Search results

Jump to: navigation, search

Page title matches

  • ...Privacy in the Online Environment is related to the fields of information privacy and [[Wikipedia:Anonymity|anonymity]] in [[Wikipedia:Cyberspace|cyberspace] == The Complexity of Privacy in Virtual Environments ==
    13 KB (1,888 words) - 15:54, 26 April 2019
  • [[File:socialnet.png|300px|thumb|right|The Power of Social Networks]]'''Privacy in Social Networking''' has become a topic of much concern since the increa ===Privacy Settings===
    7 KB (1,021 words) - 00:31, 29 April 2019
  • ...amples of environments in a digital society in which the interpretation of privacy in public can be applied in this context are [https://en.wikipedia.org/wiki ...15. doi:10.1007/s10676-009-9186-x. </ref> <ref>Stanford University Press ''Privacy In Context'' Hellen Nissenbaum 2009</ref>
    17 KB (2,647 words) - 14:49, 28 April 2019
  • |issue=Facebook's Privacy Policy |value=Privacy, Disclosure
    12 KB (1,704 words) - 01:19, 25 April 2018
  • ...pple’s privacy policy is more popularly known for its staunch stance for privacy, starting in 2014, in comparison with other tech companies such as Google a [[File:Privacy.png|400px|thumb|right]]
    11 KB (1,610 words) - 19:50, 29 March 2020
  • Online privacy from employers is one of the social and legal issues of online privacy. Online actions are monitored more closely, and words and actions online ha ...ssional.” He brought suit, claiming that Pillsbury violated his right to privacy, and that he was therefore wrongfully terminated.
    8 KB (1,213 words) - 00:22, 20 April 2018
  • == <big>'''Privacy in Venmo'''</big> == ...be public in Venmo and do not consider the necessity to change the default privacy setting to private. What’s more, since Venmo requires users to write for
    7 KB (1,053 words) - 18:32, 27 March 2020
  • 0 B (0 words) - 21:43, 18 January 2022
  • [[File:Social-Media-Privacy2-900x400.jpeg|thumb|right|600px|Social Media privacy concern <br> Copyright: https://it.wisc.edu/news/4-ways-to-better-protect-your-privacy-in-social-media-apps/]]
    30 KB (4,351 words) - 18:54, 11 February 2022
  • ...ndividual or a group feels unwilling or inconvenient to share with others. Privacy protection is a natural human right of each individual. <ref>Privacy in China |(汉语词语)_百度百科, https://baike.baidu.com/item/%E9
    9 KB (1,339 words) - 21:26, 20 April 2021
  • 11 B (2 words) - 18:05, 2 March 2021
  • ...d-privacy-in-the-covid-19-response "Joint Statement on Data Protection and Privacy in the COVID-19 Response"] 19, Nov. 2020</ref>. [[File:Coviddata.jpg|thumb|right|500px|Privacy in relation to COVID-19<ref>https://www.coe.int/en/web/human-rights-rule-of
    23 KB (3,263 words) - 13:20, 23 April 2021
  • Extended Reality [XR] Privacy Policies content
    46 B (6 words) - 19:18, 19 January 2022
  • ...ndustry'' https://www.geekwire.com/2021/washington-state-finally-pass-data-privacy-laws-bill-backed-tech-industry/</ref>]] ...ning their privacy policies <ref> Bukaty, Preston. The California Consumer Privacy Act (CCPA) : An Implementation Guide, IT Governance Ltd, 2019. ProQuest Ebo
    26 KB (3,909 words) - 15:23, 11 February 2022
  • 24 B (2 words) - 19:16, 27 January 2022
  • 38 B (7 words) - 18:49, 17 January 2023
  • ...ted through every exchange of information. <ref>[https://www.priv.gc.ca/en/privacy-topics/technology/md_info_201410/ What is Metadata?]</ref> Physical interac == Ethical Concerns Regarding the Privacy and Surveillance of Metadata ==
    17 KB (2,614 words) - 04:34, 11 February 2023

Page text matches

  • .... Cambridge University Press.</ref> To maintain one's [[Wikipedia:privacy| Privacy in the Online Environment]] one simply restrains from sharing one's persona ...that represent one's offline self. Although this is not a way to maintain privacy, it is a method to not deceive other users who come in contact with one's a
    28 KB (4,418 words) - 21:06, 21 April 2019
  • ...at should not be seen by the public. In that case, it can protect personal privacy and identities of certain persons who are considered to be "at risk."<ref>1 ...hip. There is often a fine line between freedom of speech and security and privacy. More often than not, censorship for what certain groups would consider a g
    30 KB (4,644 words) - 12:49, 20 April 2018
  • .... Information ethics broadly examines issues related to ownership, access, privacy, security, and community. Information Ethics is related to the fields of co
    12 KB (1,728 words) - 14:55, 24 April 2017
  • ...in late October 2011 <ref> [http://news.cnet.com/2030-1069_3-5172731.html Privacy in the age of transparency] </ref>.
