Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Internet privacy" wg kryterium: Temat


Wyświetlanie 1-10 z 10
Tytuł:
Exploration of a fragmented discourse. Privacy and data security in Süddeutsche Zeitung: 2007–2017
Autorzy:
Meissner, Florian
von Nordheim, Gerret
Powiązania:
https://bibliotekanauki.pl/articles/691344.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
Internet, digitization, privacy, data security, information security, surveillance, Snowden, risk communication, journalism.
Opis:
The goal of this exploratory case study is to identify different facets of news reporting on surveillance, privacy and data security, and more specifically, how risks in this context are portrayed. The theoretical foundation consists of two elements: 1) the concept of mediatized risk culture, and 2) the discursive arena model of risk communication, which provides the normative background for assessing news reporting. A text-mining approach (topic modeling) is applied to analyze relevant coverage of the German quality newspaper Süddeutsche Zeitung. The study yields a total of seven topics which belong to three categories: violation of privacy norms, power and law enforcement, and datafication. The results show that despite the de-mystification of digital technology after the Snowden leaks, coverage has recently become more affirmative and less focused on risk. We conclude that this may indicate a normalization of mass surveillance and data harvesting even in Germany, a society which traditionally values privacy. In order to add more context to our findings, however, further qualitative analyses were needed. The paper serves as a starting point for further research on media reporting of surveillance, privacy and data security.
Źródło:
Mediatization Studies; 2018, 2
2451-1188
Pojawia się w:
Mediatization Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Privacy On The Internet Concerning Generation Z In Bosnia And Herzegovina
Autorzy:
Trninic, Dragana
Kupresanin Vukelic, Andjela
Powiązania:
https://bibliotekanauki.pl/articles/2150854.pdf
Data publikacji:
2021
Wydawca:
Univerzita sv. Cyrila a Metoda. Fakulta masmediálnej komunikácie
Tematy:
Generation Z
Privacy on the Internet
Protection of personal data on the Internet
Digital surrounding.
Opis:
Growing up in digital surroundings and using the Internet on a daily basis have been some of the most prominent features of the young population today. In fact, where Generation Z is concerned, this has virtually been the only modus vivendi they know. They find online communication natural, feeling comfortable in the digital world, spending most of their time on the Internet sharing photographs and video footage, having fun, and communicating by means of social media and various software applications. In doing so, they prove very skillful and they have no difficulty mastering new digital trends, but they are often unaware of how vulnerable they are in terms of protection of their privacy and personal data. For that reason, the paper aims at determining to what extent the members of Generation Z expose their private lives on the Internet, whether they are concerned about possible the consequences of these actions, and what steps they should take to protect their personal data. The results of the survey, conducted online, reveal that most examinees are unaware of the possible risks of providing their personal data to unknown entities on the Internet, as well as that the similar percentage of them do not take any steps towards protecting their privacy.
Źródło:
Media Literacy and Academic Research; 2021, 4, 1; 180-199
2585-8726
Pojawia się w:
Media Literacy and Academic Research
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Internet-related risks from the perspective of Polish adolescents with a focus on hate speech
Autorzy:
Kapera, Artur
Kapera, Jacek
Powiązania:
https://bibliotekanauki.pl/articles/1834997.pdf
Data publikacji:
2021
Wydawca:
Krakowska Akademia im. Andrzeja Frycza Modrzewskiego
Tematy:
Internet
security
hate speech
privacy
Opis:
The aim of the study was to present the main threats related to the use of the Internet by the Polish youth and to analyse them with particular emphasis on issues related to hate speech. Using the Internet, apart from its undoubted usability, brings with it a number of threats, among which are: malware (including spyware, ransomware, “crypto-miners” and adware), invasion of privacy (both by private individuals (stalking) and advertising companies), phishing, spam, hate speech, paedophilia, human trafficking, cyber-bullying, and, less frequently, targeted attacks. According to the survey, nearly 70% of the respondents encountered threats on the Internet. The phenomenon of hate speech affects 37% of respondents who fell victim to it and 18% who practised hate speech.
