Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Privacy" wg kryterium: Temat


Tytuł:
Prywatność w pracy
Privacy at Work
Autorzy:
Chrabonszczewski, Maciej
Powiązania:
https://bibliotekanauki.pl/articles/469102.pdf
Data publikacji:
2009
Wydawca:
Polska Akademia Nauk. Instytut Filozofii i Socjologii PAN
Tematy:
privacy
privacy right
monitoring
information technology
code ethics
invasion of privacy
Opis:
The purpose of the paper is to explore the conflict between the employee’s privacy protection and the employer’s interests and to show how this conflict can be soften. In the first part of the paper an essence of the conflict is presented. The second part is devoted to analysis of several spheres in which the employee’s privacy can be violated. Some ways to protect employee’s privacy by the codes of ethics and legal norms are regarded in the last part of the paper.
Źródło:
Prakseologia; 2009, 149; 205-239
0079-4872
Pojawia się w:
Prakseologia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Projekt stanowiska Sejmu w sprawie o sygn. akt K 13/13
The case concerning the application of the Human Rights Defender of 8 April 2013 (Ref. No. C 13/13), concerning the Act of 26 October 1982 on Upbringing in Sobriety and Counteracting Alcoholism
Autorzy:
Kaleta, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/12711937.pdf
Data publikacji:
2013
Wydawca:
Kancelaria Sejmu. Biuro Analiz Sejmowych
Tematy:
alcoholism
privacy policy
Privacy Rights
Constitutional Tribunal
Opis:
The case no. K 13/13 concerns the competence of the municipal committee on alcohol problems to take steps towards the ruling on the use of compulsory treatment for drug addiction treatment institution in relation to alcohol addicted persons. According to the author, the contested regulations are imprecise and – in particular – disproportionately interfere with the privacy of citizens.
Źródło:
Zeszyty Prawnicze BAS; 2013, 4(40); 273-293
1896-9852
2082-064X
Pojawia się w:
Zeszyty Prawnicze BAS
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Encryption for the masses? An analysis of PGP key usage
Autorzy:
Braun, Sven
Oostveen, Anne-Marie
Powiązania:
https://bibliotekanauki.pl/articles/691346.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
Email communication, Pretty Good Privacy, Privacy Enhancing Technologies, privacy self-management, encryption, usability
Opis:
Despite the rise of alternatives, email remains integral to technology-mediated communication. To protect email privacy the encryption software Pretty Good Privacy (PGP) has been considered the first choice for individuals since 1991. However, there is little scholarly insight into the characteristics and motivations for the people using PGP. We seek to shed light on social aspects of PGP: who is using PGP for encrypted email communication, how and why? By understanding those using the technology, questions on the motivations, usability, and the political dimension of communication encryption can be contextualized and cautiously generalized to provide input for the design of privacy-enhancing technologies. We have greatly extended the scale and scope of existing research by conducting a PGP key analysis on 4.27 million PGP public keys complemented by a survey filled out by former and current PGP users (N = 3,727). We show that a relatively small homogeneous population of mainly western, technically skilled, and moderately politically active males is using PGP for privacy self-management. Additionally, findings from existing research identifying poor usability and a lack of understanding of the underlying mechanisms of PGP can be confirmed.
Źródło:
Mediatization Studies; 2018, 2
2451-1188
Pojawia się w:
Mediatization Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Privacy Awareness Monitoring
Monitorowanie znaczenia prywatności
Autorzy:
Pańkowska, Małgorzata
Powiązania:
https://bibliotekanauki.pl/articles/1923772.pdf
Data publikacji:
2019-11-29
Wydawca:
Uniwersytet Warszawski. Wydawnictwo Naukowe Wydziału Zarządzania
Tematy:
privacy monitoring
privacy awareness
privacy aware monitoring
privacy paradox
social media
monitorowanie prywatności
znaczenie prywatności
monitorowanie znaczenia prywatności
paradoks prywatności
media społecznościowe
Opis:
In this paper, monitoring is perceived as a way to observe how people change their attitude towards privacy, particularly in the Internet circumstances. The paper aims to analyze privacy awareness and the privacy paradox. A systematic literature review provides the background on the privacy issues in the Internet environment. Beyond that, the paper covers a survey on the perception of new media by students from Poland, Bulgaria, and Colombia. The systematic literature review and the student privacy awareness survey revealed the relative value of privacy and its dependence on security. The discussion included in this paper concerns the privacy paradox, which can possibly be resolved by separation, exclusion, integration, and connection. The literature survey has allowed to present privacy in different aspects, i.e. protection modeling, tools and techniques. Researchers focus on protection systems, but they do not reveal reactions of users of the proposed solutions. On the other hand, proponents of the Internet communication encourage people to reveal personal data, without sufficient warning about the consequences of data exposure. The privacy paradox considerations are expected to be valuable for practitioners of the organizational design because they are to be asked to cope with the privacy ambidexterity and to develop the corresponding business processes. The important issue, i.e. the privacy paradox, is placed in contradictory concepts (i.e. freedom of exposure and protection from disclosure). The paradox is valuable as a prerequisite for further considerations on privacy in information management. In this paper, the privacy paradox is used as a strategy for theorizing on privacy.