    9 KB (1,307 words) - 20:24, 11 December 2012
  • (general info with policy vacuums and privacy in online environment as examples...) ====Privacy in the Online Environment====
    13 KB (1,834 words) - 17:08, 21 April 2019
  • *Miller, Seamus; Weckert, John (2000). "Privacy, the workplace and the Internet". Journal of Business Ethics 28: 255–265.
    13 KB (1,753 words) - 13:04, 26 March 2019
  • *"Liberal Theory and the Collective Right to Privacy" 2nd Annual Information Ethics Roundtable, Massachusetts College of Liberal
    12 KB (1,761 words) - 04:48, 11 December 2012
  • ...Privacy in the Online Environment is related to the fields of information privacy and [[Wikipedia:Anonymity|anonymity]] in [[Wikipedia:Cyberspace|cyberspace] == The Complexity of Privacy in Virtual Environments ==
    13 KB (1,888 words) - 15:54, 26 April 2019
  • ...lue and address being public go beyond internet security and into personal privacy and safety. me to reevaluate my privacy settings. As a user, I had little control over who could or could not view
    8 KB (1,295 words) - 12:35, 9 March 2021
  • ===Ontological Model of Privacy=== ...issue of Privacy, Floridi offers his Ontological Model. In this framework, privacy is measured at the extent to which ontological friction exists in the infos
    10 KB (1,378 words) - 20:13, 21 April 2017
  • ...cussing the details of Prince's suicide out of “respect for the family's privacy.” Many in the community of about 17,000 in western Massachusetts was in s *[[Privacy in Social Networking]]
    30 KB (4,492 words) - 12:59, 20 April 2018
  • ...would not have engaged in offline stalking for fear of being caught.<ref> Privacy Rights Clearinghouse "ONLINE HARASSMENT & CYBERSTALKING" https://www.privac ...mation from a victim's online identity raises ethical concerns surrounding privacy, anonymity, and virtual identity.
    18 KB (2,697 words) - 00:46, 23 April 2018
  • ...rstalking and the invasion of personal [[Privacy_in_the_Online_Environment|privacy]] online. ...n without much difficulty via the Internet. He was able to violate Boyer's privacy and gain deep access to her personal life. This is an example of how legisl
    12 KB (1,840 words) - 12:45, 16 April 2018
  • ...y and real-world identies. In February 2011, Alma Whitten, the Director of Privacy, Product and Engineeringm at Google, made a blog post about the importance ...ot be judged by sex, race or gender. Pseudonyms also give users a level of privacy that the current real name system cannot grant. On the other hand, some use
    11 KB (1,614 words) - 20:38, 11 December 2012
  • ...al-selves-privacy.pdf "Plural Selves and Relational Identity: Intimacy and Privacy Online,"] 2008. Retrieved on 4 April 2018.</ref> In the online space, there
    27 KB (4,103 words) - 20:42, 8 April 2018
  • === Cloud Security and Privacy === ...or protect.<ref>[https://www.privacyrights.org/ar/cloud-computing.htm The Privacy Implications of Cloud Computing]</ref>
    28 KB (4,353 words) - 13:35, 27 April 2019
  • ...etscape's. In 2001, "Microsoft implements tools that support Platform for Privacy Preferences (P3P), a technology under development by the World Wide Web Con
    7 KB (1,059 words) - 03:54, 19 January 2016
  • ...ng personal identification, images, videos, music, and thoughts. Issues of privacy tend to be the main point of debate against these types of services since o Moral issues include cyber-bullying, fake profiles, and invasion of privacy.
