczną równowagę. Przegląd literatury pozwolił na ujawnienie, że badania dotyczące prywatności de facto sprowadzają się do modelowania technik i narzędzi ochrony. Jednakże zwolennicy komunikacji internetowej zachęcają użytkowników do ujawniania danych osobowych w celu umożliwienia im korzystania z oprogramowania i informacji z Internetu. Najważniejszą kwestią jest przedstawienie paradoksu prywatności. Z jednej strony użytkownicy oczekują ochrony, z drugiej zaś – możliwości nieograniczonej swobody ekspozycji swoich danych osobowych.
Źródło:
Problemy Zarządzania; 2019, 5/2019 (85); 111-131
1644-9584
Pojawia się w:
Problemy Zarządzania
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Multi-Party Scheme for Privacy : Preserving Clustering
Autorzy:
Zhan, J.
Matwin, S.
Chang, L.
Powiązania:
https://bibliotekanauki.pl/articles/93043.pdf
Data publikacji:
2006
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
privacy
security
clustering
Opis:
Preserving data privacy while conducting data clustering among multiple parties is a demanding problem. We address this challenging problem in the following scenario: without disclosing their private data to each other, multiple parties, each having a private data set, want to collaboratively conduct k-medoids clustering. To tackle this problem, we develop secure protocols for multiple parties to achieve this dual goal. The solution is distributed, i.e., there is no central, trusted party having access to all the data. Instead, we define a protocol using homomorphic encryption and digital envelope techniques to exchange the data while keeping it private.
Źródło:
Studia Informatica : systems and information technology; 2006, 1(7); 217-232
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Surveillance capitalism and privacy. Knowledge and attitudes on surveillance capitalism and online institutional privacy protection practices among adolescents in Poland
Autorzy:
Ptaszek, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/691382.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
institutional privacy, surveillance capitalism, Polish adolescents, online privacy protection practices
Opis:
The purpose of the study was to determine the level of knowledge and attitudes towards surveillance capitalism and online institutional privacy protection practices among adolescents in Poland (aged 18–19), as well as to determine the relationships between these variables. Surveillance capitalism has emerged as a result of internet users’ activities and involves the collection of all data about these users by different entities for specific benefits without letting them know about it. The dominant role in surveillance capitalism is played by hi-tech corporations. The aim of the study was to verify whether knowledge, and what kind of knowledge, on surveillance capitalism translates into practices related to the protection of online institutional privacy. The study was conducted on a sample of 177 adolescents in Poland. The main part of the questionnaire consisted of two scales: the scale of knowledge and attitudes on surveillance capitalism, and the scale of online institutional privacy protection practices. The results of the study, calculated by statistical methods, showed that although the majority of respondents had average knowledge and attitudes about surveillance capitalism, which may result from insufficient knowledge of the subject matter, this participation in specialized activities/workshops influences the level of intensification of online institutional privacy protection practices.
Źródło:
Mediatization Studies; 2018, 2
2451-1188
Pojawia się w:
Mediatization Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Generation Zs perception of privacy on social media: Examining the impact of personalized advertising, interpersonal relationships, reference group dynamics, social isolation, and anxiety on self-disclosure willingness
Autorzy:
Rózsa, Zoltán
Ferenčáková, Lucia
Zámek, David
Firstová, Jana
Powiązania:
https://bibliotekanauki.pl/articles/39836168.pdf
Data publikacji:
2024
Wydawca:
Instytut Badań Gospodarczych
Tematy:
privacy on social media
personalized advertising
self-disclosure
privacy calculus theory
Opis:
Research background: Consumers frequently exchange personal data for limited benefits from digital services, despite privacy concerns. This data enables digital providers to tailor content and enhance marketing communication, and digital services' effectiveness and efficiency. Purpose of the article: Utilizing the principles of privacy calculus theory, this study aims to identify how attitudes towards advertising (ATT), perception of advertising credibility (CRE), consumer susceptibility to interpersonal (II) and reference group influence (RGI), social isolation (SI) and social anxiety (SA) influence the willingness of Generation Z to disclose personal information on social media derived from the Generation Z privacy concerns (PC) and develop a prediction model for such behavior. Methods:  Data was gathered using an online self-administered questionnaire from a sample of 451 Generation Z individuals. A non-random convenient sampling technique and binary logistic regression were used to quantify the influence of selected independent variables on the dispersion of values in the dependent variable under investigation. Findings & value added:  The results highlight that Generation Z's self-disclosure willingness on social media is significantly influenced by attitudes toward advertising and consumer susceptibility to reference group influence. The effect of social isolation was also close to the required level of statistical significance. It means that positive attitudes towards advertising and high susceptibility to influence from reference groups enhance the probability of personal information disclosure. Being one of the few studies to address factors that influence the willingness of Generation Z to disclose personal information on social media, this study stands out for its holistic approach. Thus, combining various interconnected elements provides a fresh perspective to comprehend the intricate dynamics of Generation Z's relationship with privacy on social media.
