Privacy

Privacy (UK: /ˈprɪvəs/, US: /ˈpr-/)[1][2] is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.

see caption
Banksy's One Nation Under CCTV graffiti, adjacent to an actual CCTV camera

The domain of privacy partially overlaps with security, which can include the concepts of appropriate use and protection of information. Privacy may also take the form of bodily integrity.

There have been many different conceptions of privacy throughout history. Most cultures recognize the right of an individual to withhold aspects of their personal lives from public record. The right not to be subjected to unsanctioned invasions of privacy by the government, corporations, or individuals is part of many countries' privacy laws, and in some cases, constitutions.

With the rise of technology, the debate regarding privacy has expanded from a bodily sense to include a digital sense. In most countries, the right to digital privacy is considered an extension of the original right to privacy, and many countries have passed acts that further protect digital privacy from public and private entities.

There are multiple techniques to invade privacy, which may be employed by corporations or governments for profit or political reasons. Conversely, in order to protect privacy, people may employ encryption or anonymity measures.

Wiki EnglishWiki JapaneseWiki Deutsch Etymology DeCew, Judith (2015-01-01). Zalta, Edward N. (ed.). Privacy (Spring 2015 ed.). Metaphysics Research Lab, Stanford University.
  • ^ Sirach 29:21
  • ^ "4 Harvard Law Review 193 (1890)". Groups.csail.mit.edu. 1996-05-18. Retrieved 2019-08-22.
  • ^ Information Privacy, Official Reference for the Certified Information privacy Professional (CIPP), Swire, 2007
  • ^ "Nineteen Eighty-four | Summary, Characters, Analysis, & Facts". Encyclopedia Britannica. Retrieved 2021-09-27.
  • ^ Leetaru, Kalev. "As Orwell's 1984 Turns 70 It Predicted Much Of Today's Surveillance Society". Forbes. Retrieved 2021-09-27.
  • ^ a b c d e f g h i Solove 2010, pp. 3–4.
  • ^ "Alan Westin is the father of modern data privacy law". Osano. 2020-07-24. Retrieved 2021-09-28.
  • ^ a b c "Silicon Valley is Listening to Your Most Intimate Moments". Bloomberg.com. Bloomberg Businessweek. 2019-12-11. Retrieved 2021-06-02.
  • ^ "United States v. Jones". Oyez. Retrieved 2021-09-27.
  • ^ "Riley v. California". Oyez. Retrieved 2021-09-27.
  • ^ "Carpenter v. United States". Oyez. Retrieved 2021-09-27.
  • ^ "17 disturbing things Snowden has taught us (so far)". The World from PRX. Retrieved 2021-09-28.
  • ^ "Privacy vs Security: A pointless false dichotomy?". Archived from the original on 2023-01-31.
  • ^ Ari Ezra Waldman (2021). "One Book in One Page". Industry Unbound: The Inside Story of Privacy, Data, and Corporate Power. Cambridge University Press. p. x. doi:10.1017/9781108591386. ISBN 978-1-108-49242-3.
  • ^ "The Little-Known Data Broker Industry Is Spending Big Bucks Lobbying Congress". April 2021. Archived from the original on 2023-04-22.
  • ^ a b c "The Web Means the End of Forgetting". The New York Times. 2010-07-25. Archived from the original on 2019-03-10.
  • ^ "Privacy". Electronic Frontier Foundation.
  • ^ "Legislative Reform". Cyber Civil Rights Initiative.
  • ^ Ben Tarnoff (2022). "Preface: Among the Eels". Internet for the People: The Fight for Our Digital Future. Verso Books. pp. 8–9. ISBN 978-1-83976-202-4.
  • ^ "Fighting Identity Theft with the Red Flags Rule: A How-To Guide for Business". Federal Trade Commission. 2013-05-02. Retrieved 2021-09-28.
  • ^ Tiku, Nitasha. "How Europe's New Privacy Law Will Change the Web, and More". Wired. ISSN 1059-1028. Retrieved 2021-10-26.
