Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Privacy" wg kryterium: Temat


Tytuł:
Prywatność w pracy
Privacy at Work
Autorzy:
Chrabonszczewski, Maciej
Powiązania:
https://bibliotekanauki.pl/articles/469102.pdf
Data publikacji:
2009
Wydawca:
Polska Akademia Nauk. Instytut Filozofii i Socjologii PAN
Tematy:
privacy
privacy right
monitoring
information technology
code ethics
invasion of privacy
Opis:
The purpose of the paper is to explore the conflict between the employee’s privacy protection and the employer’s interests and to show how this conflict can be soften. In the first part of the paper an essence of the conflict is presented. The second part is devoted to analysis of several spheres in which the employee’s privacy can be violated. Some ways to protect employee’s privacy by the codes of ethics and legal norms are regarded in the last part of the paper.
Źródło:
Prakseologia; 2009, 149; 205-239
0079-4872
Pojawia się w:
Prakseologia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Multi-Party Scheme for Privacy : Preserving Clustering
Autorzy:
Zhan, J.
Matwin, S.
Chang, L.
Powiązania:
https://bibliotekanauki.pl/articles/93043.pdf
Data publikacji:
2006
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
privacy
security
clustering
Opis:
Preserving data privacy while conducting data clustering among multiple parties is a demanding problem. We address this challenging problem in the following scenario: without disclosing their private data to each other, multiple parties, each having a private data set, want to collaboratively conduct k-medoids clustering. To tackle this problem, we develop secure protocols for multiple parties to achieve this dual goal. The solution is distributed, i.e., there is no central, trusted party having access to all the data. Instead, we define a protocol using homomorphic encryption and digital envelope techniques to exchange the data while keeping it private.
Źródło:
Studia Informatica : systems and information technology; 2006, 1(7); 217-232
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Internet-related risks from the perspective of Polish adolescents with a focus on hate speech
Autorzy:
Kapera, Artur
Kapera, Jacek
Powiązania:
https://bibliotekanauki.pl/articles/1834997.pdf
Data publikacji:
2021
Wydawca:
Krakowska Akademia im. Andrzeja Frycza Modrzewskiego
Tematy:
Internet
security
hate speech
privacy
Opis:
The aim of the study was to present the main threats related to the use of the Internet by the Polish youth and to analyse them with particular emphasis on issues related to hate speech. Using the Internet, apart from its undoubted usability, brings with it a number of threats, among which are: malware (including spyware, ransomware, “crypto-miners” and adware), invasion of privacy (both by private individuals (stalking) and advertising companies), phishing, spam, hate speech, paedophilia, human trafficking, cyber-bullying, and, less frequently, targeted attacks. According to the survey, nearly 70% of the respondents encountered threats on the Internet. The phenomenon of hate speech affects 37% of respondents who fell victim to it and 18% who practised hate speech.
Źródło:
Studia Prawnicze: rozprawy i materiały; 2021, (28), 1; 133-146
1689-8052
2451-0807
Pojawia się w:
Studia Prawnicze: rozprawy i materiały
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Covid Tracking Apps, Over Reliance on Technology, Bias and Unfairness
Autorzy:
Hilcenko, Christine
Taubman-Bassirian, Tara
Kovacic, Zoran
Powiązania:
https://bibliotekanauki.pl/articles/2044855.pdf
Data publikacji:
2021-12-28
Wydawca:
Uniwersytet Rzeszowski
Tematy:
privacy
individual freedom
security
information
Opis:
Various contact tracing apps tracking the spread of the pandemic were issued in different countries. Mainly based on two technologies, centralised with more control by the governments or decentralised controlled by the Apple or Google Android mobile phone systems. In this paper, we will discuss the advantages and disadvantages of the different systems, as well as their potential dangers.
Źródło:
Journal of Education, Technology and Computer Science; 2021, 12, 2(32); 93-103
2719-6550
Pojawia się w:
Journal of Education, Technology and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Polski dyskurs prywatności
Polish Discourse of Privacy
Autorzy:
Kita, Małgorzata
Powiązania:
https://bibliotekanauki.pl/articles/511071.pdf
Data publikacji:
2013
Wydawca:
Wydawnictwo Uniwersytetu Śląskiego
Tematy:
discourse
privacy
intimacy
contemporaineity
diary
Opis:
The main hypothesis presented in this article is the very existence of the discourse of privacy that is rooted in culture. This research covers the area of Polish contemporary discourse. The author claims that certain parts of the world of discourse consist of specific genres of speech and cultural scripts that determine the subsequent language choices of those who communicate. The author also implies that privacy as a psycho‑social feature is relative and it is revealed in a bipolar (PRIVATE – PUBLIC) structure. She implies that there is the migration of the discourse of privacy manifestations from their natural context („internal world“ of an individual, home, family, friends) to the public discourse. Such transgressive behaviour of participants of the „worlds of texts“ is one of the most important features of postmodern contemporaneity.