W artykule monitorowanie jest postrzegane jako sposób obserwacji zmiany stosunku ludzi do prywatności, szczególnie w środowisku Internetu. Celem artykułu jest badanie znaczenia prywatności i analiza paradoksu prywatności. Systematyczny przegląd literatury zapewnia podstawową wiedzę na temat interpretacji prywatności w środowisku Internetu. Artykuł zawiera ponadto wyniki badania ankietowego na temat postrzegania nowych mediów przez studentów z Polski, Bułgarii i Kolumbii. Systematyczny przegląd literatury i badanie ankietowe znaczenia prywatności dla studentów ujawniły, że zagadnienia prywatności i bezpieczeństwa analizowane są jako współwystępujące. W artykule przedstawiono cztery sposoby traktowania tego współwystępowania: rozdzielenie, wykluczenie, integrację i dynamiczną równowagę. Przegląd literatury pozwolił na ujawnienie, że badania dotyczące prywatności de facto sprowadzają się do modelowania technik i narzędzi ochrony. Jednakże zwolennicy komunikacji internetowej zachęcają użytkowników do ujawniania danych osobowych w celu umożliwienia im korzystania z oprogramowania i informacji z Internetu. Najważniejszą kwestią jest przedstawienie paradoksu prywatności. Z jednej strony użytkownicy oczekują ochrony, z drugiej zaś – możliwości nieograniczonej swobody ekspozycji swoich danych osobowych.
Źródło:
Problemy Zarządzania; 2019, 5/2019 (85); 111-131
1644-9584
Pojawia się w:
Problemy Zarządzania
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Multi-Party Scheme for Privacy : Preserving Clustering
Autorzy:
Zhan, J.
Matwin, S.
Chang, L.
Powiązania:
https://bibliotekanauki.pl/articles/93043.pdf
Data publikacji:
2006
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
privacy
security
clustering
Opis:
Preserving data privacy while conducting data clustering among multiple parties is a demanding problem. We address this challenging problem in the following scenario: without disclosing their private data to each other, multiple parties, each having a private data set, want to collaboratively conduct k-medoids clustering. To tackle this problem, we develop secure protocols for multiple parties to achieve this dual goal. The solution is distributed, i.e., there is no central, trusted party having access to all the data. Instead, we define a protocol using homomorphic encryption and digital envelope techniques to exchange the data while keeping it private.
Źródło:
Studia Informatica : systems and information technology; 2006, 1(7); 217-232
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Surveillance capitalism and privacy. Knowledge and attitudes on surveillance capitalism and online institutional privacy protection practices among adolescents in Poland
Autorzy:
Ptaszek, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/691382.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
institutional privacy, surveillance capitalism, Polish adolescents, online privacy protection practices
Opis:
The purpose of the study was to determine the level of knowledge and attitudes towards surveillance capitalism and online institutional privacy protection practices among adolescents in Poland (aged 18–19), as well as to determine the relationships between these variables. Surveillance capitalism has emerged as a result of internet users’ activities and involves the collection of all data about these users by different entities for specific benefits without letting them know about it. The dominant role in surveillance capitalism is played by hi-tech corporations. The aim of the study was to verify whether knowledge, and what kind of knowledge, on surveillance capitalism translates into practices related to the protection of online institutional privacy. The study was conducted on a sample of 177 adolescents in Poland. The main part of the questionnaire consisted of two scales: the scale of knowledge and attitudes on surveillance capitalism, and the scale of online institutional privacy protection practices. The results of the study, calculated by statistical methods, showed that although the majority of respondents had average knowledge and attitudes about surveillance capitalism, which may result from insufficient knowledge of the subject matter, this participation in specialized activities/workshops influences the level of intensification of online institutional privacy protection practices.
