Communication Privacy Management: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors
254 pages
English

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris

Communication Privacy Management: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors , livre ebook

-

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus
254 pages
English
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus

Description

Communication privacy management theory is concerned with how people negotiate openness and privacy of communicated information. Coming from the sociocultural tradition, this theory focuses on how people in relationships manage boundaries which separate the public from the private. It is based on systematic research and seeks to explain how individuals regulate revealing and concealing information in communication.


This book is your ultimate resource for Communication Privacy Management. Here you will find the most up-to-date information, analysis, background and everything you need to know.


In easy to read chapters, with extensive references and links to get you to know all there is to know about Communication Privacy Management right away, covering: Communication privacy management theory, Privacy, Address confidentiality program, Bank secrecy, Banking in Switzerland, Black room, Cabinet noir, Classified information in the United Kingdom, Classified information in the United States, COBIT, Computer and Internet Protocol Address Verifier, Cone of Silence, Consumer privacy, Do not disturb sign, Data Privacy Day, Simon Davies (privacy advocate), Digital footprint, Digital self-defense, DNA database, Domains by Proxy, DSCI, Duty of confidentiality, E-Verify, Employee monitoring, Financial privacy, FTC Fair Information Practice, Genetic exceptionalism, Geo (marketing), Global Internet Freedom Consortium, Government database, Information privacy, Information technology controls, Internet censorship, Nazril Irham, Lotus Marketplace, Medical privacy, Mobile phone tracking, National Coalition for Sexual Freedom, National DNA database, Network Advertising Initiative, Numbered bank account, Open fields doctrine, Personal identifier, Political privacy, Printer steganography, Privacy-enhancing technologies, Privacy fencing, Privacy law, Privacy policy, Privacy protocol, Privacy software, Private currency, Protect America Act of 2007, Publicy, Radio-frequency identification, Raihman v. Latvia, Restitution of Illicit Assets Act, Safe deposit box, Samhain (software), Secrecy of correspondence, Full body scanner, Surveillance, Daniella Tobar, The Transparent Society, Trial by media, Trigger list, Visual privacy, Webcam, White noise machine, Winston Smith Project, Woodhull Sexual Freedom Alliance, Workplace privacy


This book explains in-depth the real drivers and workings of Communication Privacy Management. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Communication Privacy Management with the objectivity of experienced professionals.

Sujets

Informations

Publié par
Date de parution 24 octobre 2012
Nombre de lectures 0
EAN13 9781743332900
Langue English
Poids de l'ouvrage 16 Mo

Informations légales : prix de location à la page 0,1598€. Cette information est donnée uniquement à titre indicatif conformément à la législation en vigueur.

Extrait

  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents