Anonymity

Results: 917



#Item
721Identity management / Social issues / Privacy / Computing / Internet privacy / Anonymity / In re Gateway Learning Corp. / Information privacy / Ethics / Email / Internet

United Way Privacy Policy About Your Privacy Your privacy is very important to us. The following information concerning the gathering and use of data is being provided to enable you to make knowledgeable choices about wh

Add to Reading List

Source URL: www.uwba.org

Language: English - Date: 2013-09-27 17:29:19
722HTTP cookie / Internet / Privacy / World Wide Web / Anonymity / Zombie cookie / Internet privacy / Ethics / Digital media

UNITED BOARD INTERNET PRIVACY POLICY TABLE OF CONTENTS   

Add to Reading List

Source URL: www.unitedboard.org

Language: English - Date: 2011-09-01 05:01:32
723Alcohol abuse / Alcoholics Anonymous / Psychiatry / Twelve Traditions / Anonymity / Al-Anon/Alateen / Anonymous / Twelve-step programs / Addiction / Ethics

Tradition Eleven “Our public relations policy is based on attraction rather than promotion; we need always maintain personal anonymity at the level of press, radio, and films.” WITHOUT its legions of well-wishers, A

Add to Reading List

Source URL: www.aa.org

Language: English - Date: 2014-03-27 14:38:21
724Alcoholics Anonymous / Alcohol abuse / Therapeutic community / Anonymity / Bill W. / Twelve Traditions / Twelve-step programs / Addiction / Ethics

P-47 - Understanding Anonymity

Add to Reading List

Source URL: www.aa.org

Language: English - Date: 2014-06-05 16:18:02
725Money / Finance / Anonymity / Cheque / Business

Grant Suggestion Form Fund ID: Date:

Add to Reading List

Source URL: www.cicf.org

Language: English - Date: 2011-12-20 10:10:58
726Cryptographic software / Internet / Email / Hushmail / PGP / Webmail / Pseudonymity / Passphrase / HTTP cookie / Computing / Internet privacy / Cryptography

Real World Patterns of Failure in Anonymity Systems Richard Clayton, George Danezis, and Markus G. Kuhn University of Cambridge, Computer Laboratory, Gates Building, JJ Thompson Avenue, Cambridge CB3 0FD, United Kingdom

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2002-06-08 10:10:59
727Addiction / Ethics / Human development / Therapeutic community / Social networking service / Internet privacy / Password / Anonymity / Twelve-step programs / Alcoholics Anonymous / Twelve Traditions

A.A. Guidelines - Internet

Add to Reading List

Source URL: www.aa.org

Language: English - Date: 2014-03-27 14:39:07
728Correction / Knowledge / Language / Punctuation / Quotation mark / Anonymity

Guidelines on Integrity Reporters, editors, photographers and all members of the news staff of The New York Times share a common and essential interest in protecting the integrity of the newspaper. As the news, editoria

Add to Reading List

Source URL: www.nytco.com

Language: English - Date: 2014-02-18 09:41:16
729Social issues / Anonymity / Relational model / Relational database / Information privacy / Data mining / Internet privacy / Computing / Ethics / Privacy / Identity management

L. Sweeney. k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5), 2002; [removed]k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY1 LATANYA SWEENEY

Add to Reading List

Source URL: arbor.ee.ntu.edu.tw

Language: English - Date: 2008-08-19 03:39:17
730Internet ethics / Human rights / Internet privacy / Cryptography / Secrecy / Security through obscurity / Privacy / Online identity / Anonymity / Ethics / World Wide Web / Computing

THE CASE FOR ONLINE OBSCURITY Woodrow Hartzog* and Frederic Stutzman** ABSTRACT: On the Internet, obscure information has a minimal risk of being discovered or understood by unintended recipients. Empirical research demo

Add to Reading List

Source URL: www.futureofprivacy.org

Language: English - Date: 2011-09-30 13:02:58
UPDATE