Źródło:
Mediatization Studies; 2018, 2
2451-1188
Pojawia się w:
Mediatization Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Generation Zs perception of privacy on social media: Examining the impact of personalized advertising, interpersonal relationships, reference group dynamics, social isolation, and anxiety on self-disclosure willingness
Autorzy:
Rózsa, Zoltán
Ferenčáková, Lucia
Zámek, David
Firstová, Jana
Powiązania:
https://bibliotekanauki.pl/articles/39836168.pdf
Data publikacji:
2024
Wydawca:
Instytut Badań Gospodarczych
Tematy:
privacy on social media
personalized advertising
self-disclosure
privacy calculus theory
Opis:
Research background: Consumers frequently exchange personal data for limited benefits from digital services, despite privacy concerns. This data enables digital providers to tailor content and enhance marketing communication, and digital services' effectiveness and efficiency. Purpose of the article: Utilizing the principles of privacy calculus theory, this study aims to identify how attitudes towards advertising (ATT), perception of advertising credibility (CRE), consumer susceptibility to interpersonal (II) and reference group influence (RGI), social isolation (SI) and social anxiety (SA) influence the willingness of Generation Z to disclose personal information on social media derived from the Generation Z privacy concerns (PC) and develop a prediction model for such behavior. Methods:  Data was gathered using an online self-administered questionnaire from a sample of 451 Generation Z individuals. A non-random convenient sampling technique and binary logistic regression were used to quantify the influence of selected independent variables on the dispersion of values in the dependent variable under investigation. Findings & value added:  The results highlight that Generation Z's self-disclosure willingness on social media is significantly influenced by attitudes toward advertising and consumer susceptibility to reference group influence. The effect of social isolation was also close to the required level of statistical significance. It means that positive attitudes towards advertising and high susceptibility to influence from reference groups enhance the probability of personal information disclosure. Being one of the few studies to address factors that influence the willingness of Generation Z to disclose personal information on social media, this study stands out for its holistic approach. Thus, combining various interconnected elements provides a fresh perspective to comprehend the intricate dynamics of Generation Z's relationship with privacy on social media.
Źródło:
Oeconomia Copernicana; 2024, 15, 1; 229-266
2083-1277
Pojawia się w:
Oeconomia Copernicana
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Animals’ right to privacy
Autorzy:
Haratym, Ewa
Powiązania:
https://bibliotekanauki.pl/articles/1179140.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
animals’ privacy
right to be let alone
television wildlife documentaries and animals right to privacy
the right to privacy
Opis:
Since the dawn of time people have felt the need to protect their private lives. Contemporarily, the right to privacy remains one of the basic human rights. There are very few voices advocating that an individual shall be deprived of a possibility to keep any information about them in secrecy. Such views receive strong criticism as the majority of social groups and circles is likely to accept some constraints only due to the necessity to provide safety to communities. However, the issue whether other living creatures are entitled to be granted with the right to privacy does not remain a widely discussed matter. First signals pointing to the fact that functioning of animals may result in establishing some sorts of private spheres by them date back to as early as a few decades ago. They did not, however, bring about any wider interest whatsoever. Several years ago Brett Mills, Ph.D. raised the aforementioned question with regards to the manner in which the groups producing wildlife documentaries operate. His position stood up against strong opposition from numerous environments and backgrounds, including such ones acting in favour of animals. Animals’ right to privacy remains an interesting issue and ought to be analysed in a more profound manner. My article aims to present in detail the issue of animals’ right to privacy with special emphasis put over physical distance and the right to be let alone.
Źródło:
World Scientific News; 2017, 85; 73-77
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Prywatność w Internecie – zarys perspektywy krytycznej
Internet Privacy – Outline of Critical Perspective
Autorzy:
Siuda, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/514306.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Kardynała Stefana Wyszyńskiego w Warszawie. Wydział Teologiczny
Tematy:
Internet privacy
Internet criticism
Right to privacy
Violations of privacy
Privacy protection
Media literacy
Internet studies
Prywatność internetowa
Krytyka internetu
Prawo do prywatności
Naruszenia prywatności
Edukacja medialna
Badania internetu
Opis:
The article claims that when it comes to studying the Internet, one can indicate two groups of researchers: the optimists and the pessimists. The later show the negative economic and political consequences of using the Web. Recently, these researchers have increasingly written about violations of the privacy of Internet users. However, a general critical framework for research on privacy violations remains lacking. The goal of this article is to propose such a framework. This article shows how pessimists conceptualize Internet privacy and what basic types of Internet privacy violation they indicate; how to protect online privacy is also discussed. The aforementioned issues are extremely crucial, particularly when considering (after the pessimists) the scale of the violations of Internet privacy and the lack of research regarding the opinions and behaviors of Internet users in regard to the infringement of online privacy.