  • ^ "Children's Online Privacy Protection Rule ("COPPA")". Federal Trade Commission. 2013-07-25. Retrieved 2021-09-28.
  • ^ "Fair Credit Reporting Act". Federal Trade Commission. 19 July 2013. Retrieved 2023-06-18.
  • ^ "Facebook: active users worldwide". Statista. Retrieved 2020-10-11.
  • ^ Hugl, Ulrike (2011), "Reviewing Person's Value of Privacy of Online Social Networking," Internet Research, 21(4), in press, http://www.emeraldinsight.com/journals.htm?issn=1066-2243&volume=21&issue=4&articleid=1926600&show=abstract Archived 2014-03-28 at the Wayback Machine
  • ^ Kosinski, Michal; Stillwell, D.; Graepel, T. (2013). "Private traits and attributes are predictable from digital records of human behavior". Proceedings of the National Academy of Sciences. 110 (15): 5802–5805. Bibcode:2013PNAS..110.5802K. doi:10.1073/pnas.1218772110. PMC 3625324. PMID 23479631.
  • ^ "Self-portraits and social media: The rise of the 'selfie'". BBC News. 2013-06-07. Retrieved 2021-03-17.
  • ^ Giroux, Henry A. (2015-05-04). "Selfie Culture in the Age of Corporate and State Surveillance". Third Text. 29 (3): 155–164. doi:10.1080/09528822.2015.1082339. ISSN 0952-8822. S2CID 146571563.
  • ^ Dhir, Amandeep; Torsheim, Torbjørn; Pallesen, Ståle; Andreassen, Cecilie S. (2017). "Do Online Privacy Concerns Predict Selfie Behavior among Adolescents, Young Adults and Adults?". Frontiers in Psychology. 8: 815. doi:10.3389/fpsyg.2017.00815. ISSN 1664-1078. PMC 5440591. PMID 28588530.
  • ^ CTVNews.ca Staff (October 14, 2012). "In wake of Amanda Todd suicide, MPs to debate anti-bullying motion". CTV News. Archived from the original on October 29, 2013. Retrieved October 17, 2012.
  • ^ Boutilier, Alex (April 13, 2014). "Amanda Todd's mother raises concerns about cyberbullying bill: Families of cyberbullying victims want legislation, but some have concerns about warrantless access to Canadians personal data". www.thestar.com. Archived from the original on October 28, 2016. Retrieved September 12, 2016.
  • ^ Todd, Carol (May 14, 2014). "Carol Todd's Testimony regarding Bill C-13". www.openparliament.ca. Archived from the original on September 18, 2016. Retrieved September 12, 2016.
  • ^ "Real-Name Online Registration to Be Scrapped". The Chosun Ilbo. Archived from the original on 2023-04-23.
  • ^ Empirical analysis of online anonymity and user behaviors: the impact of real name policy. Hawaii International Conference on System Sciences (45th ed.). IEEE Computer Society. 2012.
  • ^ "Law, Policies and Regulations". 24 September 2019. Retrieved 2023-06-19.
  • ^ "Florida Anti-Bullying Laws and Policies". 24 September 2019. Retrieved 2023-06-19.
  • ^ de Montjoye, Yves-Alexandre; César A. Hidalgo; Michel Verleysen; Vincent D. Blondel (March 25, 2013). "Unique in the Crowd: The privacy bounds of human mobility". Scientific Reports. 3: 1376. Bibcode:2013NatSR...3E1376D. doi:10.1038/srep01376. PMC 3607247. PMID 23524645.
  • ^ Athanasios S. Voulodimos and Charalampos Z. Patrikakis, "Quantifying Privacy in Terms of Entropy for Context Aware Services", special issue of the Identity in the Information Society journal, "Identity Management in Grid and SOA", Springer, vol. 2, no 2, December 2009
  • ^ Whittaker, Zack. "AccuWeather caught sending user location data – even when location sharing is off". ZDNet. Retrieved 2021-11-22.
