enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Menlo Report - Wikipedia

    en.wikipedia.org/wiki/Menlo_Report

    This report proposes a framework for ethical guidelines for computer and information security research, based on the principles set forth in the 1979 Belmont Report, a seminal guide for ethical research in the biomedical and behavioral sciences. The Menlo Report describes how the three principles in the Belmont report can be applied in fields ...

  3. Computer ethics - Wikipedia

    en.wikipedia.org/wiki/Computer_ethics

    Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct. [1]Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into three primary influences: [2]

  4. Cyberethics - Wikipedia

    en.wikipedia.org/wiki/Cyberethics

    Hands are shown typing on a backlit keyboard to communicate with a computer. Cyberethics is "a branch of ethics concerned with behavior in an online environment". [1] In another definition, it is the "exploration of the entire range of ethical and moral issues that arise in cyberspace" while cyberspace is understood to be "the electronic worlds made visible by the Internet."

  5. Journal of Cybersecurity - Wikipedia

    en.wikipedia.org/wiki/Journal_of_Cybersecurity

    The Journal of Cybersecurity is an open access peer reviewed academic journal of cybersecurity. It is published by Oxford University Press. [1] It was first issued in 2015. [1] Its editors in chief are Tyler Moore and David Pym. [2] The journal is a member of the Committee on Publication Ethics (COPE). [1]

  6. Ethics of technology - Wikipedia

    en.wikipedia.org/wiki/Ethics_of_technology

    Technoethics (TE) is an interdisciplinary research area that draws on theories and methods from multiple knowledge domains (such as communications, social sciences, information studies, technology studies, applied ethics, and philosophy) to provide insights on ethical dimensions of technological systems and practices for advancing a technological society.

  7. Computer security - Wikipedia

    en.wikipedia.org/wiki/Computer_security

    An example of a physical security measure: a metal lock on the back of a personal computer to prevent hardware tampering. Computer security (also cybersecurity, digital security, or information technology (IT) security) is the protection of computer software, systems and networks from threats that can lead to unauthorized information disclosure, theft or damage to hardware, software, or data ...

  8. Ethics and Information Technology - Wikipedia

    en.wikipedia.org/wiki/Ethics_and_Information...

    Ethics and Information Technology is a quarterly peer-reviewed scientific journal covering the intersection between moral philosophy and the field of information and communications technology. It was established in 1999 by Jeroen van den Hoven ( Delft University of Technology ), who has been its editor-in-chief ever since.

  9. Information ethics - Wikipedia

    en.wikipedia.org/wiki/Information_ethics

    Ethical concerns regarding international security, surveillance, and the right to privacy are on the rise. [23] The issues of security and privacy commonly overlap in the field of information, due to the interconnectedness of online research and the development of Information Technology (IT). [24]