Autor artykułu wychodzi z założenia, że mamy do czynienia z dwoma stanowiskami w badaniach internetu: optymistycznym i pesymistycznym. Krytycy wskazują na ekonomiczne i polityczne negatywne konsekwencje użycia Sieci, a obecnie coraz więcej uwagi poświęcają kwestii naruszeń prywatności w internecie. Badaniom na ten temat rzadko kiedy towarzyszy jednak próba ogólnego uporządkowania tego, jak wspomniane pogwałcenia postrzegają krytycy tego zagadnienia. To jest właśnie celem artykułu. Autor – posiłkując się różnymi doniesieniami akademickimi – pokazuje, jak krytycy konceptualizują prywatność internetową i jakie wyróżniają typy jej naruszeń oraz sposoby przeciwdziałania im. Omawiane zagadnienia są ważne, jeśli uznać (za krytykami), że skala naruszeń prywatności jest bardzo duża. Rzadko kiedy bada się opinie i zachowania użytkowników internetu związane z prywatnością online.
Źródło:
Kultura – Media – Teologia; 2015, 20; 36 - 56
2081-8971
Pojawia się w:
Kultura – Media – Teologia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Data protection by design on the ground of a general data protection regulation
Autorzy:
Siemieniak, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/1179134.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
data protection
general data protection regulation
information security
privacy by design
privacy protection
Opis:
Each member of the information society generates, often quite involuntarily, noticeable amounts of data being closely related to them. The range of such data may be extremely extensive as it may encompass the details on the geographical positioning, the data regarding the network behaviours or the data on ID numbers for the devices used. Hence, there exists a more and more intensified and permanent risk of the right for privacy , one of the most fundamental human right, being infringed on. Data controllers attempt to enter any personal data which are easily accessible due to the operational peculiarities applicable to various technological solutions. Such actions may infringe on the rights included into the charter of fundamental rights, namely the right for privacy and the right for personal data protection. Consequently, the data controllers remain under obligation to carry out a series of duties within the area of personal data protection that are related to appropriate technical and organisational means being applied in order to achieve full legal compliance on the matter. Privacy protection remains a complicated process involving the interactions from various areas including the law, software engineering, cycle management or ethics. One of the legal solutions to be introduced by the general data protection regulation is , the so called, “privacy by design” model. The following publication is intended to present the privacy by design model on the ground of the general data protection regulation.
Źródło:
World Scientific News; 2017, 85; 38-43
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Impossible Trinity of Security, Freedom and Privacy
Autorzy:
Hajnal, Zsófia
Powiązania:
https://bibliotekanauki.pl/articles/527003.pdf
Data publikacji:
2016-12-31
Wydawca:
Collegium Civitas
Tematy:
Freedom
Security
Privacy
Trilemma
Transparency
Opis:
In Economics, the Impossible Trinity of free capital movement, an independent monetary policy and a stable foreign exchange rate is well known. There is a similar, though less explored trilemma in modern governance operating with more basic concepts: that of security, freedom and privacy. The aim of the study is to clarify this latter trilemma, as well as to offer a theoretical long-term solution. After expounding the general nature of trilemmas and the three main concepts, the impossible trinity of security, freedom and privacy is examined by taking three extreme scenarios. The scenarios are based on partially hypothetical situations in developed countries, where encryption debates or terrorist attacks took place recently. The study then turns to the solution of the situation. In order to understand the origin of the problem, it takes a step back to the dilemma of security and freedom. The fourth important concept the study operates with is transparency. The study suggests increasing transparency. A mathematical projection of the scenarios is introduced, and the suggested solution is derived in an equation as well.
Źródło:
Securitologia; 2016, 2 (24); 131-145
1898-4509
Pojawia się w:
Securitologia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Internet-related risks from the perspective of Polish adolescents with a focus on hate speech
Autorzy:
Kapera, Artur
Kapera, Jacek
Powiązania:
https://bibliotekanauki.pl/articles/1834997.pdf
Data publikacji:
2021
Wydawca:
Krakowska Akademia im. Andrzeja Frycza Modrzewskiego
Tematy:
Internet
security
hate speech
privacy
Opis:
The aim of the study was to present the main threats related to the use of the Internet by the Polish youth and to analyse them with particular emphasis on issues related to hate speech. Using the Internet, apart from its undoubted usability, brings with it a number of threats, among which are: malware (including spyware, ransomware, “crypto-miners” and adware), invasion of privacy (both by private individuals (stalking) and advertising companies), phishing, spam, hate speech, paedophilia, human trafficking, cyber-bullying, and, less frequently, targeted attacks. According to the survey, nearly 70% of the respondents encountered threats on the Internet. The phenomenon of hate speech affects 37% of respondents who fell victim to it and 18% who practised hate speech.
