Tuesday, December 31, 2019

The Effects Of Domestic Violence On Children - 2555 Words

The purpose of this research was to examine the affects of physical, emotional, sexual, and even economic abuse in families, also known as domestic violence. Domestic violence often escalates in stages. Usually, the abuse is cyclical and escalates beginning with threats and verbal abuse, later resulting in violence. Although, physical injury by a partner may be the most evident danger, the emotional and psychological effects of domestic abuse are also severe, and may go easily undetected. A screening tool called the WAST, created to detect abuse that is not so easily noticeable is introduced in this paper along with abuse prevention programs and campaigns. Research examining the reliability and validity of the WAST found it to be a†¦show more content†¦Domestic violence includes any behaviors, but are not limited to those that can be found as intimidating, humiliating, isolating, threatening, and injurious. Domestic violence often escalates in stages. Usually, the abuse is cyclical and escalates beginning with threats and verbal abuse, later resulting in violence. Although, physical injury by a partner may be the most evident danger, the emotional and psychological effects of domestic abuse are also severe, and may go easily undetected. When a relationship is emotionally abusive, it can take a huge toll on an individual’s confidence, and self worth. This lack of self-confidence can lead to issues with anxiety and depression, making victims of abuse feel helpless, abandoned, and worthless (Smith Segal, 2013). Domestic Violence can also lead to other common emotional traumas such as substance abuse and more importantly, posttraumatic stress disorder. Abuse can have such a bad psychological effect on an individual that it can trigger suicide attempts, psychotic episodes, and make recovery a very difficult process. In some cases, children are also exposed to domestic violence, and are at risk for developmental issues, psychiatric disorders, school