Źródło:
Studia Prawnicze: rozprawy i materiały; 2021, (28), 1; 133-146
1689-8052
2451-0807
Pojawia się w:
Studia Prawnicze: rozprawy i materiały
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Internet of Things and biometric data versus employee privacy in the Polish case
Autorzy:
Ryś, Krystian
Powiązania:
https://bibliotekanauki.pl/articles/1595894.pdf
Data publikacji:
2020
Wydawca:
Uniwersytet Szczeciński. Wydawnictwo Naukowe Uniwersytetu Szczecińskiego
Tematy:
Internet of Things
biometric data
employee privacy
Opis:
The Internet of Things is a modern technology that affects every area of human life, includ- ing employment relationships. IoT enables the processing of specific personal data categories, including biometric data, and entails the risk of employers interfering with employee privacy. Due to the use of intelligent solutions, the issue of employee privacy, which is, in princi- ple, a personal right subject to protection, becomes significant. The relationship between an employee and an employer includes two subjects of legal protection, the meeting of which may lead to internal contradiction. There is the employee’s dignity and privacy, on the one hand, and protection of reasonable interests of an employer, on the other. A definition of the concept of the Internet of Things and its applications was introduced. Moreover, the author proposed setting a specific legal framework for this and discussed the issue of biometric data. It was also shown how far IoT solutions, which make it possible to analyse and describe the personality of an individual, may interfere with the information autonomy of a person. As a consequence, the employer’s interference with employee privacy cannot be unrestricted, because it should be limited by purpose and lawfulness. This is the purpose of the current legislation.
Źródło:
Acta Iuris Stetinensis; 2020, 31, 3; 79-94
2083-4373
2545-3181
Pojawia się w:
Acta Iuris Stetinensis
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Politicians’ Right to Privacy Online. Polish and International Protection Standards. Selected Issues
Prawo do prywatności polityków w internecie. Polskie i międzynarodowe standardy ochrony. Wybrane zagadnienia
Autorzy:
Bagieńska-Masiota, Aleksandra
Jaroszyk-Pawlukiewicz, Joanna
Powiązania:
https://bibliotekanauki.pl/articles/523145.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Warszawski. Ośrodek Analiz Politologicznych
Tematy:
politician
a public person
Internet Press
Privacy
Opis:
The article concerns the following issues: legal status of the Internet, considerations concerning the definition of a politician from a legal viewpoint, definitions regarding the right to privacy, international privacy protection regulations and privacy of a public person in the jurisprudence of Polish courts.
Artykuł składa się z następujących merytorycznych części, dotyczących zagadnień: statusu prawnego Internetu, rozważań związanych z definiowaniem osoby polityka z punktu widzenia prawa, zagadnień definicyjnych związanych z  prawem do prywatności, międzynarodowych regulacji dotyczących ochrony prywatności oraz prywatności osoby publicznej w orzecznictwie sądów polskich.
Źródło:
Kwartalnik Naukowy OAP UW "e-Politikon"; 2014, 9; 293-320
2084-5294
Pojawia się w:
Kwartalnik Naukowy OAP UW "e-Politikon"
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Videos or intimate images on the internet
Autorzy:
Mar Moya Fuentes, María del
Mar Carrasco Andrino, María del
Powiązania:
https://bibliotekanauki.pl/articles/26917635.pdf
Data publikacji:
2013
Wydawca:
Polska Akademia Nauk. Instytut Nauk Prawnych PAN
Tematy:
prawo do prywatności
cyberprzestępczość
Internet
right to privacy
cybercrime
Opis:
In recent years there have been an increasing number of cases of dissemination of intimate images or videos without the consent of the victim, even though there was previous agreement to the recording.The typical example of this is when a person consents to be recorded while maintaining a sexual relationship or any other intimate act of their life (taking a shower, changing clothes or undressing during an internet communication), which are subsequently published on websites (social networks, forums, pornographic websites, etc.) without their authorization. Commonly these images are released by spite or revenge of an ex- partner after the breakup of the relationship, used as blackmail or a simple joke by a friend.
Źródło:
Biuletyn Kryminologiczny; 2013, 20; 63-65
2084-5375
Pojawia się w:
Biuletyn Kryminologiczny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
IOT Security Challenges and Issues – An Overview
Autorzy:
Sujithra, M.
Padmavathi, G.
Powiązania:
https://bibliotekanauki.pl/articles/1193574.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Internet of Things
Network transmission
Privacy protection
RFID
Security
Opis:
A direct interpretation of the term Internet of Things refersto the use of standard Internet protocols for the human-to-thing or thing-to-thing communication in embedded networks. Certainly, the IoT security is more than a technicalproblem as it needs series of regulations and faultless securitysystem for common purposes. So, the study of IoT security problem is an emergent issue to be introduced in a research paper. There are many problems in security of Internet of Things (IOT) crying out for solutions, such as RFID tag security, wireless security, network transmission security, privacy protection and information processing security. This article is based on the existing researches of network security technology. And it provides a new approach for researchers in certain IOT application and design, through analyzing and summarizing the security of IOT from various angles. In this paper, the traditional techniques are studied and evaluated, which protect the IoT resources such as devices and data against hacking and stealing.