    21 KB (3,284 words) - 00:41, 29 April 2019
  • ...o do include revealing personal information, compromising others' personal privacy, complaining about reposts, pleading for votes, and posting comments that l ...arguing about its borderline child pornographic aesthetic and its lack of privacy protection for young girls. /r/jailbait was shut down by site administrator
    24 KB (3,779 words) - 18:57, 27 April 2019
  • In his own writing he speaks mainly on the policy of information privacy, "cyberethics," and biological information and computing ethics. His arti *Web mining and personal privacy, including the [[Facebook]] Beacon controversy
    9 KB (1,208 words) - 21:24, 11 December 2012
  • ...athered and studied, ethical concerns arise from the lack of anonymity and privacy of the subjects used in data mining techniques as well as around receiving ...on, and information asymmetries.<ref>Schermer, B.W. (2011). The limits of privacy in automated profiling and data mining. Computer Law and Security Report, 2
    22 KB (3,377 words) - 03:47, 25 April 2018
  • ===Information Security and Privacy=== ...ic or derivative motivating force behind information security, information privacy compels many companies, governments, and people alike to consider the impli
    11 KB (1,584 words) - 22:57, 28 March 2018
  • ...amount of personal information you allow people to see. Putting the proper privacy settings on these websites is also important, so people you do not know are ===Privacy===
    15 KB (2,250 words) - 17:05, 26 April 2019
  • ...etc. The chat sessions in World of Warcraft have also been the subject of privacy concerns as similar to any other messaging device, may hold sensitive infor ==== Privacy and Online Confessions ====
    35 KB (5,529 words) - 01:25, 17 April 2019
  • ...implications, particularly from academic purists and humans concerned with privacy. ===Privacy===
    26 KB (4,104 words) - 17:29, 28 April 2019
  • ...is allowed only one account per lifetime and the rules guarding the site's privacy and high [[Wikipedia:Glossary_of_BitTorrent_terms#Share_ratio|"ratio"]] are
    13 KB (2,041 words) - 18:40, 19 April 2018
  • ...cepts of ''informational privacy'', ''physical privacy'', and ''decisional privacy.'' ...us vehicles.<ref name = "Shaw"> Shaw, Johnathan. "The Watchers Assaults on Privacy in America". Harvard Magazine. 2017. </ref>
    29 KB (4,327 words) - 01:51, 28 April 2019
  • ...rison Project" design, however, lives on in popular culture and studies of privacy and surveillance, as the '''panopticon''' (the official term for the design ...ponent for women's and LGBTQ rights, along with law reform, economics, and privacy. Although he still held a very sexist opinion on women in terms of intellec
    20 KB (3,037 words) - 15:23, 28 April 2019
  • ...Facebook data, thus creating more ethical ambiguity and concern regarding privacy and accessibility.
    23 KB (3,483 words) - 15:05, 28 April 2019
  • ...oemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol
    34 KB (5,147 words) - 11:53, 28 April 2019
  • ...here has been a drastic increase in mention of and care around online data privacy and security. These questions surrounding this topic along with how our per ...ublic and media backlash against CA and Facebook and debate about personal privacy and data ethics.<ref name=facebook/>
    25 KB (3,653 words) - 16:57, 28 April 2019
  • ...ug research<ref>3BL blogs: DNA testing is popular, but many are unaware of privacy concerns (2019). Chatham: Newstex. Retrieved from http://proxy.lib.umich.ed ...w that addresses this concept of genetic privacy. There are concerns among privacy experts regarding GINA’s narrow scope, which is limited to prohibiting he
    26 KB (3,783 words) - 00:35, 29 April 2019
  • Hacking is the invasion of an individual's privacy through a technological medium. '''Hacking security''' refers to being free ...dentity including financial, health, or personal data, bringing up serious privacy concerns. Hacking security has become easier as information technology adva
    37 KB (5,675 words) - 22:27, 28 April 2019
  • ...vans, David S. "The online advertising industry: Economics, evolution, and privacy." Journal of economic perspectives 23.3 (2009): 37-60.</ref><ref>Turow, Jos ...hp/Confidentiality_of_Online_Data heightened concerns] in regards to user privacy, data protection, reach, and corporate transparency in advertising.