Źródło:
Postscriptum Polonistyczne; 2013, 1(11); 93-103
1898-1593
2353-9844
Pojawia się w:
Postscriptum Polonistyczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Privacy protection in a digital economy
Autorzy:
Wróblewski, Łukasz
Powiązania:
https://bibliotekanauki.pl/articles/1178970.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
cyberspace
economy
market
privacy
protection
Opis:
The author wonders, what impact on the privacy of the human being is developing ahead of us digital economy, with the acquisition of new technology. Brings forth the most important legal standards in force and outlines future European plans for digital market development. It presents the role of cyberspace in the functioning of business and society, and addresses the risks associated with it, such as exclusion, poverty and social unrest. Looking for answers to the question of what decides about behavior or loss of privacy in virtual reality.
Źródło:
World Scientific News; 2017, 89; 322-328
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Godność i prywatność osoby w świetle Konstytucji Rzeczypospolitej Polskiej
Dignity and privacy of individuals in the light of the Constitution of The Republic of Poland
Autorzy:
Fleszer, Dorota
Powiązania:
https://bibliotekanauki.pl/articles/443875.pdf
Data publikacji:
2015
Wydawca:
Wyższa Szkoła Humanitas
Tematy:
godność
prywatność
prawo do prywatności
autonomia informacyjna
dignity
privacy
right to privacy
autonomy information
Opis:
Ustawodawca uznaje godność osoby fizycznej za szczególną wartość związaną z istotą człowieczeństwa. Świadczy o tym przede wszystkim sposób, w jaki jest ona zagwarantowana w Konstytucji Rzeczypospolitej Polskiej. Godność stanowi bowiem źródło wolności i praw człowieka i obywatela. Jest nienaruszalna, a jej poszanowanie i ochrona jest obowiązkiem władz publicznych. Natomiast prawo do prywatności wywodzone jest bezpośrednio z prawa do godności. Jest ono utożsamiane z władztwem osoby fizycznej nad dotyczącymi jej informacjami, niedają- cym się sprowadzić tylko do wyrażenia zgody na rozpowszechnianie tych informacji, ale obejmuje również szczególną ochronę informacji, które zazwyczaj nie są chronione przed dostępem innych ludzi. Zachowanie przez człowieka godności wymaga bowiem poszanowania jego sfery czysto osobistej (prywatnej), tak by nie był on narażony na konieczność „bycia z innymi” czy „dzielenia się z innymi” swoimi przeżyciami czy doznaniami o intymnym charakterze.
In the eyes of a legislator, dignity of an individual is a special value associated with the essence of humanity. This is mainly presented by the way in which it is guaranteed by the Constitution of the Republic of Poland. This is because dignity is a source of freedom and rights of man and citizen. It is inviolable and must be respected and protected by public authorities. Whereas the right to privacy derives directly from the right to dignity. It is identified with an individual’s sovereignty over information related to it, which cannot be reduced only to giving consent to information distribution, but also includes special protection of information which, typically, is not protected against other people’s access. Man’s dignity requires respecting his purely personal sphere (private) so that he is not exposed to the need for “being with others” or “sharing with others” his experiences or intimate situations.
Źródło:
Roczniki Administracji i Prawa; 2015, 15/1; 19-30
1644-9126
Pojawia się w:
Roczniki Administracji i Prawa
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Trustee’s Duty to Become Familiar with the Contents of the Mail Addressed to a Bankrupt and the Right to Privacy
Autorzy:
Wołowski, Przemysław
Powiązania:
https://bibliotekanauki.pl/articles/2185943.pdf
Data publikacji:
2023-01-15
Wydawca:
Akademia Leona Koźmińskiego w Warszawie
Tematy:
constitution
bankruptcy
privacy
trustee
bankruptcy estate
Opis:
The publication looks into the conflict that occurs between values protected under the Constitution of the Republic of Poland – i.e. the right to privacy and the protection of communication versus the protection of property rights – in a situation of declaration of bankruptcy. Acting pursuant to Article 176(2) of the Bankruptcy Law, the legislator has a priori given preference to the protection of property rights over the right to privacy and the protection of communication. The conflict in question has been resolved in favour of bankruptcy creditors. The legislator’s adoption of a hierarchy of values in the area of bankruptcy law does not, of course, deal with all the problems arising in the field of the conflict between these values, and does not mean that the solution chosen is in accordance with hierarchically higher norms – meaning constitutional norms. In principle, the Constitution of the Republic of Poland makes the legislator free to resolve conflicts of competing values protected under this normative act. What is important is that this conflict be resolved by the – legislator in a way that meets the requirements of Article 31(3) of the Constitution of the Republic of Poland.
