Ethics of technology

Results: 4688



#Item
781Behavior / Bullying / Aggression / Crime / Cyberstalking / Sociology / Cyber-bullying / Harassment / Stalking / Abuse / Computer crimes / Ethics

Online Abuse, Cyber-bullying and Cyberstalking: As technology gets more advanced and constantly becomes a bigger part of our lives, online abuse and cyber-bullying also become more and more prevalent. Cyberbullying is co

Add to Reading List

Source URL: www.cjcp.org.za

Language: English - Date: 2014-07-24 08:32:59
782Computing / Data privacy / Technology / HTTP cookie / International Safe Harbor Privacy Principles / P3P / Telecommunications data retention / Ethics / Internet privacy / Privacy

TrustX Inc. Privacy Policy Effective as of 1 January 2015 This Privacy Policy describes the privacy practices regarding how TrustX Inc. (“TrustX”) handles your personal information while using its identity authentica

Add to Reading List

Source URL: www.trustx.com

Language: English - Date: 2015-01-07 14:13:22
783Internet / Technology / Internet ethics / Censorship / Computer network security / Content-control software / Google China / Surveillance / Freedom of speech / Ethics / Privacy / Internet censorship

10 Corporate Accountability in Networked Asia Rebecca MacKinnon In 2010, Google’s defiance of Chinese government censorship demands, followed by its decision to remove its Chinese search operations from mainland China,

Add to Reading List

Source URL: oni-access.net

Language: English - Date: 2011-12-09 11:50:32
784Identity management / Law / Privacy / Internet / Netsafe / Peter Gutmann / Legal aspects of computing / TRUSTe / Ethics / Cypherpunks / Internet privacy

PRIVACY AWARENESS WEEK 2007 “Privacy and Technology in the 21st Century” Wellington: 28 August 8.30am-12.30pm GROUND FLOOR theatreTTE, BP HOUSE, CNR WARING TAYLOR ST/CUSTOMHOUSE QUAY

Add to Reading List

Source URL: privacy.org.nz

Language: English - Date: 2014-09-24 22:14:57
785Ethics / Identity / Theft / Red Flags Rule / Identity theft / Learning management system / Internet privacy / Sharable Content Object Reference Model / Privacy / Crimes / Education / Educational technology

IDENTITY THEFT RED FLAGS As the number of identity theft cases continues to rise, your organization must be prepared. Identity thieves don’t just steal information; they also rob an organization of consumer trust, conf

Add to Reading List

Source URL: www.mediapro.com

Language: English - Date: 2013-10-04 16:35:26
786Accountancy / Crimes / Deception / Business intelligence / Computer-aided audit tools / Fraud deterrence / Association of Certified Fraud Examiners / Certified Fraud Examiner / ACL / Business / Fraud / Ethics

ARBUTUS Fraud Detection Solutions Arbutus Software and Cash Recovery Partners, LLC have aligned to provide a powerful combination of services, technology and methodology that is based on over 20 years of experience in wo

Add to Reading List

Source URL: www.arbutussoftware.com

Language: English - Date: 2014-12-03 17:54:17
787Identity management / Social issues / Open data / E-Government / Privacy / Internet privacy / Technology / Gov2Taskforce / Open government / Ethics / Public administration

Towards Government 2.0 DATA as a SERVICE INTRODUCTION Much of the Government 2.0 movement is defined around two key facets – the delivery of more Public Sector Information (Data Engagement) and the delivery of improved

Add to Reading List

Source URL: gov2.net.au

Language: English - Date: 2014-05-22 00:52:12
788Digital media / Behavioral addiction / Human–computer interaction / Internet addiction disorder / Internet / Technology / Scale / Ethics / Pornography / Internet culture

Internet Addiction Test How do you know if you’re already addicted or rapidly tumbling toward trouble? The Internet Addiction Test is the first validated and reliable measure of addictive use of the Internet. Developed

Add to Reading List

Source URL: usfweb2.usf.edu

Language: English - Date: 2011-08-29 14:42:58
789Personally identifiable information / International Association of Privacy Professionals / Data Privacy Day / Privacy / Ethics / Internet privacy

Privacy in Technology Unit 1 Understanding the Need for Privacy in the IT Environment This unit describes the impact regulatory activities, security threats, advances in technology and the increasing proliferation of soc

Add to Reading List

Source URL: privacyassociation.org

Language: English - Date: 2014-11-20 10:27:45
790Freedom of information legislation / Democracy / Ethics / Technology / Politics / Information society / Open government / Elections / Censorship / Freedom of speech

13 July 2008 Submission to the Inquiry into Improving Access to Victorian Public Sector Information and Data To the Economic Development and Infrastructure Committee, Although much of the debate surrounding this Inquiry

Add to Reading List

Source URL: www.parliament.vic.gov.au

Language: English - Date: 2008-09-03 20:05:06
UPDATE