default search action
Encyclopedia of Information Ethics and Security 2007
- Marian Quigley:
Encyclopedia of Information Ethics and Security. IGI Global 2007, ISBN 9781591409885 - Koon-Ying Raymond Li, James Sofra:
3D Avatars and Collaborative Virtual Environments. 1-6 - Yifeng Shen:
Access Control for Healthcare. 7-14 - Savvas Papagiannidis, Michael Bourlakis:
Advertising in the Networked Environment. 15-22 - Wenbing Zhao:
Anonymous Peer-to-Peer Systems. 23-29 - Ephraim Nissan:
Argumentation and Computing. 30-35 - Ephraim Nissan:
Argumentation with Wigmore Charts and Computing. 36-41 - Ephraim Nissan:
Artificial Intelligence Tools for Handling Legal Evidence. 42-48 - Jianxia Du:
Barriers Facing African American Women in Technology. 49-54 - Antonio Grillo:
B-POS Secure Mobile Payment System. 55-61 - Wenbing Zhao:
Building Secure and Dependable Information Systems. 62-67 - Zack Jourdan:
Classifying Articles in Information Ethics and Security. 68-75 - Alicia Ruvinsky:
Computational Ethics. 76-82 - Yefim Kats:
Computer Ethics and Intelligent Technologies. 83-88 - Robert J. Cole:
Computer Worms, Detection, and Defense. 89-95 - Matthew Butler:
Conflicting Value of Digital Music Piracy. 96-101 - Jengchung V. Chen:
Content Filtering Methods for Internet Pornography. 102-107 - Christopher Beggs:
Cyber-Terrorism in Australia. 108-113 - Zbigniew W. Ras, Seunghyun Im:
Data Security and Chase. 114-120 - Yang Xiang, Wanlei Zhou:
Defending against Distributed Denial of Service. 121-129 - Irene Chen, Terry T. Kidd:
Digital Divide Implications and Trends. 130-135 - Jo Anne Cote, Eun G. Park:
Digital Rights Management Metadata and Standards. 136-142 - Omer Mahmood:
Dilemmas of Online Identity Theft. 143-149 - Christopher H. Walker:
Document Security in the Ancient World. 150-156 - Bong Wee Kiau:
DRM Practices in the E-Publication Industry. 157-163 - Kathleen Gray:
Educational Technology Practitioner-Research Ethics. 164-169 - Prajesh N. Chhanabhai:
E-Health and Ensuring Quality. 170-178 - Aashish Srivastava, Stanley B. Thomson:
Electronic Signatures and Ethics. 179-186 - Tagelsir Mohamed Gasmelseid:
Engineering Multi-Agent Systems. 187-193 - Sophie Nichol:
Ethical Approach to Gathering Survey Data Online. 194-200 - Sutirtha Chatterjee:
Ethical Behaviour in Technology-Mediated Communication. 201-207 - Alistair Irons, Roger Boyle:
Ethical Concerns in Computer Science Projects. 208-213 - Stephanie Etter, Patricia G. Phillips, Ashli M. Molinero:
The Ethical Debate Surrounding RFID. 214-220 - Joseph A. Cazier, Ryan C. LaBrie:
Ethical Dilemmas in Data Mining and Warehousing. 221-228 - John Wang:
Ethical Erosion at Enron. 229-234 - Kirsten Ellis:
Ethical Usability Testing with Children. 235-240 - Belinda Davis Lazarus:
Ethics and Access to Technology for Persons with Disabilities. 241-245 - Michelle M. Ramim:
Ethics and Perceptions in Online Learning Environments. 246-253 - Thomas J. Tribunella, Heidi R. Tribunella:
Ethics and Security under the Sarbanes-Oxley Act. 254-259 - Lori N. K. Leonard:
Ethics Education for the Online Environment. 260-265 - Pankaj Kamthan:
Ethics in Software Engineering. 266-272 - Sushma Mishra:
Ethics in the Security of Organizational Information Systems. 273-278 - Kevin B. Korb:
Ethics of AI. 279-284 - Pasi Tyrväskylä:
Fair Use. 285-290 - Michael J. Chapple:
Federal Information Security Law. 291-296 - Udo Richard Averweg:
Formulating a Code of Cyberethics for a Municipality. 297-303 - M. J. Warren:
Hackers and Cyber Terrorists. 304-311 - Katina Michael:
Homo Electricus and the Continued Speciation of Humans. 312-318 - Leanne Ngo:
IT Security Culture Transition Process. 319-325 - Amanda Third:
