HOME

TheInfoList



OR:

Digital privacy is often used in contexts that promote advocacy on behalf of individual and
consumer privacy Consumer privacy is information privacy as it relates to the consumers of products and services. A variety of social, legal and political issues arise from the interaction of the public's potential expectation of privacy and the collection and d ...
rights in e-services and is typically used in opposition to the business practices of many e-marketers, businesses, and companies to collect and use such information and data. Digital privacy, a crucial aspect of modern online interactions and services, can be defined under three sub-related categories:
information privacy Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as dat ...
, communication privacy, and individual privacy. Digital privacy has increasingly become a topic of interest as information and data shared over the
social web The social web is a set of social relations that link people through the World Wide Web. The social web encompasses how websites and software are designed and developed in order to support and foster social interaction. These online social int ...
have continued to become more and more commodified; social media users are now considered unpaid "
digital labor Digital labor or digital labour refers to forms of labor mediated by digital technologies, typically performed through or enabled by internet platforms, software systems, and data infrastructures. It includes a wide range of activities such as data ...
s", as one pays for "free" e-services through the loss of their privacy. For example, between 2005 and 2011, the change in levels of disclosure for different profile items on
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
shows that, over the years, people have wanted to keep more information private. Observing the seven-year span, Facebook gained a profit of $100 billion through the collection and sharing of their users' data with third-party advertisers. The more a user shares on social networks, the more privacy is lost. All of the information and data one shares is connected to clusters of similar information. As the user continues to share their productive expression, it gets matched with the respective cluster, and their speech and expression are no longer only in the possession of them or of their social circle. This can be seen as a consequence of building
social capital Social capital is a concept used in sociology and economics to define networks of relationships which are productive towards advancing the goals of individuals and groups. It involves the effective functioning of social groups through interper ...
. As people create new and diverse ties on social networks, data becomes linked. This decrease in privacy continues until bundling appears (when the ties become strong and the network more homogeneous). As digital privacy concerns grow, regulatory approaches have emerged to protect user data across various sectors. In the United States, privacy regulation has traditionally been sector-based, with different industries having their own rules. Since the 1970s, laws have covered areas like financial services, healthcare, and education. However, recent efforts, such as the American Data Privacy and Protection Act of 2022 (ADPPA), signal a shift toward a comprehensive privacy framework. This mirrors the European Union's General Data Protection Regulation (GDPR), which provides uniform privacy rules across all sectors. A key challenge in digital privacy regulation is tailoring data protection rules for specific industries, particularly in digital spaces like social media, search engines, and mobile apps, where data collection practices often exceed existing laws. The Federal Trade Commission (FTC) has played a central role in addressing these concerns, with its growing expertise in the digital landscape. As the digital economy evolves, there is increasing pressure for stronger privacy laws that balance privacy protection with competition. Advocates argue that this balance is necessary to protect users from exploitation by companies with massive data collection capabilities.


Types of privacy


Information privacy

In the context of digital privacy, ''information privacy'' is the idea that individuals should have the freedom to determine how their
digital information Digital data, in information theory and information systems, is information represented as a string of Discrete mathematics, discrete symbols, each of which can take on one of only a finite number of values from some alphabet (formal languages ...
is collected and used. This is particularly relevant for
personally identifiable information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely used in the United States, but the phrase it abbreviates has fou ...
. The concept of information privacy has evolved in parallel to the evolution of the field of
Information Technology Information technology (IT) is a set of related fields within information and communications technology (ICT), that encompass computer systems, software, programming languages, data processing, data and information processing, and storage. Inf ...
(IT). The rise of networking and computing led to the dramatic change in the ways of information exchange. The baseline for this concept was put forward in the late 1940s, and the third era of privacy development began in the 1990s. The
European Union The European Union (EU) is a supranational union, supranational political union, political and economic union of Member state of the European Union, member states that are Geography of the European Union, located primarily in Europe. The u ...
has various
privacy law Privacy law is a set of regulations that govern the collection, storage, and utilization of personal information from healthcare, governments, companies, public or private entities, or individuals. Privacy laws are examined in relation to an ind ...
s that dictate how information may be collected and used by companies. Some of those laws are written to give agency to the preferences of individuals/consumers in how their data is used. The
General Data Protection Regulation The General Data Protection Regulation (Regulation (EU) 2016/679), abbreviated GDPR, is a European Union regulation on information privacy in the European Union (EU) and the European Economic Area (EEA). The GDPR is an important component of ...
(GDPR) is an example of this. In other places, like in the United States,
privacy law Privacy law is a set of regulations that govern the collection, storage, and utilization of personal information from healthcare, governments, companies, public or private entities, or individuals. Privacy laws are examined in relation to an ind ...
is argued by some to be less developed in this regard. By example, some legislation, or lack thereof, allow companies to self-regulate their collection and dissemination practices of consumer information. It is a common practice in some countries to oblige companies and websites to provide users with notice and ask for the consent to collect their data and/or track activity. However, the specifics of this procedure usually are not properly regulated, which allows websites to manipulate users into obtaining consent by reducing the visibility of the notice, the frequency of requests for consent, etc. This affects the power dynamics between companies and consumers, perceived risks, and jeopardizes the right to privacy in the collection of personal data. One such example of privacy policies being called into question would be on the social media app
TikTok TikTok, known in mainland China and Hong Kong as Douyin (), is a social media and Short-form content, short-form online video platform owned by Chinese Internet company ByteDance. It hosts user-submitted videos, which may range in duration f ...
. While collecting user data normally requires permission from the user, the app is known to be quite insistent on the user sharing the data, at least in comparison to other apps such as
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
. Since TikTok is capable of running without the user's personal data being gathered, this has raised suspicions about the app being used for data harvesting by the government.