    32 KB (4,653 words) - 23:25, 28 April 2019
  • ...eral unethical practices such as doxxing and gatekeeping. The violation of privacy and ethics in the online community can be examined as a result of the gamer ...r home. She was eventually forced to leave her home out of concern for her privacy and safety, but refused to be silenced by the harassers. She offered a $11,
    26 KB (3,936 words) - 08:14, 29 April 2019
  • ...n be viewed as an act of seeking justice in response to a violation of our privacy and rights.
    34 KB (5,238 words) - 07:12, 29 April 2019
  • ...losion/index.html "Explosion in Data Collection and Data Sharing"]. ''Data Privacy Lab''. Retrieved April 28, 2019.</ref> .... He questions, "does respect for individual's privacy require respect for privacy of the group to which the individual belongs to?"<ref>Floridi, Luciano (Mar
    18 KB (2,638 words) - 08:29, 29 April 2019
  • ...chievous behaviors of Internet trolls and their deliberate abuse of online privacy. Trolls typically hide behind the anonymity provided by online environments
    16 KB (2,560 words) - 16:44, 27 April 2019
  • ...h searchers. In 2008 Wang Fei sued Tianya and Zhang Leyi for violating his privacy and provoking the defamation of his character<ref>McLaughlin, Ryan. [http:/ ...of [[cyberbullying]]. Some believe it is not ethical to invade a person's privacy on the internet, but if the information is out there, then no one can stop
    13 KB (2,103 words) - 02:24, 6 December 2012
  • [[File:socialnet.png|300px|thumb|right|The Power of Social Networks]]'''Privacy in Social Networking''' has become a topic of much concern since the increa ===Privacy Settings===
    7 KB (1,021 words) - 00:31, 29 April 2019
  • ...ettings to allow for only private sharing<ref>https://foursquare.com/legal/privacy</ref>. ...res have developed and each time people threaten to quit the site if their privacy is not respected. This will be an interesting feature when Facebook releas
    14 KB (2,200 words) - 00:05, 29 April 2019
  • ===Privacy===
    11 KB (1,703 words) - 04:29, 12 December 2012
  • ...o have gotten lucky. It's a strange feeling knowing that much of my online privacy is due only to chance. ...ation could be accessed given that I had felt I’d set up my account with privacy in mind. Additionally, many of these features were not available when I fir
    8 KB (1,485 words) - 20:27, 8 March 2021
  • |privacy ...al Network.'' The site also poses serious ethical questions regarding the privacy of users and the ownership of their information posted. There has also been
    67 KB (10,382 words) - 19:28, 23 April 2017
  • ...ternalDBID=n%2Fa&rft.externalDocID=121082132</ref>. As a result, patients' privacy is susceptible to violation, which raises the question if the benefits of E ===Privacy===
    20 KB (3,070 words) - 04:55, 12 December 2012
  • ...ithout a user's consent, ethical concerns have arisen focusing on personal privacy, personal choice, and vulnerability of targets. ...ata Mining, it has become a very controversial topic in relation to online privacy.
    23 KB (3,466 words) - 14:12, 28 April 2019
  • ...t to adopt cloud computing because of the importance of client information privacy in their work. There are tradeoffs, as cloud hosting companies have large d [[Category: Privacy]]
    11 KB (1,735 words) - 00:42, 19 April 2019
  • ===Hacking, Trolling, and Privacy=== ...ary 2016. </ref> Thus, there is a gray line between keeping the safety and privacy of security officers and promoting safer and slower driving behavior by sho
    19 KB (3,020 words) - 18:35, 16 February 2021
  • ===Privacy Issues=== ...violation of privacy and personal identity. Facebook further endangers the privacy of users because it is creating tools to predict future behavior based on e
    17 KB (2,555 words) - 17:06, 20 April 2021
  • ...et View has recently been the subject of online data collecting issues and privacy issues. <ref>Wikipedia. [[Wikipedia:Google_Street_View|Google Street View]] | Google took New Zealand Privacy Commission's suggestion and blurred people's faces, but not the registratio
    14 KB (2,110 words) - 20:19, 13 April 2017
  • ===Privacy===
    20 KB (2,867 words) - 17:41, 23 March 2019
  • ...nnected to the internet. Though Spotify has offered many features to limit privacy, there are still ways around this via other services, like Soundiiz, a webs ===Privacy Issues===
    50 KB (7,331 words) - 12:46, 20 April 2018
  • ...and transfer health-clinical data. It can also involve the information and privacy necessary when combining health information and technology.<ref>http://www.
