Computer ethics

Results: 6625



#Item
101Cyberspace / Law / Internet privacy / Legal aspects of computing / Information privacy / Surveillance / Ethics / Privacy / Computer law

Microsoft Word - Summary e-Conference Stockholm 2008 final.doc

Add to Reading List

Source URL: www.juridicum.su.se

Language: English - Date: 2009-07-03 10:49:09
102Public-key cryptography / Protection Profile / Common Criteria / Electronic signature / Public key certificate / Evaluation Assurance Level / Integrity / CAdES / Ethics / Evaluation / Computer security / Key management

Microsoft Word - WD1 EN_14169-4_(E)_v1.0.1_KGTCCGA.doc

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2013-02-14 10:25:38
103Cyberwarfare / Social vulnerability / Military tactics / Computer security / Vulnerability / Threat / Disaster / Psychological resilience / Risk / Ethics / Security

Concepts of Vulnerability AIACC Project AIACC VULNERABILITY AND ADAPTATION TRAINING Vulnerability Module for Nairobi Kick-off Meeting

Add to Reading List

Source URL: www.start.org

Language: English - Date: 2010-04-05 16:30:34
104Computer crimes / Bullying / Human behavior / Aggression / Cyber-bullying / Social psychology / Internet privacy / Email / Cyberstalking / Abuse / Ethics / Behavior

Microsoft Word - Cyberbullying.doc

Add to Reading List

Source URL: internetsafety101.org

Language: English - Date: 2010-10-06 15:07:28
105Actuarial science / Ethics / Data security / Computer security / IT risk management / Credit risk / Financial risk / Operational risk / Risk / Management / Security

RISK POLICIES UK Green Investment Bank plc Risk Policies May 2014 

Add to Reading List

Source URL: www.greeninvestmentbank.com

Language: English - Date: 2014-06-03 12:18:39
106Freedom of information in the United States / Law / Ethics / Privacy law / Freedom of information legislation / Computer law / Electronic Privacy Information Center

United States Court of Appeals FOR THE DISTRICT OF COLUMBIA CIRCUIT Argued December 11, 2014 Decided February 10, 2015

Add to Reading List

Source URL: www.cadc.uscourts.gov

Language: English - Date: 2015-06-16 10:39:58
107Ethics / Security / Risk / Security risk / Supply chain management / Management / Risk management / Computer security

Protective Security Training College 2015 Training Calendar (Date)

Add to Reading List

Source URL: www.ag.gov.au

Language: English - Date: 2015-04-01 17:47:23
108Crime prevention / Data security / Information security / National security / Business ethics / United States antitrust law / Conflict of interest / Social issues / The Tyco Guide to Ethical Conduct / Security / Ethics / Computer security

CODE OF CONDUCT REVISED APRIL 2015 CODE OF CONDUCT Coach’s Code of Conduct* outlines the significant legal and ethical issues that frequently arise in

Add to Reading List

Source URL: static.coach.com

Language: English - Date: 2015-05-08 15:48:37
109Crime prevention / National security / Internet privacy / Intrusion detection system / Cyberwarfare / Computer virus / Computer security / Antivirus software / Privacy / Security / Computer network security / Ethics

Review of New Security Paradigms 2002 Workshop Papers By Christina Serban and Hilary Hosmer The New Security Paradigms Workshop (NSPW) offers researchers a safe, constructive environment to explore radical rather than ev

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2002-11-16 13:14:38
110Computer security / Data security / Security / Business ethics / Regulatory Reform (Fire Safety) Order / Compliance and ethics program / Regulatory compliance / Drug Enforcement Administration / United Kingdom

Microsoft Word - GeneralEnforcementPolicyAppendix30.doc

Add to Reading List

Source URL: www.rotherham.gov.uk

Language: English
UPDATE