The right to privacy versus state security – a conflict of constitutional values

نویسندگان

چکیده

The dynamic development of technology has led to significant changes in the concept right privacy. Currently, it is primarily a virtual space which we communicate with each other using computers, phones and tablets connected by network. Cyberspace protection now become one most frequently discussed security-related topics. This article describes conflicts two values expressed Polish Constitution: state security versus It important how conflict: individuals’ rights privacy should be resolved, criteria are decisive for determining these rules takes precedence over other.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Right to Prisoners’ Privacy: Dimensions, Effects and Indicators.

 The right to privacy is subject was defined by Shariah and law and it refer to exploration prohibition and kind of human life aspects which are called positivism area. Article constitution is known as one of the most important rights for people in community closely linked to the right to privacy. The authors, considering that the prisoners are also human and his conviction should not deprive h...

متن کامل

from linguistics to literature: a linguistic approach to the study of linguistic deviations in the turkish divan of shahriar

chapter i provides an overview of structural linguistics and touches upon the saussurean dichotomies with the final goal of exploring their relevance to the stylistic studies of literature. to provide evidence for the singificance of the study, chapter ii deals with the controversial issue of linguistics and literature, and presents opposing views which, at the same time, have been central to t...

15 صفحه اول

Ubiquitous Security: Privacy versus Protection

In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling pervasive computing systems gain a foothold presence in becoming more flexible and, at the same time, more invisibly interconnected, system users may have to trade privacy and protection to gain full entry into this new info...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Acta Iuridica Resoviensia

سال: 2022

ISSN: ['2720-0574']

DOI: https://doi.org/10.15584/actaires.2022.3.18