Źródło:
Oeconomia Copernicana; 2024, 15, 1; 229-266
2083-1277
Pojawia się w:
Oeconomia Copernicana
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Animals’ right to privacy
Autorzy:
Haratym, Ewa
Powiązania:
https://bibliotekanauki.pl/articles/1179140.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
animals’ privacy
right to be let alone
television wildlife documentaries and animals right to privacy
the right to privacy
Opis:
Since the dawn of time people have felt the need to protect their private lives. Contemporarily, the right to privacy remains one of the basic human rights. There are very few voices advocating that an individual shall be deprived of a possibility to keep any information about them in secrecy. Such views receive strong criticism as the majority of social groups and circles is likely to accept some constraints only due to the necessity to provide safety to communities. However, the issue whether other living creatures are entitled to be granted with the right to privacy does not remain a widely discussed matter. First signals pointing to the fact that functioning of animals may result in establishing some sorts of private spheres by them date back to as early as a few decades ago. They did not, however, bring about any wider interest whatsoever. Several years ago Brett Mills, Ph.D. raised the aforementioned question with regards to the manner in which the groups producing wildlife documentaries operate. His position stood up against strong opposition from numerous environments and backgrounds, including such ones acting in favour of animals. Animals’ right to privacy remains an interesting issue and ought to be analysed in a more profound manner. My article aims to present in detail the issue of animals’ right to privacy with special emphasis put over physical distance and the right to be let alone.
Źródło:
World Scientific News; 2017, 85; 73-77
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Prywatność w Internecie – zarys perspektywy krytycznej
Internet Privacy – Outline of Critical Perspective
Autorzy:
Siuda, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/514306.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Kardynała Stefana Wyszyńskiego w Warszawie. Wydział Teologiczny
Tematy:
Internet privacy
Internet criticism
Right to privacy
Violations of privacy
Privacy protection
Media literacy
Internet studies
Prywatność internetowa
Krytyka internetu
Prawo do prywatności
Naruszenia prywatności
Edukacja medialna
Badania internetu
Opis:
The article claims that when it comes to studying the Internet, one can indicate two groups of researchers: the optimists and the pessimists. The later show the negative economic and political consequences of using the Web. Recently, these researchers have increasingly written about violations of the privacy of Internet users. However, a general critical framework for research on privacy violations remains lacking. The goal of this article is to propose such a framework. This article shows how pessimists conceptualize Internet privacy and what basic types of Internet privacy violation they indicate; how to protect online privacy is also discussed. The aforementioned issues are extremely crucial, particularly when considering (after the pessimists) the scale of the violations of Internet privacy and the lack of research regarding the opinions and behaviors of Internet users in regard to the infringement of online privacy.
