Treffer 1 - 19
von 19
Ethics and Phishing Experiments.
Resnik, David B. ; Finn, Peter R.
Science & Engineering Ethics. Aug2018, Vol. 24 Issue 4, p1241-1252. 12p.
A Framework for the Implementation of Socio-ethical Controls in Information Security.
Trompeter, C.M. ; Eloff, J.H.P.
Computers & Security. 2001, Vol. 20 Issue 5, p384. 8p. 1 Diagram.
Generally Accepted System Security Principles (GASSP) version 2.0 June 1999. (cover story)
Information Systems Security. Fall99, Vol. 8 Issue 3, p32. 20p. 2 Diagrams, 1 Chart.
Ethics of information security.
Parker, Donn B.
Information Systems Security. Spring96, Vol. 5 Issue 1, p13. 6p.
Revolutionizing Medical Data Sharing Using Advanced Privacy-Enhancing Technologies: Technical, Legal, and Ethical Synthesis.
Scheibner, J. ; Raisaro, J.L. ; Troncoso-Pastoriza, J.R. ; et al.
Journal of medical Internet research, vol. 23, no. 2, pp. e25120
Lock up your data.
Meall, Lesley
Accountancy (1995). Aug97, Vol. 120 Issue 1248, p36. 3p. 4 Color Photographs, 1 Chart.
HacK, CouNterHaCk.
Gottlieb, Bruce
New York Times Magazine. 10/03/99, Vol. 149 Issue 51664, p34. 4p. 5 Color Photographs.
Data Mining and Privacy of Social Network Sites' Users: Implications of the Data Mining Problem.
Al-Saggaf, Yeslam ; Islam, Md
Science & Engineering Ethics; Aug2015, Vol. 21 Issue 4, p941-966, 26p
A Brittle and Fragile Future.
Cerf, Vinton G.
Communications of the ACM; Jul2017, Vol. 60 Issue 7, p7-7, 1p
Security: The Bug Short.
Chafkin, Max ; King, Ian
Bloomberg Businessweek. 4/30/2018, Issue 4567, p41-42. 2p. 1 Color Photograph.
Moral Clarity in the Computer Age.
Denning, Peter J.
Communications of the ACM; Oct83, Vol. 26 Issue 10, p709-710, 2p
ETHICS VS MORALITY.
Mitchell, John
ITNOW; Summer2018, Vol. 60 Issue 2, p44-45, 2p
Patient privacy in the genomic era.
Raisaro, J.L. ; Ayday, E. ; Hubaux, J.P.
Securing the data economy: translating privacy and enacting security in the development of DataSHIELD
Murtagh, M. J. ; Demir, I. ; Jenkings, K. N. ; et al.
Public Health Genomics ; https://hal.archives-ouvertes.fr/hal-01262906 ; Public Health Genomics, 2012, 15 (5), pp.243-53. ⟨10.1159/000336673⟩
Only you can prevent computer intrusions.
Koerner, Brendan I.
U.S. News & World Report; 11/22/99, Vol. 127 Issue 20, p50, 1p, 1 Color Photograph
Convenience vs. security on the Internet.
Wilson, David L.
Chronicle of Higher Education; 7/13/94, Vol. 40 Issue 45, pA15, 3p, 2 Color Photographs
PTC 2015 Report.
COOPER, TOM
Media Ethics; Spring2015, Vol. 26 Issue 2, p1-1, 1p
Security Risk Management: Building and Information Security Risk.
Palvia, Pankaj
Journal of Information Privacy & Security. 2011, Vol. 7 Issue 4, p72-73. 2p.