Internet governance

Results: 5820



#Item
151Cultural globalization / Internet / New media / Telegraphy / Virtual reality / World Internet Project / Privacy / Information privacy / Media / Internet Governance Forum / E-democracy

Communication Media Relations Phone: +Fax: +www.mediadesk.uzh.ch

Add to Reading List

Source URL: www.mediachange.ch

Language: English - Date: 2015-12-15 03:18:50
152Crime prevention / Cryptography / Information governance / National security / Actuarial science / Computer security / Risk / Internet privacy / Information / Internet / Virus

PDF Document

Add to Reading List

Source URL: yarrabend.com.au

Language: English - Date: 2016-08-03 20:59:15
153Cyberwarfare / Cybercrime / Information and communication technologies for development / National security / International Telecommunication Union / Cyberspace / Internet Governance Forum / Computer security / Commonwealth of Nations / International Multilateral Partnership Against Cyber Threats / Commonwealth Telecommunications Organisation

The role of the Commonwealth in facilitating cooperation in Cyberspace Shola Taylor, Secretary-General, Commonwealth Telecommunications Organisation Commonwealth Cybersecurity Forum 2016, 23 March 2015 Honourable Adriel

Add to Reading List

Source URL: www.cto.int

Language: English - Date: 2016-06-23 04:56:26
154Computer network security / Crime prevention / Cryptography / Information governance / National security / Acceptable use policy / Internet privacy / Computer security / Information privacy / Privacy / Privacy concerns with social networking services / Cloud computing security

Acceptable Use Policy for Wadham IT General Rules 1. All individuals wishing to make use of Wadham College IT facilities must abide by this document. Wadham IT facilities include networking, shared IT facilities such as

Add to Reading List

Source URL: www.wadham.ox.ac.uk

Language: English - Date: 2013-08-21 07:05:29
155Computer network security / Crime prevention / Cryptography / Information governance / National security / Ubiquitous computing / Mobile computing / Computer security / Internet privacy / Authentication / Ambient intelligence / Wireless LAN

Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions V. Ramakrishna, Kevin Eustice and Matthew Schnaider Laboratory for Advanced Systems Research Computer Science Department Univers

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2006-07-13 17:06:00
156Crime prevention / Cryptography / Information governance / National security / Mobile phones / Mobile security / Computer security / Mobile device / Smartphone / Internet privacy / Mobile malware / Information security

An application to estimate the Cyber-risk Detection Skill of mobile device users. (Novel idea presentation) Guillaume Schaff itrust consulting (Luxembourg) Carlo Harpes

Add to Reading List

Source URL: iaria.org

Language: English - Date: 2013-12-10 21:37:25
157Crime prevention / Cryptography / Information governance / National security / Computer network security / Computer security / Cisco Systems / Security / Computer network / Internet / Windows / Competition

DOC Document

Add to Reading List

Source URL: nccdc.org

Language: English - Date: 2010-01-07 14:50:06
158Crime prevention / National security / Cryptography / Information governance / Security / Privacy policy / Information security / Freedom of information laws by country / Computer security / Privacy / Internet privacy

NovemberSecurity Practices & Procedures for Managing Sensitive Personal Data & Information BNP Paribas Asset Management India Private Limited

Add to Reading List

Source URL: www.bnpparibasmf.in

Language: English - Date: 2015-04-05 05:10:20
159Library science / Academic publishing / Information and communication technologies for development / Cultural globalization / Internet Governance Forum / Public library / Open access / Library / Internet access / Electronic Information for Libraries / Internet / Trends in library usage

Internet Governance Forum DYNAMIC COALITION ON PUBLIC ACCESS IN LIBRARIES (DC PAL) Principles on Public Access in Libraries Introduction:

Add to Reading List

Source URL: www.shlb.org

Language: English - Date: 2016-05-05 10:10:08
160Cultural globalization / Humancomputer interaction / Information Age / Internet culture / Social information processing / Web 2.0 / Internet / World Wide Web / Blog / Internet privacy / Internet Governance Forum

The Influence of Web 2.0 on Business University of New York in Prague, 2006 Jarom ír M atýšek www.kerray.cz

Add to Reading List

Source URL: www.kerray.cz

Language: English - Date: 2009-07-21 06:14:00
UPDATE