  • ^ Kirk, Jeremy (March 20, 2017). "McShame: McDonald's API Leaks Data for 2.2 Million Users". www.bankinfosecurity.com. Retrieved 2021-11-22.
  • ^ Popkin, Helen A.S., "Gov't officials want answers to secret iPhone tracking". MSNBC, "Technology", April 21, 2011
  • ^ "Apple faces questions from Congress about iPhone tracking". Computerworld. 2011-04-21. Archived from the original on 2019-07-20.
  • ^ "Apple denies tracking iPhone users, but promises changes". Computerworld. 2011-04-27. Archived from the original on 2023-03-29.
  • ^ a b "Complaint for Injunctive and Other Relief" (PDF). The Superior Court of the State of Arizona In and For the County of Maricopa. 2021-06-03. Retrieved 2021-06-03.
  • ^ a b Chen, Brian X. (2021-09-16). "The Battle for Digital Privacy Is Reshaping the Internet". The New York Times. ISSN 0362-4331. Retrieved 2021-11-22.
  • ^ "Google Facing Fresh E.U. Inquiry Over Ad Technology". The New York Times. 2021-06-22. Archived from the original on 2023-04-15.
  • ^ "EFF technologist cites Google "breach of trust" on FLoC; key ad-tech change agent departs IAB Tech Lab". Information Trust Exchange Governing Association. Retrieved April 16, 2021.
  • ^ "Google's FLoC Is a Terrible Idea". Electronic Frontier Foundation. 2021-03-03.
  • ^ Kosinski, Michal; Stillwell, D.; Graepel, T. (2013). "Private traits and attributes are predictable from digital records of human behavior". Proceedings of the National Academy of Sciences. 110 (15): 5802–5805. Bibcode:2013PNAS..110.5802K. doi:10.1073/pnas.1218772110. PMC 3625324. PMID 23479631.
  • ^ "The Italian Constitution" (PDF). The official website of the Presidency of the Italian Republic. Archived from the original on 2016-11-27.
  • ^ Solove 2010, p. 3.
  • ^ Quinn, Michael J. (2009). Ethics for the Information Age. Pearson Addison Wesley. ISBN 978-0-321-53685-3.
  • ^ "Privacy Guidelines". OECD. Retrieved 2019-08-22.
  • ^ Cate, Fred H.; Collen, Peter; Mayer-Schönberger, Viktor. Data Protection Principles for the 21st Century. Revising the 1980 OECD Guidelines (PDF) (Report). Archived from the original (PDF) on 2018-12-31. Retrieved 2019-02-01.
  • ^ Jensen, Carlos (2004). Privacy policies as decision-making tools: an evaluation of online privacy notices. CHI.
  • ^ "The Privacy Act". Home. 10 March 2023.
  • ^ "For Your Information". Alrc.gov.au. 2008-08-12. Retrieved 2019-08-22.
  • ^ Privacy Amendment (Enhancing Privacy Protection) Bill 2012.
  • ^ Zhong, Guorong (2019). "E-Commerce Consumer Privacy Protection Based on Differential Privacy". Journal of Physics: Conference Series. 1168 (3): 032084. Bibcode:2019JPhCS1168c2084Z. doi:10.1088/1742-6596/1168/3/032084. S2CID 169731837.
  • ^ Burghardt, Buchmann, Böhm, Kühling, Sivridis A Study on the Lack of Enforcement of Data Protection Acts Proceedings of the 3rd int. conference on e-democracy, 2009.
  • ^ Mark Scott (3 December 2014). "French Official Campaigns to Make 'Right to be Forgotten' Global". nytimes. Retrieved 14 April 2018.
  • ^ "What Happens When a Billion Identities Are Digitized?". Yale Insights. 27 March 2020. Retrieved 2021-11-22.
