Showing 1 - 20 results of 40 for search '"privacy"', query time: 0.07s Refine Results
  1. 1

    ICT omnipresence and the rights to privacy by Abdulkadir, Abdulkadir Bolaji, Abdulkadir, Abdulrazaq Owolabi

    Published 2023
    “…The goal of this essay is to strike a balance between the requirement for cybersecurity and cybercrimes prevention and the right to privacy.…”
    Get full text
    Article
  2. 2

    Spatial privacy on institutions for unaccompanied teenage girls in Mashhad-Iran by Nazanin Salehi Milani, Azizah Salim Syed Salim, Norsidah Ujang

    Published 2013
    “…This research suggests new application and directions and appropriate size in terms of spatial privacy for teenage girls in the future.…”
    Get full text
    Article
  3. 3
  4. 4

    Relation of cultural and social attributes in dwelling, responding to privacy in Iranian Traditional House. by Mohamad Mahdi Shabani, Mazlan Mohd Tahir, Hoda Shabankareh, Honey Arjmandi, Fereshteh Mazaheri

    Published 2011
    “…Home is never created until there is a combination of comfort, fulfillment and a sense of belonging to a dwelling space. Privacy like security and peace is one of the rolling factors that affect housing forms. …”
    Get full text
    Article
  5. 5

    Data privacy rights and bankers’ business interests in Nigeria : reflections on opportunities, challenges and legal reforms by Abdulkadir, Abdulkadir Bolaji, Sambo, Abdulfatai Oladapo

    Published 2022
    “…The study thus recommended that there should be effective data protection legislation in Nigeria particularly in the banking sector that would protect data privacy as well as the legitimate business interests of bankers.…”
    Get full text
    Article
  6. 6

    Communication privacy management theory in the context of the COVID-19 Pandemic: case studies from the Philippines by Bernabe, Edna T., Pasumbal, Divina T., Bernabe Jr., Mamerto S., Pasumbal, Leia Reyna T.

    Published 2024
    “…Jurnal Komunikasi: Malaysian Journal of Communication Jilid 40(1) 2024: 496-512 *Corresponding author: bernabe.niniedna@gmail.com E-ISSN: 2289-1528 https://doi.org/10.17576/JKMJC-2024-4001-28 Communication Privacy Management Theory in the Context of the COVID-19 Pandemic: Case Studies from the Philippines EDNA T. …”
    Get full text
    Article
  7. 7

    Factors effecting online shopping behaviour with trust as moderation by Bhatti, Anam, Ur Rehman, Shafique, Kamal, Ahtisham Zahid, Akram, Hamza

    Published 2020
    “…The purpose of this research is to study financial risk, product risk, privacy risk, and convenience risk influence on internet buying behaviour with trust as moderator. …”
    Get full text
    Article
  8. 8

    Perceived technology trust among business owners : a study of e-business adoption in Sarawak’s SMES by Ngian, Ek Tee, Wong, Winnie Poh Ming

    Published 2019
    “…This paper examines the influence of privacy and security factors on attitude towards adoption which directly predicts e-business adoption in Sarawak’s SMEs. …”
    Get full text
    Article
  9. 9

    Factors affecting trust in publishing personal information in online social network: An empirical study of Malaysia’s Klang Valley users by Syed Shah Alam, Maisarah Ahmad, A. Ali Khatibi, Mst. Nilufar Ahsan

    Published 2016
    “…Online Social Networking (OSN) is a platform that enables one to socialize over the world online without having to meet anyone physically or face to face. However, privacy in OSN sites is becoming a main concern for users because of the potential threats that come with sharing one’s personal information online. …”
    Get full text
    Article
  10. 10

    Students’ acceptance of drones using the Knowledge, Attitudes, and Practice (KAP) model by Siti Noranis’s Mohd Yunus, Umawathy Techanamurthy

    Published 2023
    “…This may assist in transforming the perception of drones from destroying machines and privacy invaders to a technology beneficial to society.…”
    Get full text
    Article
  11. 11

