We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-58 of 58 results
  1. Develo** Cryptography Key Management Plans for Healthcare Institutions

    To secure patient ePHI, healthcare institutions must ensure that a qualified key management plan is implemented within their organization. Selecting...
    Conference paper 2020
  2. AI, Philosophy of Technology, and Ethics

    To understand many of the ethical questions that arise in relation to AI, we must understand how it is viewed as a technology. Different perspectives...
    Paula Boddington in AI Ethics
    Chapter 2023
  3. Public Fora and Freedom of Expression

    This paper focuses on freedom of expression in the age of digitalization specifically on social media public fora. As the current political climate...
    Olli I. Heimo, Kai K. Kimppa in Human-Centric Computing in a Data-Driven Society
    Conference paper 2020
  4. Collaboration and Social Networking

    Living reference work entry 2019
  5. The internet as a context for participatory action research

    This paper suggests formal education must take new approaches to meet the social opportunities and challenges brought about through the information...

    Article 27 November 2019
  6. Online Harassment in the Workplace: the Role of Technology in Labour Law Disputes

    In this paper, we explore the role technology plays in online workplace harassment as it emerges in the legal verdicts of labour law courts....

    Nelson Tenório, Pernille Bjørn in Computer Supported Cooperative Work (CSCW)
    Article 18 May 2019
  7. Emergence of Geovigilantes and Geographic Information Ethics in the Web 2.0 Era

    The current technical evolution has enabled GIS as a tool for social participation, empowerment, and public involvement. Public citizens become...
    Conference paper 2019
  8. GamerGate: A Case Study in Online Harassment

    In 2013, an online movement called GamerGate gained notoriety and would reflect the reach, scope, and severity of harassment in social media. This...
    Sarah A. Aghazadeh, Alison Burns, ... Leah Rufus in Online Harassment
    Chapter 2018
  9. P2P surveillance in the global village

    New ubiquitous information and communication technologies, in particular recording-enabled smart devices and social media programs, are giving rise...

    Article 02 November 2018
  10. A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin

    Blockchains primarily enable credible accounting of digital events, e.g., money transfers in cryptocurrencies. However, beyond this original purpose,...
    Roman Matzutt, Jens Hiller, ... Klaus Wehrle in Financial Cryptography and Data Security
    Conference paper 2018
  11. Misuse of Computers

    Misused computing is a threat that secure computing practices will not mitigate. When computing is misused, security is usually not breached....
    Marvin Waschke in Personal Cybersecurity
    Chapter 2017
  12. Playing Games in the Emotional Space

    The nature of user studies is changing, reflecting changing visions of both what is relevant to study and how to study it in order to understand the...
    Kristina Andersen, Margot Jacobs, Laura Polazzi in Funology 2
    Chapter 2018
  13. Scandal or sex crime? Gendered privacy and the celebrity nude photo leaks

    In 2014, a large archive of hacked nude photos of female celebrities was released on 4chan and organized and discussed primarily on Reddit. This...

    Alice E. Marwick in Ethics and Information Technology
    Article 28 August 2017
  14. Joseph Fleming

    From the moment his fingers hit the keyboard on the TI 99/4A that his dad brought home, Joseph Fleming knew...
    Malathi Mahadevan in Data Professionals at Work
    Chapter 2018
  15. D

    daemon: A program that runs as a background process is often started at the time the building control system boots and runs continuously without...
    Luis Ayala in Cybersecurity Lexicon
    Chapter 2016
  16. Exploring Malicious Hacker Forums

    For consumers the increasingly widespread consumer-grade connected (“smart”) devices; growing use of cloud-storage and globally still expanding use...
    Jana Shakarian, Andrew T. Gunn, Paulo Shakarian in Cyber Deception
    Chapter 2016
  17. Security issues in cloud environments: a survey

    In the last few years, the appealing features of cloud computing have been fueling the integration of cloud environments in the industry, which has...

    Diogo A. B. Fernandes, Liliana F. B. Soares, ... Pedro R. M. Inácio in International Journal of Information Security
    Article 28 September 2013
Did you find what you were looking for? Share feedback.