Search results
Results From The WOW.Com Content Network
The reasonable expectation of privacy has been extended to include the totality of a person's movements captured by tracking their cellphone. [24] Generally, a person loses the expectation of privacy when they disclose information to a third party, [ 25 ] including circumstances involving telecommunications. [ 26 ]
Peddling Prosperity: Economic Sense and Nonsense in an Age of Diminished Expectations is a book by Nobel laureate and New York Times columnist Paul Krugman, first published in 1994 by W. W. Norton & Company.
Peddling Prosperity: Economic Sense and Nonsense in an Age of Diminished Expectations (April 1995) ISBN 0-393-31292-5. History of economic thought from the first rumblings of revolt against Keynesian economics to the present, for the layman. The Age of Diminished Expectations: U.S. Economic Policy in the 1990s (1990) ISBN 0-262-11156-X
Economics of information security includes models of the strictly rational “homo economicus” as well as behavioral economics. Economics of securities addresses individual and organizational decisions and behaviors with respect to security and privacy as market decisions.
The OECD (Organisation for Economic Co-operation and Development) initiated privacy guidelines in 1980, setting international standards, and in 2007, proposed cross-border cooperation for privacy law enforcement.
Expectation of privacy; Financial privacy laws in the United States; HTLINGUAL, a former CIA project to intercept mail destined for the Soviet Union and China. Mass surveillance in the United States. U.S. government databases; MAINWAY, an NSA database containing metadata for billions of calls made over the Verizon and AT&T networks.
Consumer expectations for the economy have plunged to a ‘new low’ as the government faces continued pressure over public finances. It comes as businesses report job cuts and reduced sales.
Invasion of privacy, a subset of expectation of privacy, is a different concept from the collecting, aggregating, and disseminating information because those three are a misuse of available data, whereas invasion is an attack on the right of individuals to keep personal secrets. [176]