Autor artykułu wychodzi z założenia, że mamy do czynienia z dwoma stanowiskami w badaniach internetu: optymistycznym i pesymistycznym. Krytycy wskazują na ekonomiczne i polityczne negatywne konsekwencje użycia Sieci, a obecnie coraz więcej uwagi poświęcają kwestii naruszeń prywatności w internecie. Badaniom na ten temat rzadko kiedy towarzyszy jednak próba ogólnego uporządkowania tego, jak wspomniane pogwałcenia postrzegają krytycy tego zagadnienia. To jest właśnie celem artykułu. Autor – posiłkując się różnymi doniesieniami akademickimi – pokazuje, jak krytycy konceptualizują prywatność internetową i jakie wyróżniają typy jej naruszeń oraz sposoby przeciwdziałania im. Omawiane zagadnienia są ważne, jeśli uznać (za krytykami), że skala naruszeń prywatności jest bardzo duża. Rzadko kiedy bada się opinie i zachowania użytkowników internetu związane z prywatnością online.
Źródło:
Kultura – Media – Teologia; 2015, 20; 36 - 56
2081-8971
Pojawia się w:
Kultura – Media – Teologia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Data protection by design on the ground of a general data protection regulation
Autorzy:
Siemieniak, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/1179134.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
data protection
general data protection regulation
information security
privacy by design
privacy protection
Opis:
Each member of the information society generates, often quite involuntarily, noticeable amounts of data being closely related to them. The range of such data may be extremely extensive as it may encompass the details on the geographical positioning, the data regarding the network behaviours or the data on ID numbers for the devices used. Hence, there exists a more and more intensified and permanent risk of the right for privacy , one of the most fundamental human right, being infringed on. Data controllers attempt to enter any personal data which are easily accessible due to the operational peculiarities applicable to various technological solutions. Such actions may infringe on the rights included into the charter of fundamental rights, namely the right for privacy and the right for personal data protection. Consequently, the data controllers remain under obligation to carry out a series of duties within the area of personal data protection that are related to appropriate technical and organisational means being applied in order to achieve full legal compliance on the matter. Privacy protection remains a complicated process involving the interactions from various areas including the law, software engineering, cycle management or ethics. One of the legal solutions to be introduced by the general data protection regulation is , the so called, “privacy by design” model. The following publication is intended to present the privacy by design model on the ground of the general data protection regulation.
Źródło:
World Scientific News; 2017, 85; 38-43
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Impossible Trinity of Security, Freedom and Privacy
Autorzy:
Hajnal, Zsófia
Powiązania:
https://bibliotekanauki.pl/articles/527003.pdf
Data publikacji:
2016-12-31
Wydawca:
Collegium Civitas
Tematy:
Freedom
Security
Privacy
Trilemma
Transparency
Opis:
In Economics, the Impossible Trinity of free capital movement, an independent monetary policy and a stable foreign exchange rate is well known. There is a similar, though less explored trilemma in modern governance operating with more basic concepts: that of security, freedom and privacy. The aim of the study is to clarify this latter trilemma, as well as to offer a theoretical long-term solution. After expounding the general nature of trilemmas and the three main concepts, the impossible trinity of security, freedom and privacy is examined by taking three extreme scenarios. The scenarios are based on partially hypothetical situations in developed countries, where encryption debates or terrorist attacks took place recently. The study then turns to the solution of the situation. In order to understand the origin of the problem, it takes a step back to the dilemma of security and freedom. The fourth important concept the study operates with is transparency. The study suggests increasing transparency. A mathematical projection of the scenarios is introduced, and the suggested solution is derived in an equation as well.
Źródło:
Securitologia; 2016, 2 (24); 131-145
1898-4509
Pojawia się w:
Securitologia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Internet-related risks from the perspective of Polish adolescents with a focus on hate speech
Autorzy:
Kapera, Artur
Kapera, Jacek
Powiązania:
https://bibliotekanauki.pl/articles/1834997.pdf
Data publikacji:
2021
Wydawca:
Krakowska Akademia im. Andrzeja Frycza Modrzewskiego
Tematy:
Internet
security
hate speech
privacy
Opis:
The aim of the study was to present the main threats related to the use of the Internet by the Polish youth and to analyse them with particular emphasis on issues related to hate speech. Using the Internet, apart from its undoubted usability, brings with it a number of threats, among which are: malware (including spyware, ransomware, “crypto-miners” and adware), invasion of privacy (both by private individuals (stalking) and advertising companies), phishing, spam, hate speech, paedophilia, human trafficking, cyber-bullying, and, less frequently, targeted attacks. According to the survey, nearly 70% of the respondents encountered threats on the Internet. The phenomenon of hate speech affects 37% of respondents who fell victim to it and 18% who practised hate speech.
