When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Privacy regulation theory - Wikipedia

    en.wikipedia.org/wiki/Privacy_regulation_theory

    Traditionally, privacy is regarded as a state of social withdrawal (i.e., avoiding people). [3] Altman, however, regards it as a dialectic and dynamic boundary regulation process where privacy is not static but "a selective control of access to the self or to one’s group" [1] (p. 18).

  3. Computer-based test interpretation in psychological assessment

    en.wikipedia.org/wiki/Computer-Based_Test...

    Computer-based test interpretation (CBTI) programs are technological tools that have been commonly used to interpret data in psychological assessments since the 1960s. CBTI programs are used for a myriad of psychological tests, like clinical interviews or problem rating, but are most frequently exercised in psychological and neuropsychological ...

  4. Reasonable expectation of privacy (United States) - Wikipedia

    en.wikipedia.org/wiki/Reasonable_expectation_of...

    An individual has no legitimate expectation of privacy in information provided to third parties. In Smith v. Maryland , 442 U.S. 735 (1979), the Supreme Court held individuals have no "legitimate expectation of privacy" regarding the telephone numbers they dial because they knowingly give that information to telephone companies when they dial a ...

  5. Privacy - Wikipedia

    en.wikipedia.org/wiki/Privacy

    The word privacy is derived from the Latin word and concept of ‘privatus’, which referred to things set apart from what is public; personal and belonging to oneself, and not to the state. [3] Literally, ‘privatus’ is the past participle of the Latin verb ‘privere’ meaning ‘to be deprived of’. [4]

  6. Information privacy - Wikipedia

    en.wikipedia.org/wiki/Information_privacy

    Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. [1] It is also known as data privacy [2] [3] or data protection.

  7. Communication privacy management theory - Wikipedia

    en.wikipedia.org/wiki/Communication_privacy...

    Communication privacy management (CPM), originally known as communication boundary management, is a systematic research theory developed by Sandra Petronio in 1991. CPM theory aims to develop an evidence-based understanding of the way people make decisions about revealing and concealing private information.

  8. Psychology - Wikipedia

    en.wikipedia.org/wiki/Psychology

    Psychology is the scientific study of mind and behavior. [1] [2] Its subject matter includes the behavior of humans and nonhumans, both conscious and unconscious phenomena, and mental processes such as thoughts, feelings, and motives. Psychology is an academic discipline of immense scope, crossing the boundaries between the natural and social ...

  9. Personal data - Wikipedia

    en.wikipedia.org/wiki/Personal_data

    Personal data, also known as personal information or personally identifiable information (PII), [1] [2] [3] is any information related to an identifiable person.. The abbreviation PII is widely used in the United States, but the phrase it abbreviates has four common variants based on personal or personally, and identifiable or identifying.