ICT Leapfrogging Policy and Development in the Third World. 326-334 - Ramaswamy Palaniappan, Lalit M. Patnaik:
Identity Verification using Resting State Brain Signals. 335-341 - Carmel McNaught:
Individual and Institutional Responses to Staff Plagiarism. 342-347 - Bernd Carsten Stahl:
Information Ethics as Ideology. 348-354 - Salam Abdallah:
Information Ethics from an Islamic Perspective. 355-361 - Michael Douma, Eduard J. Gamito:
Information Security and the "Privacy Broker". 362-369 - Julia Kotlarsky, Ilan Oshri, Corey Hirsch:
Information Security Policies for Networkable Devices. 370-376 - Heather Fulford, Neil F. Doherty:
Information Security Policy Research Agenda. 377-383 - Dianne Currier:
Internet and Suicide. 384-390 - Paul Sugden:
Internet Piracy and Copyright Debates. 391-396 - Elizabeth Buchanan:
Internet Research Ethics Questions and Considerations. 397-402 - Elza Dunkels, AnnBritt Enochsson:
Interviews with Young People using Online Chat. 403-410 - Terry T. Kidd, Robert K. Hiltbrand:
Intrusion Detection and Information Security Audits. 411-417 - Gianluigi Me:
Investigation Strategy for the Small Pedophiles World. 418-425 - Alan Sixsmithm:
Managed Services and Changing Workplace Ethics. 426-432 - Laurel Evelyn Dyson:
Managing the Environmental Impact of Information Technology. 433-439 - Mohammad Abdolmohammadi:
Measuring Ethical Reasoning of IT Professionals and Students. 440-444 - Charles R. Crowell:
Meta View of Information Ethics. 445-450 - Reggie Becker, Mark B. Schmidt, Allen C. Johnston:
Mitigation of Identity Theft in the Information Age. 451-456 - Fei Xue:
Mobile Agents and Security. 457-462 - Pravin Shetty, Seng Wai Loke:
Modelling Context-Aware Security for Electronic Health Records. 463-469 - Lynley Hocking:
Moral Rights in the Australian Public Sector. 470-477 - Ajita Rattani:
Multimodal Biometric System. 478-485 - John R. Drake:
Objective Ethics for Managing InformationTechnology. 486-491 - Benjamin J. Halpert:
Parental Rights to Monitor Internet Usage. 492-497 - Nilmini Wickramasinghe:
Patient Centric Healthcare InformationSystems in the U.S. 498-506 - Melissa Dark, Richard G. Epstein, Linda Morales, Terry A. Countermine, Qing Yuan:
Pedagogical Framework for EthicalDevelopment. 507-512 - Sabah S. Al-Fedaghi:
Personal Information Ethics. 513-519 - Manish Gupta:
Pharming Attack Designs. 520-526 - Jalal Kawash:
Port Scans. 527-533 - Dick Whiddett:
Privacy and Access to Electronic Health Records. 534-541 - Calin Gurau:
Privacy and Online Data Collection. 542-548 - James P. Lawler:
Privacy in Data Mining Textbooks. 549-555 - Sheng-Uei Guan:
Protection of Mobile Agent Data. 556-562 - Pravin Shetty, Seng Wai Loke:
Rule-Based Policies for Secured Defense Meetings. 563-570 - Sheng-Uei Guan:
Secure Agent Roaming under M-Commerce. 571-578 - Jan Skalicky Hanson:
Secure Automated Clearing House Transactions. 579-584 - Jeffrey Roy:
Security Dilemmas for Canada's New Government. 585-593 - Sanjay Jasola:
Security Model for Educational Satellite Networks. 594-601 - Gregory Paperin:
Security of Communication and Quantum Technology. 602-608 - M. J. Warren:
Security Protection for Critical Infrastructure. 609-615 - Thomas F. Stafford:
Spyware. 616-621 - Ralf Isenmann:
Sustainable Information Society. 622-630 - Sabah S. Al-Fedaghi:
Taxonomy of Computer and Information Ethics. 631-637 - Ephraim Nissan:
Tools for Representing and Processing Narratives. 638-644 - Ulia Popova-Gosart:
Traditional Knowledge and Intellectual Property. 645-654 - Alessandro Arbore:
Universal Internet Access under an Ethical Lens. 655-661
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.