Public Perception of Data Privacy Risks and Regulation

A 2023
Pew Research The Pew Research Center (also simply known as Pew) is a nonpartisan American think tank based in Washington, D.C. It provides information on social issues, public opinion, and demographic trends shaping the United States and the world. It als ...
study highlights growing concerns among Americans about data privacy. 81% are worried about how companies use their personal data, and 71% share similar concerns about government data usage. Many feel they lack control over their data, with 73% stating they have little control over how companies collect their information and 79% feeling the same about government data collection. The report also reveals that a significant portion of Americans are confused about data usage. 77% do not understand how the government uses their data, and 67% feel similarly about companies. Additionally, there is strong support for more government regulation, with 72% of Americans believing that companies should face more oversight regarding personal information handling. Despite concerns, Americans remain skeptical about their ability to protect their data. While 78% trust themselves to make decisions about online privacy, 61% feel their actions won't make a significant impact. Racial and ethnic differences are also evident, with Hispanic, Black, and Asian adults more concerned about identity theft and data misuse compared to White adults. Public trust in social media companies is low. 77% of Americans distrust social media executives’ ability to admit mistakes regarding data misuse, while 76% are skeptical about their commitment to prevent unauthorized data sales.


Communication privacy

In the context of digital privacy, communication privacy is the notion that individuals should have the freedom, or right, to communicate information digitally with the expectation that their communications are secure—meaning that messages and communications will only be accessible to the sender's original intended recipient. However, communications can be intercepted or delivered to other recipients without the sender's knowledge, in a multitude of ways. Communications can be intercepted directly through various hacking methods, such as the
man-in-the-middle attack In cryptography and computer security, a man-in-the-middle (MITM) attack, or on-path attack, is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communi ...
(MITM). Communications can also be delivered to recipients unbeknown to the sender due to false assumptions made regarding the platform or medium that was used to send information. For example, the failure to read a company's privacy policy regarding communications on their platform could lead one to assume that their communication is protected when it is in fact not. Additionally, companies frequently have been known to lack transparency in how they use information, which can be both intentional and unintentional. Discussion of communication privacy necessarily requires consideration of technological methods of protecting information/communication in digital mediums, the effectiveness and ineffectiveness of such methods/systems, and the development/advancement of new and current technologies. Many scholars have used communication privacy management (CPM) theory as a way to define control over private information. By sharing information with others through social media, the ownership of that information becomes collective.


Individual privacy

In the context of digital privacy, individual privacy is the notion that individuals have a right to exist freely on the internet, in that they can choose what type of information they are exposed to, and more importantly, that unwanted information should not interrupt them. An example of a digital breach of individual privacy would be an internet user receiving unwanted ads and emails/spam, or a computer virus that forces the user to take actions, which otherwise they would not. In such cases, the individual does not exist digitally without interruption from unwanted information; thus their individual privacy has been infringed upon.


Individual privacy

Some internet users proactively work to ensure information can not be collected, this is the practice of attempting to remain anonymous. There are many ways for a user to stay anonymous on the internet, including
onion routing Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to the layers of an onion. The encrypted data is transmitted through a series o ...
, anonymous VPN services, probabilistic anonymity, and deterministic anonymity. Some companies are trying to create an all-in-one solution, In an interview with Tom Okman, co-founder of NordVPN he mentioned they're currently exploring a technology that will block trackers, cookies, detect
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
before it lands on the user's device and more.


