Computer Ethics Institute

Results: 195



#Item
81Computer security / Data security / Professional associations / Government / International Association of Privacy Professionals / Information security / Internet privacy / National Institute of Standards and Technology / Medical privacy / Ethics / Privacy / Security

Agenda Second Workshop on Privacy Engineering Sponsored by NIST and IAPP September 15-16, 2014 San Jose, California This workshop will gather comments and feedback on the draft privacy engineering concepts

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2014-09-09 06:57:31
82Government / National Institute of Standards and Technology / Ethics / Computer law / Federal Information Security Management Act / Privacy law / NIST Special Publication 800-53 / OMB Circular A-130 / Personally identifiable information / Security / Computer security / Data security

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C[removed]DEPUTY DIRECTOR FOR MANAGEMENT

Add to Reading List

Source URL: hr.od.nih.gov

Language: English - Date: 2013-09-11 12:36:59
83Computer network security / National Strategy for Trusted Identities in Cyberspace / Technology / Open government / Public administration / Identity assurance / Steering / Critical infrastructure protection / E-Government / Identity management / Ethics / National security

July 22, 2011 Submitted via email to [removed] Annie Sokol National Institute of Standards and Technology 100 Bureau Drive, Mailstop 8930 Gaithersburg, MD 20899

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-22 10:41:48
84Codes of conduct / Computer Ethics Institute / Email / Jewish ethics / Ten Commandments of Computer Ethics / Computer ethics / Ten Commandments / Educational technology / Technology / Applied ethics / Ethics / Professional ethics

Senior 4 ELA: ESL for Academic Success Module Handouts Module 3

Add to Reading List

Source URL: www.edu.gov.mb.ca

Language: English - Date: 2010-11-01 16:33:50
85Technology / Computer security / Internet privacy / Acceptable use policy / Privacy policy / Internet / Privacy / UNESCO Institute for Statistics / Computing / Email / Ethics

Appropriate Use Policy for Information Technology Pacific University Faculty, Staff, Students, Friends and Guests November 17, 2011 Pacific University reserves the right to amend or otherwise revise this document as may

Add to Reading List

Source URL: www.pacificu.edu

Language: English - Date: 2014-11-26 07:18:41
86Phishing / CRI / Ethics / Crime / Criminology / Computer crimes / Australian Institute of Criminology / Crime in Australia

Identity crime and misuse in Australia: Results of the 2013 online survey Russell G Smith Alice Hutchings

Add to Reading List

Source URL: www.ag.gov.au

Language: English - Date: 2014-10-20 18:36:06
87Computer law / Aspen Institute / Roaring Fork Valley / Privacy / Internet privacy / National Telecommunications and Information Administration / AT&T / Open Rights Group / National Broadband Plan / Ethics / Law / Internet

Communications and Society Program Adler Updating Rules of the Digital Road:

Add to Reading List

Source URL: www.aspeninstitute.org

Language: English - Date: 2012-09-01 17:19:31
88Privacy / Computer science / Association for Computing Machinery / Academia / Electronic Privacy Information Center / Whitfield Diffie / ACM SIGACT / Lance Hoffman / Ethics / Susan Landau / Year of birth missing

Susan Landau Department of Social Science and Policy Studies Salisbury Laboratories 100 Institute Road Worcester, MA[removed][removed]

Add to Reading List

Source URL: privacyink.org

Language: English - Date: 2014-10-25 12:36:58
89Computer security / Data security / Professional associations / Government / International Association of Privacy Professionals / Information security / Internet privacy / National Institute of Standards and Technology / Medical privacy / Ethics / Privacy / Security

Agenda Second Workshop on Privacy Engineering Sponsored by NIST and IAPP September 15-16, 2014 San Jose, California This workshop will gather comments and feedback on the draft privacy engineering concepts

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-09-09 06:57:31
90Ethology / Reputation management / Sociology / Information systems / Accountability / Trust / System / Macroeconomic model / Computational trust / Ethics / Social psychology / Behavior

Active Trust Management for Autonomous Adaptive Survivable Systems Howard Shrobe, Jon Doyle, and Peter Szolovits Massachusetts Institute of Technology Artiļ¬cial Intelligence Laboratory and Laboratory for Computer Scien

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2001-01-17 09:31:00
UPDATE