Information security management

Results: 13712



#Item
121Digital rights / Human rights / Identity management / Law / Privacy / Internet privacy / Data security / Information privacy / Medical privacy / Politics / Government

Engendering Trust: Privacy Policies and Signatures Joshua B. Gross, Jessica Sheffield, Alice Anderson, and Nan Yu The Pennsylvania State University University Park, PA 16802 , (jessicas, aea145, nxy906

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-01 23:42:33
122Privacy / Identity documents / Identity management / Data security / Law / Personally identifiable information / Internet privacy / Information privacy / REAL ID Act / Anonymity / Medical privacy / Pseudonym

Unlinking Private Data Alex VaynbergYale University Sensitive Information in the Wired World

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2006-05-19 11:28:28
123Information technology management / Corporate Governance of ICT / National Telecommunications and Information Administration / E-government / Government / Information technology governance / Management / Politics / Draft:ICT Security Policy System: A Case Study / Information and communication technologies for development

Organizational Unit Functions of the Division National ICT Governance – Policies and Standards Development (PSD)

Add to Reading List

Source URL: dict.gov.ph

Language: English - Date: 2014-12-01 02:05:59
124Privacy / Identity management / Digital rights / Human rights / P3P / World Wide Web / Data security / Computing / Internet privacy / Information privacy / Computer security / Recommender system

By Bettina Berendt, Oliver Günther, and Sarah Spiekermann PRIVACY IN E-COMMERCE: Stated Preferences vs.

Add to Reading List

Source URL: www.wiwi.hu-berlin.de

Language: English - Date: 2008-06-14 12:00:44
125Actuarial science / Risk / Academia / Prevention / Economy / Financial risk / Security / Probability / Social vulnerability

RIMMA - Interdisciplinary CODATA Workshop on 1 RISK Information Management, Risk Models and Applications Berlin, Germany, November 17/18, 2014

Add to Reading List

Source URL: www.rimma2014.net

Language: English - Date: 2014-10-26 12:07:36
126Data security / Computing / Prevention / Information technology management / Information privacy / Privacy / Computer security / Security / Information security / Personally identifiable information / Data Protection Directive / Professional certification

Neue EU-Datenschutz-Verordnung:

Add to Reading List

Source URL: ir.cis-cert.com

Language: English - Date: 2014-01-21 11:13:20
127Information technology management / Information technology governance / Information technology / Privacy / Information technology audit / Computing / COBIT / Data security / ISACA / Information security / Business process management / Val IT

Cybersecurity Forum August 19, 2015 COBIT 5 Lets Play 50 Questions (more or less)

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2015-08-19 23:26:10
128Privacy / Data security / Data protection / Identity management / Computing / Internet privacy / Information privacy / Government / Personally identifiable information / Privacy law / Directive on Privacy and Electronic Communications

Privacy Policy Sure respects the privacy of you, its customer and takes its responsibilities regarding the security of your customer information very seriously. Sure is committed to providing you with a professional, val

Add to Reading List

Source URL: web.sure.com

Language: English - Date: 2014-03-12 06:14:51
129Economy / Finance / Money / Funds / Investment / Banking / Financial services / Financial markets / Specialized investment fund / Asset liability management / Security / Investor

Bentham Wholesale Syndicated Loan Fund NZD ARSNAdditional information Dated 8 October 2013

Add to Reading List

Source URL: fidante.com.au

Language: English - Date: 2016-08-22 21:01:33
130Security / Computer security / Information technology management / Data security / System administration / Splunk / Computer network security / Cyberwarfare / Cryptography

SECURITY PROFESSIONAL SERVICES Security Program Review Services Improve Your Security Posture Overview

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2016-01-08 01:13:16
UPDATE