    The social relationship of contemporary residants in Iranian Housing by Mohsen Asadi, Tahir .M.M

    Published 2012
    “…The traditional architecture of Iranian houses for instance used to include a courtyard surrounded by rooms which controlled privacy, movement and separated people in different situations. …”
    Get full text
    Article
  12. 12

    Personalisation of internet based business office layout by Chua, S.J.L., O. Shahruddin, A.S. Ali, C.P., Au-Yong, N.F. Azmi

    Published 2017
    “…The workers from both case studies agreed that the interior layout design parameter that has the most effect on the productivity is the environment noise and privacy; while 2D horizontal and vertical layout has the least effect.…”
    Get full text
    Article
  13. 13

    Human rights in the digital era : challenges and opportunities from the United Nations human rights system by Iza, Daniela González

    Published 2021
    “…Not only do we talk about the vulnerability to privacy, but also the possible biases of algorithms and other risks that represent potential violations to human rights. …”
    Get full text
    Article
  14. 14

    Admissibility of covert surveillance evidence: a prolegomenon by Md. Abdul Jalil, Abu Hena Mostofa Kamal

    Published 2014
    “…Further, it analyses issues that have a profound relationship with ‘individual’s right of privacy’ and ‘public authority’s duties of conducting surveillance.’ …”
    Get full text
    Article
  15. 15

    Admissibility of covert surveillance evidence: a prolegomenon by Md. Abdul Jalil, Abu Hena Mostofa Kamal

    Published 2014
    “…Further, it analyses issues that have a profound relationship with ‘individual’s right of privacy’ and ‘public authority’s duties of conducting surveillance.’ …”
    Get full text
    Article
  16. 16

    The implementation of cloud accounting in public sector by Aini Aman, Nahariah Mohamed

    Published 2017
    “…By using system implementation framework, this study found that in the implementation of cloud accounting, challenges are associated with system specification which include system integration, security and privacy. Other challenges are associated to the roll out strategy and data migration. …”
    Get full text
    Article
  17. 17

    Citizen journalism and election monitoring in Nigeria by Tsegyu, Santas

    Published 2016
    “…Some of the drawbacks of citizen journalism include the following; it may lead to mass revolt and protest, invasion of people’s privacy, and the dissemination of unverifiable information by members of the public. …”
    Get full text
    Article
  18. 18

    Practices of (neoliberal) governmentality: racial and gendered gaze in Jhumpa Lahiri’s fiction by Asl, Moussa Pourya, Nurul Farhana Low Abdullah

    Published 2017
    “…Family, which is generally defined in terms of its functionality, when considering the difficulties of integration into the non-natal culture from the perspective of the uprooted migrants, is often referred to, erroneously, as the locus of privacy, individuality and autonomy. Among the works of the contemporary writers of Indian diaspora experience in America, Jhumpa Lahiri’s Interpreter of Maladies (1999) has addressed issues of displacement, assimilation and acculturation modifying Indian diaspora individuals and families. …”
    Get full text
    Article
  19. 19

    E-Government and public service delivery in Nigeria by Lawan, Bello Muhammed, Ajadi, Ishola Abdulrasaq, Kayode, Abdulkareem Abdulrazaq, Yaru, Abubakar Umar

    Published 2020
    “…With due use of thematic analysis of the interview data, the study found that the challenges confronting e-government implementation in Nigeria were national challenges such as infrastructural deficiency, ICT illiteracy in addition to peculiar challenges like data privacy, security concerns. The paper thus concluded that unless these problems are tacked, the likelihood of having a successful e-government implementation outing in Nigeria would remain a mirage.…”
    Get full text
    Article
  20. 20

    Complete decompositions of dihedral groups and group based key exchange protocol by Huey, Voon Chen, Chang, Seng Sin

    Published 2021
    “…The popularity of internet has increased rapidly and the application of cryptography become more important as it ensures the privacy and security of the users in the network. …”
    Get full text
    Article