  • ^ Masiero, Silvia (2018-09-24). "Explaining Trust in Large Biometric Infrastructures: A Critical Realist Case Study of India's Aadhaar Project". The Electronic Journal of Information Systems in Developing Countries. 84 (6): e12053. doi:10.1002/isd2.12053.
  • ^ McCarthy, Julie (2017-08-24). "Indian Supreme Court Declares Privacy A Fundamental Right". NPR. Retrieved 2021-11-22.
  • ^ Saberin, Zeenat. "India's top court upholds validity of biometric ID card". www.aljazeera.com. Retrieved 2021-11-22.
  • ^ Does Beckham judgment change rules?, from BBC News (retrieved 27 April 2005).
  • ^ "Personal Information Toolkit" Archived 2009-01-03 at the Wayback Machine Information Commissioner's Office, UK
  • ^ "Fourth Amendment". LII / Legal Information Institute. Retrieved 2021-03-20.
  • ^ "DOBBS v. JACKSON WOMEN'S HEALTH ORGANIZATION". LII / Legal Information Institute. Retrieved 2022-06-25.
  • ^ Frias, Lauren. "What is Griswold v. Connecticut? How access to contraception and other privacy rights could be at risk after SCOTUS overturned Roe v. Wade". Business Insider. Retrieved 2022-06-25.
  • ^ "The Privacy Act". Freedom of Information Act. US Department of State. 2015-05-22. Archived from the original on 2015-08-10. Retrieved 2015-11-19.
  • ^ Children's Online Privacy Protection Act, 15 U.S.C. § 6501 et seq.
  • ^ Fourth Amendment to the United States Constitution
  • ^ "Visit to the United States of America".
  • ^ Nissenbaum, Helen (2009). Privacy in Context Technology, Policy, and the Integrity of Social Life. Stanford, CA: Stanford University Press. ISBN 978-0804772891.
  • ^ a b c Solove 2010, pp. 15–17.
  • ^ Warren and Brandeis, "The Right To Privacy"(1890) 4 Harvard Law Review 193
  • ^ a b c d Solove 2010, p. 19.
  • ^ Godkin, E.L. (December 1880). "Libel and its Legal Remedy". Atlantic Monthly. 46 (278): 729–739.
  • ^ Oulasvirta, Antti; Suomalainen, Tiia; Hamari, Juho; Lampinen, Airi; Karvonen, Kristiina (2014). "Transparency of Intentions Decreases Privacy Concerns in Ubiquitous Surveillance". Cyberpsychology, Behavior, and Social Networking. 17 (10): 633–638. doi:10.1089/cyber.2013.0585. PMID 25226054.
  • ^ Gavison, Ruth (1980). "Privacy and the Limits of Law". Yale Law Journal. 89 (3): 421–471. doi:10.2307/795891. JSTOR 795891.
  • ^ Bok, Sissela (1989). Secrets : on the ethics of concealment and revelation (Vintage Books ed.). New York: Vintage Books. pp. 10–11. ISBN 978-0-679-72473-5.
  • ^ Solove 2010, p. 24.
  • ^ The quotation is from Alan Westin.Westin, Alan F.; Blom-Cooper, Louis (1970). Privacy and freedom. London: Bodley Head. p. 7. ISBN 978-0-370-01325-1.
  • ^ "Predicting Data that People Refuse to Disclose; How Data Mining Predictions Challenge Informational Self-Determination". openaccess.leidenuniv.nl. Retrieved 2017-07-19.
  • ^ Mantelero, Alessandro (2014-12-01). "The future of consumer data protection in the E.U. Re-thinking the "notice and consent" paradigm in the new era of predictive analytics". Computer Law & Security Review. 30 (6): 643–660. doi:10.1016/j.clsr.2014.09.004. ISSN 0267-3649.
  • ^ a b c d Westin, Alan (1967). Privacy and Freedom. New York: Atheneum.
  • ^ a b c d Hughes, Kirsty (2012). "A Behavioural Understanding of Privacy and Its Implications for Privacy Law". The Modern Law Review. 75 (5): 806–836. doi:10.1111/j.1468-2230.2012.00925.x. S2CID 142188960.
