Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
151,474
result(s) for
"Right of privacy."
Sort by:
DECONSTRUCTING DATA PROTECTION: THE ‘ADDED-VALUE’ OF A RIGHT TO DATA PROTECTION IN THE EU LEGAL ORDER
by
Lynskey, Orla
in
Charter of Fundamental Rights of the European Union (2000 December 7)
,
CIVIL LIBERTIES
,
Courts
2014
Article 8 of the EU Charter of Fundamental Rights sets out a right to data protection which sits alongside, and in addition to, the established right to privacy in the Charter. The Charter's inclusion of an independent right to data protection differentiates it from other international human rights documents which treat data protection as a subset of the right to privacy. Its introduction and its relationship with the established right to privacy merit an explanation. This paper explores the relationship between the rights to data protection and privacy. It demonstrates that, to date, the Court of Justice of the European Union (CJEU) has consistently conflated the two rights. However, based on a comparison between the scope of the two rights as well as the protection they offer to individuals whose personal data are processed, it claims that the two rights are distinct. It argues that the right to data protection provides individuals with more rights over more types of data than the right to privacy. It suggests that the enhanced control over personal data provided by the right to data protection serves two purposes: first, it proactively promotes individual personality rights which are threatened by personal data processing and, second, it reduces the power and information asymmetries between individuals and those who process their data. For these reasons, this paper suggests that there ought to be explicit judicial recognition of the distinction between the two rights.
Journal Article
Privacy : a very short introduction
Some would argue that scarcely a day passes without a new assault on our privacy. In the wake of the whistle-blower Edward Snowden's revelations about the extent of surveillance conducted by the security services in the United States, Britain, and elsewhere, concerns about individual privacy have significantly increased. The Internet generates risks, unimagined even twenty years ago, to the security and integrity of information in all its forms. The manner in which information is collected, stored, exchanged, and used has changed forever; and with it, the character of the threats to individual privacy. The scale of accessible private data generated by the phenomenal growth of blogs, social media, and other contrivances of our information age pose disturbing threats to our privacy. And the hunger for gossip continues to fuel sensationalist media that frequently degrade the notion of a private domain to which we reasonably lay claim. In the new edition of this Very Short Introduction, Raymond Wacks looks at all aspects of privacy to include numerous recent changes, and considers how this fundamental value might be reconciled with competing interests such as security and freedom of expression.
Practicing Privacy Literacy in Academic Libraries
by
Chisholm, Alexandria
,
Hartman-Caverly, Sarah
in
Academic libraries
,
Data privacy-Study and teaching
,
Librarians-Professional ethics
2023
Practicing Privacy Literacy in Academic Libraries: Theories, Methods, and Cases can help you teach privacy literacy, evolve the privacy practices at your institution, and re-center the individuals behind the data and the ethics behind library work.
The Moral Significance of Privacy Dependencies
by
Mainz, Jakob Thrane
,
Munch, Lauritz Aastrup
in
Big Data
,
Information dissemination
,
Personal information
2023
Often, when we share information about ourselves, we contribute to people learning personal things about others. This may happen because what we share about ourselves can be used to infer personal information about others. Such dependencies have become known as privacy dependencies in the literature. It is sometimes claimed that the scope of the right to privacy should be expanded in light of such dependencies. For example, some have argued that inferring information about others can violate their right to privacy. Others have argued that sharing personal information about yourself that license such inferences can by itself violate the right to privacy. In this paper, we argue that the latter view should be rejected.
Journal Article
Digital identities in tension : between autonomy and control
by
Khatchatourov, Armen, author
,
Chardel, Pierre-Antoine. Identity as an issue of constraint and recognition: a question of fundamental ethics
,
Khatchatourov, Armen. Digital regimes of identity management: from the exercise of privacy to modulation of the self
in
Privacy, Right of.
,
Data protection.
The digital person : technology and privacy in the information age
by
Solove, Daniel J.
in
Access control
,
Data protection
,
Data protection -- Law and legislation -- United States
2004
Seven days a week, twenty-four hours a day, electronic databases are compiling information about you. As you surf the Internet, an unprecedented amount of your personal information is being recorded and preserved forever in the digital minds of computers. For each individual, these databases create a profile of activities, interests, and preferences used to investigate backgrounds, check credit, market products, and make a wide variety of decisions affecting our lives. The creation and use of these databases—which Daniel J. Solove calls “digital dossiers”—has thus far gone largely unchecked. In this startling account of new technologies for gathering and using personal data, Solove explains why digital dossiers pose a grave threat to our privacy.
The Digital Person sets forth a new understanding of what privacy is, one that is appropriate for the new challenges of the Information Age. Solove recommends how the law can be reformed to simultaneously protect our privacy and allow us to enjoy the benefits of our increasingly digital world.
The first volume in the series EX MACHINA: LAW, TECHNOLOGY, AND SOCIETY
Of privacy and power : the transatlantic struggle over freedom and security
We live in an interconnected world, where security problems like terrorism are spilling across borders, and globalized data networks and e-commerce platforms are reshaping the world economy. This means that states' jurisdictions and rule systems clash. How have they negotiated their differences over freedom and security? Of Privacy and Power investigates how the European Union and United States, the two major regulatory systems in world politics, have regulated privacy and security, and how their agreements and disputes have reshaped the transatlantic relationship. The transatlantic struggle over freedom and security has usually been depicted as a clash between a peace-loving European Union and a belligerent United States. Henry Farrell and Abraham Newman demonstrate how this misses the point. The real dispute was between two transnational coalitions--one favoring security, the other liberty--whose struggles have reshaped the politics of surveillance, e-commerce, and privacy rights. Looking at three large security debates in the period since 9/11, involving Passenger Name Record data, the SWIFT financial messaging controversy, and Edward Snowden's revelations, the authors examine how the powers of border-spanning coalitions have waxed and waned. Globalization has enabled new strategies of action, which security agencies, interior ministries, privacy NGOs, bureaucrats, and other actors exploit as circumstances dictate.
Privacy Protection in Using Artificial Intelligence for Healthcare: Chinese Regulation in Comparative Perspective
2022
Advanced artificial intelligence (AI) technologies are now widely employed in China’s medical and healthcare fields. Enormous amounts of personal data are collected from various sources and inserted into AI algorithms for medical purposes, producing challenges to patient’s privacy. This is a comparative study of Chinese, United States, and European Union operational rules for healthcare data that is collected and then used in AI functions, particularly focusing on legal differences and deficiencies. The conceptual boundaries of privacy and personal information, the influence of technological development on the informed consent model, and conflicts between freedom and security in rules of cross-border data flow were found to be key issues requiring consideration when regulating healthcare data used for AI purposes. Furthermore, the results indicate that the appropriate balance between privacy protections and technological development, between individual and group interests, and between corporate profits and the public interest should be identified and observed. In terms of specific rule-making, it was found that China should establish special regulations protecting healthcare information, provide clear definitions and classification schemas for different types of healthcare information, and enact stricter accountability mechanisms. Examining and contrasting operational rules for AI in health care promotes informed privacy governance and improved privacy legislation.
Journal Article