Yahoo Αναζήτηση Διαδυκτίου

Αποτελέσματα Αναζήτησης

  1. 24 Σεπ 2001 · Professor Solove illustrates that conceptualizing the problem with the Kafka metaphor has profound implications for the law of information privacy as well as which legal approaches are taken to...

  2. 14 Δεκ 2000 · The Big Brother metaphor as well as much of the law that protects privacy emerges from a longstanding paradigm for conceptualizing privacy problems. Under this paradigm, privacy is invaded by uncovering one's hidden world, by surveillance, and by the disclosure of concealed information.

  3. 24 Σεπ 2001 · Privacy and Power: Computer Databases and Metaphors for Information Privacy. Professor Solove illustrates that conceptualizing the problem with the Kafka metaphor has profound implications for the law of information privacy as well as which legal approaches are taken to solve the problem.

  4. Journalists, politicians, jurists, and legal academics often describe the privacy problem created by the collection and use of personal information through computer databases and the Internet with the metaphor of Big Brother— the totalitarian government portrayed in George Orwell’s Nineteen Eighty-Four.

  5. 24 Οκτ 2017 · Using thematic analysis, four metaphorical frames for privacy are constructed: ‘dodo’, ‘hemline’, ‘savings’ and ‘foundations of our home’. The frames are analysed using the causal layered analysis method to uncover their systemic and worldview components.

  6. This paper, which is based upon extensive work in developing metaphors for telecommunications systems, provides a framework for software designers who wish to exploit the use of interface metaphors. The paper proposes a set of six design steps, to provide designers with a practical approach to the application of metaphor in the design of ...

  7. 3 Δεκ 2023 · In this paper, we elicit 32 symbols and metaphors associated with privacy and security through two brainstorming sessions (n = 8, each). Six experts further separated this collection into security and privacy-related symbols and generated clusters based on similarity.