Information anonymity

For a user to keep their information anonymous when accessing the web, onion routing can be used to ensure the protection of their
personally identifiable information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely used in the United States, but the phrase it abbreviates has fou ...
. Onion routing was originally developed by the U.S. Naval Research Lab and was intended to anonymize web traffic. The system created a path to any
TCP/IP The Internet protocol suite, commonly known as TCP/IP, is a framework for organizing the communication protocols used in the Internet and similar computer networks according to functional criteria. The foundational protocols in the suite are ...
server by creating a pathway of onion routers. Once a pathway has been established, all information that is sent through it is anonymously delivered. When the user has finished utilizing the pathway it was essentially deleted which freed the resources to be used for a new pathway within onion routing. The Onion Routing Project developed into what is today known as
Tor Tor, TOR or ToR may refer to: Places * Toronto, Canada ** Toronto Raptors * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor ...
, a completely open-sourced and free software. Unlike its predecessor, Tor is able to protect both the anonymity of individuals as well as web providers. This allows people to set up anonymous web servers that in effect provide a censorship-resistant publishing service.


Communication anonymity

While the previously mentioned information anonymity system can also potentially protect the contents of communications between two people, there are other systems that directly function to guarantee that communication remains between its intended recipients. One of these systems,
Pretty Good Privacy Pretty Good Privacy (PGP) is an encryption software, encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for digital signature, signing, encrypting, and decrypting texts, Email, e-mail ...
(PGP), has existed in various forms for many years. It functions to protect email messages by encrypting and decrypting them. It originally existed as a command-line-only program, but it has evolved in recent years to have its own full interface, and a multitude of email providers now offer built-in PGP support. Users can also install PGP-compatible software and manually configure it to encrypt emails on nearly any platform.
Secure Sockets Layer Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network, such as the Internet. The protocol is widely used in applications such as email, instant messaging, and voice over IP, ...
(SSL) and
Transport Layer Security Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network, such as the Internet. The protocol is widely used in applications such as email, instant messaging, and voice over ...
(TLS) are measures to secure payments online. While these systems are not immune from breaches or failure, many users benefit greatly from their use as every major browser program has built-in support for it.


Additional services

There are additional methods that work to provide anonymity and, by extension, protect the user's data. As
IP address An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
es can frequently be traced back to a specific physical location, and likewise can identify someone as well, changing one's IP address can help users remain anonymous by providing access to a multitude of servers in various geographic locations around the world, allowing them to appear as if they are physically located in a selected area, even when they are not. This is an example of a method/service that works to allow for information and communication anonymity. IP-address changers are one such service, which an internet user typically pays a fee to use. The Virtual Private Network (VPN) is a technology that provides users secured connection over a non-secure public network such as the Internet through several
tunneling protocol In computer networks, a tunneling protocol is a communication protocol which allows for the movement of data from one network to another. They can, for example, allow private network communications to be sent across a public network (such as the ...
s, handling, and encapsulating traffic at different levels to ensure communication security. VPN is also effective in securing data and privacy over the cloud and data-center environments because it is capable of protecting IPs from exposure to different kinds of attacks. This technology can be categorized into SSL VPN and IPSec VPN, which are methods of
data communication Data communication, including data transmission and data reception, is the transfer of data, transmitted and received over a point-to-point or point-to-multipoint communication channel. Examples of such channels are copper wires, optic ...
from a user device to a VPN gateway using a secure tunnel. There is also the case of the VHSP mechanism, which protects the exposure of an IP address by assigning a temporal IP for the VPN gateway and its services. The use of
network address translation Network address translation (NAT) is a method of mapping an IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic Router (computing), routing device. The te ...
(NAT) allows users to hide connections passing through a gateway behind the gateway through the use of a sensible hiding IP address that is routable to the issuing gateway.