Sunday, December 22, 2019

Tennessee Williams The Glass Menagerie Essay - 1063 Words

The lacking of a positive male role model can be very troublesome for any family; especially during the mid-thirties. Prior to the Second World War, women did not have significant roles in the workforce and depended on their husbands or fathers to provide for them financially. There were limited government assistance programs during the era of The Great Depression, and it was up to the families to provide for themselves. The absence of Mr. Wingfield placed enormous strains on the physical as well as mental wellbeing of his family. The effects the abandonment of their father had on the Wingfield family from Tennessee William’s The Glass Menagerie are undeniable. The Amanda Wingfield that we come to know is overbearing, worrisome, and†¦show more content†¦Amanda’s constant pushing of Laura to attend â€Å"Rubicam’s Business College†, whose anxiety disorder already prevents her from leading a normal life, illuminates Amanda’s inability to recognize the abnormalities in her children (1163). When Laura reminds her mother that she is crippled, Amanda begins to scold Laura, â€Å"[n]on-sense! Laura, I’ve told you never, never to use that word†¦Ã¢â‚¬  this gives further testimony to Amanda’s denial of her children’s defects (1165). Amanda is so consumed with preventing her children from making the same mistakes that she has, that she has become a â€Å"witch† and â€Å"hateful to her children† (1172). Her thirst for her children’s success combined with the lack of ability to give them what â€Å"she† thinks they need, due to her financial constraints of not having her husband’s support, has driven her to the current delusional state she is in (Williams). In present day women are very active in the work force, and a man in his early twenties generally does not have to take on the responsibilities of providing for his family, like young Tom Wingfield did, even if the father had abandoned them. When Tom’s father ran out on them, Tom being the only male in the male driven work force of that time period, had to abandon his dreams and ambitions to fill in as the main provider for his family. The lack of adventure in Tom’s career at the Continental Shoemakers, leads Tom to attending late-night movies to suppressShow MoreRelatedThe Glass Menagerie By Tennessee Williams985 Words   |  4 Pageshardly catch it going. ¨ This quote by the author of The Glass Menagerie, Tennessee Williams, describes both The Glass Menagerie, a memory play, and the life of Tennessee Williams himself, for whom memories played a large role in his life. Within the play, many parallels can be drawn between the life of Williams and the life of Tom, t he main character, such as a disdain for factory work. In addition, several characters in The Glass Menagerie have a difficult time fitting into the roles that theirRead MoreThe Glass Menagerie By Tennessee Williams Essay940 Words   |  4 PagesTennessee Williams was a renowned Pulitzer Prize-winning playwriter for his numerous plays throughout his career. One of such plays is The Glass Menagerie. After perfecting his play for many years, The Glass Menagerie was first introduced to Broadway on March 31, 1945. As a young writer, Williams lived vicariously through his plays. Throughout this play in particular, there are several allegories that pertain to Williams life. Although Williams had a relatively happy childhood, his life changedRead MoreThe Glass Menagerie By Tennessee Williams932 Words   |  4 Pages THE GLASS MENAGERIE Name Instructor Institution Course Date The Glass Menagerie Tennessee Williams, the author in the play †The Glass Menagerie† that is based on his life that presents characters that, as caught animals in an cage, live in woeful states and just wish to unravel themselves from this state (Fisher, 2010). The primary clash in the story emerges through their longing to encounter a different world, but their condition opens them to life s unforgiving realities. LifeRead MoreThe Glass Menagerie By Tennessee Williams986 Words   |  4 PagesTennessee Williams’s The Glass Menagerie, is a classic drama about a young man who is tired of his dull and boring existence. Tom, the main character, struggles to deal with his family, who is apparently holding him back in life. With the use of powerful writing techniques, Williams is able to captivate his audience and create a play that has stood the test of time. An excellent writing technique employed by Williams that contributes to The Glass Menagerie’s success is his use of plot. ThroughoutRead MoreThe Glass Menagerie By Tennessee Williams1249 Words   |  5 Pagesthe outside world The Glass Menagerie is very interesting because William s play relates to alot of people and their situations, people can learn alot from it alot whether they connect to Amanda and her past or to Laura and her lack of confidence and being in a world of her own or to Tom and his internal conflict about abandoning his family or staying with them. Laura s life is all about her glass menageries what happens when her glass unicorn breaks? What happens when a gentlemanRead MoreThe Glass Menagerie By Tennessee Williams1619 Words   |  7 PagesIsolation is prevalent in â€Å"The Glass Menagerie† by Tennessee Williams. This is presented in symbols such as blue roses and the glass unicorn, for they are imagined objects and only existent in another fantasy world. Williams incorporates such arcane symbols to draw out his characters, Amanda, Laura, and Tom, and how they cope with confinement. Most importantly, the symbols of the play represent how isolation debilita tes them psychologically in an attempt to connect with reality. The jonquils representRead MoreThe Glass Menagerie By Tennessee William1014 Words   |  5 PagesIn the play â€Å"The Glass Menagerie† of Tennessee William, he wrote a drama play to emphasize readers about the life is at a standstill the Wingfield family. Through of the Wingfield family, he uses many symbols which represent many things, but the important main symbolization is fire escape that shows three main characters; Tom Wingfield, his fire escape is the way out of Amanda and Laura. Amanda Wingfield, hope gentlemen callers to enter their lives, and Laura Wingfield, who wants in her own worldRead MoreThe Glass Menagerie By Tennessee Williams1534 Words   |  7 PagesThe Glass Menagerie by Tennessee Williams Tennessee Williams, born Thomas Lanier Williams, wrote The Glass Menagerie, a play which premiered in Chicago in 1944. This award winning play, autobiographical in nature, represented a time in which Williams felt the obligation of his responsibilities in regards to the care of his family. Robert DiYanni, Adjunct Professor of Humanities at New York University, rated it as, â€Å"One of his best-loved plays...a portrayal of loneliness among characters who confuseRead MoreThe Glass Menagerie By Tennessee Williams Essay876 Words   |  4 PagesIn Tennessee Williams’ The Glass Menagerie, there is a collection of glass animal figurines that belong to Laura. Laura uses those figurines to escape her reality. The â€Å"glass menagerie† is also a metaphor because all of the characters have a metaphorical glass menagerie that they use to escape their reality. Tom escapes his reality by going to the movies, drinking, and writing poetry. Tom says, â€Å"I go to the movies because – I like adventure†¦ something I don’t have much of at work† (Williams 33)Read MoreThe Glass Menagerie By Tennessee Williams867 Words   |  4 Pagesdraw the line between getting what you want and doing what you are obligated to do? In The Glass Menagerie by Tennessee Williams, the main characters are torn between fulfilling their desires and aligning with their role in society. On the surface, Amanda Wingfield plays the role of a caring mother that would do anything in her children’s best interest. However, according to the play, â€Å"The Glass Menagerie†, you should never be fooled by the â€Å"Illusion of the truth.† She indeed values her children’s