Źródło:
Studia Prawnicze: rozprawy i materiały; 2021, (28), 1; 133-146
1689-8052
2451-0807
Pojawia się w:
Studia Prawnicze: rozprawy i materiały
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Covid Tracking Apps, Over Reliance on Technology, Bias and Unfairness
Autorzy:
Hilcenko, Christine
Taubman-Bassirian, Tara
Kovacic, Zoran
Powiązania:
https://bibliotekanauki.pl/articles/2044855.pdf
Data publikacji:
2021-12-28
Wydawca:
Uniwersytet Rzeszowski
Tematy:
privacy
individual freedom
security
information
Opis:
Various contact tracing apps tracking the spread of the pandemic were issued in different countries. Mainly based on two technologies, centralised with more control by the governments or decentralised controlled by the Apple or Google Android mobile phone systems. In this paper, we will discuss the advantages and disadvantages of the different systems, as well as their potential dangers.
Źródło:
Journal of Education, Technology and Computer Science; 2021, 12, 2(32); 93-103
2719-6550
Pojawia się w:
Journal of Education, Technology and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Whose Information Should Be Shared With Whom?: Parents’ Awareness Of Children’s Digital Privacy In Turkey
Autorzy:
Gül Ünlü, Derya
Morva, Oya
Powiązania:
https://bibliotekanauki.pl/articles/2150842.pdf
Data publikacji:
2020
Wydawca:
Univerzita sv. Cyrila a Metoda. Fakulta masmediálnej komunikácie
Tematy:
Sharenting
Digital parenting
Digital privacy
Opis:
Today, parents make use of social media accounts for many different purposes, such as obtaining information, giving advice, receiving support, and exchanging ideas with other parents. In parallel with the use of social media, according to their parenting roles, individuals frequently share various content related to both their own daily practices and the development processes of their children. The fact that most of the content shared is about children raises the question of digital privacy in this context. Based on this focus, this research aims to determine the priorities attached by the parents when they share content about children on their social media accounts, and what kind of measures they take in sharing this content to protect the digital privacy of their children. Therefore, a questionnaire based quantitative field study was carried out within the scope of this research. As a result of the study, it was found that parents primarily prefer sharing special occasions with their children, family photographs and photographs of their children at early ages; if the child is at a later age, they tend to consult him/her before sharing the content, but they do not tend to pay enough attention to ensuring that the child's identity is kept confidential and sharing of personal information is avoided.
Źródło:
Media Literacy and Academic Research; 2020, 3, 2; 109-124
2585-8726
Pojawia się w:
Media Literacy and Academic Research
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Polski dyskurs prywatności
Polish Discourse of Privacy
Autorzy:
Kita, Małgorzata
Powiązania:
https://bibliotekanauki.pl/articles/511071.pdf
Data publikacji:
2013
Wydawca:
Wydawnictwo Uniwersytetu Śląskiego
Tematy:
discourse
privacy
intimacy
contemporaineity
diary
Opis:
The main hypothesis presented in this article is the very existence of the discourse of privacy that is rooted in culture. This research covers the area of Polish contemporary discourse. The author claims that certain parts of the world of discourse consist of specific genres of speech and cultural scripts that determine the subsequent language choices of those who communicate. The author also implies that privacy as a psycho‑social feature is relative and it is revealed in a bipolar (PRIVATE – PUBLIC) structure. She implies that there is the migration of the discourse of privacy manifestations from their natural context („internal world“ of an individual, home, family, friends) to the public discourse. Such transgressive behaviour of participants of the „worlds of texts“ is one of the most important features of postmodern contemporaneity.
Źródło:
Postscriptum Polonistyczne; 2013, 1(11); 93-103
1898-1593
2353-9844
Pojawia się w:
Postscriptum Polonistyczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Privacy protection in a digital economy
Autorzy:
Wróblewski, Łukasz
Powiązania:
https://bibliotekanauki.pl/articles/1178970.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
cyberspace
economy
market
privacy
protection
Opis:
The author wonders, what impact on the privacy of the human being is developing ahead of us digital economy, with the acquisition of new technology. Brings forth the most important legal standards in force and outlines future European plans for digital market development. It presents the role of cyberspace in the functioning of business and society, and addresses the risks associated with it, such as exclusion, poverty and social unrest. Looking for answers to the question of what decides about behavior or loss of privacy in virtual reality.
