Search
Full bibliography 2,167 resources
-
This article draws upon social interaction theory (the work of Irwin Altman) to develop a theory of the right to privacy, which reflects the way that privacy is experienced. This theory states that the right to privacy is a right to respect for barriers, and that an invasion of privacy occurs when a privacy barrier is penetrated. The first part of the paper establishes the position of the author's theory in the existing scholarship. The second part of the paper expands upon the theory to explain the nature of privacy barriers and the way that the author's theory manages a number of specific privacy issues, including threats to privacy, attempted invasions of privacy, unforeseeable interferences with privacy and waiving the right to privacy. The final part of the paper demonstrates the impact that this approach to privacy could have upon judicial reasoning, in particular Article 8 European Convention on Human Rights.
-
Disclaimer: This summary was generated by AI based on the content of the source document.
-
"During the past decade, rapid developments in information and communications technology have transformed key social, commercial, and political realities. Within that same time period, working at something less than Internet speed, much of the academic and policy debate arising from these new and emerging technologies has been fragmented. There have been few examples of interdisciplinary dialogue about the importance and impact of anonymity and privacy in a networked society. Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society fills that gap, and examines key questions about anonymity, privacy, and identity in an environment that increasingly automates the collection of personal information and relies upon surveillance to promote private and public sector goals." "This book has been informed by the results of a multi-million dollar research project that has brought together a distinguished array of philosophers, ethicists, feminists, cognitive scientists, lawyers, cryptographers, engineers, policy analysts, government policy makers, and privacy experts. Working collaboratively over a four-year period and participating in an iterative process designed to maximize the potential for interdisciplinary discussion and feedback through a series of workshops and peer review, the authors have integrated crucial public policy themes with the most recent research outcomes."--BOOK JACKET.
-
Disclaimer: This summary was generated by AI based on the content of the source document.
-
Courts, Litigants, and the Digital Age examines the ramifications of technology for courts, judges, and the administration of justice. It sets out the issues raised by technology, and, particularly, the Internet, so that conventional paradigms can be updated in the judicial context. In particular, the book dwells on issues such as proper judicial use of Internet sources, judicial ethics and social networking, electronic court records and anonymization techniques, control of the courtroom and jurors' use of new technologies, asnwell as the Internet's impact on judicial appointments and the diversity of thenjudiciary. The second edition includes discussion of current issues in thisnrapidly developing area, such as privacy protection, the "right to be forgotten," cyber intimidation, freedom of digital speech, and litigant anonymity. Through examination of relevant practical, legal, and ethical issues, it endeavours to extract lessons from the developing issues surveyed and proposes forward-thinking approaches based on proportionality principles.
-
Disclaimer: This summary was generated by AI based on the content of the source document.
-
Disclaimer: This summary was generated by AI based on the content of the source document.
-
Disclaimer: This summary was generated by AI based on the content of the source document.
-
Disclaimer: This summary was generated by AI based on the content of the source document.
-
Disclaimer: This summary was generated by AI based on the content of the source document.
-
Disclaimer: This summary was generated by AI based on the content of the source document.
-
Disclaimer: This summary was generated by AI based on the content of the source document.
-
Disclaimer: This summary was generated by AI based on the content of the source document.
Explore
Resource type
- Blog Post (6)
- Book (752)
- Book Section (209)
- Case (226)
- Conference Paper (5)
- Dictionary Entry (74)
- Document (2)
- Encyclopedia Article (1)
- Journal Article (868)
- Magazine Article (2)
- Newspaper Article (2)
- Preprint (2)
- Presentation (1)
- Report (15)
- Thesis (1)
- Web Page (1)
Topics
- Aboriginal law (4)
- Aboriginal peoples (2)
- Abuse of process (5)
- Access to information (1)
- Administrative law (11)
- Admissibility (1)
- Appeals (5)
- Arrest (2)
- Assurance (1)
- Bankruptcy and insolvency (6)
- Banks (1)
- Canada (2)
- Charge to jury (2)
- Charter of Rights (29)
- Child and family services (1)
- Choice of forum (1)
- Civil liability (1)
- Civil procedure (2)
- Communications law (1)
- Constitutional law (46)
- Contracts (2)
- Copyright (8)
- Copyright Pentalogy (5)
- Costs (1)
- Court having jurisdiction (1)
- Courts (8)
- Criminal law (85)
- Crown law (1)
- Custody (4)
- Declaration of invalidity (1)
- Discoverability (1)
- Division of powers (4)
- Equity (1)
- Evidence (16)
- Expropriation (2)
- Extraterritoriality (1)
- Family law (7)
- Fiduciary duty (1)
- Financial institutions (1)
- Fitness to stand trial (1)
- Habeas corpus (1)
- Human rights (1)
- Immigration (3)
- Impaired driving (2)
- Income tax (4)
- Informer privilege (1)
- Infringement (2)
- Insurance (2)
- Intellectual property (8)
- Judicial review (5)
- Jurisdiction (5)
- Labour relations (1)
- Limitation of actions (1)
- Mediation (1)
- Negligence (1)
- Obligation of loyalty (1)
- Obstructing justice (1)
- Occupational health and safety (1)
- Open court principle (1)
- Patents (1)
- Prerogative writs (1)
- Prescription (1)
- Private international law (2)
- Property (1)
- Prosecutorial immunity (1)
- Provincial offences (1)
- Publication bans (1)
- Real property (1)
- Right to security of person (1)
- Sale of goods (1)
- Securities (2)
- Sentencing (9)
- Sex workers (1)
- Sexual assault (6)
- Status of persons (1)
- Statutes (1)
- Taxation (6)
- Telecommunications (1)
- Torts (1)
- Trafficking in persons (1)
- Transportation law (2)
- Treaty rights (1)
- Trial (5)
- Voyeurism (1)
- Young persons (2)
Publication year
-
Between 1700 and 1799
(9)
-
Between 1700 and 1709
(1)
- 1701 (1)
- Between 1760 and 1769 (5)
-
Between 1770 and 1779
(1)
- 1777 (1)
-
Between 1790 and 1799
(2)
- 1797 (2)
-
Between 1700 and 1709
(1)
-
Between 1800 and 1899
(11)
- Between 1820 and 1829 (2)
-
Between 1830 and 1839
(1)
- 1830 (1)
-
Between 1840 and 1849
(1)
- 1849 (1)
- Between 1870 and 1879 (2)
-
Between 1880 and 1889
(1)
- 1880 (1)
- Between 1890 and 1899 (4)
-
Between 1900 and 1999
(415)
-
Between 1900 and 1909
(1)
- 1908 (1)
-
Between 1910 and 1919
(1)
- 1918 (1)
-
Between 1920 and 1929
(1)
- 1927 (1)
- Between 1930 and 1939 (8)
- Between 1940 and 1949 (9)
- Between 1950 and 1959 (13)
- Between 1960 and 1969 (30)
- Between 1970 and 1979 (38)
- Between 1980 and 1989 (127)
- Between 1990 and 1999 (187)
-
Between 1900 and 1909
(1)
-
Between 2000 and 2026
(1,732)
- Between 2000 and 2009 (398)
- Between 2010 and 2019 (680)
- Between 2020 and 2026 (654)