Search
Search Results
-
Develo** Cryptography Key Management Plans for Healthcare Institutions
To secure patient ePHI, healthcare institutions must ensure that a qualified key management plan is implemented within their organization. Selecting... -
AI, Philosophy of Technology, and Ethics
To understand many of the ethical questions that arise in relation to AI, we must understand how it is viewed as a technology. Different perspectives... -
Public Fora and Freedom of Expression
This paper focuses on freedom of expression in the age of digitalization specifically on social media public fora. As the current political climate... -
-
The internet as a context for participatory action research
This paper suggests formal education must take new approaches to meet the social opportunities and challenges brought about through the information...
-
Online Harassment in the Workplace: the Role of Technology in Labour Law Disputes
In this paper, we explore the role technology plays in online workplace harassment as it emerges in the legal verdicts of labour law courts....
-
Emergence of Geovigilantes and Geographic Information Ethics in the Web 2.0 Era
The current technical evolution has enabled GIS as a tool for social participation, empowerment, and public involvement. Public citizens become... -
GamerGate: A Case Study in Online Harassment
In 2013, an online movement called GamerGate gained notoriety and would reflect the reach, scope, and severity of harassment in social media. This... -
P2P surveillance in the global village
New ubiquitous information and communication technologies, in particular recording-enabled smart devices and social media programs, are giving rise...
-
A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin
Blockchains primarily enable credible accounting of digital events, e.g., money transfers in cryptocurrencies. However, beyond this original purpose,... -
Misuse of Computers
Misused computing is a threat that secure computing practices will not mitigate. When computing is misused, security is usually not breached.... -
Playing Games in the Emotional Space
The nature of user studies is changing, reflecting changing visions of both what is relevant to study and how to study it in order to understand the... -
Scandal or sex crime? Gendered privacy and the celebrity nude photo leaks
In 2014, a large archive of hacked nude photos of female celebrities was released on 4chan and organized and discussed primarily on Reddit. This...
-
Joseph Fleming
From the moment his fingers hit the keyboard on the TI 99/4A that his dad brought home, Joseph Fleming knew... -
D
daemon: A program that runs as a background process is often started at the time the building control system boots and runs continuously without... -
Exploring Malicious Hacker Forums
For consumers the increasingly widespread consumer-grade connected (“smart”) devices; growing use of cloud-storage and globally still expanding use... -
Security issues in cloud environments: a survey
In the last few years, the appealing features of cloud computing have been fueling the integration of cloud environments in the industry, which has...