Computer Ethics Institute

Results: 195



#Item
21Ethics / Engineering / IEEE Computer Society / Institute of Electrical and Electronics Engineers / Privacy / Ambient intelligence / Measurement / International nongovernmental organizations / Professional associations / Standards organizations

tcsp-oakland11-report.dvi

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2011-05-16 17:23:45
22Law / Privacy / Internet privacy / National Institute of Standards and Technology / Privacy Office of the U.S. Department of Homeland Security / IT risk / Ethics / Computer security / Information technology management

Summary of the Privacy Engineering Workshop at the National Institute of Standards and Technology (April 9-10, 2014)

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2014-05-21 09:55:14
23Computer security / Computer network security / Crime prevention / Electronic commerce / National security / Trust / Institute for Information Infrastructure Protection / Data security / Information Trust Institute / Ethics / Security / Computer crimes

National Cyber Leap Year Summit 2009

Add to Reading List

Source URL: tahoe-lafs.org

Language: English - Date: 2014-12-16 18:34:05
24Ethics / Cyberwarfare / Data breach / Information security / Internet privacy / Privacy / Information privacy / Security / Computer security / Data security

Aftermath of a Data Breach Study Sponsored by Experian® Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012

Add to Reading List

Source URL: www.ponemon.org

Language: English - Date: 2013-01-21 11:58:32
25Applied ethics / National Resident Matching Program / Computer ethics / Bias / Statistics / Critical thinking

Bias in Computer Systems BATYA FRIEDMAN Colby College and The Mina Institute and HELEN NISSENBAUM Princeton University

Add to Reading List

Source URL: vsdesign.org

Language: English - Date: 2011-06-30 18:59:58
26Internet privacy / Computer law / Miri / Intellectual property law / Personally identifiable information / Online Copyright Infringement Liability Limitation Act / Privacy / Copyright infringement / HTTP cookie / Law / Ethics / Government

Lesswrong.com Privacy Policy and Terms of Use Privacy Policy We Value Your Privacy Machine Intelligence Research Institute, Inc. (“MIRI”) has adopted this Privacy Policy (“Privacy Policy”) to provide you, the use

Add to Reading List

Source URL: intelligence.org

Language: English - Date: 2015-04-01 15:19:40
27Grants / Research / Association of American Universities / Carnegie Mellon University / Knowledge / Privacy / Electronic submission / Institute of Electrical and Electronics Engineers / Carnegie Mellon Silicon Valley / Ethics / Competitions / Digital media

Call for Papers Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. Th

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2012-08-14 14:31:01
28Computer security / Computing / Ethics / Data security / Computer network security / Cloud computing / National University of Singapore / Information security / Privacy / Security / Crime prevention / National security

STMI@NUS STRATEGIC TECHNOLOGY MANAGEMENT INSTITUTE NICF-Legal and Regulatory

Add to Reading List

Source URL: www.stmi.nus.edu.sg

Language: English - Date: 2013-01-29 04:37:55
29Digital media / Massively multiplayer online role-playing game / Virtual crime / Virtual world / Massively multiplayer online game / Multiplayer online game / Role-playing video game / EverQuest / World of Warcraft / Virtual economy / Games / Software

  Massachusetts Institute of Technology  Department of Electrical Engineering and Computer Science  6.805: Ethics and Law on the Electronic Frontier   

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2008-09-04 09:54:14
30Internet privacy / Privacy / AOL Instant Messenger / Software / Ethics / Computing

Field Deployment of IMBuddy: A Study of Privacy Control and Feedback Mechanisms for Contextual IM Gary Hsieh, Karen P. Tang, Wai Yong Low, and Jason I. Hong Human-Computer Interaction Institute Carnegie Mellon University

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2010-10-11 10:04:48
UPDATE