Computer ethics

Results: 6625



#Item
811Scientific revolution / Digital technology / Hacking / Computer / Nettime / Analog computer / Internet / Hacker / Legal aspects of computing / Computing / Electronics / Technology

SUBJECT: SCIENTIFIC ETHICS: A TWO-SIDED QUESTION FROM: MICHEL SERRES (BY WAY OF PIT SCHULTZ <>) DATE: MON, 21 SEP:34:11 +0200

Add to Reading List

Source URL: www.medialounge.net

Language: English - Date: 2004-01-29 13:56:53
812Privacy / Law / Computer law / Information privacy / IB Diploma Programme / Ethics / International Safe Harbor Privacy Principles / Data security / Information / Data privacy / Data management / Privacy law

IB policy document GLOBAL DATA PROTECTION POLICY Version: 2.0

Add to Reading List

Source URL: ibo.org

Language: English - Date: 2014-11-04 10:13:10
813Risk / Risk analysis / Human rights / Actuarial science / Social issues / Internet privacy / Privacy / Threat / Ethics / Computer security / Management

PrivaCheck™ IT’S TIME FOR A PRIVACY CHECK-UP. PrivaTech Consulting is making an external privacy audit and assessment more accessible to your business. PrivaCheck is a new cost-effective, customized solution that he

Add to Reading List

Source URL: privatech.ca

Language: English
814Human–computer interaction / Internet ethics / Internet privacy / Cache / Google Chrome / World Wide Web / HTTP cookie / Web cache / Privacy mode / Software / Computing / HTTP

I Know Where You’ve Been: Geo-Inference Attacks via the Browser Cache Yaoqi Jia∗ , Xinshu Dong† , Zhenkai Liang ∗ , Prateek Saxena∗ ∗ School of Computing, National University of Singapore

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2014-10-15 16:11:26
815Law / Identity management / Social issues / Gramm–Leach–Bliley Act / Internet privacy / Medical privacy / Privacy policy / Consumer privacy / Privacy / Ethics / Computer law

Gramm – Leach – Bliley Privacy Act

Add to Reading List

Source URL: www.iwar.org.uk

Language: English - Date: 2008-11-19 12:01:33
816Privacy / Human rights / Crime prevention / Law enforcement / Internet privacy / Surveillance / Mass surveillance / Tor / Computer surveillance / Security / Ethics / National security

Do We Care About Surveillance? Edward Snowden’s Impact And Policy Implications Arya Azma, Louis DeScioli, and Evan Marshall 1  

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2014-08-10 11:09:32
817Law / Privacy / Internet privacy / National Institute of Standards and Technology / Privacy Office of the U.S. Department of Homeland Security / IT risk / Ethics / Computer security / Information technology management

Summary of the Privacy Engineering Workshop at the National Institute of Standards and Technology (April 9-10, 2014)

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2014-05-21 09:55:14
818Event / Subroutines / Risk / Insurance / Management / Ethics / Computer programming

*PD-Starter Guide Web-no pics

Add to Reading List

Source URL: www.walgett.nsw.gov.au

Language: English - Date: 2013-05-14 06:14:05
819Computer security / Data security / Information privacy / Internet privacy / Information security / Personally identifiable information / Identity theft / Personal Data Privacy and Security Act / Privacy / Ethics / Security

How Global Organizations Approach the Challenge of Protecting Personal Data Contents Passing the Tipping Point. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Add to Reading List

Source URL: www.ponemon.org

Language: English - Date: 2010-07-14 11:22:08
820Risk / Software testing / Computer security / Security / Risk management / Penetration test / Vulnerability / Actuarial science / Management / Ethics

Case Study: Medical Product Security Assessment (Document NoSolutions For Advanced Services Altius Information Technologies, Inc. Delivering higher business performance

Add to Reading List

Source URL: www.altiusit.com

Language: English - Date: 2015-01-29 19:02:40
UPDATE