Computer ethics

Results: 6625



#Item
831Ethics / Cyberwarfare / Data breach / Information security / Internet privacy / Privacy / Information privacy / Security / Computer security / Data security

Aftermath of a Data Breach Study Sponsored by Experian® Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012

Add to Reading List

Source URL: www.ponemon.org

Language: English - Date: 2013-01-21 11:58:32
832Social responsibility / Computing / Computer hardware / Hewlett-Packard / Sustainable development / Environmentalism / The Planetworkshops / Corporate Community Games / Business ethics / Applied ethics / Corporate social responsibility

Message from the CEO Welcome to the Sony Corporate Social Responsibility responsible corporate citizen as well as enhancing corporate

Add to Reading List

Source URL: www.sony.net

Language: English - Date: 2012-03-22 22:05:54
833Spamming / Computer-mediated communication / Spam filtering / Internet ethics / Web 2.0 / Anti-spam techniques / Email spam / Spam / Email service provider / Internet / Computing / Email

E W www.trendcommunications.com.au PFPO Box 2330 Bowral NSW 2576 ABN  

Add to Reading List

Source URL: www.trendcommunications.com.au

Language: English - Date: 2013-09-16 02:23:37
834Ethics / Internet governance / Censorship in the United Kingdom / Internet Watch Foundation / Computer crimes / Child pornography / Child sexual abuse / Europol / Sexual slavery / Crime / Sex crimes / Law enforcement

Commercial Sexual Exploitation of Children Online A Strategic Assessment Prepared by the European Cybercrime Centre (EC3) – Europol Public Version Update

Add to Reading List

Source URL: www.europeanfinancialcoalition.eu

Language: English - Date: 2015-03-20 05:42:01
835Spamming / Crime / Ethics / Criminology / Social engineering / Computer crimes / Phishing

Why  “No  Worse  Off”  is  Worse  Off   John  Aycock   Department  of  Computer  Science   University  of  Calgary,  Canada  

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-02 18:48:28
836Tokyo Electron / Business ethics / Social responsibility / Corporate social responsibility / Applied Materials / Hewlett-Packard / Technology / Computing / Computer hardware

Tokyo Electron’s Technology Supports Our Everyday Lives in Familiar Ways Since our establishment in 1963, the Tokyo Electron (TEL) Group has been developing, producing, and selling products in a broad range of fields a

Add to Reading List

Source URL: www.tel.com

Language: English - Date: 2010-11-12 04:55:00
837Technology / Computer ethics / George Ledin / Malware / Virtue ethics / Information ethics / Business ethics / Social philosophy / Ethics / Philosophy

A Case Study in Malware Research Ethics Education When teaching bad is good

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:40:36
838Computer law / Government / Computer security / Data Protection Act / Audit Commission / Identity Cards Act / Information privacy / Privacy / Internet privacy / Ethics / Privacy law / Data privacy

NO2ID Parliamentary Briefing on the UK Borders Bill

Add to Reading List

Source URL: www.no2id.net

Language: English - Date: 2013-12-22 20:29:06
839Gramm–Leach–Bliley Act / Privacy law / United States federal banking legislation / SoftQuad Software / Gramm / XMetaL / Computing / Software / Internet privacy / Ethics / Computer law / 106th United States Congress

F:\R\114\RH\H601_RH.XML H.L.C. Union Calendar No. 114TH CONGRESS

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2015-04-09 14:40:49
840Security / Ethics / Common Criteria / National Information Assurance Partnership / Evaluation Assurance Level / ECO / Evaluation / Computer security / Protection Profile

National Information Assurance Program Common Criteria Evaluation and Validation Scheme

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:01:44
UPDATE