Źródło:
World Scientific News; 2016, 41; 214-221
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Internet of Things: Technological and Social Aspects
Autorzy:
Sowa, G.
Marchlewska, A.
Powiązania:
https://bibliotekanauki.pl/articles/108668.pdf
Data publikacji:
2016
Wydawca:
Społeczna Akademia Nauk w Łodzi
Tematy:
Internet of Things
RFID systems
big data
privacy
user interface
Opis:
The basic idea of is the Internet of Things is presence around us of a variety of things – such as RFID tags, sensors, actuators, mobile phones, etc. – which are able to interact with each other and cooperate with their neighbors to reach common goals. Semantic oriented IoT visions have also been proposed. The number of items involved in the future Internet is destined to become extremely high. Therefore, issues pertaining how to represent, store, interconnect, search, and organize information generated by the IoT will become very challenging. In this context, semantic technologies will play a key role. And creative approaches to visualizing data – humans are far better than computers at seeing patterns –frequently prove integral to the process of creating knowledge. From a privacy perspective, IoT is challenging because it operates in private settings, like homes, and presents an attack target that is harder to secure.
Źródło:
Journal of Applied Computer Science Methods; 2016, 8 No. 1; 17-27
1689-9636
Pojawia się w:
Journal of Applied Computer Science Methods
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Influence of the Use of Digital Technologies on the Physical Activity of Children Aged 7–17 Years in the Opinion of Parents
Autorzy:
RYWCZYŃSKA, ANNA
JAROSZEWSKI, PRZEMYSŁAW
Powiązania:
https://bibliotekanauki.pl/articles/455525.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Rzeszowski
Tematy:
Internet of Toys
Internet of Things
smart connected toys
privacy
vulnerabilities
children safety online
security
research
family
education
awareness raising
Opis:
Toys with integrated technology are not a new thing. We are familiar with talking dolls or remote control cars. However, the interactive toys connected to the internet, which has appeared in recent years, and which are the natural consequence of the development of the internet of things, may bring a revolution to the world of children. Following article is the result of the research project „Internet of Toys a support or a threat to child’s development?” aimed at verifying the readiness to introduce digital toys as well astesting what is the level of security associated with the smart connected toys usage. A mixed methods research: pilot qualitative study in the form of interviews concerning various attitudes and practices relating to the use of digital devices, in particular connected smart toys, together with a quantitative study, gave an overview on the smart toys popularisation and the level of knowledge about their safety. Moreover, tests over selected products from the viewpoint of cyber threats and precautions implemented bythe vendor made it possible to come up with safety recommendations for future or present smart connected toys users. Communicative companions may bring not only fun and education, but also a dose of threats. What happens to the data collected by the toys, how easy it is to reach unauthorised access to the device and who potentially may come into these data possession? Last but not least this article tries to answer the questions on what consequences might bring to children social development, permanent parental supervision,restrictions of children’s privacyand the possibility that digital toys might become a replacement of a real participation in the child’s life.
Źródło:
Edukacja-Technika-Informatyka; 2019, 10, 1; 164-171
2080-9069
Pojawia się w:
Edukacja-Technika-Informatyka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Application of Internet of Things in logistics – current challenges
Autorzy:
Tadejko, P.
Powiązania:
https://bibliotekanauki.pl/articles/398788.pdf
Data publikacji:
2015
Wydawca:
Politechnika Białostocka. Oficyna Wydawnicza Politechniki Białostockiej
Tematy:
internet of things (IoT)
modern logistics
standardization
architecture
security
privacy
interoperability
Internet przedmiotów
nowoczesna logistyka
normalizacja
architektura
bezpieczeństwo
prywatność
zdolność do współpracy
Opis:
In this paper, some aspects of modern logistics related to the Internet of Things technology were studied. Internet of Things can overcome shortcomings of some areas of logistics, for example monitoring, production management, efficiency of logistics operations, information, exchange and communication, modeling supply chains, intelligent information collection and security. This paper describes some principles and characteristics of Internet of Things, and briefly discusses the application of it in modern logistics. Logistics has come to a new stage with the development of Internet of Things technology. The current application areas and future prospects of this technology are analyzed in this paper. Difficulties encountered in the implementation show that the IoT technology needed to be further improved. However, despite many difficulties, experts believe that the key are not problems of costs, standards and techniques, but the formation of a profitable business model in the logistics industry.
Źródło:
Ekonomia i Zarządzanie; 2015, 7, 4; 54-64
2080-9646
Pojawia się w:
Ekonomia i Zarządzanie
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-10 z 10

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies