首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
This article asserts that the United States federal government should adopt a centralized governmental structure for the privacy protection of personal information and data. There are a number of significant reasons, ranging from facilitation of the international dealings of United States corporations to the interactions of the United States government with other governments, for creating a centralized privacy protection structure for the United States federal government. This article examines the rise of centralized governmental privacy protection structures, identifies reasons for adopting such structures, and analyzes a selection of the structures used by various nations and states at present. From this analysis, the article presents a number of models of centralized governmental privacy protection structures. These models then form the basis of a discussion of what type of structural models of privacy protection would be most appropriate for the U.S. federal government.  相似文献   

2.

This article is an examination of electronic privacy, specifically as it relates to e‐mail and related communication issues in the computer environment. Since the passage of the Electronic Communications Privacy Act of 1986 (U.S. C. 18, §§ 2510–2711), there have been questions raised as to whether the Act goes far enough in protecting privacy.

The article attempts to clarify the status of e‐mail privacy under the ECPA. It examines current law and the paucity of definitive case law that until now has left the ECPA untested. A review of cases and literature suggests there is a gap in the existing ECPA that allows for potentially abusive electronic monitoring and interception of e‐mail, particularly in the workplace. “Electronic Mail, Privacy, and the Electronic Communications Privacy Act of 1986: Technology in Search of Law.”;  相似文献   

3.
A growing aspect of e-government is healthcare-related. Although preventative e-health services provided by governments like proximity tracing applications (PTAs) can bring important benefits, their adoption is lagging behind expectations. Researchers and policymakers need a better understanding of the factors that influence their adoption. The paper draws from the Unified Theory of Acceptance and Use of Technology (UTAUT) model and extends it by including privacy concerns as an explanatory factor regarding the intention to use PTAs. The study empirically evaluates the impact of privacy concerns together with two of its antecedents – trust in government and trust in technology – on the intention to use a PTA. Data from 762 adult respondents from Slovenia and Germany were collected and analysed using partial least squares structural equation modelling (PLS-SEM). The main findings are: (1) even in the unique context of a PTA the universal predictors of UTAUT have a significant impact; (2) privacy concerns have a direct impact on intention to use; and (3) trust in government and trust in technology both have a significant impact on privacy concerns. The theoretical implications are important for technology adoption research on e-health services provided by the government generally and PTAs in particular.  相似文献   

4.
开放式图书馆读者服务工作中涉及的几个法律问题探析   总被引:1,自引:0,他引:1  
汇总目前开放式图书馆读者服务工作中几个涉及相关法律的具体问题,主要包括曝光读者不良行为与读者名誉权、隐私权、读者长期占用免费存包柜、读者使用黑客程序上网、图书馆罚款标准规定以及数字图书馆建设中的困惑等问题,通过从现行法律条文中找寻依据,对以上问题进行了分析研究,并依法提出了应对的建议。  相似文献   

5.
隐私权是信息时代的一项基本人权.文章在简要阐释欧盟隐私管理政策与体制的基础上,分别介绍了英、法、德、意等欧盟成员国各自关于隐私权问题的法律规定,并通过对比分析从中挖掘对我国档案隐私权问题的有益启示.  相似文献   

6.
《Communication monographs》2012,79(3):344-365
This three-part study examines how privacy rules function to protect shared information from further revelation. Communication Privacy Management served as a theoretical framework to investigate issues related to boundary management. In the pilot study, college students (N = 409) described privacy rules and their use, and participants reported not further revealing the information when privacy rules were expressed by disclosers. In Study 1, participants (N = 167) reported on disclosing health-related information, and participants did not anticipate that recipients would further reveal especially when they used a privacy rule. In Study 2, dyads (dyad N = 257) reported on shared disclosure experiences, including both anticipated and actual boundary management. Study 2 findings include that privacy rules have limited effectiveness. The article discusses implications of privacy rule use when sharing private information.  相似文献   

7.
张法  盛钊  刘梅 《新世纪图书馆》2010,(1):80-82,20
论文通过对隐私权概念、各国隐私权法律保护的现状、公众对隐私问题的认知以及网络环境下图书馆服务方式的变化的分析,总结了我国图书馆在工作中可能面临的三个方面的隐私侵权风险,并根据这些风险提出了一些解决对策。  相似文献   

8.
The purpose of this article is to identify the process in which each nation appropriates a new technological force challenging regulatory regimes. Departing from regime theory, this paper critically assesses the interaction between Asian Pacific Economic Cooperation and the East-Asia ‘Four Tigers’ in formulating Internet security policy. A particular concern is about the formation of global information policy regime that arbitrates the tension between citizens' right to privacy and free information flow. This paper argues that the potential of the greater protection of information privacy are curtailed as market incentives of information flow dominate over the region's policy effort. A 2003 Bangkok meeting epitomizes such policy formulation in the interaction between international and national regimes that are particular to the region's regulatory legacies. Implications are discussed in terms of the function of industrial legacies in new information policy.  相似文献   

9.
数字保存中的技术、组织及法律因素分析   总被引:5,自引:0,他引:5  
章对数字献保存中的技术、组织以及法律因素进行分析,在发现问题的基础上提出解决建议。技术因素包括:数字存储介质、技术的变化、内容真实性以及存储能力;组织因素包括:成本、专业性、组织结构、角色分工以及选择;法律因素包括:知识产权和隐私权。  相似文献   

10.
The increasing use of the Internet for service delivery has paralleled an increase of e-service users' privacy concerns as technology offers ample opportunities for organizations to store, process, and exploit personal data. This may reduce individuals' perceived ability to control their personal information and increase their perceived privacy risk. A systematic understanding of individuals' privacy concerns is important as negative user perceptions are a challenge to service providers' reputation and may hamper service delivery processes as they influence users' trust and willingness to disclose personal information. This study develops and validates a model that examines the effect of organizational privacy assurances on individual privacy concerns, privacy control and risk perceptions, trust beliefs and non-self-disclosure behavior. Drawing on a survey to 547 users of different types of e-services – e-government, e-commerce and social networking – in Rwanda, and working within the framework of exploratory analysis, this study uses partial least square-structural equation modeling to validate the overall model and the proposed hypotheses. The findings show that perceptions of privacy risks and privacy control are antecedents of e-service users' privacy concerns, trust and non-self-disclosure behavior. They further show that the perceived effectiveness of privacy policy and perceived effectiveness of self-regulations influence both perceptions of privacy risks and control and their consequences; users' privacy concerns, trust and non-self-disclosure behavior. The hypotheses are supported differently across the three types of e-services, which means that privacy is specific to context and situation. The study shows that the effect of privacy assurances on trust is different in e-government services than in other services which suggest that trust in e-government may be more complex and different in nature than in other contexts. The findings serve to enhance a theoretical understanding of organizational privacy assurances and individual privacy concerns, trust and self-disclosure behavior. They also have implications for e-service providers and users as well as for regulatory bodies and e-services designers.  相似文献   

11.
Research articles discussing in detail how methodological decisions for a particular study have been made are not common in the literature. The set of choices related to methodological choices must be based on knowledge of research methodology. The present article critically discusses the methodology used for a published study, which explored factors that enable and constrain collaboration between academics and library staff, in universities in two contrasting countries, Australia and Vietnam. A key aim is to provide an understanding of how methodological choices were made, including knowledge of paradigms, methods, and techniques required for the study. Of particular focus is the interaction of methodological choices with the theoretical underpinnings of the research, in this case Giddens' (1984) structuration theory. This article would be beneficial to researchers seeking to evaluate the methodological planning process and its connection with theory development or could serve as a model for researchers wanting to build theory using case study research.  相似文献   

12.
钟明  钱庆  吴思竹 《图书情报工作》2022,66(24):128-139
[目的/意义]总结国外医学科学数据隐私保护实践经验,为我国医学科学数据隐私管理提供借鉴和启示。[方法/过程]采用网络调研法和内容分析法,对PhysioNet、TCIA、BioLINCC、N3C、SAIL、Brain-CODE 6个典型的医学科学数据仓储进行调研,从数据政策、数据收集、数据保存和数据使用4个方面对其开展的隐私保护措施进行比较分析。[结果/结论]所调查的数据共享仓储根据相关政策法规,采取符合自身特点的医学科学数据隐私保护措施,并不断优化和完善。我国可借鉴国外医学科学数据仓储的隐私保护经验,加快医学科学数据隐私保护政策落地,提高数据去隐私化处理水平,强化数据基础设施安全保障,完善数据访问控制机制。  相似文献   

13.
14.
参照GB 3100~ 3102-1993《量和单位》和关于计算机流程图的相关规范,分析科技期刊中计算机流程图表达中存在的问题,且给出规范的表达形式.认为:流程图中,开始与结束标志符号用椭圆框表示,数据输入和输出标志符号用平行四边形框表示,判定标志符号用菱形框表示,活动标志符号用矩形框表示;判定的2种选择可用"是"或"否","Y"或"N","Yes"或"No"表示,建议全期期刊表达一致,首选"Y"或"N"表示;图形中的文字、变量符号、体例、格式可参考GB 3100~3102-1993等相关标准进行规范.  相似文献   