Źródło:
Krytyka Prawa. Niezależne Studia nad Prawem; 2023, 15, 1; 275-299
2080-1084
2450-7938
Pojawia się w:
Krytyka Prawa. Niezależne Studia nad Prawem
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Access to Financial Information for Tax Purposes and Proportionality – Balancing Public Interest with the Protection of Privacy
Autorzy:
Teixeira, Glória
Pinho, Maria Filipa
Teixeira, Hugo
Powiązania:
https://bibliotekanauki.pl/articles/35549322.pdf
Data publikacji:
2023
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
financial information
tax
privacy
public interest
Opis:
The purpose of the article is to analyse how to balance public interests with the protection of privacy in the tax field. It has not been an easy task especially in the context of access to financial information. In this area, the compromise to achieve transparency needs to pay regard to the principle of proportionality, as reinforced by recent case law of the ECJ, and align with specific legislation such as the EU General Data Protection Regulation and recently enacted EU Digital Services Act. It is extremely important to investigate the possible consequences of acting against fundamental rights that are attributed to European citizens (and not only), such as the right to privacy and the protection of personal data. The paper aims to provide relevant and further insight to paths that lead to a fair way to handle such relevant information. Every citizen, every academically inclined and dedicated individual, every public official, every judicial agent, must question whether the public interest can ever, or at least, recurrently, surpass a fundamental right to privacy, specially, in a sensible area as the financial information of an individual. Such actions can often lead, if mistakes are made along the way, to dangerous outcomes, such as public humiliation, and can even harm the person’s professional and personal life. Methodology. In the course of the paper, an analysis is made of public decisions taken in cases across the European continent. Additionally, some considerations are made about the recent legislation that is produced by competent authorities, particularly the European Institutions. Results of the research. The authors offer a personal insight regarding the information that has been gathered, confirming some significant concerns. What is of crucial importance, as stated in the title of this article, is a well established balance between the public interest and the protection of privacy, with explained and defined possible paths to follow.
Źródło:
Finanse i Prawo Finansowe; 2023, 3, 39; 7-14
2391-6478
2353-5601
Pojawia się w:
Finanse i Prawo Finansowe
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
How To Construct Support Vector Machines Without Breaching Privacy
Autorzy:
Zhan, J.
Chang, L.
Matwin, S.
Powiązania:
https://bibliotekanauki.pl/articles/92993.pdf
Data publikacji:
2006
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
privacy
security
support vector machine (SVM)
Opis:
This paper addresses the problem of data sharing among multiple parties in the following scenario: without disclosing their private data to each other, multiple parties, each having a private data set, want to collaboratively construct support vector machines using a linear, polynomial or sigmoid kernel function. To tackle this problem, we develop a secure protocol for multiple parties to conduct the desired computation. In our solution, multiple parties use homomorphic encryption and digital envelope techniques to exchange the data while keeping it private. All the parties are treated symmetrically: they all participate in the encryption and in the computation involved in learning support vector machines.
Źródło:
Studia Informatica : systems and information technology; 2006, 1(7); 233-244
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Sféra soukromí a sféra zaměstnání − synergie či antagonismus?
Privacy sphere and employment sphere – synergy or antagonism?
Autorzy:
Novotná Březovská, Barbora
Powiązania:
https://bibliotekanauki.pl/articles/501365.pdf
Data publikacji:
2012
Wydawca:
Instytut Studiów Międzynarodowych i Edukacji Humanum
Tematy:
privacy
private life
public life
ethics
Opis:
This contribution deals with privacy at work from the angle of social psychology and ethics. The purpose is to try to find a definition of privacy itself and to point out the ambivalence of privacy in the private sphere of life and in the public sphere of life. It occurs that its roots are essentially ethical.
