Search results
Results from the WOW.Com Content Network
State government agencies can also be subject to state based privacy legislation. This built upon the already existing privacy requirements that applied to telecommunications providers (under Part 13 of the Telecommunications Act 1997), and confidentiality requirements that already applied to banking, legal and patient / doctor relationships. [71]
Communication privacy management theory. Communication privacy management (CPM), originally known as communication boundary management, is a systematic research theory developed by Sandra Petronio in 1991. CPM theory aims to develop an evidence-based understanding of the way people make decisions about revealing and concealing private information.
Confidentiality is also challenged in cases involving the diagnosis of a sexually transmitted disease in a patient who refuses to reveal the diagnosis to a spouse, and in the termination of a pregnancy in an underage patient, without the knowledge of the patient's parents.
A person seeks an optimal level of privacy (i.e. desired level equals to actual level).There are possibilities of too much or too little privacy. When there is too much privacy (actual desired level), a person may engage in crowding. On the other hand, when there is too little privacy (desired > actual level), a person may prefer social isolation.
Information privacy. Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. [1] It is also known as data privacy[2] or data protection.
Clinical psychology is an integration of human science, behavioral science, theory, and clinical knowledge for the purpose of understanding, preventing, and relieving psychologically-based distress or dysfunction and to promote subjective well-being and personal development. [1][2] Central to its practice are psychological assessment, clinical ...
On privacy, confidentiality and discretion. As Wikipedia has grown to become one of the most popular websites on the internet, accessed daily by millions, numerous attempts have been made to develop a consistent way of protecting the private personal information [1] of those who create and develop its content, while at the same time protecting ...
As a conceptual framework, contextual integrity has been used to analyze and understand the privacy implications of socio-technical systems on a wide array of platforms (e.g. Web, smartphone, IoT systems), and has led to many tools, frameworks, and system designs that help study and address these privacy issues.