15.
Antiterrorism legislation passed at the end of 2001—the U.S.A. Patriot Act—has serious implications for privacy. Many of the law’s provisions expand the government’s existing ability to intercept wire, oral, and electronic communications relating to terrorism and other crimes, to share criminal investigative information, and to conduct electronic surveillance. While the changes are controversial, and some are of questionable constitutionality, the surveillance provisions of the new law mostly make changes in degree and not kind. Other aspects of privacy and privacy law remained unchanged. Laws affecting how the private sector gathers, stores, and uses personal information for private purposes were not modified. After passage of the antiterrorism law, other legislation expanded privacy protections in other areas. Further events and legislation will affect privacy rights and interests, and some protections may be eroded while others are improved.  相似文献   

16.
Our information societies are evolving into surveillance societies, as we near the year 2000. The various automated databases now in existence make possible fairly integrated monitoring of individuals in Western countries. The proliferation of such information banks in both the public and private sectors, rather than the existence of any single one of them, poses the fundamental challenge to privacy interests. We need to think about the implications of such surveillance practices for the protection of human rights. In North America, in particular, the application of information technology is galloping ahead of regulation and control. Moreover, despite the advent of privacy and data protection laws and agencies, there is some evidence that we have only created the illusion of data protection, since the force of those trying to invade privacy is so overpowering in the name of efficiency and cost control.  相似文献   

17.
ABSTRACT

In October 2001, Congress passed the USA PATRIOT Act to strengthen the ability of the U.S. government to combat terrorism. Unfortunately, some sections of the Act strike at core values and practices of libraries and archives, especially in the areas of record keeping, privacy, confidentiality, security, and access to the collections. This article addresses several crucial issues with focus especially on Section 215 of the Act, privacy and confidentiality concerns, record keeping practices, and the development of policies and procedures to prepare archivists for a request from the Federal Bureau of Investigation for researcher records.  相似文献   

18.
[目的/意义] 针对目前我国个人信息保护规范和政策不断出台而大学图书馆相关政策极度缺失的状况,调查并分析英国10所著名大学图书馆网站个人信息保护政策,为我国大学图书馆今后发展个人信息保护政策提供可借鉴的经验。[方法/过程] 对英国10所著名大学的图书馆网站个人信息保护政策内容进行全面扫描,结合隐私保护准则以及隐私关注测量模型进行政策文本的分析,揭示这些政策文本在形式和主题方面的特点。[结果/结论] 英国大学图书馆个人信息保护政策主要包括隐私政策、Cookies政策和数据保护,颁布主体多为学校;内容主题通常包括保证类、个人信息生命周期管理类以及事务类,与OECD隐私保护准则以及隐私关注测量模型有较好吻合。这些对我国大学图书馆未来发展个人信息保护政策有很好的借鉴价值。  相似文献   

19.
This paper demonstrates the divergent requestor privacy policies of professional librarians and the administration of the Freedom of Information Act (FOIA), and urges the federal government to adhere to librarian ethics in order to protect FOIA requestors. Section 1 of the paper provides information about the origins and purpose of the FOIA. Section 2 offers an overview of the philosophical and historical origins of library patron privacy ethics, discussing both the ethical basis for patron privacy and actual instances where library records have been sought for government surveillance of private citizens. Section 3 describes the state library laws that protect library requestors, as well as federal laws that protect non-FOIA requestor privacy rights, including the Video Privacy Protection Act (VPPA), which protects video rental records. Section 4 of the paper warns that, in the digital era, it is more important than ever to safeguard personal information like that contained in FOIA requests to prevent the stifling of information seeking activities in the United States. By modifying laws tomeet the needs of the “information age,” the United States government can embrace and utilize the ethical standards that are at the foundation of librarianship, and protect the principle that information should be free and available to the American populace.  相似文献   

20.
Libraries have always been places where individuals feel free to explore new ideas and seek out information in the pursuit of creative and intellectual growth. Fear of exposure or surveillance could threaten an individual's inclination to search for and access information. Understandably then, privacy is understood to be a core professional responsibility of librarians. This study builds on a national report and a qualitative study, completed in the United States, which explored librarians' attitudes on privacy. Adding a Canadian voice to the literature, this study examines survey results from academic librarians in Canada on their perceptions and attitudes related to library practices and online privacy behaviors. Overall, Canadian academic librarians believe that protecting patron privacy and educating patrons about issues related to online privacy is important. However, many Canadian academic librarians doubt that libraries are doing all they can to protect patron privacy. Academic librarians stand to gain knowledge and understanding of peer attitudes toward online privacy, as well as how patron privacy is being advocated for and protected on university campuses across Canada. The results will guide future library policies and programming aimed at creating an environment where privacy rights are protected and patrons can make informed choices about their online actions.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号