Search results

Jump to: navigation, search

Page title matches

Page text matches

  • ...athered and studied, ethical concerns arise from the lack of anonymity and privacy of the subjects used in data mining techniques as well as around receiving ...on, and information asymmetries.<ref>Schermer, B.W. (2011). The limits of privacy in automated profiling and data mining. Computer Law and Security Report, 2
    22 KB (3,377 words) - 03:47, 25 April 2018
  • ===Information Security and Privacy=== ...ic or derivative motivating force behind information security, information privacy compels many companies, governments, and people alike to consider the impli
    11 KB (1,584 words) - 22:57, 28 March 2018
  • ...amount of personal information you allow people to see. Putting the proper privacy settings on these websites is also important, so people you do not know are ===Privacy===
    15 KB (2,250 words) - 17:05, 26 April 2019
  • ...etc. The chat sessions in World of Warcraft have also been the subject of privacy concerns as similar to any other messaging device, may hold sensitive infor ==== Privacy and Online Confessions ====
    35 KB (5,529 words) - 01:25, 17 April 2019
  • ...implications, particularly from academic purists and humans concerned with privacy. ===Privacy===
    26 KB (4,104 words) - 17:29, 28 April 2019
  • ...is allowed only one account per lifetime and the rules guarding the site's privacy and high [[Wikipedia:Glossary_of_BitTorrent_terms#Share_ratio|"ratio"]] are
    13 KB (2,041 words) - 18:40, 19 April 2018
  • ...cepts of ''informational privacy'', ''physical privacy'', and ''decisional privacy.'' ...us vehicles.<ref name = "Shaw"> Shaw, Johnathan. "The Watchers Assaults on Privacy in America". Harvard Magazine. 2017. </ref>
    29 KB (4,327 words) - 01:51, 28 April 2019
  • ...rison Project" design, however, lives on in popular culture and studies of privacy and surveillance, as the '''panopticon''' (the official term for the design ...ponent for women's and LGBTQ rights, along with law reform, economics, and privacy. Although he still held a very sexist opinion on women in terms of intellec
    20 KB (3,037 words) - 15:23, 28 April 2019
  • ...Facebook data, thus creating more ethical ambiguity and concern regarding privacy and accessibility.
    23 KB (3,483 words) - 15:05, 28 April 2019
  • ...oemaker, David W. “Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity.” Ethics and Information Technology, vol
    34 KB (5,147 words) - 11:53, 28 April 2019
  • ...here has been a drastic increase in mention of and care around online data privacy and security. These questions surrounding this topic along with how our per ...ublic and media backlash against CA and Facebook and debate about personal privacy and data ethics.<ref name=facebook/>
    25 KB (3,653 words) - 16:57, 28 April 2019
  • ...ug research<ref>3BL blogs: DNA testing is popular, but many are unaware of privacy concerns (2019). Chatham: Newstex. Retrieved from http://proxy.lib.umich.ed ...w that addresses this concept of genetic privacy. There are concerns among privacy experts regarding GINA’s narrow scope, which is limited to prohibiting he
    26 KB (3,783 words) - 00:35, 29 April 2019
  • Hacking is the invasion of an individual's privacy through a technological medium. '''Hacking security''' refers to being free ...dentity including financial, health, or personal data, bringing up serious privacy concerns. Hacking security has become easier as information technology adva
    37 KB (5,675 words) - 22:27, 28 April 2019
  • ...vans, David S. "The online advertising industry: Economics, evolution, and privacy." Journal of economic perspectives 23.3 (2009): 37-60.</ref><ref>Turow, Jos ...hp/Confidentiality_of_Online_Data heightened concerns] in regards to user privacy, data protection, reach, and corporate transparency in advertising.
    32 KB (4,653 words) - 23:25, 28 April 2019
  • ...eral unethical practices such as doxxing and gatekeeping. The violation of privacy and ethics in the online community can be examined as a result of the gamer ...r home. She was eventually forced to leave her home out of concern for her privacy and safety, but refused to be silenced by the harassers. She offered a $11,
    26 KB (3,936 words) - 08:14, 29 April 2019
  • ...n be viewed as an act of seeking justice in response to a violation of our privacy and rights.
    34 KB (5,238 words) - 07:12, 29 April 2019
  • ...losion/index.html "Explosion in Data Collection and Data Sharing"]. ''Data Privacy Lab''. Retrieved April 28, 2019.</ref> .... He questions, "does respect for individual's privacy require respect for privacy of the group to which the individual belongs to?"<ref>Floridi, Luciano (Mar
    18 KB (2,638 words) - 08:29, 29 April 2019
  • ...chievous behaviors of Internet trolls and their deliberate abuse of online privacy. Trolls typically hide behind the anonymity provided by online environments
    16 KB (2,560 words) - 16:44, 27 April 2019
  • ...h searchers. In 2008 Wang Fei sued Tianya and Zhang Leyi for violating his privacy and provoking the defamation of his character<ref>McLaughlin, Ryan. [http:/ ...of [[cyberbullying]]. Some believe it is not ethical to invade a person's privacy on the internet, but if the information is out there, then no one can stop
    13 KB (2,103 words) - 02:24, 6 December 2012
  • [[File:socialnet.png|300px|thumb|right|The Power of Social Networks]]'''Privacy in Social Networking''' has become a topic of much concern since the increa ===Privacy Settings===
    7 KB (1,021 words) - 00:31, 29 April 2019

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)