Treffer 1 - 19 von 19

1

Ethics and Phishing Experiments.
Resnik, David B. ; Finn, Peter R.
Science & Engineering Ethics. Aug2018, Vol. 24 Issue 4, p1241-1252. 12p.

PHISHING COMPUTER security ethics HUMAN experimentation INTERNET privacy DECEPTION INFORMED consent (Law)
Fachzeitschrift
Merkliste
2

Collapse-Based Authentication: Redacted Summary of the ASDC Protocol
Adamson, Bradley

Cybersecurity authentication zero trust collapse system post-quantum Cryptography
Fachzeitschrift
Merkliste
3

A Framework for the Implementation of Socio-ethical Controls in Information Security.
Trompeter, C.M. ; Eloff, J.H.P.
Computers & Security. 2001, Vol. 20 Issue 5, p384. 8p. 1 Diagram.

Fachzeitschrift
Merkliste
4

Generally Accepted System Security Principles (GASSP) version 2.0 June 1999. (cover story)
Information Systems Security. Fall99, Vol. 8 Issue 3, p32. 20p. 2 Diagrams, 1 Chart.

Zeitschrift
Merkliste
5

Ethics of information security.
Parker, Donn B.
Information Systems Security. Spring96, Vol. 5 Issue 1, p13. 6p.

Zeitschrift
Merkliste
6

Revolutionizing Medical Data Sharing Using Advanced Privacy-Enhancing Technologies: Technical, Legal, and Ethical Synthesis.
Scheibner, J. ; Raisaro, J.L. ; Troncoso-Pastoriza, J.R. ; et al.
Journal of medical Internet research, vol. 23, no. 2, pp. e25120

Computer Security/ethics Humans Information Disseminatio... Privacy/legislation & ju... Technology/methods GDPR
Fachzeitschrift
Merkliste
7

Lock up your data.
Meall, Lesley
Accountancy (1995). Aug97, Vol. 120 Issue 1248, p36. 3p. 4 Color Photographs, 1 Chart.

Fachzeitschrift
Merkliste
8

HacK, CouNterHaCk.
Gottlieb, Bruce
New York Times Magazine. 10/03/99, Vol. 149 Issue 51664, p34. 4p. 5 Color Photographs.

UNITED States LOPHT (Organization) COMPUTER hackers COMPUTER security ethics SOCIAL advocacy
Zeitschrift
Merkliste
9

Data Mining and Privacy of Social Network Sites' Users: Implications of the Data Mining Problem.
Al-Saggaf, Yeslam ; Islam, Md
Science & Engineering Ethics; Aug2015, Vol. 21 Issue 4, p941-966, 26p

DATA mining ONLINE social networks r... COMPUTER security ethics CONTENT analysis DECISION trees ETHICS
Fachzeitschrift
Merkliste
10

A Brittle and Fragile Future.
Cerf, Vinton G.
Communications of the ACM; Jul2017, Vol. 60 Issue 7, p7-7, 1p

TECHNOLOGY security meas... ANTIVIRUS software COMPUTER network securit... INTERNET of things COMPUTER security ethics
Zeitschrift
Merkliste
11

Security: The Bug Short.
Chafkin, Max ; King, Ian
Bloomberg Businessweek. 4/30/2018, Issue 4567, p41-42. 2p. 1 Color Photograph.

Zeitschrift
Merkliste
12

Moral Clarity in the Computer Age.
Denning, Peter J.
Communications of the ACM; Oct83, Vol. 26 Issue 10, p709-710, 2p

COMPUTER crimes COMPUTER hacking COMPUTER security ethics COMPUTER hackers DATA privacy ETHICS
Zeitschrift
Merkliste
13

ETHICS VS MORALITY.
Mitchell, John
ITNOW; Summer2018, Vol. 60 Issue 2, p44-45, 2p

PENETRATION testing (Com... COMPUTER hackers COMPUTER security ethics COMPUTER security manage... ETHICS PSYCHOLOGY
Fachzeitschrift
Merkliste
14

Patient privacy in the genomic era.
Raisaro, J.L. ; Ayday, E. ; Hubaux, J.P.

Computer Security/ethics Computer Security/legisl... Ethics Medical Genetic Predisposition t... Genetic Privacy/ethics
Fachzeitschrift
Merkliste
15

Securing the data economy: translating privacy and enacting security in the development of DataSHIELD
Murtagh, M. J. ; Demir, I. ; Jenkings, K. N. ; et al.
Public Health Genomics ; https://hal.archives-ouvertes.fr/hal-01262906 ; Public Health Genomics, 2012, 15 (5), pp.243-53. ⟨10.1159/000336673⟩

Biomedical Research Comp... [SDV.SPEE]Life Sciences... info
Fachzeitschrift
Merkliste
16

Only you can prevent computer intrusions.
Koerner, Brendan I.
U.S. News & World Report; 11/22/99, Vol. 127 Issue 20, p50, 1p, 1 Color Photograph

UNITED States UNITED States. Dept. of... COMPUTER hackers COMPUTER crime preventio... COMPUTER security ethics PUBLIC spending
Zeitschrift
Merkliste
17

Convenience vs. security on the Internet.
Wilson, David L.
Chronicle of Higher Education; 7/13/94, Vol. 40 Issue 45, pA15, 3p, 2 Color Photographs

COMPUTER software INTERNET security COMPUTER security ethics
News
Merkliste
18

PTC 2015 Report.
COOPER, TOM
Media Ethics; Spring2015, Vol. 26 Issue 2, p1-1, 1p

CHINA UNITED States TELECOMMUNICATION confer... CYBERTERRORISM COMPUTER security ethics COMPUTER security
Fachzeitschrift
Merkliste
19

Security Risk Management: Building and Information Security Risk.
Palvia, Pankaj
Journal of Information Privacy & Security. 2011, Vol. 7 Issue 4, p72-73. 2p.

Security Risk Management... Wheeler, Evan Computer security ethics Nonfiction
Rezension
Merkliste

Filter