    15 KB (2,011 words) - 13:13, 25 April 2016
  • ...rivacy ([[Privacy in the Online Environment|In the Online Environment]], [[Privacy in Social Networking|In Social Networking]]) ...ure--our sacred spaces. Could we, for example, build a Net that reweights privacy concerns, acknowledging that these, as much as information, are central to
    12 KB (1,871 words) - 22:24, 28 March 2018
  • ...hetically indifferent, along with AI aiding human progress and loyalty and privacy issues.<ref>Singler, Beth. “AI Slaves: the Questionable Desire Shaping Ou ===Loyalty and Privacy===
    27 KB (4,254 words) - 14:07, 28 April 2019
  • ...chnologies within the fields of energy consumption, algorithms, and online privacy. ===Online Privacy===
    15 KB (2,156 words) - 22:55, 26 April 2019
  • ....com/article/salvadorhernandez/family-tree-dna-fbi-investigative-genealogy-privacy.</ref> ===Privacy===
    21 KB (3,202 words) - 07:12, 29 April 2019
  • ==== Privacy/Surveillance ==== ...oice, and cookies. An example of designing for privacy would be Facebook's privacy features. When an individual posts a photo, Facebook allows that person to
    20 KB (3,072 words) - 10:36, 28 April 2019
  • ===Privacy=== ...will be directed to the person under attack. This results in the person's privacy being violated multiple times.
    15 KB (2,331 words) - 00:42, 29 April 2019
  • ...sentations of ourselves to be. This is summarized by The Control Theory of Privacy which states that, ...one’s beliefs ground emotions of self-esteem. One has the informational privacy to the extent one has control over others’ access to, and one’s own pre
    26 KB (3,874 words) - 13:17, 29 April 2019
  • ...This filtering contributes to the ethical concern of a severe invasion of privacy - to such an extent that it may be considered constant surveillance. [[File:Twitterpic123.png|300px|thumb|right|Concerns about no privacy]]
    18 KB (2,607 words) - 20:53, 26 April 2019
  • ...riction also introduces a number of ethical issues including anonymity and privacy. ...L., The Fourth Revolution: How the Infosphere is Reshaping Human Reality, Privacy, Oxford University Press, 2014, 101-128.</ref> Just as revolutionary commun
    10 KB (1,370 words) - 10:44, 18 April 2019
  • # The requested information invades another private individual's privacy if disclosed.<ref name="faq"/> ...guity. What information rises to the standard of violating an individual's privacy? Especially when that individual is not consulted throughout the process. C
    12 KB (1,775 words) - 12:21, 28 April 2019
  • California, which has some of the most developed digital privacy and security laws, has certain statutes that apply to digital assets. Calif ===Data Creation, Ownership, and Privacy===
    20 KB (3,045 words) - 13:14, 28 April 2019
  • ..., as many people do not believe that it is possible to protect individual privacy to the extent that it was before. It has also raised environmental concerns ...ise with growing data and that the matters of group privacy and individual privacy have several points of intersection that can be potential grey areas or pro
    18 KB (2,722 words) - 07:14, 29 April 2019
  • ...Shoemaker, David W. "Self-exposure and exposure of the self: informational privacy and the presentation of identity," Spring Science and Business Media, 2009<
    19 KB (2,947 words) - 07:09, 29 April 2019
  • ...brings about several ethical concerns surrounding the notions of consent, privacy and sexual harassment - among others. ...ful to both receiving and sending parties. This not only breaks a sense of privacy between users but also causes a trust issue between the users sending sexua
    27 KB (4,231 words) - 14:03, 28 April 2019
  • ...ds-on effort they require. Human error is inevitable causing concerns with privacy and trust when information is sent to these third-party moderators. <ref> Z
    35 KB (5,081 words) - 16:56, 17 March 2020
  • ...in information among search engines has lead to ethical concerns regarding privacy, the filtering of search results, and types of biases that may occur among ...as involved in the search engine design, the filtering of results, and the privacy of the user.
