enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Jonathan Katz (computer scientist) - Wikipedia

    en.wikipedia.org/wiki/Jonathan_Katz_(computer...

    Jonathan Katz is a professor in the Department of Computer Science at the University of Maryland who conducts research on cryptography and cybersecurity. In 2019–2020 he was a faculty member in the Volgenau School of Engineering at George Mason University, where he held the title of Eminent Scholar in Cybersecurity. [1]

  3. Houbing Song - Wikipedia

    en.wikipedia.org/wiki/Houbing_Song

    Houbing Herbert Song is the Co-Editor-in-Chief for IEEE Transactions on Industrial Informatics (TII) [1] and the Director of the Security and Optimization for Networked Globe Laboratory (SONG Lab) [2] at the University of Maryland, Baltimore County in Baltimore, USA.

  4. Cyberethics - Wikipedia

    en.wikipedia.org/wiki/Cyberethics

    Hands are shown typing on a backlit keyboard to communicate with a computer. Cyberethics is "a branch of ethics concerned with behavior in an online environment". [1] In another definition, it is the "exploration of the entire range of ethical and moral issues that arise in cyberspace" while cyberspace is understood to be "the electronic worlds made visible by the Internet."

  5. National Cybersecurity Center of Excellence - Wikipedia

    en.wikipedia.org/wiki/National_Cybersecurity...

    The center, located in Rockville, Maryland, was established in 2012 through a partnership with the National Institute of Standards and Technology (NIST), the state of Maryland, and Montgomery County. [2] The center is partnered with nearly 20 market-leading IT companies, which contribute hardware, software and expertise. [3] [4]

  6. Security and Privacy in Computer Systems - Wikipedia

    en.wikipedia.org/wiki/Security_and_Privacy_in...

    Ware's presentation was the first public conference session about information security and privacy in respect of computer systems, especially networked or remotely-accessed ones.

  7. Computer ethics - Wikipedia

    en.wikipedia.org/wiki/Computer_ethics

    Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct. [1]Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into three primary influences: [2]

  8. Information technology law - Wikipedia

    en.wikipedia.org/wiki/Information_technology_law

    Information technology law (IT law), also known as information, communication and technology law (ICT law) or cyberlaw, concerns the juridical regulation of information technology, its possibilities and the consequences of its use, including computing, software coding, artificial intelligence, the internet and virtual worlds.

  9. IEEE Symposium on Security and Privacy - Wikipedia

    en.wikipedia.org/wiki/IEEE_Symposium_on_Security...

    The conference started as a small workshop where researchers exchanged ideas on computer security and privacy, with an early emphasis on theoretical research. During these initial years, there was a divide between cryptographers and system security researchers, with cryptographers often leaving sessions focused on systems security. This issue ...