Saturday, December 14, 2019

Good Fall Free Essays

A Good Fall The word Freedom has a different connotation in every part of the world, to have freedom means to have certain characteristics. These characteristics would be having the Third Eye, self-control, humility, and the ability to be able to overcome problems with a strategized plan. In the short story collection A Good Fall by Ha Jin, each story puts characters in dissimilar positions where they show whether or not they have the characteristics that define freedom. We will write a custom essay sample on Good Fall or any similar topic only for you Order Now A Composer and His Parakeet†, â€Å" In The Crossfire†, â€Å"The Beauty†, and â€Å"Temporary Love† all involve characters that seem to be trapped in a current relationship, but for different reasons. Learned Helplessness is a disease, in which you close your heart and mind to your strong self and settle for your weak self-resulting in shame, several characters are diagnosed with this disease. The Third Eye can be defined as self-awareness, it allows us to interpret the current situation we are in, and analyze the good from the bad. It emphasizes the bigger, long-term picture over the short-term and helps make decisions out of reason rather emotion. A person with the third eyes exercises discipline over desire. Humility is simply learning from our mistakes to make us stronger and wiser. Fanlin from the story â€Å"A Composer and his Parakeets† shows traits of having freedom. His girlfriend Supriya owns a mute parakeet Bori; she leaves Bori with Fanlin as she goes off to Thailand for her job as an actress. At the beginning Fanlin disliked the bird because he believed one of Supriya’s ex-boyfriends gave her the bird. Over time he grows a heart and starts bonding with the bird, he lets him into his music studio in which the bird was not allowed in at first. Fanlin was preparing to write for an Opera event that was coming up. Weeks went on and the bird went everywhere Fanlin did, until one day by the beach the bird flies away and almost drowns and Fanlin throws himself into the water to save it. Bori would later die the following day and his girlfriend did not seem to care about the bird anymore. This made Fanlin’s third eye kick in as he wondered whether she would not care about him like she did with the bird over time. When the bird died so did his relationship with Supriya. Fanlin’s students that he thought music lessons seemed concerned about him and so they bring him another parakeet. This parakeet had a dirty mouth and Fanlin paid him no mind, he even left his window open so he would fly away. After the death of the first bird and the death of his relationship, Fanlin goes on to write a beautiful second half of music in his opera which was full of emotion and is told to go back to rewrite the first half. His second bird would fly away shortly after, symbolizing he being set free from his past relationship that was just a waste of time. Self-control is the ability to improve our position rather than surrender to self-destruction and compulsion. In the story â€Å"Temporary Love†, Lina a married woman who’s husband was in China, lived in the United States with a married man. Although she tells her husband that she lives by herself, she has sexual relations with this married man who’s spouse as well lived in China. They had a mutual agreement to end this temporary relationship until their spouses arrived in the United States. Unfortunately Panbin, the man Lina stayed with grew feelings for her and told her repeatedly he was in love with her. Lina told him a plethora of times that she was married and that they agreed to end this arrangement whenever one wanted. Her husband was coming to the United States so Lina prepares to move out and find her own apartment. She thought that her husband did not know about the affair but he did. He had his ways of having someone follow her and relay him the information he needed. This put Lina in an uncomfortable position, her husband told her he did not want to find a job and was going to go to business school to get his MBA. Not only that, but Lina was going to pay for it with all her money she had saved in her bank account. She had no other choice but to pay for his schooling, she feared that once she paid he would soon leave her. Secretly she would visit Panbin for advice but he paid her no mind for leaving him. Now she was trapped in a relationship she could not escape. Lina could either pay and face the consequences of her husband maybe leaving or not pay and face the humility, disappointment, and shame in her by her family back home for her actions. Lina is a victim of learned helplessness. Freedom was a major contributor in Fanlin actions as he could freely relieve himself from Supriya. As for Lina, she was strapped in for a long ride with the devil. Fanlin is able to figure out that Supriya was no good for him and that she would soon leave him. He made up his mind and left her, and was free without her. Lina in this case was stuck, she had no self-control, she was ashamed of herself and her actions, the only thing she could do was pay her husbands tuition for taking of her ailing father back home. Some people are born with the third eye such as Fanlin, while others lack it and suffer and live a life without any freedom. How to cite Good Fall, Papers