  • ^ Solove 2010, p. 21.
  • ^ Posner, Richard A. (1983). The economics of justice (5. print ed.). Cambridge, MA: Harvard University Press. p. 271. ISBN 978-0-674-23526-7.
  • ^ a b Solove 2010, pp. 22–23.
  • ^ a b c Reiman, Jeffrey (1976). "Privacy, Intimacy, and Personhood". Philosophy & Public Affairs.
  • ^ a b c d Benn, Stanley. "Privacy, freedom, and respect for persons". In Schoeman, Ferdinand (ed.). Philosophical Dimensions of Privacy: An Anthology. New York: Cambridge University Press.
  • ^ a b c d e f Kufer, Joseph (1987). "Privacy, Autonomy, and Self-Concept". American Philosophical Quarterly.
  • ^ Goffman, Erving (1968). Asylums: Essays on the Social Situation of Mental Patients and Other Inmates. New York: Doubleday.
  • ^ a b c Altman, Irwin (1975). The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Monterey: Brooks/Cole Publishing Company.[ISBN missing]
  • ^ a b c Solove 2010, p. 35.
  • ^ Rachels, James (Summer 1975). "Why Privacy is Important". Philosophy & Public Affairs. 4 (4): 323–333. JSTOR 2265077.
  • ^ Citron, Danielle (2019). "Sexual Privacy". Yale Law Journal. 128: 1877, 1880.
  • ^ H. Jeff Smith (1994). Managing Privacy: Information Technology and Corporate America. UNC Press Books. ISBN 978-0807821473.
  • ^ a b "Fixing the Fourth Amendment with trade secret law: A response to Kyllo v. United States". Georgetown Law Journal. 2002.
  • ^ "Security Recommendations For Stalking Victims". Privacyrights. 11 January 2012. Archived from the original on 11 January 2012. Retrieved 2 February 2008.
  • ^ "FindLaw's Writ – Amar: Executive Privilege". Writ.corporate.findlaw.com. 2004-04-16. Retrieved 2012-01-01.
  • ^ Popa, C., et al., "Managing Personal Information: Insights on Corporate Risk and Opportunity for Privacy-Savvy Leaders", Carswell (2012), Ch. 6
  • ^ Flaherty, D. (1989). Protecting privacy in surveillance societies: The federal republic of Germany, Sweden, France, Canada, and the United States. Chapel Hill, U.S.: The University of North Carolina Press.
  • ^ Posner, R. A. (1981). "The economics of privacy". The American Economic Review. 71 (2): 405–409.
  • ^ Lessig (2006), p. 229: "In my view, the protection of privacy would be stronger if people conceived of the right as a property right.".
  • ^ Lessig (2006).
  • ^ Johnson, Deborah (2009). Beauchamp; Bowie; Arnold (eds.). Ethical theory and business (8th ed.). Upper Saddle River, NJ: Pearson/Prentice Hall. pp. 428–442. ISBN 978-0-13-612602-7.
  • ^ Regan, P. M. (1995). Legislating privacy: Technology, social values, and public policy. Chapel Hill: The University of North Carolina Press.[ISBN missing][page needed]
  • ^ "United Nations Universal Declaration of Human Rights". 1948. Archived from the original on 2014-12-08.
  • ^ Shade, L.R. (2008). "Reconsidering the right to privacy in Canada". Bulletin of Science, Technology & Society, 28(1), 80–91.
  • ^ Watt, Eliza. "The role of international human rights law in the protection of online privacy in the age of surveillance." In 2017 9th International Conference on Cyber Conflict (CyCon), pp. 1–14. IEEE, 2017.
  • ^ a b Swartz, J., "'Opting In': A Privacy Paradox", The Washington Post, 03 Sep 2000, H.1.
