{"title":"Legislation and Privacy across Borders","authors":"Leah E. Glass, Robert Gresko","doi":"10.1109/SocialCom-PASSAT.2012.135","DOIUrl":null,"url":null,"abstract":"This paper explores the influences of cultural values and government structure on technology-based privacy legislation. The following geographic areas are analyzed to better understand this relationship: the United States (U.S.), the European Union (EU), China, and India. Using three primary cultural dimensions from the extensive studies of Geert Hofstede, the findings reveal a significant connection between the strength of certain cultural traits and whether the government is reactive or proactive to technology-based privacy breaches.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SocialCom-PASSAT.2012.135","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This paper explores the influences of cultural values and government structure on technology-based privacy legislation. The following geographic areas are analyzed to better understand this relationship: the United States (U.S.), the European Union (EU), China, and India. Using three primary cultural dimensions from the extensive studies of Geert Hofstede, the findings reveal a significant connection between the strength of certain cultural traits and whether the government is reactive or proactive to technology-based privacy breaches.