    41 KB (6,339 words) - 15:48, 28 April 2019
  • ...amples of environments in a digital society in which the interpretation of privacy in public can be applied in this context are [https://en.wikipedia.org/wiki ...15. doi:10.1007/s10676-009-9186-x. </ref> <ref>Stanford University Press ''Privacy In Context'' Hellen Nissenbaum 2009</ref>
    17 KB (2,647 words) - 14:49, 28 April 2019
  • ...ciary Committee delayed the vote for the implementation of the Stop Online Privacy Act aimed at mandating internet service providers to alter records in the [
    13 KB (2,073 words) - 02:14, 12 December 2012
  • ...asses legal issues related to Internet use. Some of these concerns involve privacy, freedom of speech, jurisdiction, and internet usage.
    15 KB (2,440 words) - 16:22, 16 April 2021
  • ...arrieriq Gizmodo: Carrier IQ Software May Not Record Messages But It’s a Privacy Risk]</ref> Ethical issues arise when the software invades a person's privacy without their full knowledge and consent of it occurring. If the software
    19 KB (2,843 words) - 21:54, 11 December 2012
  • ===Privacy=== ...ocations of the photo, Imgur strips the photos of this data to protect the privacy of those unaware of exif data's existence.<ref name = "exif">[http://imgur.
    13 KB (1,956 words) - 19:48, 13 April 2018
  • |privacy ===Privacy===
    44 KB (6,690 words) - 20:45, 8 April 2018
  • ===Privacy Issues=== ...op employees, including the CEO himself. This is a clear violation of the privacy laws laid out in our country; however, the inability by the authorities to
    15 KB (2,269 words) - 01:31, 24 April 2018
  • === Data Privacy and Consent ===
    12 KB (1,863 words) - 13:52, 23 April 2019
  • ...hi & Saatch. In 2008 Wang Fei sued Tianya and Zhang Leyi for violating his privacy and provoking the defamation of his character<ref>[http://www.ryan-mclaughl ...nformation being posted in online forums, which is an extreme violation of privacy. Tianya has been held accountable for not promptly removing posts that cont
    8 KB (1,246 words) - 09:31, 27 April 2019
  • ...ese forums allow for anonymity through a online screen name. The increased privacy is a factor that contributes to my increased usage on these sites as oppose Due to the prevalence of my name and privacy settings it is very difficult to pinpoint my online identity on the interne
    7 KB (1,229 words) - 23:08, 7 March 2021
  • ...ed with memes include control of the meme (or lack thereof) as it spreads, privacy of the people depicted in popular memes, copyright issues (specifically Art ===Privacy===
    22 KB (3,480 words) - 16:21, 24 April 2019
  • ...rs]. Ethical issues encountered in this setting often include security and privacy issues, most often relating to the unintentional spread of inaccurate infor
    6 KB (937 words) - 12:47, 26 March 2019
  • ...r </ref> The use of Tor and it's development highlight ethical concerns on privacy. ...relay. Tor uses the same circuit for connections for 10 minutes to ensure privacy and security.<ref name="tor" />
    11 KB (1,680 words) - 16:15, 19 April 2018
  • ...s]. Recommender systems pose a number of ethical challenges, including the privacy of aggregated information and the use of such systems for unethical purpose ===Privacy===
    9 KB (1,370 words) - 18:17, 11 February 2021
  • ...n order to gain back users trust and create a new standard for information privacy. At first glance, Zuckerberg's original thought that this was an okay thing ...ers date to Cambridge Analytica, and it lead to his policy to increase the privacy of user information on both Facebook and Instagram. In the end, these "mist
    9 KB (1,465 words) - 00:43, 30 March 2021
  • ...for an increased amount of debate surrounding the ethical implications of privacy online. ..., sexual orientation, etc. In order to counteract what would be considered privacy intrusions, Google has an ''Incognito'' mode that can be used on their web
    50 KB (7,631 words) - 00:16, 25 April 2018
