enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Menlo Report - Wikipedia

    en.wikipedia.org/wiki/Menlo_Report

    The Menlo Report is a report published by the U.S. Department of Homeland Security Science and Technology Directorate, Cyber Security Division that outlines an ethical framework for research involving Information and Communications Technologies (ICT). [1] The 17-page report [2] was published on August 3, 2012.

  3. Focus group - Wikipedia

    en.wikipedia.org/wiki/Focus_group

    Informed consent must be granted before beginning the discussion. In addition, before the discussion is to begin potential group members should be briefed about the topic of discussion and informed about their rights, including the confidentiality (e.g., that their identities will not be revealed in any report or publication).

  4. Informed consent - Wikipedia

    en.wikipedia.org/wiki/Informed_consent

    Example of informed consent document from the PARAMOUNT trial. Informed consent is a principle in medical ethics, medical law, media studies, and other fields, that a person must have sufficient information and understanding before making decisions about accepting risk, such as their medical care.

  5. The Protection of Information in Computer Systems - Wikipedia

    en.wikipedia.org/wiki/The_Protection_of...

    The Protection of Information in Computer Systems is a 1975 seminal publication by Jerome Saltzer and Michael Schroeder about information security. [1] [2] The paper emphasized that the primary concern of security measures should be the information on computers and not the computers itself. [3]

  6. Privacy-enhancing technologies - Wikipedia

    en.wikipedia.org/wiki/Privacy-enhancing_technologies

    Format-preserving encryption (FPE), refers to encrypting in such a way that the output (the ciphertext) is in the same format as the input (the plaintext) Blinding is a cryptography technique by which an agent can provide a service to a client in an encoded form without knowing either the real input or the real output.

  7. Information privacy - Wikipedia

    en.wikipedia.org/wiki/Information_privacy

    Currently security messages are designed for the "average user", i.e. the same message for everyone. Researchers have posited that individualized messages and security "nudges", crafted based on users' individual differences and personality traits, can be used for further improvements for each person's compliance with computer security and privacy.

  8. Belmont Report - Wikipedia

    en.wikipedia.org/wiki/Belmont_Report

    The Belmont Report is a 1978 report created by the National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research.Its full title is the Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research, Report of the National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research.

  9. Ten Commandments of Computer Ethics - Wikipedia

    en.wikipedia.org/wiki/Ten_Commandments_of...

    The Ten Commandments of Computer Ethics were created in 1992 by the Washington, D.C.–based Computer Ethics Institute. [1] The commandments were introduced in the paper "In Pursuit of a 'Ten Commandments' for Computer Ethics" by Ramon C. Barquin as a means to create "a set of standards to guide and instruct people in the ethical use of computers."