2,246
Views
30
CrossRef citations to date
0
Altmetric
Research Article

Privacy principles, risks and harms

&
Pages 277-298 | Received 29 Jul 2013, Accepted 25 Mar 2014, Published online: 04 Jun 2014

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (3)

Ben Collier. (2021) The power to structure: exploring social worlds of privacy, technology and power in the Tor Project. Information, Communication & Society 24:12, pages 1728-1744.
Read now

Articles from other publishers (27)

Aaron Necaise, Tangila Islam Tanni, Aneka Williams, Yan Solihin, Apu Kapadia & Mary Jean Amon. (2023) User Preferences for Interdependent Privacy Preservation Strategies in Social Media. Proceedings of the ACM on Human-Computer Interaction 7:CSCW2, pages 1-30.
Crossref
Lena Podoletz. (2022) We have to talk about emotional AI and crime. AI & SOCIETY 38:3, pages 1067-1082.
Crossref
Naila AzamLito Michala, Shuja Ansari & Nguyen Binh Truong. (2023) Data Privacy Threat Modelling for Autonomous Systems: A Survey From the GDPR's Perspective. IEEE Transactions on Big Data 9:2, pages 388-414.
Crossref
Atheer Aljeraisy, Masoud Barati, Omer Rana & Charith Perera. (2021) Privacy Laws and Privacy by Design Schemes for the Internet of Things. ACM Computing Surveys 54:5, pages 1-38.
Crossref
Moritz Büchi, Noemi Festic & Michael Latzer. (2022) The Chilling Effects of Digital Dataveillance: A Theoretical Model and an Empirical Research Agenda. Big Data & Society 9:1, pages 205395172110653.
Crossref
Firoz Cachalia & Jonathan Klaaren. (2021) Digitalisation in the Health Sector: A South African Public Law Perspective. Potchefstroom Electronic Law Journal 25.
Crossref
Saskia Witteborn. (2021) Data Privacy and Displacement: A Cultural Approach. Journal of Refugee Studies 34:2, pages 2291-2307.
Crossref
Mary Francis. (2021) The Treatment of Privacy in Professional Codes of Ethics: An International Survey. The Library Quarterly 91:3, pages 304-321.
Crossref
Lamya Alkhariji, Nada Alhirabi, Mansour Naser Alraja, Mahmoud Barhamgi, Omer Rana & Charith Perera. (2021) Synthesising Privacy by Design Knowledge Toward Explainable Internet of Things Application Designing in Healthcare. ACM Transactions on Multimedia Computing, Communications, and Applications 17:2s, pages 1-29.
Crossref
Nick Hajli, Farid Shirazi, Mina Tajvidi & Nurul Huda. (2020) Towards an Understanding of Privacy Management Architecture in Big Data: An Experimental Research. British Journal of Management 32:2, pages 548-565.
Crossref
. (2020) Book Review. Information Polity 25:3, pages 403-406.
Crossref
Colin J. Bennett & Charles D. Raab. (2018) Revisiting the governance of privacy: Contemporary policy instruments in global perspective. Regulation & Governance 14:3, pages 447-464.
Crossref
Charith Perera, Mahmoud Barhamgi, Arosha K. Bandara, Muhammad Ajmal, Blaine Price & Bashar Nuseibeh. (2020) Designing privacy-aware internet of things applications. Information Sciences 512, pages 238-257.
Crossref
Chantal Mutimukwe, Ella Kolkowska & Åke Grönlund. (2019) Information privacy practices in e-government in an African least developing country, Rwanda. The Electronic Journal of Information Systems in Developing Countries 85:2, pages e12074.
Crossref
Raphaël Gellert. (2018) Understanding the notion of risk in the General Data Protection Regulation. Computer Law & Security Review 34:2, pages 279-288.
Crossref
Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zheng, Junaid Chaudhry, Erwin Adi & Craig Valli. (2018) Securing Mobile Healthcare Data: A Smart Card Based Cancelable Finger-Vein Bio-Cryptosystem. IEEE Access 6, pages 36939-36947.
Crossref
Chantal Lidynia, Philipp Brauner & Martina Ziefle. 2018. Advances in Human Factors in Wearable Technologies and Game Design. Advances in Human Factors in Wearable Technologies and Game Design 42 53 .
Daeseon Choi, Younho Lee, Seokhyun Kim & Pilsung Kang. (2017) Private attribute inference from Facebook’s public text metadata: a case study of Korean users. Industrial Management & Data Systems 117:8, pages 1687-1706.
Crossref
Aisha Fouad Bushager, Ali Abbas Mohamed, Ahmed Ebrahim Darwish, Mahmood Shawqi Jafaar & Mohamed Saeed Ahmed. (2017) Privacy Provision in E-Learning Systems. Privacy Provision in E-Learning Systems.
Rene Meis & Maritta Heisel. (2017) Computer-Aided Identification and Validation of Intervenability Requirements. Information 8:1, pages 30.
Crossref
Elisa Orrù. 2017. Data Protection and Privacy: (In)visibilities and Infrastructures. Data Protection and Privacy: (In)visibilities and Infrastructures 107 137 .
Niels van Dijk, Raphaël Gellert & Kjetil Rommetveit. (2016) A risk to a right? Beyond data protection risk assessments. Computer Law & Security Review 32:2, pages 286-306.
Crossref
Rene Meis & Maritta Heisel. 2016. Trust, Privacy and Security in Digital Business. Trust, Privacy and Security in Digital Business 79 94 .
Rene Meis, Roman Wirtz & Maritta Heisel. 2015. Trust, Privacy and Security in Digital Business. Trust, Privacy and Security in Digital Business 195 209 .
Beatriz San Miguel, Jose M. del Alamo & Juan C. Yelmo. 2015. Web Information Systems Engineering – WISE 2014 Workshops. Web Information Systems Engineering – WISE 2014 Workshops 161 175 .
Yod-Samuel Martin, Jose M. del Alamo & Juan C. Yelmo. (2014) Engineering privacy requirements valuable lessons from another realm. Engineering privacy requirements valuable lessons from another realm.
Lokke Moerel & Corien Prins. (2016) Privacy for the Homo Digitalis: Proposal for a New Regulatory Framework for Data Protection in the Light of Big Data and the Internet of Things. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.