The (no) harm principle

Following the ''(no) harm principle'' of
John Stuart Mill John Stuart Mill (20 May 1806 – 7 May 1873) was an English philosopher, political economist, politician and civil servant. One of the most influential thinkers in the history of liberalism and social liberalism, he contributed widely to s ...
, private references must be respected: one can do whatever they want as long as others do not suffer from the consequences of it. In one's private space, alone, a person is free to do whatever they desire. With the advent of
photojournalism Photojournalism is journalism that uses images to tell a news story. It usually only refers to still images, but can also refer to video used in broadcast journalism. Photojournalism is distinguished from other close branches of photography (such ...
, the invasion of celebrities' private lives arose along with the notion of right-to-privacy—or what Samuel D. Warren II and
Louis Brandeis Louis Dembitz Brandeis ( ; November 13, 1856 – October 5, 1941) was an American lawyer who served as an Associate Justice of the Supreme Court of the United States, associate justice on the Supreme Court of the United States from 1916 to ...
branded in 1890 as "the right to be left alone." Today's "privacy incidents" do not exclusively concern celebrities and politicians, as most people are connected and share data: people are not online to be left alone.


The economic value of data

According to Alessandro Acquisti, Curtis Taylor and Liad Wagman in ''The Economics of Privacy'' (2015), individual data can be seen as having two types of value: a commercial value and a private value. The fact that data is collected can have both positive and negative effects, and can cause a violation of privacy and a monetary cost. As per Acquisti, Taylor, and Wagman, there are further concerns about the progress of collecting data as
data analysis Data analysis is the process of inspecting, Data cleansing, cleansing, Data transformation, transforming, and Data modeling, modeling data with the goal of discovering useful information, informing conclusions, and supporting decision-making. Da ...
becomes increasingly more efficient. Regulations such as the EU Data Protection Directive, the U.S. ''
Children's Online Privacy Protection Act The Children's Online Privacy Protection Act of 1998 (COPPA) is a United States federal law The law of the United States comprises many levels of Codification (law), codified and uncodified forms of law, of which the supreme law is ...
'', and many more are being put in place; however, the IT industry is always evolving and requires the users to be empowered and focus on self-management of the online privacy. As such, it is very important for the lawmakers to continue focusing on the right balance between the use of the internet and the economics of privacy.


Privacy and information breaches

Methods can be purposely crafted to obtain one's personal information illegally. These directed attacks are commonly referred to as hacking, though that term refers to the general practice and does not address specific hacking methods and implementation. Various hacking methods as it pertains to the invasion of one's digital privacy are outlined below. As it pertains to intent, within hacking, there are two categories of invasion: # Directed attacks against someone individually, and # Directed attacks against groups. With the latter category, however, a hacker could effectively obtain a specified/particular individual's information through first targeting a larger group. An example of this possibility could be as follows: if a hacker, named individual-A, wishes to obtain a particular person's information, individual-B, they could first target a platform or group that has individual-B's information already, such as a credit agency, or they could likewise target a group that individual-B has previously relinquished/provided their data to, like a social media network or a cloud based data service. Through targeting one of those groups, individual-A could effectively obtain individual-B's information by first hacking all data the group has, including the data of other individuals. Once obtained, the hacker could simply identify individual-B's information within the data and disregard the rest. Digital tools are available online to help thwart personal data theft.


Phishing

Phishing Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticate ...
is a common method of obtaining someone's
private information Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
. This generally consists of an individual (often referred in this context as a
hacker A hacker is a person skilled in information technology who achieves goals and solves problems by non-standard means. The term has become associated in popular culture with a security hackersomeone with knowledge of bug (computing), bugs or exp ...
), developing a website that looks similar to other major websites that a target person commonly uses. The phishing website may look identical to the legitimate site, but its
URL A uniform resource locator (URL), colloquially known as an address on the Web, is a reference to a resource that specifies its location on a computer network and a mechanism for retrieving it. A URL is a specific type of Uniform Resource Identi ...
could have a variation in spelling or a different domain such as .org instead of .com. The target person can be directed to the site through a link in a "fake" email that is designed to look like it came from the website they commonly use. The user then clicks on the URL, proceeds to sign in, or provide other personal information, and as opposed to the information being submitted to the website that the user thought they were on, it is actually sent directly to the hacker. Phishing attacks commonly obtain bank and financial data as well as social networking website information. Online tools can help users protect their information from phishing attacks, including Web browser extensions, which are capable of flagging suspicious websites and links.