Źródło:
World Scientific News; 2017, 89; 322-328
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Prawo dziecka do prywatności w obliczu edukacji zdalnej wyznaczonej pandemią koronawirusa
A child’s right to privacy in the face of distance education caused by the COVID-19 pandemic
Autorzy:
Samborska, Iwona
Powiązania:
https://bibliotekanauki.pl/articles/44031859.pdf
Data publikacji:
2022-12-03
Wydawca:
Akademia Pedagogiki Specjalnej im. Marii Grzegorzewskiej. Wydawnictwo APS
Tematy:
prawo dziecka do prywatności
ochrona prywatności
prywatność w warunkach edukacji zdalnej
children’s right to privacy
privacy protection
privacy in distance education
Opis:
Problematyka artykułu koncentruje się na realizacji prawa do prywatności przez dziecko w wieku wczesnoszkolnym w czasie edukacji zdalnej prowadzonej w warunkach pandemii COVID-19. Przedmiotem analiz były teksty pochodzące z wywiadów z dziećmi zawierające ich wypowiedzi na temat uczenia się zdalnego. Zakres prowadzonych analiz wyznaczała treść prawa dziecka do prywatności. Zidentyfikowano trzy kategorie analityczne dotyczące: 1) prywatności związanej z osobistą przestrzenią życia, 2) prywatności związanej z przebywaniem w określonym miejscu, 3) prywatności związanej z relacjami z innymi. Zastosowaną metodą była analiza treści. Wyniki analiz ujawniły szereg zagrożeń w obszarze prawa dziecka do prywatności, co rodzi potrzebę skutecznej jego ochrony. Prywatność w opinii badanych stanowiła dużą wartość, a jednocześnie potrzebę, która w warunkach uczenia się w sposób zapośredniczony wymaga podjęcia zdecydowanych działań o charakterze legislacyjnym oraz edukacyjnym.
The article focuses on the implementation of the right to privacy by the pre-school child during distance education conducted under the conditions of the COVID-19 pandemic. The subject of the analyses were texts from interviews with children containing their statements on distance learning. The scope of the conducted analyses was determined by the content of the child’s right to privacy. Three analytical categories were identified in terms of: 1) privacy related to personal living space, 2) privacy related to being in a certain place, and 3) privacy related to relationships with others. The method used was content analysis. The results of the analyses revealed several threats around the child’s right to privacy, which raises the need for its effective protection. Privacy, in the opinion of the respondents, is of great value and, at the same time, it is a need which, in mediated learning conditions, requires decisive legislative and educational measures.
Źródło:
Problemy Opiekuńczo-Wychowawcze; 2022, 614(9); 3-12
0552-2188
Pojawia się w:
Problemy Opiekuńczo-Wychowawcze
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Godność i prywatność osoby w świetle Konstytucji Rzeczypospolitej Polskiej
Dignity and privacy of individuals in the light of the Constitution of The Republic of Poland
Autorzy:
Fleszer, Dorota
Powiązania:
https://bibliotekanauki.pl/articles/443875.pdf
Data publikacji:
2015
Wydawca:
Wyższa Szkoła Humanitas
Tematy:
godność
prywatność
prawo do prywatności
autonomia informacyjna
dignity
privacy
right to privacy
autonomy information
Opis:
Ustawodawca uznaje godność osoby fizycznej za szczególną wartość związaną z istotą człowieczeństwa. Świadczy o tym przede wszystkim sposób, w jaki jest ona zagwarantowana w Konstytucji Rzeczypospolitej Polskiej. Godność stanowi bowiem źródło wolności i praw człowieka i obywatela. Jest nienaruszalna, a jej poszanowanie i ochrona jest obowiązkiem władz publicznych. Natomiast prawo do prywatności wywodzone jest bezpośrednio z prawa do godności. Jest ono utożsamiane z władztwem osoby fizycznej nad dotyczącymi jej informacjami, niedają- cym się sprowadzić tylko do wyrażenia zgody na rozpowszechnianie tych informacji, ale obejmuje również szczególną ochronę informacji, które zazwyczaj nie są chronione przed dostępem innych ludzi. Zachowanie przez człowieka godności wymaga bowiem poszanowania jego sfery czysto osobistej (prywatnej), tak by nie był on narażony na konieczność „bycia z innymi” czy „dzielenia się z innymi” swoimi przeżyciami czy doznaniami o intymnym charakterze.