Źródło:
Społeczeństwo i Edukacja. Międzynarodowe Studia Humanistyczne; 2012, 2(10); 429-436
1898-0171
Pojawia się w:
Społeczeństwo i Edukacja. Międzynarodowe Studia Humanistyczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zniesławienie na Facebooku
Autorzy:
Wełyczko, Sylwia
Powiązania:
https://bibliotekanauki.pl/articles/2216235.pdf
Data publikacji:
2015-12-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
defamation
freedom of speech
dignity
privacy
Opis:
The article examines the mechanisms of defamation in the internet space, social media and Facebook in particular. Human dignity is protected both as a constitutional value and as an individual right, though in everyday practice law-enforcement bodies usually tend to be unwilling to react to violations of human dignity, while appropriate legal provisions are often not in place to be implemented. Actions taken by the police in investigating appropriate cases do not always manage to identify perpetrators or bring them to justice. Most internet or cyber crime occurs across international borders and can be committed anonymously. There are certain types of defamatory statements that are considered to harm the reputation of the victim. Libel in the internet involves cyberbullying, online harassment, cyber-stalking, and, most of all, internet trolls. Trolling is any deliberate and intentional attempt to disrupt the credibility of others, often involving petty arguments. People tend to lose control of their emotions when they go online. An explosion of raw and unbridled emotions follows, standards wane, and eventually some internet users lose their touch with reality. Cyber violence and online harassment are punishable crimes and are subject to criminal prosecution: defamation, libel and online threats. Stalking and vulgar language in public places are offences subject to public prosecution and the provisions of the Petty Offences Procedure Code. . Generally, a defamatory statement published to third parties has to be proved and it has to be proved that the publisher knew or should have known that the statement that they made which harmed the reputation was false. The good name or reputation of another can be damaged, or even totally destroyed, in a number of ways. To calumniate another is certainly to ruin a person’s or a company their good name and so to do them an injustice. The number of criminal offences under Article 212 has increased four times over the past ten years.
Źródło:
Themis Polska Nova; 2015, 2(9); 192-215
2084-4522
Pojawia się w:
Themis Polska Nova
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Пилип Орлик сам про себе
Pylyp Orlyk about himself
Autorzy:
Sobol, Walentyna
Powiązania:
https://bibliotekanauki.pl/articles/2156681.pdf
Data publikacji:
2021-09-27
Wydawca:
Uniwersytet Warszawski. Wydawnictwa Uniwersytetu Warszawskiego
Tematy:
Emigration
prayer
privacy
friendship
discourses
reading
epidemic
Opis:
This article explores various forms of self-presentation of the hetman on the path of self-knowledge in the conditions of hopelessness caused by emigration. Pylyp Orlyk’s handwritten diary of 1725, 1726, and 1727 is dominated by motives of accustoming to emigration conditions, protection of privacy, discourses, illness and recovery, friendship, solitude with reading, and fi nally, more clearly than before, the self-awareness of the soul. “Peregrine”, as Orlyk calls himself in 1727, aft er eighteen years of emigration. He orders two or three services at once for the children on their birthdays, for the health of his wife Anna of the Hercyk family. Orlyk visits all the churches in Th essaloniki, is a good Christian, but nowhere emphasizes his denomination. He believes in the power of praying for the health of his family and friends. Sincere prayer becomes medicine. One of the described disasters of that time is perceived today in a very modern way - “bad air”. Th is euphemism is repeated in the manuscript when it comes to the plague pandemic in Th essaloniki, Smyrna, Istanbul.
Źródło:
Studia Polsko-Ukraińskie; 2021, 8; 85-99
2353-5644
2451-2958
Pojawia się w:
Studia Polsko-Ukraińskie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Prywatne małe rzeczy. Oswajanie śmierci w liryce Herberta
Private Little Things. Familiarizing Death in the Lyric Poetry of Zbigniew Herbert
Autorzy:
Jakowska, Krystyna
Powiązania:
https://bibliotekanauki.pl/articles/1521201.pdf
Data publikacji:
2018-06-28
Wydawca:
Uniwersytet w Białymstoku. Wydawnictwo Uniwersytetu w Białymstoku
Tematy:
Polish poetry
privacy
everyday life
object
death
Opis:
Looking at the images of death, dying and afterlife in Herbert’s poetry allows us to acknowledge the function of personal as a means of escaping theterrors ofdeath.Thisconsolingprivacyrevealsitselfinthecommonality of the language and, above all, in recognizing the meaning of insignificant everyday objects.
Źródło:
Białostockie Studia Literaturoznawcze; 2018, 12; 7-20
2082-9701
2720-0078
Pojawia się w:
Białostockie Studia Literaturoznawcze
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Access Logs : Underestimated Privacy Risks
Autorzy:
Glet, Michał
Kaczyński, Kamil
Powiązania:
https://bibliotekanauki.pl/articles/227087.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
metadata
privacy
cybersecurity
instant messaging
access log
Opis:
Access logs may offer service providers a lot of information about specific users. Depending on the type of the service offers, the operator is capable of obtaining the user’s IP, location, communication habits, device information and so on. In this paper, we analyze a sample instant messenger service that is operating for a certain period of time. In our sandbox, we gathered enough data to correlate user communication habits with their localization, and even contacts. We show how seriously metadata may impact the user’s privacy and make some recommendations about mitigating the quantity of data collected in connection with this type of services.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 3; 405-410
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies