Search results

Jump to: navigation, search

Page title matches

Page text matches

  • ===Privacy===
    20 KB (2,867 words) - 17:41, 23 March 2019
  • ...nnected to the internet. Though Spotify has offered many features to limit privacy, there are still ways around this via other services, like Soundiiz, a webs ===Privacy Issues===
    50 KB (7,331 words) - 12:46, 20 April 2018
  • ...and transfer health-clinical data. It can also involve the information and privacy necessary when combining health information and technology.<ref>http://www.
    15 KB (2,011 words) - 13:13, 25 April 2016
  • ...rivacy ([[Privacy in the Online Environment|In the Online Environment]], [[Privacy in Social Networking|In Social Networking]]) ...ure--our sacred spaces. Could we, for example, build a Net that reweights privacy concerns, acknowledging that these, as much as information, are central to
    12 KB (1,871 words) - 22:24, 28 March 2018
  • ...hetically indifferent, along with AI aiding human progress and loyalty and privacy issues.<ref>Singler, Beth. “AI Slaves: the Questionable Desire Shaping Ou ===Loyalty and Privacy===
    27 KB (4,254 words) - 14:07, 28 April 2019
  • ...chnologies within the fields of energy consumption, algorithms, and online privacy. ===Online Privacy===
    15 KB (2,156 words) - 22:55, 26 April 2019
  • ....com/article/salvadorhernandez/family-tree-dna-fbi-investigative-genealogy-privacy.</ref> ===Privacy===
    21 KB (3,202 words) - 07:12, 29 April 2019
  • ==== Privacy/Surveillance ==== ...oice, and cookies. An example of designing for privacy would be Facebook's privacy features. When an individual posts a photo, Facebook allows that person to
    20 KB (3,072 words) - 10:36, 28 April 2019
  • ===Privacy=== ...will be directed to the person under attack. This results in the person's privacy being violated multiple times.
    15 KB (2,331 words) - 00:42, 29 April 2019
  • ...sentations of ourselves to be. This is summarized by The Control Theory of Privacy which states that, ...one’s beliefs ground emotions of self-esteem. One has the informational privacy to the extent one has control over others’ access to, and one’s own pre
    26 KB (3,874 words) - 13:17, 29 April 2019
  • ...This filtering contributes to the ethical concern of a severe invasion of privacy - to such an extent that it may be considered constant surveillance. [[File:Twitterpic123.png|300px|thumb|right|Concerns about no privacy]]
    18 KB (2,607 words) - 20:53, 26 April 2019
  • ...riction also introduces a number of ethical issues including anonymity and privacy. ...L., The Fourth Revolution: How the Infosphere is Reshaping Human Reality, Privacy, Oxford University Press, 2014, 101-128.</ref> Just as revolutionary commun
    10 KB (1,370 words) - 10:44, 18 April 2019
  • # The requested information invades another private individual's privacy if disclosed.<ref name="faq"/> ...guity. What information rises to the standard of violating an individual's privacy? Especially when that individual is not consulted throughout the process. C
    12 KB (1,775 words) - 12:21, 28 April 2019
  • California, which has some of the most developed digital privacy and security laws, has certain statutes that apply to digital assets. Calif ===Data Creation, Ownership, and Privacy===
    20 KB (3,045 words) - 13:14, 28 April 2019
  • ..., as many people do not believe that it is possible to protect individual privacy to the extent that it was before. It has also raised environmental concerns ...ise with growing data and that the matters of group privacy and individual privacy have several points of intersection that can be potential grey areas or pro
    18 KB (2,722 words) - 07:14, 29 April 2019
  • ...Shoemaker, David W. "Self-exposure and exposure of the self: informational privacy and the presentation of identity," Spring Science and Business Media, 2009<
    19 KB (2,947 words) - 07:09, 29 April 2019
  • ...brings about several ethical concerns surrounding the notions of consent, privacy and sexual harassment - among others. ...ful to both receiving and sending parties. This not only breaks a sense of privacy between users but also causes a trust issue between the users sending sexua
    27 KB (4,231 words) - 14:03, 28 April 2019
  • ...ds-on effort they require. Human error is inevitable causing concerns with privacy and trust when information is sent to these third-party moderators. <ref> Z
    35 KB (5,081 words) - 16:56, 17 March 2020
  • ...in information among search engines has lead to ethical concerns regarding privacy, the filtering of search results, and types of biases that may occur among ...as involved in the search engine design, the filtering of results, and the privacy of the user.
    41 KB (6,339 words) - 15:48, 28 April 2019
  • ...amples of environments in a digital society in which the interpretation of privacy in public can be applied in this context are [https://en.wikipedia.org/wiki ...15. doi:10.1007/s10676-009-9186-x. </ref> <ref>Stanford University Press ''Privacy In Context'' Hellen Nissenbaum 2009</ref>
    17 KB (2,647 words) - 14:49, 28 April 2019

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)