Friday, December 6, 2019

Maintaining Human Dignity and Data Privacy

Question- Explain why you believe this (your case study) to be an issue where human dignity is a critical factor? Answer- Introduction: The essay highlights on the given topic Human dignity and data privacy. It discusses some of the key issues such as the need for maintaining human dignity and also privacy of personal data. The given case study focuses on some of the aspects related to the topic, along with three unique perspectives. The essay highlights on each of the perspectives along with their pros and cons. Privacy is considered to be a fundamental human right (Pincock, 2004). It is said to underpin human dignity as well as other values like freedom of speech as well as freedom of association. Privacy is a human right which is most difficult to define. As depicted in the various situations in the case study, each of the cases depict different pictures altogether. Perspective 1: In order to protect the dignity of all human life against forces that may threaten it (eg. terrorism and other threats to public safety), government agencies must collect and store large amounts of otherwise private data. The statement may be complied with to an extent where it concerns security of personal information of the people. Government agencies are quite empowered to resolve such issues. So the perspective may be supported to a great extent. The improved sophistication of the sector of information technology along with its capacity of collection, analyzing, and dissemination of information upon individuals has led to the rise of urgency towards the demand for legislation ('Protectors of privacy: regulating personal data in the global economy', 2009). Computer systems connected together with great speed networks along with advanced processing systems can develop comprehensive dossiers upon any individual without using a single central system. Innovative technologies developed by the industry of defense are on the process of spreading to enforcement of law, private companies, and civilian agencies (Parhiala Simango, 2014). As per opinion polls and that of the depicted cases in the given case study, concern over violation related to privacy has increased greatly more than ever before in the recent times. Also, population of each global nation express their fears regarding encroachment upon privacy, thereby prompting severa l nations to pass laws that particularly safeguard the privacy of the population. As referred to in the case study, it is normal that power, capacity, and that of speed of information technology is increasing at a rapid speed. The level of privacy invasion has increased simultaneously. As per researches, several trends contribute towards privacy invasion such as globalization, convergence, and multimedia. These have impacts upon surveillance within developing nations (Moerel, 2010). In context to information and communication technology, the pace of policy convergence has been compressed. Throughout the surveillance spectrum, wiretapping, data mining, personal ID system, encryption controls all set a proscriptive pace. It has been rightly stated that government agencies must collect and store large amounts of otherwise private data. In fact governments of almost all developing nations nowadays depend upon the first world nations for the supply of technologies of surveillance like digital wiretapping equipment, scanners, deciphering equipment, bugs, computer interc ept systems, and tracking systems (McConnell, 2002). Thus, governments as well as citizens would immensely benefit from the plethora of information technology schemes that are implemented by the public as well as private sectors. Innovative projects of smart cards which bears client information is placed upon a chip in a card can streamline complex transactions. The availability of internet would revolutionize accessibility to basic information upon government services. Here in such cases, encryption may provide security as well as privacy to all parties (Richardson, 2003). In the current environment there is a rising need to protect data. Advancements in the computer technology, biotechnology, and medicine have resulted in the rise of personal data processing within different spheres of social as well as economic activities, imparting challenges of complex technology. On the other side, technological as well as electronic commerce progress renders convenience in the treatment as well as data exchange across international boundaries (Ismail, 2012). So, it is significant to protect every personal data while facilitating the continued information flow, electronic commerce, and advancements in technology. However, these initiatives would demand for a bold procedure having a strong legislative framework. If governments can suitably deliver the required framework would be dependent upon their willingness to attend the call of the emerging world digital economy as well as to recognize the need to incorporate a strong privacy protection (Fischer, 2014). As per some recent information, several schemes of access control have been introduced for controlling unauthorized propagation of data and information within the online networks. However, a need still exists to have a mechanism for evaluation of risk in the social networks. Perspective 2: In our internet connected society, the rise of shamelessness in the online community whereby individuals share personal information (sacrifice privacy) in order to gain fame and the voyeurism that accompanies