Development and controversy

Digital privacy is a trending social concern. For example, over the past decade, the usage of the phrase ''digital privacy'' has increased by more than fivefold in published books. A TED talk by Eric Berlow and Sean Gourley following the
2013 mass surveillance disclosures During the 2010s, international media reports revealed new operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly relate to top secret documents leake ...
cast a shadow over the privacy of
cloud storage Cloud storage is a model of computer data storage in which data, said to be on "the cloud", is stored remotely in logical pools and is accessible to users over a network, typically the Internet. The physical storage spans multiple servers (so ...
and
social media Social media are interactive technologies that facilitate the Content creation, creation, information exchange, sharing and news aggregator, aggregation of Content (media), content (such as ideas, interests, and other forms of expression) amongs ...
. While digital privacy is concerned with the privacy of digital information in general, in many contexts it specifically refers to information concerning
personal identity Personal identity is the unique numerical identity of a person over time. Discussions regarding personal identity typically aim to determine the necessary and sufficient conditions under which a person at one time and a person at another time ...
shared over public networks. As the secrecy of the American ''
Foreign Intelligence Surveillance Act The Foreign Intelligence Surveillance Act of 1978 (FISA, , ) is a Law of the United States, United States federal law that establishes procedures for the surveillance and collection of foreign intelligence on domestic soil.mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by Local government, local and federal governments or intell ...
. Prior to the
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. Born in 1983 in Elizabeth ...
disclosures concerning the extent of the NSA PRISM program were revealed in 2013, the public debate on digital privacy mainly centered on privacy concerns with social-networking services, as viewed from within these services. Even after 2013, scandals related to social-media privacy issues have continued to attract public attention. The most notable of these is the coverage of the Facebook–Cambridge Analytica data scandal in 2018, which led to a 66% decrease in public trust of Facebook. The use of
cryptographic software Encryption software is software that uses cryptography to prevent unauthorized access to digital information. Cryptography is used to protect digital information on computers as well as the digital information that is sent to other computers over t ...
to evade
prosecution A prosecutor is a legal representative of the prosecution in states with either the adversarial system, which is adopted in common law, or inquisitorial system, which is adopted in Civil law (legal system), civil law. The prosecution is the ...
and
harassment Harassment covers a wide range of behaviors of an offensive nature. It is commonly understood as behavior that demeans, humiliates, and intimidates a person, and it is characteristically identified by its unlikelihood in terms of social and ...
while sending and receiving information over computer networks is associated with crypto-anarchism, a movement intending to protect individuals from mass surveillance by the government. Digital privacy breaches, including mass identity theft, are on the rise. In 2024, an error by background check company MC2 Data exposed 106 million records containing personal information about U.S. citizens.


Future Research

In the future, research on digital privacy should explore the intersection of
cybersecurity Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
and personal data protection. Specifically, it is crucial to investigate the evolving risks of cyber threats like
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
,
ransomware Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
, and phishing, which threaten privacy. Moreover, a multi-disciplinary approach that combines legal, technological, and social perspectives would provide a comprehensive understanding of how personal data is shared, managed, and protected. This could expand the focus beyond individual protection to include the collective implications of digital privacy, particularly as new technologies like AI and IoT complicate privacy boundaries.


See also

*
Internet privacy Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. P ...
*
Tor (network) Tor is a free overlay network for enabling anonymous communication. It is built on free and open-source software run by over seven thousand volunteer-operated relays worldwide, as well as by millions of users who route their Internet traf ...
* Digital Footprint


Further reading


"Privacy and Information Technology" (Summer 2020 edition), Edward N. Zalta, Editor
by Jeroen van den Hoven; Martijn Blaauw; Wolter Pieters; and Martijn Warnier, ''The Stanford Encyclopedia of Philosophy'', October 30, 2019 (version). Retrieved October 6, 2022.
''Digital Data Collection and Information Privacy Law''
by Mark Burdon,
Cambridge University Press Cambridge University Press was the university press of the University of Cambridge. Granted a letters patent by King Henry VIII in 1534, it was the oldest university press in the world. Cambridge University Press merged with Cambridge Assessme ...
, 2020.
"Data Is Different, So Policymakers Should Pay Close Attention to Its Governance", by Susan Ariel Aaronson, Mira Burri. Editor
Part IV -'' Global Perspectives on Digital Trade Governance''. Cambridge University Press, July 9, 2021. Retrieved October 6, 2022.
"Data is disruptive: How data sovereignty is challenging data governance"
Susan Ariel Aaronson Susan Ariel Aaronson is an American author, public speaker and an academic professor whose works are centred on the relationship between economic change and human rights and more recently focuses on data. She is a research professor at the El ...
, Hinrich Foundation August 3, 2021. Retrieved October 6, 2022.
"Privacy, Big Data, and the Public Good: Frameworks for Engagement", by Combe C.
Local Government Studies, 41(1), 181–182. 2014. Retrieved December 6, 2024.


References

{{Privacy Privacy