Computer ethics

Results: 6625



#Item
881Computer law / Internet in the United States / Information / Data / Intellectual property / Social information processing / Business ethics / Copyright / IP address / Intellectual property law / Law / Monopoly

Intellectual Property in a Digital Age Dan McIntosh, Stuart Schaefer, Christina Gould _____________________________________________________________ Introduction Piracy of intellectual property (IP)—specifically copyrig

Add to Reading List

Source URL: www.ethicapublishing.com

Language: English - Date: 2009-02-01 12:27:49
882Science / Internet privacy / Politics / Policy / Privacy policy / FTC Fair Information Practice / Personally identifiable information / Language model / N-gram / Privacy / Ethics / Federal Trade Commission

Unsupervised Alignment of Privacy Policies using Hidden Markov Models Rohan Ramanath Fei Liu Norman Sadeh Noah A. Smith School of Computer Science Carnegie Mellon University

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2014-07-30 20:11:35
883Hydrography / Surveying / STL / Center for Religion /  Ethics and Social Policy / Year 2000 problem / Computing / Computer file formats / Hydrographic survey

Newsletter Volume two Issue four

Add to Reading List

Source URL: www.geocomp.com.au

Language: English - Date: 2011-10-04 22:12:14
884Reputation management / World Wide Web / Sociology / Google / Human–computer interaction / Trustworthiness / Trust / Web search engine / Google Panda / Ethics / Internet / Computing

Google looking at ways to rate websites based more on trustworthiness

Add to Reading List

Source URL: techxplore.com

Language: English - Date: 2015-05-04 00:05:54
885Law / Identity management / Social issues / Gramm–Leach–Bliley Act / Internet privacy / Medical privacy / Privacy policy / Consumer privacy / Privacy / Ethics / Computer law

Gramm – Leach – Bliley Privacy Act

Add to Reading List

Source URL: www.iwar.org.uk

Language: English - Date: 2008-11-19 05:51:58
886Spamming / Criminology / Ethics / Cyberwarfare / Internet-related prefixes / Legal aspects of computing / Phishing / Cyberterrorism / Advance-fee fraud / Computer crimes / Crime / Social engineering

“EPCH HOUSE” POCKET–6 & 7, SECTOR–C, L.S.C., VASANT KUNJ, NEW DELHITel: Fax: , Email: Web: www.epch.in

Add to Reading List

Source URL: www.epch.in

Language: English - Date: 2014-01-22 02:34:54
887Computing / Internet / P3P / HTTP cookie / FTC Fair Information Practice / Wikipedia / Automatic summarization / Privacy / Ethics / Internet privacy

A Step Towards Usable Privacy Policy: Automatic Alignment of Privacy Statements Fei Liu Rohan Ramanath Norman Sadeh Noah A. Smith School of Computer Science

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2014-08-30 19:32:00
888P3P / World Wide Web / Identity management / Social issues / Facebook / Internet / Lorrie Cranor / Privacy policy / Internet privacy / Ethics / Privacy / Computing

Privacy Critics: UI Components to Safeguard Users’ Privacy Mark S. Ackerman Information and Computer Science University of California, Irvine Irvine, CAUSA

Add to Reading List

Source URL: lorrie.cranor.org

Language: English - Date: 2001-08-08 13:05:13
889Phishing / Crime / Computer network security / Ethics / Criminology / Anti-phishing software / In-session phishing / Social engineering / Computer crimes / Spamming

TRUST AND SEMANTIC ATTACKS - II Class Notes: February 23, 2006

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-02-28 20:18:35
UPDATE