it, results in a loss of human dignity. Dignity is then further compromised by the collection and storage of this personal data for later use. As per the given perspective stated above, it is the most common phenomenon that is depicted. The trend of using internet among individuals of various ages has led to the excessive use of online social networks. It is true that this kind of social platform drives people towards the craze for being famous with some simple measures. In this process, often people tend to share their personal information (Shin, Ma, Kim Kim, 2013). The information is further collected by various anonymous entities for respective gains. This is a form of harm to human dignity. The dominant persuasive role of social networking in the web has been turning human relations to conduits of data as well as information flow. This refers to the fact that the manner information which spreads within the web is determined to a great extent by human activities and decisions (Durante, 2011). As a result, information security rests upon the quality of the collective decisions taken by the users. As per some recent infor mation, several schemes of access control have been introduced for controlling unauthorized propagation of data and information within the online networks. However, a need still exists to have a mechanism for evaluation of risk in the social networks. However, not always people provide personal information to the data processors. During online purchases, customers are inevitably required to provide some personal information even if they are reluctant. So, the perspective cannot be supported completely. With increased number of online customers and association with social media requires them to share their personal information. This allows potential hackers to access as well as leverage the information to get financial benefits. It is very important that online customers adhere to a plan of cyber-security which involves the use of system restore as well as application control technology(Di Valentino, n.d.). The convenience of online purchases resulted in the rapid expansion of the market of e-commerce. Every time customers provide their credit card information and hence their financial security is at danger. This allows the hackers to get transactions occurring for stealing cardholder information and make illegal charges (Vorster, 2012). One of the key problems with the online communities is the lack of trust about any sort of personal or professional information relating to the question of identity or information reciprocity. Many a times, when information is shared with any user o f an online community, one expects similar thing to occur by sharing equal information back ('Demographics: a guide to methods and data sources for media, business, and government', 2006). Normally, all online social networking sites require users to provide their personal data and information for accessing the services. Users are generally comfortable in sharing with their data in order to seek services. It is common phenomenon that for attaining fame, users tend to provide their personal information to the data processors (Vlkel Haller, 2009). This is a form of loss of dignity. Human dignity is further compromised when the shared information is utilized by firms and organization for financial gains. Perspective 3: It is vital to ensure the protection of personal data online, and that internet users are aware of how accessible their posted information is. The collection of individuals personal data could result in a loss of dignity, through personal profiling, pre-emptive judgments and the possible loss of presumed innocence. The perspective depicted in the above statement refers to the need to protect personal data on the web. The internet users must be aware all the time that their personal information that is posted on the online social networking site is easily accessible by others. When the information are collected by others, it results in the loss of dignity by means of personal profiling, possible loss of innocence, and pre-emptive judgments (Whitman, n.d.). Protection of data is regarded as a right to privacy which individuals possess against illegal use of personal data by any data processor. The main purpose of such a policy or regulation is to safeguard the human dign ity of any nation, and prevent any sort of misuse of personal data. On one side, protection of data enables individuals to have greater control over the manner they share their personal information with data processors(Wong, n.d.). On the other side, it creates the obligations of data processors. The processors need to get the consent of the people prior to processing. They must also ensure measures to safeguard the integrity as well as confidentiality of the personal data obtained. In case of information share, it needs to ensure similar compliance from the third party regarding protection level. In the present situation, identity theft has become a concerning area among customers in the recent years. With increased number of online customers and association with social media requires them to share their personal information. This allows potential hackers to access as well as leverage the information to get financial benefits (Yu, 2005). It is very important that online customers adhere to a plan of cyber-security which involves the use of system restore as well as application control technology. The convenience of online purchases resulted in the rapid expansion of the market of e-commerce. Every time