When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Reasonable expectation of privacy (United States) - Wikipedia

    en.wikipedia.org/wiki/Reasonable_expectation_of...

    The reasonable expectation of privacy has been extended to include the totality of a person's movements captured by tracking their cellphone. [24] Generally, a person loses the expectation of privacy when they disclose information to a third party, [ 25 ] including circumstances involving telecommunications. [ 26 ]

  3. Contextual integrity - Wikipedia

    en.wikipedia.org/wiki/Contextual_Integrity

    For example, Primal et al. argued that smartphone permissions would be more efficient if it only prompts the user "when an application's access to sensitive data is likely to defy expectations", and they examined how applications were accessing personal data and the gap between the current practice and users' expectations. [8]

  4. Economics of security - Wikipedia

    en.wikipedia.org/wiki/Economics_of_security

    Economics of securities addresses individual and organizational decisions and behaviors with respect to security and privacy as market decisions. Economics of security addresses a core question: why do agents choose technical risks when there exists technical solutions to mitigate security and privacy risks? Economics addresses not only this ...

  5. Privacy - Wikipedia

    en.wikipedia.org/wiki/Privacy

    Invasion of privacy, a subset of expectation of privacy, is a different concept from the collecting, aggregating, and disseminating information because those three are a misuse of available data, whereas invasion is an attack on the right of individuals to keep personal secrets. [176]

  6. Communication privacy management theory - Wikipedia

    en.wikipedia.org/wiki/Communication_privacy...

    Communication privacy management (CPM), originally known as communication boundary management, is a systematic research theory developed by Sandra Petronio in 1991. CPM theory aims to develop an evidence-based understanding of the way people make decisions about revealing and concealing private information.

  7. Privacy law - Wikipedia

    en.wikipedia.org/wiki/Privacy_law

    The OECD (Organisation for Economic Co-operation and Development) initiated privacy guidelines in 1980, setting international standards, and in 2007, proposed cross-border cooperation for privacy law enforcement.

  8. Paul Krugman - Wikipedia

    en.wikipedia.org/wiki/Paul_Krugman

    Peddling Prosperity: Economic Sense and Nonsense in an Age of Diminished Expectations (April 1995) ISBN 0-393-31292-5. History of economic thought from the first rumblings of revolt against Keynesian economics to the present, for the layman. The Age of Diminished Expectations: U.S. Economic Policy in the 1990s (1990) ISBN 0-262-11156-X

  9. Information privacy - Wikipedia

    en.wikipedia.org/wiki/Information_privacy

    Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. [1] It is also known as data privacy [2] [3] or data protection.