Computer ethics

Results: 6625



#Item
691Ethics / Computer security / ISO/IEC JTC1 / SQL / Privacy / ISO/TC 176 / ISO/IEC JTC1/SC36 / Identity management / Computing / ISO JTC 1/SC 27

Microsoft PowerPoint - IFIPPrimeLife Summer School.Rannenbergpost.pptx

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2010-08-18 04:14:00
692Data security / Applied ethics / Dentsu / Information security / Business ethics / Human rights / Regulatory compliance / Compliance training / Public safety / Ethics / Security / Computer security

Dentsu CSR Repor t V. Fair Business Practices 40

Add to Reading List

Source URL: www.dentsu.com

Language: English - Date: 2014-12-09 02:26:36
693Intellectual property law / Law / Philosophy of life / Creative Commons / Free music / Copyright / Ethics / Open content / Computer law / Copyleft

North Central Chapter Health Physics Society Minutes of the Executive Council Meeting 25 September 2014 Chanhassen, MN Attendees: Victor Goretsky, Barbara Hodge, Chris Kessler, HPS President-elect Nancy Kirner, Shari Mas

Add to Reading List

Source URL: hps1.org

Language: English - Date: 2014-11-02 20:00:59
694Intellectual property law / Law / Philosophy of life / Creative Commons / Free music / Copyright / Ethics / Open content / Computer law / Copyleft

A man was thinking and he realized … i our problems quite logically follow …

Add to Reading List

Source URL: www.biblestudy.org

Language: English - Date: 2014-11-14 10:49:41
695Privacy / Psiphon / Internet / Computing / Ultrasurf / Ethics / Freegate / Censorship / Politics of Burma / Internet censorship / Computer network security / Content-control software

Country report for end users in Burma Country report for end users in Burma 1

Add to Reading List

Source URL: www.burmapartnership.org

Language: English - Date: 2011-04-20 06:44:47
696Risk management / Computer security / Actuarial science / Emergency management / Access control / Internet privacy / Android / Risk / Security / Ethics

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOITDSC, IEEE Tr

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2015-01-30 02:29:32
697Internet privacy / Privacy / Computing / Cyberethics / Anti-Counterfeiting Trade Agreement / Ethics / Internet ethics / Computer law

Terms and Conditions 1. About this Website 1.1 This website is published by The Rebecca L Cooper Medical Research Foundation Ltd ACNin its capacity as the trustee of The Rebecca L Cooper Medical Research Fou

Add to Reading List

Source URL: www.cooperfoundation.org.au

Language: English - Date: 2014-01-19 19:10:36
698Security / Crime prevention / National security / Electronic commerce / Internet ethics / Wireless security / Email spam / Information security / Computer security / Computer network security / Internet / Computing

Section 5 Ensuring Information Security and Building a Securer IT Society 1. Necessity of Ensuring Information Security The diffusion of information and communications, such

Add to Reading List

Source URL: www.soumu.go.jp

Language: English - Date: 2009-10-02 11:38:57
699Cybercrime / Email / Computer crimes / Internet ethics / The Spamhaus Project / Phishing / Spam / Request for Comments / ICANN / Internet / Computing / Spamming

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:27
700Data privacy / Privacy law / Crimes / Human rights / Data Protection Act / CIFAS / Privacy / Information privacy / Data sharing / Ethics / Law / Computer law

Data protection ICO review: Data sharing between the public and private sector to prevent fraud

Add to Reading List

Source URL: ico.org.uk

Language: English - Date: 2015-04-16 07:42:45
UPDATE