customers provide their credit card information and hence their financial security is at danger. This allows the hackers to get transactions occurring for stealing cardholder information and make illegal charges (Zanfir, n.d.). Several businesses nowadays provide ability of storing payment records so that customers can make purchases quickly without giving card numbers and addr esses again and again. This is helpful in providing greater effortless experience of online shopping though vulnerabilities also exist. Cybercriminals often infiltrate organizational databases to steal information. With consideration of increased cost of payment as well as identity information theft with increase of frequency of breaches, it is quite common that businesses as well as individuals need to take greater pains in securing their personal data. As per a recent survey of 1000 Australians, it was found that almost 55% of them could not remember how many websites had their personal information. Only 27% users of social networking said they were aware of sharing personal information. In the current environment there is a rising need to protect data ('Data Watch: Most Youths Post Personal Information Online', 2007). Advancements in the computer technology, biotechnology, and medicine have resulted in the rise of personal data processing within different spheres of social as well as economic activities, imparting challenges of complex technology. On the other side, technological as well as electronic commerce progress renders convenience in the treatment as well as data exchange across inte rnational boundaries. So, it is significant to protect every personal data while facilitating the continued information flow, electronic commerce, and advancements in technology. However, the significance of personal life and that of the source of right to privacy of an individual vary as per policies of one nation to another (Cheung, n.d.). Hence, different rules as well as regulations are an urgent necessity to utilize personal information for ensuring involved fundamental rights. The level of privacy invasion has increased greatly. As per researches, several trends contribute towards privacy invasion such as globalization, convergence, and multimedia. These have impacts upon surveillance within developing nations. In context to information and communication technology, the pace of policy convergence has been compressed. Throughout the surveillance spectrum, wiretapping, data mining, personal ID system, encryption controls all set a proscriptive pace. References Cheung, A. Revisiting Privacy and Dignity: Online Shaming in the Global E-Village.SSRN Journal. doi:10.2139/ssrn.2010438 Data Watch: Most Youths Post Personal Information Online. (2007).Pediatric News,41(5), 9. doi:10.1016/s0031-398x(07)70299-0 Demographics: a guide to methods and data sources for media, business, and government. (2006).Choice Reviews Online,44(03), 44-1294-44-1294. doi:10.5860/choice.44-1294 Di Valentino, L. Medical Shadow: On the Privacy Protection of Personal Health Information Online in Canada.SSRN Journal. doi:10.2139/ssrn.2091855 Durante, M. (2011). The Online Construction of Personal Identity Through Trust and Privacy.Information,2(4), 594-620. doi:10.3390/info2040594 Fischer, J. (2014). Diskussion: Human Dignity and Human Rights.Zeitschrift Fr Evangelische Ethik,58(1). doi:10.14315/zee-2014-58-1-40 Ismail, N. (2012). Selected issues regarding the Malaysian Personal Data Protection Act (PDPA) 2010.International Data Privacy Law,2(2), 105-112. doi:10.1093/idpl/ips005 McConnell, C. (2002). LEGAL BRIEF: Personal data protection.The Computer Bulletin,44(6), 32-32. doi:10.1093/combul/44.6.32-c Moerel, L. (2010). The long arm of EU data protection law: Does the Data Protection Directive apply to processing of personal data of EU citizens by websites worldwide?.International Data Privacy Law,1(1), 28-46. doi:10.1093/idpl/ipq004 Parhiala, P., Simango, G. (2014). Diakonia and Human Dignity.The Ecumenical Review,66(3), 330-340. doi:10.1111/erev.12115 Pincock, S. (2004). Hospitals still don't do enough for patients' privacy and dignity.BMJ,328(7442), 730-0. doi:10.1136/bmj.328.7442.730-b Protectors of privacy: regulating personal data in the global economy. (2009).Choice Reviews Online,46(10), 46-5861-46-5861. doi:10.5860/choice.46-5861 Richardson, R. (2003). Human dignity.BMJ,326(7398), 1077-1077. doi:10.1136/bmj.326.7398.1077 Shin, S., Ma, S., Kim, S., Kim, B. (2013). Research on Factors Efecting Online Service Loyalty : Mediating Efect of Perceived Personal Information Protection.Journal Of Security Engineering,10(6), 695-710. doi:10.14257/jse.2013.12.02 Vlkel, M., Haller, H. (2009). Conceptual data structures for personal knowledge management.Online Information Review,33(2), 298-315. doi:10.1108/14684520910951221 Vorster, N. (2012). THE RELATIONSHIP BETWEEN HUMAN AND NON-HUMAN DIGNITY.Scriptura,104(0), 406. doi:10.7833/104-0-180 Whitman, J. The Two Western Cultures of Privacy: Dignity versus Liberty.SSRN Journal. doi:10.2139/ssrn.476041 Wong, R. Data Protection in the Online Age.SSRN Journal. doi:10.2139/ssrn.2220754 Yu, J. (2005). Electronic government and its implication for data privacy in Hong Kong: Can Personal Data (Privacy) Ordinance protect the privacy of personal information in cyberspace?.International Review Of Law, Computers Technology,19(2), 143-163. doi:10.1080/13600860500131564 Zanfir, G. The Right to the Protection of Personal Data (Dreptul la ProtecÃ…Â £ia Datelor cu Caracter Personal).SSRN Journal. doi:10.2139/ssrn.1852623