In the eyes of a legislator, dignity of an individual is a special value associated with the essence of humanity. This is mainly presented by the way in which it is guaranteed by the Constitution of the Republic of Poland. This is because dignity is a source of freedom and rights of man and citizen. It is inviolable and must be respected and protected by public authorities. Whereas the right to privacy derives directly from the right to dignity. It is identified with an individual’s sovereignty over information related to it, which cannot be reduced only to giving consent to information distribution, but also includes special protection of information which, typically, is not protected against other people’s access. Man’s dignity requires respecting his purely personal sphere (private) so that he is not exposed to the need for “being with others” or “sharing with others” his experiences or intimate situations.
Źródło:
Roczniki Administracji i Prawa; 2015, 15/1; 19-30
1644-9126
Pojawia się w:
Roczniki Administracji i Prawa
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Geomedia and privacy in context. Paradoxical behavior or the unwitting sharing of geodata with digital platforms?
Autorzy:
Atteneder, Helena
Collini-Nocker, Bernhard
Powiązania:
https://bibliotekanauki.pl/articles/691358.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
privacy, geoprivacy, geomedia, privacy paradox, permanent spatial connectivity, ubiquitous geodata capturing, corporate surveillance, awareness
Opis:
The increasing pervasiveness of media in society implies the ubiquitous processes of geodata-capture and real-time feedback. The concept of Geomedia considers these developments and raises the questions of geoprivacy and corporate surveillance. The aim of this study was to investigate what kinds of geolocation data are shared wittingly or unwittingly, and in what contexts. Beyond that, we ask how much individuals know about the data-sharing processes and the underlying commercial logic, and how they act upon this knowledge (whether paradoxically or not). Our study was theoretically framed by contextual privacy (Nissenbaum 2011), because we assumed that a violation of privacy is perceived differently according to the context. The quasi-experimental design (using a WiFi-capture device) combined with a questionnaire revealed the participants’ attitudes to, and awareness of, data sharing, and their understanding of geoprivacy and geomedia use. The main results show that people are aware of the underlying commercial logic, have privacy concerns and, strongly depending on contextual factors, their knowledge and capabilities, act upon this awareness. Finally, we show that smartphones covertly share a huge amount of meta and traffic data.
Źródło:
Mediatization Studies; 2018, 2
2451-1188
Pojawia się w:
Mediatization Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Robust distributed privacy-preserving secure aggregation in vehicular communication
Autorzy:
Qin, B.
Wu, Q.
Domingo-Ferrer, J.
Susilo, W.
Powiązania:
https://bibliotekanauki.pl/articles/206240.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
authentication
vehicle privacy
data aggregation
VANETs
Opis:
Vehicular ad hoc networks (VANETs), formed by computers embedded in vehicles and the traffic infrastructure, are expected to develop in the near future to improve traffic safety and efficiency. To this end, VANETs should be designed to be resistant against various abuses and attacks. In this paper, we first review the existing proposals to provide security, privacy, and data aggregation in vehicle-to-vehicle communication. We then address the fundamental issue of achieving these conflicting properties in a unified solution, having observed that separate efforts cannot fulfill the VANET design objectives. A set of new mechanisms are suggested for efficiently managing identities and securely compressing cryptographic witnesses, which are among the major obstacles to the deployment of strong security mechanisms in VANETs. Finally, we employ the standard threshold cryptographic technology to improve the basic protocol with robustness.
Źródło:
Control and Cybernetics; 2012, 41, 2; 277-296
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Legal Security Aspects of Online Search. Postulates de lege ferenda
Autorzy:
Kurek, Justyna
Powiązania:
https://bibliotekanauki.pl/articles/1374840.pdf
Data publikacji:
2019
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
Privacy
spyware
covert activity in cyberspace
Opis:
Classified online search of telecommunication systems with the use of spyware tools requires comprehensive regulation. On the one hand, it should ensure the balance between an effective legal framework for guaranteeing public security in the online environment and legal regulation, on the other hand — it should respect constitutional norms, in particular the right of the individual to protect privacy, the inviolability of the home and the protection of correspondence. Legal and political consent for such activities requires, however, the creation of institutional, material, legal and procedural guarantees.
Źródło:
Internal Security; 2019, 11(2); 129-140
2080-5268
Pojawia się w:
Internal Security
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Privacy Preserving and Secure Iris-Based Biometric Authentication for Computer Networks
Autorzy:
Strzelczyk, P.