Źródło:
Studia Prawnicze: rozprawy i materiały; 2021, (28), 1; 133-146
1689-8052
2451-0807
Pojawia się w:
Studia Prawnicze: rozprawy i materiały
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Covid Tracking Apps, Over Reliance on Technology, Bias and Unfairness
Autorzy:
Hilcenko, Christine
Taubman-Bassirian, Tara
Kovacic, Zoran
Powiązania:
https://bibliotekanauki.pl/articles/2044855.pdf
Data publikacji:
2021-12-28
Wydawca:
Uniwersytet Rzeszowski
Tematy:
privacy
individual freedom
security
information
Opis:
Various contact tracing apps tracking the spread of the pandemic were issued in different countries. Mainly based on two technologies, centralised with more control by the governments or decentralised controlled by the Apple or Google Android mobile phone systems. In this paper, we will discuss the advantages and disadvantages of the different systems, as well as their potential dangers.
Źródło:
Journal of Education, Technology and Computer Science; 2021, 12, 2(32); 93-103
2719-6550
Pojawia się w:
Journal of Education, Technology and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Whose Information Should Be Shared With Whom?: Parents’ Awareness Of Children’s Digital Privacy In Turkey
Autorzy:
Gül Ünlü, Derya
Morva, Oya
Powiązania:
https://bibliotekanauki.pl/articles/2150842.pdf
Data publikacji:
2020
Wydawca:
Univerzita sv. Cyrila a Metoda. Fakulta masmediálnej komunikácie
Tematy:
Sharenting
Digital parenting
Digital privacy
Opis:
Today, parents make use of social media accounts for many different purposes, such as obtaining information, giving advice, receiving support, and exchanging ideas with other parents. In parallel with the use of social media, according to their parenting roles, individuals frequently share various content related to both their own daily practices and the development processes of their children. The fact that most of the content shared is about children raises the question of digital privacy in this context. Based on this focus, this research aims to determine the priorities attached by the parents when they share content about children on their social media accounts, and what kind of measures they take in sharing this content to protect the digital privacy of their children. Therefore, a questionnaire based quantitative field study was carried out within the scope of this research. As a result of the study, it was found that parents primarily prefer sharing special occasions with their children, family photographs and photographs of their children at early ages; if the child is at a later age, they tend to consult him/her before sharing the content, but they do not tend to pay enough attention to ensuring that the child's identity is kept confidential and sharing of personal information is avoided.
Źródło:
Media Literacy and Academic Research; 2020, 3, 2; 109-124
2585-8726
Pojawia się w:
Media Literacy and Academic Research
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Polski dyskurs prywatności
Polish Discourse of Privacy
Autorzy:
Kita, Małgorzata
Powiązania:
https://bibliotekanauki.pl/articles/511071.pdf
Data publikacji:
2013
Wydawca:
Wydawnictwo Uniwersytetu Śląskiego
Tematy:
discourse
privacy
intimacy
contemporaineity
diary
Opis:
The main hypothesis presented in this article is the very existence of the discourse of privacy that is rooted in culture. This research covers the area of Polish contemporary discourse. The author claims that certain parts of the world of discourse consist of specific genres of speech and cultural scripts that determine the subsequent language choices of those who communicate. The author also implies that privacy as a psycho‑social feature is relative and it is revealed in a bipolar (PRIVATE – PUBLIC) structure. She implies that there is the migration of the discourse of privacy manifestations from their natural context („internal world“ of an individual, home, family, friends) to the public discourse. Such transgressive behaviour of participants of the „worlds of texts“ is one of the most important features of postmodern contemporaneity.
Źródło:
Postscriptum Polonistyczne; 2013, 1(11); 93-103
1898-1593
2353-9844
Pojawia się w:
Postscriptum Polonistyczne
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies