Computer ethics

Results: 6625



#Item
171Violence / Cyber-bullying / Ethics / Mind / Anger / Emotions / Rage

www.stopcyberbullying.org ______________________________________________________________________________ Take 5! Put down the mouse and step away from the computer…and no one will get hurt! The Internet and mobile tech

Add to Reading List

Source URL: www.stopcyberbullying.org

Language: English - Date: 2005-04-16 10:27:50
172Security / Law / Computer law / Personal life / Personally identifiable information / Information privacy law / Data Protection Directive / Information privacy / Internet privacy / Privacy / Ethics / Data privacy

Privacy and Security Law Report ® Reproduced with permission from Privacy & Security Law Report, 13 PVLR 1581, Copyright 姝 2014 by The Bureau of National Affairs, Inchttp://www.bna.com

Add to Reading List

Source URL: docs.law.gwu.edu

Language: English - Date: 2014-09-15 13:44:22
173World Wide Web / Website / Internet privacy / Privacy / Telephone numbers in the United Kingdom / PhishTank / Ethics / Human–computer interaction / Information Age

Xxxxxx Web site Terms and Conditions of Use [NOTE: This example comes with permission of the Navajo Times, which uses a policy at http://navajotimes.com/corporate/terms.php. If you have legal questions, please consult y

Add to Reading List

Source URL: www.naja.com

Language: English - Date: 2014-01-31 14:21:12
174United States government secrecy / Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Computer / Privacy / Internet privacy / Hard disk drive / For Official Use Only / Ethics / Computer hardware / Computing

Unmarked redactions were present when Army received this document. Redactions in accordance with (b)(1)(B) UNITED STATESOF AMERICA y^ Manning, BradleyE.

Add to Reading List

Source URL: s3.documentcloud.org

Language: English - Date: 2014-04-13 20:33:20
175Sex crimes / Adolescence / Ethics / Cyber-bullying / Internet fraud / Online predator / Child pornography / Internet safety / Child grooming / Computer crimes / Crime / Human development

TAKE BACK Educate Equip Empower your family’s safety

Add to Reading List

Source URL: internetsafety101.org

Language: English - Date: 2015-05-12 12:32:39
176National security / Automatic identification and data capture / Data privacy / Image processing / Structural similarity / Vehicle registration plate / Privacy / Internet privacy / De-identification / Security / Surveillance / Ethics

Preservative License Plate De-identification for Privacy Protection Liang Du Haibin Ling Center for Data Analytics & Biomedical Informatics, Department of Computer & Information Science Temple University, Philadelphia, P

Add to Reading List

Source URL: www.dabi.temple.edu

Language: English - Date: 2011-06-26 03:54:36
177National security / Human rights / Public safety / Computer network security / Science and Technology Options Assessment / Internet privacy / Open-source software / Cloud computing / Computer security / Security / Ethics / Crime prevention

Mass Surveillance Mass Surveillance What are the risks for citizens and the opportunities for the European Information Society? What are the possible mitigation strategies?

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2015-02-12 15:10:03
178Privacy / Data Protection Act / Information privacy / Law / Regulatory compliance / Personally identifiable information / Criminal law / Ethics / Computer law / Data privacy / Privacy law

How to keep your business safe under the Personal Data Protection Act Reaching out to a business’ customers isn’t just a question of marketing savvy and clever ad copy – it’s also a legal issue. Singapore’s ne

Add to Reading List

Source URL: isoc.sg

Language: English - Date: 2013-05-31 02:16:36
179Actuarial science / Public safety / Computer crimes / Cyberwarfare / Hacking / Military technology / Operational risk / Computer security / Bank / Security / Ethics / Risk

Speech at The Clearing House’s First Annual Operational Risk Colloquium, February 11, 2015

Add to Reading List

Source URL: www.occ.gov

Language: English - Date: 2015-06-04 01:21:54
180Ethics / Cryptography / Cryptographic software / Software / File sharing networks / Tor / Anonymity / Computer security conference / Peer-to-peer / Internet privacy / Identity management / Social issues

Rob G. Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems 4555 Overlook Avenue SW Washington, DC 20375

Add to Reading List

Source URL: www.robgjansen.com

Language: English - Date: 2015-06-06 16:07:00
UPDATE