When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Privacy regulation theory - Wikipedia

    en.wikipedia.org/wiki/Privacy_regulation_theory

    A person seeks an optimal level of privacy (i.e. desired level equals to actual level).There are possibilities of too much or too little privacy. When there is too much privacy (actual desired level), a person may engage in crowding. On the other hand, when there is too little privacy (desired > actual level), a person may prefer social isolation.

  3. Information privacy - Wikipedia

    en.wikipedia.org/wiki/Information_privacy

    Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. [1] It is also known as data privacy [2] [3] or data protection.

  4. Reasonable expectation of privacy (United States) - Wikipedia

    en.wikipedia.org/wiki/Reasonable_expectation_of...

    Expectation of privacy must be reasonable, in the sense that society in general would recognize it as such; To meet the first part of the test, the person from whom the information was obtained must demonstrate that they, in fact, had an actual, subjective expectation that the evidence obtained would not be available to the public. In other ...

  5. Privacy - Wikipedia

    en.wikipedia.org/wiki/Privacy

    Watt envisions the “virtual control” test, understood as a remote control over the individual's right to privacy of communications, where privacy is recognized under the ICCPR, Article 17. This, she contends, may help to close the normative gap that is being exploited by nation states.

  6. Right to privacy - Wikipedia

    en.wikipedia.org/wiki/Right_to_privacy

    The concept of a human "right to privacy" begins when the Latin word ius expanded from meaning "what is fair" to include "a right – an entitlement a person possesses to control or claim something," by the Decretum Gratiani in Bologna, Italy in the 12th century. [6]

  7. Communication privacy management theory - Wikipedia

    en.wikipedia.org/wiki/Communication_privacy...

    Communication privacy management (CPM), originally known as communication boundary management, is a systematic research theory developed by Sandra Petronio in 1991. CPM theory aims to develop an evidence-based understanding of the way people make decisions about revealing and concealing private information.

  8. Personal data - Wikipedia

    en.wikipedia.org/wiki/Personal_data

    Personal data, also known as personal information or personally identifiable information (PII), [1] [2] [3] is any information related to an identifiable person.. The abbreviation PII is widely used in the United States, but the phrase it abbreviates has four common variants based on personal or personally, and identifiable or identifying.

  9. Self-concealment - Wikipedia

    en.wikipedia.org/wiki/Self-concealment

    Secrets and secret keeping have been a longstanding interest of psychologists and psychotherapists. [3] Jourard's [4] [5] work on self-disclosure and Pennebaker's research on the health benefits of disclosing traumatic events and secrets set the stage for the conceptualization and measurement of self-concealment.