Computer ethics

Results: 6625



#Item
41Huff & Brown | Teaching Therac 1 Integrating Ethics Into a Computing Curriculm: A Case Study of the Therac-25 Chuck Huff1 and Richard Brown2 Abstract Almost all computer ethics courses use cases to some extent. We show h

Huff & Brown | Teaching Therac 1 Integrating Ethics Into a Computing Curriculm: A Case Study of the Therac-25 Chuck Huff1 and Richard Brown2 Abstract Almost all computer ethics courses use cases to some extent. We show h

Add to Reading List

Source URL: www.stolaf.edu

Language: English - Date: 2009-10-30 22:01:02
    42South African Geomatics Institute www.sagi.co.za Application for Membership  Form A

    South African Geomatics Institute www.sagi.co.za Application for Membership Form A

    Add to Reading List

    Source URL: www.sagi.co.za

    Language: English - Date: 2016-01-28 01:49:52
    43The inevitability of the transition from a surveillance-society to a veillance-society: Moral and economic grounding for sousveillance Mir Adnan Ali and Steve Mann Department of Electrical and Computer Engineering Univer

    The inevitability of the transition from a surveillance-society to a veillance-society: Moral and economic grounding for sousveillance Mir Adnan Ali and Steve Mann Department of Electrical and Computer Engineering Univer

    Add to Reading List

    Source URL: eyetap.org

    Language: English - Date: 2013-10-12 01:11:24
    44FAQ FOR THE PERSONAL DATA PROTECTION ACT (PDPA) ACCORDING TO TYPES OF CUSTOMERS’ QUERIES AND COMPLAINTS A. B. C. D.

    FAQ FOR THE PERSONAL DATA PROTECTION ACT (PDPA) ACCORDING TO TYPES OF CUSTOMERS’ QUERIES AND COMPLAINTS A. B. C. D.

    Add to Reading List

    Source URL: www.amgeneralinsurance.com

    Language: English - Date: 2014-02-26 20:53:28
    45EECS 588: Computer and Network Security Introduction January 14, 2014

    EECS 588: Computer and Network Security Introduction January 14, 2014

    Add to Reading List

    Source URL: www.eecs.umich.edu

    Language: English - Date: 2014-12-24 15:33:54
    46Data Protection Policy Summary The University’s Data Protection Policy explains how the University meets its obligations under the Data Protection Act (DPA) and what your responsibilities are as a member of staff. So D

    Data Protection Policy Summary The University’s Data Protection Policy explains how the University meets its obligations under the Data Protection Act (DPA) and what your responsibilities are as a member of staff. So D

    Add to Reading List

    Source URL: secretariat.blogs.lincoln.ac.uk

    Language: English - Date: 2014-04-07 16:42:18
    47Date: To: From: Re:  November 13, 2014

    Date: To: From: Re: November 13, 2014

    Add to Reading List

    Source URL: payroll.uconn.edu

    Language: English - Date: 2014-11-14 12:12:37
    48   Contractual	
  Regulation	
  of	
  Personal	
  Fitness	
  and	
  Health	
  Data	
  Tracking:	
   An	
  Empirical	
  Survey	
   Timothy	
  S.	
  Hall	
   Professor	
  of	
  Law	
  

      Contractual  Regulation  of  Personal  Fitness  and  Health  Data  Tracking:   An  Empirical  Survey   Timothy  S.  Hall   Professor  of  Law  

    Add to Reading List

    Source URL: conferences.asucollegeoflaw.com

    Language: English - Date: 2015-03-05 16:28:43
    49Computer addiction / Video game controversies / Video game addiction / Sexual addiction / Video game / Substance dependence / Gameplay / Massively multiplayer online role-playing game / Addiction / Ethics / Behavioral addiction / Internet addiction disorder

    29 Running Head: Online Game Addiction

    Add to Reading List

    Source URL: web.calstatela.edu

    Language: English - Date: 2012-03-17 19:11:58
    50ACCESS TO INFORMATION AND CONFIDENTIALITY OF PERSONAL INFORMATION ON INTERNET Internet is a worldwide computer network made up of a collection of national, regional and private sub-networks linked by a common communicati

    ACCESS TO INFORMATION AND CONFIDENTIALITY OF PERSONAL INFORMATION ON INTERNET Internet is a worldwide computer network made up of a collection of national, regional and private sub-networks linked by a common communicati

    Add to Reading List

    Source URL: www.cai.gouv.qc.ca

    Language: English - Date: 2012-05-01 19:09:46