  • ...ry ten minutes and update the spreadsheet. In a sense, blockchain promotes privacy because it protects individual’s personal data by decentralizing control ...sh''' is a cryptocurrency, forked from the Bitcoin source code, with added privacy functionality compared to the normal Bitcoin Core. It uses a cryptographic
    37 KB (5,488 words) - 17:54, 28 April 2019
  • ...systems/ </ref> The birth of GIS has also led to discussions regarding the privacy, property, accuracy, and accessibility of information. ...unding GIS have not been addressed. Mason and Collins pinpointed issues of privacy, property, accuracy, and accessibility to be the four main concerns regardi
    11 KB (1,773 words) - 03:44, 25 April 2018
  • ...e many [[Facebook#Ethical_Concerns_of_Facebook |ethical issues surrounding privacy]] on Facebook. ...work</ref> Even though Diaspora is largely seen as an attempt to solve the privacy and ethical issues surrounding Facebook's highly centralized network, users
    11 KB (1,607 words) - 01:09, 26 April 2019
  • ===Privacy=== ...iction is lacking, Ebay does not provide its users with true informational privacy or, "the freedom from informational interference or intrusion, achieved tha
    27 KB (4,405 words) - 19:14, 21 April 2019
  • ====Privacy==== ...personal information, the protection of this data is vital to concerns of privacy and the expanding use of technolongy. The question of who has access to thi
    5 KB (775 words) - 20:13, 23 April 2017
  • ===Privacy Concerns=== ...rs-privacy/"Angry Birds Leak: Why App Developers Should Guard Their Users' Privacy"] 28 January 2015. Retrieved on 11 April 2017.</ref>
    23 KB (3,401 words) - 14:26, 25 April 2018
  • ...ues surrounding the site regarding comments, benefit, and harm, as well as privacy. Additionally, issues arise when determining perpetrators for the upload of ...predatory behavior, stalking, threats, harassment, intimidation, invading privacy, revealing other people’s personal information, and inciting others to co
    27 KB (4,107 words) - 11:44, 29 April 2019
  • ...ethical issues of the information age. As he outlines it, these issues are privacy, accuracy, property, and accessibility. One of Mason's main claims in regar
    12 KB (1,759 words) - 16:14, 17 April 2018
  • ====Privacy==== ...ke a hard stance on these issues either way and even using the pretense of privacy violation as a means to set up a joke.<ref> "Aiden Pearce, Snooping Superhe
    18 KB (2,831 words) - 14:08, 10 April 2019
  • ...ate issues including fraud protection, financial security, and information privacy have been major points of contention. These practices have sparked mainstr ===Privacy===
    20 KB (3,089 words) - 05:45, 24 April 2018
  • ...nized online protest occurred in 1990, when raised concerns over consumer privacy led the public to take action against product called the the Lotus Marketp
    19 KB (2,811 words) - 15:00, 26 March 2017
  • Ethically, biobanks have raised questions on privacy, research ethics, and medical ethics. While viewpoints on these ethics are ...to participants, the right to ownership of intellectual property, and the privacy and security of donors who participate. Because of these issues, researche
    18 KB (2,694 words) - 18:25, 18 April 2021
  • ===Violation of Privacy=== ...ization VI, they created such a controversy, due to the violation of their privacy and the loss of control of their information, that Firaxis, the studio that
    12 KB (1,765 words) - 20:05, 22 April 2019
  • ...until he realized that she was indeed pregnant. This raises a very serious privacy issue regarding the appropriate use of recommender systems. This situation
    16 KB (2,484 words) - 14:25, 17 April 2018
  • ===Privacy=== ...2012, Pinterest announced that they had responded to the request for more privacy controls by adding new features. Now there is a flag icon on each user’s
    32 KB (4,952 words) - 18:57, 24 April 2018

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)