  • ^ Bedrick, B., Lerner, B., Whitehead, B. "The privacy paradox: Introduction", News Media and the Law, Washington, DC, Volume 22, Issue 2, Spring 1998, pp. P1–P3.
  • ^ J. Sweat "Privacy paradox: Customers want control – and coupons", Information Week, Manhasset Iss, 781, April 10, 2000, p. 52.
  • ^ "Volume 11, Number 9". firstmonday.org. 4 September 2006. Retrieved 2019-11-25.
  • ^ Taddicken, Monika (January 2014). "The 'Privacy Paradox' in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure". Journal of Computer-Mediated Communication. 19 (2): 248–273. doi:10.1111/jcc4.12052.
  • ^ Nemec Zlatolas, Lili; Welzer, Tatjana; Heričko, Marjan; Hölbl, Marko (April 2015). "Privacy antecedents for SNS self-disclosure: The case of Facebook". Computers in Human Behavior. 45: 158–167. doi:10.1016/j.chb.2014.12.012.
  • ^ Baruh, Lemi; Secinti, Ekin; Cemalcilar, Zeynep (February 2017). "Online Privacy Concerns and Privacy Management: A Meta-Analytical Review: Privacy Concerns Meta-Analysis". Journal of Communication. 67 (1): 26–53. doi:10.1111/jcom.12276.
  • ^ Gerber, Nina; Gerber, Paul; Volkamer, Melanie (August 2018). "Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior". Computers & Security. 77: 226–261. doi:10.1016/j.cose.2018.04.002. S2CID 52884338.
  • ^ Kaiser, Florian G.; Byrka, Katarzyna; Hartig, Terry (November 2010). "Reviving Campbell's Paradigm for Attitude Research". Personality and Social Psychology Review. 14 (4): 351–367. doi:10.1177/1088868310366452. ISSN 1088-8683. PMID 20435803. S2CID 5394359.
  • ^ Acquisti, A., & Gross, R. (2006, June). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In Privacy enhancing technologies (pp. 36–58). Springer Berlin Heidelberg.
  • ^ S. Livingstone (2008). "Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression" (PDF). New Media & Society. 10 (3): 393–411. doi:10.1177/1461444808089415. S2CID 31076785.
  • ^ Utz, S., & Kramer, N. (2009). The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, article 1. [1] Archived 2016-04-13 at the Wayback Machine
  • ^ a b Barth, Susanne; de Jong, Menno D. T. (2017-11-01). "The privacy paradox – Investigating discrepancies between expressed privacy concerns and actual online behavior – A systematic literature review". Telematics and Informatics. 34 (7): 1038–1058. doi:10.1016/j.tele.2017.04.013. ISSN 0736-5853.
  • ^ a b Kokolakis, Spyros (January 2017). "Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon". Computers & Security. 64: 122–134. doi:10.1016/j.cose.2015.07.002. S2CID 422308.
  • ^ Barth, Susanne; de Jong, Menno D. T.; Junger, Marianne; Hartel, Pieter H.; Roppelt, Janina C. (2019-08-01). "Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources". Telematics and Informatics. 41: 55–69. doi:10.1016/j.tele.2019.03.003. ISSN 0736-5853.
  • ^ a b Frik, Alisa; Gaudeul, Alexia (2020-03-27). "A measure of the implicit value of privacy under risk". Journal of Consumer Marketing. 37 (4): 457–472. doi:10.1108/JCM-06-2019-3286. ISSN 0736-3761. S2CID 216265480.
  • ^ Burkhardt, Kai. "The privacy paradox is a privacy dilemma". Internet Citizen. Retrieved 2020-01-10.
  • ^ Egelman, Serge; Felt, Adrienne Porter; Wagner, David (2013), "Choice Architecture and Smartphone Privacy: There's a Price for That", The Economics of Information Security and Privacy, Springer Berlin Heidelberg, pp. 211–236, doi:10.1007/978-3-642-39498-0_10, ISBN 978-3-642-39497-3, S2CID 11701552
  • ^ a b Belliger, Andréa; Krieger, David J. (2018), "2. The Privacy Paradox", Network Publicy Governance, Digitale Gesellschaft, vol. 20, transcript Verlag, pp. 45–76, doi:10.14361/9783839442135-003, ISBN 978-3-8394-4213-5, S2CID 239333913
  • ^ Laufer, Robert S.; Wolfe, Maxine (July 1977). "Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory". Journal of Social Issues. 33 (3): 22–42. doi:10.1111/j.1540-4560.1977.tb01880.x.
  • ^ Culnan, Mary J.; Armstrong, Pamela K. (February 1999). "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation". Organization Science. 10 (1): 104–115. doi:10.1287/orsc.10.1.104. ISSN 1047-7039. S2CID 54041604.
  • ^ Trepte, Sabine; Reinecke, Leonard; Ellison, Nicole B.; Quiring, Oliver; Yao, Mike Z.; Ziegele, Marc (January 2017). "A Cross-Cultural Perspective on the Privacy Calculus". Social Media + Society. 3 (1): 205630511668803. doi:10.1177/2056305116688035. ISSN 2056-3051.
  • ^ Krasnova, Hanna; Spiekermann, Sarah; Koroleva, Ksenia; Hildebrand, Thomas (June 2010). "Online Social Networks: Why We Disclose". Journal of Information Technology. 25 (2): 109–125. doi:10.1057/jit.2010.6. ISSN 0268-3962. S2CID 33649999.
  • ^ a b c d e Solove 2010, p. 101.
  • ^ Prosser, William (1960). "Privacy". California Law Review. 48 (383): 389. doi:10.2307/3478805. JSTOR 3478805.
  • ^ a b c Solove 2010, p. 103.
  • ^ Zhou, Yinghui; Lu, Shasha; Ding, Min (2020-05-04). "Contour-as-Face Framework: A Method to Preserve Privacy and Perception". Journal of Marketing Research. 57 (4): 617–639. doi:10.1177/0022243720920256. ISSN 0022-2437. S2CID 218917353.
  • ^ a b c d e f g h i j k l m n o p q r s t Solove 2010, pp. 104–05.
  • ^ "How to Encrypt Email (Gmail, Outlook, iOS, Yahoo, Android, AOL)". Panda Security Mediacenter. 2021-03-02. Retrieved 2021-11-22.
  • ^ "Signal Messenger: Speak Freely". Signal Messenger. Retrieved 2021-11-22.
  • ^ "Anonymizers vs. VPNs: Everything You Need to Know". Privacy & VPN Blog – Orchid. 2021-05-11. Retrieved 2022-01-22.
  • ^ a b "7 Tips to Manage Your Identity and Protect Your Privacy Online". Stay Safe Online. Retrieved 2021-11-22.
  • ^ "How to Protect Your Digital Privacy". www.nytimes.com. Retrieved 2021-11-22.
  • ^ "Your Technology Is Tracking You. Take These Steps For Better Online Privacy : Life Kit". NPR.org. Retrieved 2021-11-22.
  • ^ "David Attenborough: zoos should use peepholes to respect gorillas' privacy". The Guardian. Agence France-Presse. 18 October 2016. Retrieved 10 August 2022.
  • ^ Eveleth, Rose (31 January 2020). "Animals Need Digital Privacy Too". Wired. Retrieved 10 August 2022.
  • Works cited Edit

    Wiki EnglishWiki JapaneseWiki Deutsch Further reading Edit

    Wiki EnglishWiki JapaneseWiki Deutsch External links Edit

    🔥 Top keywords: Akademia e Shkencave e RPS te ShqiperiseAlexandria Ocasio-CortezBilderberg GroupCristiano RonaldoDong XiaowanMinecraftOperation GladioPrimal cutRiot FestStrictly Come Dancing (series 7)

    Privacy

    Privacy (UK: /ˈprɪvəsiː/, US: /ˈpraɪ-/) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.