-
1
ICT omnipresence and the rights to privacy
Published 2023“…The goal of this essay is to strike a balance between the requirement for cybersecurity and cybercrimes prevention and the right to privacy.…”
Get full text
Article -
2
Spatial privacy on institutions for unaccompanied teenage girls in Mashhad-Iran
Published 2013“…This research suggests new application and directions and appropriate size in terms of spatial privacy for teenage girls in the future.…”
Get full text
Article -
3
-
4
Relation of cultural and social attributes in dwelling, responding to privacy in Iranian Traditional House.
Published 2011“…Home is never created until there is a combination of comfort, fulfillment and a sense of belonging to a dwelling space. Privacy like security and peace is one of the rolling factors that affect housing forms. …”
Get full text
Article -
5
Data privacy rights and bankers’ business interests in Nigeria : reflections on opportunities, challenges and legal reforms
Published 2022“…The study thus recommended that there should be effective data protection legislation in Nigeria particularly in the banking sector that would protect data privacy as well as the legitimate business interests of bankers.…”
Get full text
Article -
6
Communication privacy management theory in the context of the COVID-19 Pandemic: case studies from the Philippines
Published 2024“…Jurnal Komunikasi: Malaysian Journal of Communication Jilid 40(1) 2024: 496-512 *Corresponding author: bernabe.niniedna@gmail.com E-ISSN: 2289-1528 https://doi.org/10.17576/JKMJC-2024-4001-28 Communication Privacy Management Theory in the Context of the COVID-19 Pandemic: Case Studies from the Philippines EDNA T. …”
Get full text
Article -
7
Factors effecting online shopping behaviour with trust as moderation
Published 2020“…The purpose of this research is to study financial risk, product risk, privacy risk, and convenience risk influence on internet buying behaviour with trust as moderator. …”
Get full text
Article -
8
Perceived technology trust among business owners : a study of e-business adoption in Sarawak’s SMES
Published 2019“…This paper examines the influence of privacy and security factors on attitude towards adoption which directly predicts e-business adoption in Sarawak’s SMEs. …”
Get full text
Article -
9
Factors affecting trust in publishing personal information in online social network: An empirical study of Malaysia’s Klang Valley users
Published 2016“…Online Social Networking (OSN) is a platform that enables one to socialize over the world online without having to meet anyone physically or face to face. However, privacy in OSN sites is becoming a main concern for users because of the potential threats that come with sharing one’s personal information online. …”
Get full text
Article -
10
Students’ acceptance of drones using the Knowledge, Attitudes, and Practice (KAP) model
Published 2023“…This may assist in transforming the perception of drones from destroying machines and privacy invaders to a technology beneficial to society.…”
Get full text
Article -
11
The social relationship of contemporary residants in Iranian Housing
Published 2012“…The traditional architecture of Iranian houses for instance used to include a courtyard surrounded by rooms which controlled privacy, movement and separated people in different situations. …”
Get full text
Article -
12
Personalisation of internet based business office layout
Published 2017“…The workers from both case studies agreed that the interior layout design parameter that has the most effect on the productivity is the environment noise and privacy; while 2D horizontal and vertical layout has the least effect.…”
Get full text
Article -
13
Human rights in the digital era : challenges and opportunities from the United Nations human rights system
Published 2021“…Not only do we talk about the vulnerability to privacy, but also the possible biases of algorithms and other risks that represent potential violations to human rights. …”
Get full text
Article -
14
Admissibility of covert surveillance evidence: a prolegomenon
Published 2014“…Further, it analyses issues that have a profound relationship with ‘individual’s right of privacy’ and ‘public authority’s duties of conducting surveillance.’ …”
Get full text
Article -
15
Admissibility of covert surveillance evidence: a prolegomenon
Published 2014“…Further, it analyses issues that have a profound relationship with ‘individual’s right of privacy’ and ‘public authority’s duties of conducting surveillance.’ …”
Get full text
Article -
16
The implementation of cloud accounting in public sector
Published 2017“…By using system implementation framework, this study found that in the implementation of cloud accounting, challenges are associated with system specification which include system integration, security and privacy. Other challenges are associated to the roll out strategy and data migration. …”
Get full text
Article -
17
Citizen journalism and election monitoring in Nigeria
Published 2016“…Some of the drawbacks of citizen journalism include the following; it may lead to mass revolt and protest, invasion of people’s privacy, and the dissemination of unverifiable information by members of the public. …”
Get full text
Article -
18
Practices of (neoliberal) governmentality: racial and gendered gaze in Jhumpa Lahiri’s fiction
Published 2017“…Family, which is generally defined in terms of its functionality, when considering the difficulties of integration into the non-natal culture from the perspective of the uprooted migrants, is often referred to, erroneously, as the locus of privacy, individuality and autonomy. Among the works of the contemporary writers of Indian diaspora experience in America, Jhumpa Lahiri’s Interpreter of Maladies (1999) has addressed issues of displacement, assimilation and acculturation modifying Indian diaspora individuals and families. …”
Get full text
Article -
19
E-Government and public service delivery in Nigeria
Published 2020“…With due use of thematic analysis of the interview data, the study found that the challenges confronting e-government implementation in Nigeria were national challenges such as infrastructural deficiency, ICT illiteracy in addition to peculiar challenges like data privacy, security concerns. The paper thus concluded that unless these problems are tacked, the likelihood of having a successful e-government implementation outing in Nigeria would remain a mirage.…”
Get full text
Article -
20
Complete decompositions of dihedral groups and group based key exchange protocol
Published 2021“…The popularity of internet has increased rapidly and the application of cryptography become more important as it ensures the privacy and security of the users in the network. …”
Get full text
Article