Computer ethics

Results: 6625



#Item
771Security / Actuarial science / Hacking / Cyberwarfare / Insurance / IT risk / Risk management / Risk / Cyber-security regulation / Management / Ethics / Computer crimes

Cyber Pager - Wireframe - V2

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2015-03-20 15:40:14
772Privacy / Computer law / Crime prevention / Law enforcement / Surveillance / Internet privacy / Patriot Act / Electronic Privacy Information Center / Information privacy / Ethics / Law / National security

Digital Discrimination: Big Data, Surveillance, & Racial Justice Convening report from the eigHth media justice

Add to Reading List

Source URL: centerformediajustice.org

Language: English - Date: 2014-10-08 22:02:28
773Data privacy / Law / Computer law / Human rights / Information privacy / Internet privacy / Personally identifiable information / Freedom of information legislation / The right to privacy in New Zealand / Privacy law / Ethics / Privacy

section-9-public-interest-approvals-waiver-or-modification-of-the-privacy-principles

Add to Reading List

Source URL: www.oic.qld.gov.au

Language: English - Date: 2013-09-02 23:53:01
774Human behavior / Gender-based violence / Computer crimes / Violence against women / Violence / Domestic violence / Cyberstalking / Sexism / Pornography / Abuse / Ethics / Behavior

New Technology: Same Old Problems Report of a roundtable on social media and violence against women and girls

Add to Reading List

Source URL: www.endviolenceagainstwomen.org.uk

Language: English - Date: 2014-02-12 13:09:24
775Public safety / Crime prevention / National security / Computer law / Legal aspects of computing / Internet privacy / Telecommunications data retention / Surveillance / Information security / Security / Ethics / Privacy

Microsoft Word - IACP Technology Policy Framework Jan

Add to Reading List

Source URL: dnnnzlqmv.cloudapp.net

Language: English - Date: 2014-01-17 08:51:26
776Security / Computer security / Privacy / Human rights / Law / Internet privacy / Facebook / Access control / Social networking service / Computing / Ethics / Identity management

Game Theoretic Analysis of Multiparty Access Control in Online Social Networks Hongxin Hu Gail-Joon Ahn

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2014-05-20 21:22:50
777Risk management / Computer security / Impact assessment / Technology assessment / National security / Security management / Risk assessment / TRAC / Prison / Security / Risk / Ethics

UNCLASSIFIED Page 1 UNCLASSIFIED Page 1 UNCLASSIFIED Page 5

Add to Reading List

Source URL: www.justice.gov.uk

Language: English - Date: 2014-05-22 13:26:13
778Security / Health Insurance Portability and Accountability Act / Privacy law / Protected health information / Medical informatics / Computer security / Information security / Privacy / Internet privacy / Ethics / Data privacy / Health

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013 Patient Data in the Cloud

Add to Reading List

Source URL: www.mdanderson.org

Language: English - Date: 2015-05-09 06:47:02
779Computer law / Data privacy / Privacy law / Privacy / Accountability / Freedom of information legislation / Data Protection Act / Freedom of Information Act / Information privacy / Ethics / Security / Statistics

Analytical Services Unit, Department for Social Development (DSD) Confidentiality and Access Statement This Statement is issued in conformance with the requirements set out in Principle 5 of the Code of Practice for Off

Add to Reading List

Source URL: www.dsdni.gov.uk

Language: English - Date: 2015-04-16 10:23:27
780Ethology / Communication / Humanities / Journalism sourcing / Computer law / Secrecy / Media transparency / Open government / Sociological aspects of secrecy / Science / Ethics / Sociology

IRIE International Review of Information Ethics VolJuliet Lodge:

Add to Reading List

Source URL: www.i-r-i-e.net

Language: English - Date: 2012-07-20 15:31:55
UPDATE