Powiązania:
https://bibliotekanauki.pl/articles/308388.pdf
Data publikacji:
2011
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
authentication
biometrics
iris recognition
privacy preserving
Opis:
The iris biometrics is considered one of the most accurate and robust methods of the identity verification. The unique iris features of an individual can be presented in a compact binary form which can be easily compared with the reference template to confirm identity. However in contrast to passwords and PINs biometric authentication factors cannot be revoked and changed as they are inherently connected to our characteristics. Once the biometric information is compromised or disclosed it became useless for the purpose of authentication. Therefore there is a need to perform iris features matching without revealing the features itself and the reference template. We propose an extension of the standard irisbased verification protocol which introduces a features and template locking mechanism, which guarantee that no sensitive information is exposed. Presented solutions can be easily integrated into authentication mechanisms used in modern computer networks.
Źródło:
Journal of Telecommunications and Information Technology; 2011, 4; 115-118
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
How To Construct Support Vector Machines Without Breaching Privacy
Autorzy:
Zhan, J.
Chang, L.
Matwin, S.
Powiązania:
https://bibliotekanauki.pl/articles/92993.pdf
Data publikacji:
2006
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
privacy
security
support vector machine (SVM)
Opis:
This paper addresses the problem of data sharing among multiple parties in the following scenario: without disclosing their private data to each other, multiple parties, each having a private data set, want to collaboratively construct support vector machines using a linear, polynomial or sigmoid kernel function. To tackle this problem, we develop a secure protocol for multiple parties to conduct the desired computation. In our solution, multiple parties use homomorphic encryption and digital envelope techniques to exchange the data while keeping it private. All the parties are treated symmetrically: they all participate in the encryption and in the computation involved in learning support vector machines.
Źródło:
Studia Informatica : systems and information technology; 2006, 1(7); 233-244
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Sféra soukromí a sféra zaměstnání − synergie či antagonismus?
Privacy sphere and employment sphere – synergy or antagonism?
Autorzy:
Novotná Březovská, Barbora
Powiązania:
https://bibliotekanauki.pl/articles/501365.pdf
Data publikacji:
2012
Wydawca:
Instytut Studiów Międzynarodowych i Edukacji Humanum
Tematy:
privacy
private life
public life
ethics
Opis:
This contribution deals with privacy at work from the angle of social psychology and ethics. The purpose is to try to find a definition of privacy itself and to point out the ambivalence of privacy in the private sphere of life and in the public sphere of life. It occurs that its roots are essentially ethical.
Źródło:
Społeczeństwo i Edukacja. Międzynarodowe Studia Humanistyczne; 2012, 2(10); 429-436
1898-0171
Pojawia się w:
Społeczeństwo i Edukacja. Międzynarodowe Studia Humanistyczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zniesławienie na Facebooku
Autorzy:
Wełyczko, Sylwia
Powiązania:
https://bibliotekanauki.pl/articles/2216235.pdf
Data publikacji:
2015-12-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
defamation
freedom of speech
dignity
privacy
Opis:
The article examines the mechanisms of defamation in the internet space, social media and Facebook in particular. Human dignity is protected both as a constitutional value and as an individual right, though in everyday practice law-enforcement bodies usually tend to be unwilling to react to violations of human dignity, while appropriate legal provisions are often not in place to be implemented. Actions taken by the police in investigating appropriate cases do not always manage to identify perpetrators or bring them to justice. Most internet or cyber crime occurs across international borders and can be committed anonymously. There are certain types of defamatory statements that are considered to harm the reputation of the victim. Libel in the internet involves cyberbullying, online harassment, cyber-stalking, and, most of all, internet trolls. Trolling is any deliberate and intentional attempt to disrupt the credibility of others, often involving petty arguments. People tend to lose control of their emotions when they go online. An explosion of raw and unbridled emotions follows, standards wane, and eventually some internet users lose their touch with reality. Cyber violence and online harassment are punishable crimes and are subject to criminal prosecution: defamation, libel and online threats. Stalking and vulgar language in public places are offences subject to public prosecution and the provisions of the Petty Offences Procedure Code. . Generally, a defamatory statement published to third parties has to be proved and it has to be proved that the publisher knew or should have known that the statement that they made which harmed the reputation was false. The good name or reputation of another can be damaged, or even totally destroyed, in a number of ways. To calumniate another is certainly to ruin a person’s or a company their good name and so to do them an injustice. The number of criminal offences under Article 212 has increased four times over the past ten years.
Źródło:
Themis Polska Nova; 2015, 2(9); 192-215
2084-4522
Pojawia się w:
Themis Polska Nova
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies