Abstract
This Article contrasts two models for understanding and protecting against privacy violations. Traditionally, privacy violations have been understood as invasi

This publication has 2 references indexed in Scilit: