Search results

Jump to: navigation, search

Page title matches

  • ...d-privacy-in-the-covid-19-response "Joint Statement on Data Protection and Privacy in the COVID-19 Response"] 19, Nov. 2020</ref>. [[File:Coviddata.jpg|thumb|right|500px|Privacy in relation to COVID-19<ref>https://www.coe.int/en/web/human-rights-rule-of
    23 KB (3,263 words) - 13:20, 23 April 2021
  • File:Privacy invasion.jpeg
    (290 × 174 (6 KB)) - 15:26, 16 April 2021
  • Extended Reality [XR] Privacy Policies content
    46 B (6 words) - 19:18, 19 January 2022
  • ...ndustry'' https://www.geekwire.com/2021/washington-state-finally-pass-data-privacy-laws-bill-backed-tech-industry/</ref>]] ...ning their privacy policies <ref> Bukaty, Preston. The California Consumer Privacy Act (CCPA) : An Implementation Guide, IT Governance Ltd, 2019. ProQuest Ebo
    26 KB (3,909 words) - 15:23, 11 February 2022
  • 24 B (2 words) - 19:16, 27 January 2022
  • ...The author of the page has done concrete research on the topic of digital privacy and how it interacts with advertisements. ...ith explaining how Internet advertising is closely associated with digital privacy these days and summarizes the main topic of the article. I think there's no
    2 KB (381 words) - 16:20, 9 February 2022
  • ...ake the article look a bit cleaner. I would also bold "California Consumer Privacy Act (CCPA)" in the first sentence, as it is the first time you mentioned it Your introduction does a great job of introducing the California Consumer Privacy Act to someone who may not have been introduced to it before. I would defin
    4 KB (640 words) - 21:27, 4 February 2022
  • 38 B (7 words) - 18:49, 17 January 2023
  • ...ted through every exchange of information. <ref>[https://www.priv.gc.ca/en/privacy-topics/technology/md_info_201410/ What is Metadata?]</ref> Physical interac == Ethical Concerns Regarding the Privacy and Surveillance of Metadata ==
    17 KB (2,614 words) - 04:34, 11 February 2023
  • ...peer review assignment, I read Shruti Swaminathan’s page on “Metadata Privacy.” The post was around 1100 words long with good formatting and structure.
    2 KB (272 words) - 18:36, 2 February 2023

Page text matches

  • In his own writing he speaks mainly on the policy of information privacy, "cyberethics," and biological information and computing ethics. His arti *Web mining and personal privacy, including the [[Facebook]] Beacon controversy
    9 KB (1,208 words) - 21:24, 11 December 2012
  • ...athered and studied, ethical concerns arise from the lack of anonymity and privacy of the subjects used in data mining techniques as well as around receiving ...on, and information asymmetries.<ref>Schermer, B.W. (2011). The limits of privacy in automated profiling and data mining. Computer Law and Security Report, 2
    22 KB (3,377 words) - 03:47, 25 April 2018
  • ===Information Security and Privacy=== ...ic or derivative motivating force behind information security, information privacy compels many companies, governments, and people alike to consider the impli
    11 KB (1,584 words) - 22:57, 28 March 2018
  • ...amount of personal information you allow people to see. Putting the proper privacy settings on these websites is also important, so people you do not know are ===Privacy===
    15 KB (2,250 words) - 17:05, 26 April 2019
  • ...etc. The chat sessions in World of Warcraft have also been the subject of privacy concerns as similar to any other messaging device, may hold sensitive infor ==== Privacy and Online Confessions ====
    35 KB (5,529 words) - 01:25, 17 April 2019
  • File:Linkednimg.png
    Linkedin's privacy policy
    (1,510 × 1,458 (348 KB)) - 15:57, 19 February 2021
  • ...implications, particularly from academic purists and humans concerned with privacy. ===Privacy===
    26 KB (4,104 words) - 17:29, 28 April 2019
  • ...is allowed only one account per lifetime and the rules guarding the site's privacy and high [[Wikipedia:Glossary_of_BitTorrent_terms#Share_ratio|"ratio"]] are
    13 KB (2,041 words) - 18:40, 19 April 2018
  • ...cepts of ''informational privacy'', ''physical privacy'', and ''decisional privacy.'' ...us vehicles.<ref name = "Shaw"> Shaw, Johnathan. "The Watchers Assaults on Privacy in America". Harvard Magazine. 2017. </ref>
    29 KB (4,327 words) - 01:51, 28 April 2019
  • ...rison Project" design, however, lives on in popular culture and studies of privacy and surveillance, as the '''panopticon''' (the official term for the design ...ponent for women's and LGBTQ rights, along with law reform, economics, and privacy. Although he still held a very sexist opinion on women in terms of intellec
    20 KB (3,037 words) - 15:23, 28 April 2019
  • ...Facebook data, thus creating more ethical ambiguity and concern regarding privacy and accessibility.
    23 KB (3,483 words) - 15:05, 28 April 2019
  • ...oemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol
    34 KB (5,147 words) - 11:53, 28 April 2019
  • ...here has been a drastic increase in mention of and care around online data privacy and security. These questions surrounding this topic along with how our per ...ublic and media backlash against CA and Facebook and debate about personal privacy and data ethics.<ref name=facebook/>
    25 KB (3,653 words) - 16:57, 28 April 2019
  • ...ug research<ref>3BL blogs: DNA testing is popular, but many are unaware of privacy concerns (2019). Chatham: Newstex. Retrieved from http://proxy.lib.umich.ed ...w that addresses this concept of genetic privacy. There are concerns among privacy experts regarding GINA’s narrow scope, which is limited to prohibiting he
    26 KB (3,783 words) - 00:35, 29 April 2019
  • Hacking is the invasion of an individual's privacy through a technological medium. '''Hacking security''' refers to being free ...dentity including financial, health, or personal data, bringing up serious privacy concerns. Hacking security has become easier as information technology adva
    37 KB (5,675 words) - 22:27, 28 April 2019
  • ...vans, David S. "The online advertising industry: Economics, evolution, and privacy." Journal of economic perspectives 23.3 (2009): 37-60.</ref><ref>Turow, Jos ...hp/Confidentiality_of_Online_Data heightened concerns] in regards to user privacy, data protection, reach, and corporate transparency in advertising.
    32 KB (4,653 words) - 23:25, 28 April 2019
  • ...eral unethical practices such as doxxing and gatekeeping. The violation of privacy and ethics in the online community can be examined as a result of the gamer ...r home. She was eventually forced to leave her home out of concern for her privacy and safety, but refused to be silenced by the harassers. She offered a $11,
    26 KB (3,936 words) - 08:14, 29 April 2019
  • ...n be viewed as an act of seeking justice in response to a violation of our privacy and rights.
    34 KB (5,238 words) - 07:12, 29 April 2019
  • ...losion/index.html "Explosion in Data Collection and Data Sharing"]. ''Data Privacy Lab''. Retrieved April 28, 2019.</ref> .... He questions, "does respect for individual's privacy require respect for privacy of the group to which the individual belongs to?"<ref>Floridi, Luciano (Mar
    18 KB (2,638 words) - 08:29, 29 April 2019
  • ...chievous behaviors of Internet trolls and their deliberate abuse of online privacy. Trolls typically hide behind the anonymity provided by online environments
    16 KB (2,560 words) - 16:44, 27 April 2019

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)