


default search action
Encyclopedia of Information Ethics and Security 2007
- Marian Quigley:

Encyclopedia of Information Ethics and Security. IGI Global 2007, ISBN 9781591409885 - Koon-Ying Raymond Li, James Sofra:

3D Avatars and Collaborative Virtual Environments. 1-6 - Yifeng Shen:

Access Control for Healthcare. 7-14 - Savvas Papagiannidis, Michael Bourlakis:

Advertising in the Networked Environment. 15-22 - Wenbing Zhao:

Anonymous Peer-to-Peer Systems. 23-29 - Ephraim Nissan:

Argumentation and Computing. 30-35 - Ephraim Nissan:

Argumentation with Wigmore Charts and Computing. 36-41 - Ephraim Nissan:

Artificial Intelligence Tools for Handling Legal Evidence. 42-48 - Jianxia Du:

Barriers Facing African American Women in Technology. 49-54 - Antonio Grillo:

B-POS Secure Mobile Payment System. 55-61 - Wenbing Zhao:

Building Secure and Dependable Information Systems. 62-67 - Zack Jourdan:

Classifying Articles in Information Ethics and Security. 68-75 - Alicia Ruvinsky:

Computational Ethics. 76-82 - Yefim Kats:

Computer Ethics and Intelligent Technologies. 83-88 - Robert J. Cole:

Computer Worms, Detection, and Defense. 89-95 - Matthew Butler:

Conflicting Value of Digital Music Piracy. 96-101 - Jengchung V. Chen:

Content Filtering Methods for Internet Pornography. 102-107 - Christopher Beggs:

Cyber-Terrorism in Australia. 108-113 - Zbigniew W. Ras, Seunghyun Im:

Data Security and Chase. 114-120 - Yang Xiang, Wanlei Zhou:

Defending against Distributed Denial of Service. 121-129 - Irene Chen, Terry T. Kidd:

Digital Divide Implications and Trends. 130-135 - Jo Anne Cote, Eun G. Park:

Digital Rights Management Metadata and Standards. 136-142 - Omer Mahmood:

Dilemmas of Online Identity Theft. 143-149 - Christopher H. Walker:

Document Security in the Ancient World. 150-156 - Bong Wee Kiau:

DRM Practices in the E-Publication Industry. 157-163 - Kathleen Gray:

Educational Technology Practitioner-Research Ethics. 164-169 - Prajesh N. Chhanabhai:

E-Health and Ensuring Quality. 170-178 - Aashish Srivastava, Stanley B. Thomson:

Electronic Signatures and Ethics. 179-186 - Tagelsir Mohamed Gasmelseid:

Engineering Multi-Agent Systems. 187-193 - Sophie Nichol:

Ethical Approach to Gathering Survey Data Online. 194-200 - Sutirtha Chatterjee:

Ethical Behaviour in Technology-Mediated Communication. 201-207 - Alistair Irons, Roger Boyle:

Ethical Concerns in Computer Science Projects. 208-213 - Stephanie Etter, Patricia G. Phillips, Ashli M. Molinero:

The Ethical Debate Surrounding RFID. 214-220 - Joseph A. Cazier, Ryan C. LaBrie:

Ethical Dilemmas in Data Mining and Warehousing. 221-228 - John Wang:

Ethical Erosion at Enron. 229-234 - Kirsten Ellis:

Ethical Usability Testing with Children. 235-240 - Belinda Davis Lazarus:

Ethics and Access to Technology for Persons with Disabilities. 241-245 - Michelle M. Ramim:

Ethics and Perceptions in Online Learning Environments. 246-253 - Thomas J. Tribunella, Heidi R. Tribunella:

Ethics and Security under the Sarbanes-Oxley Act. 254-259 - Lori N. K. Leonard:

Ethics Education for the Online Environment. 260-265 - Pankaj Kamthan:

Ethics in Software Engineering. 266-272 - Sushma Mishra:

Ethics in the Security of Organizational Information Systems. 273-278 - Kevin B. Korb:

Ethics of AI. 279-284 - Pasi Tyrväskylä:

Fair Use. 285-290 - Michael J. Chapple:

Federal Information Security Law. 291-296 - Udo Richard Averweg:

Formulating a Code of Cyberethics for a Municipality. 297-303 - M. J. Warren:

Hackers and Cyber Terrorists. 304-311 - Katina Michael:

Homo Electricus and the Continued Speciation of Humans. 312-318 - Leanne Ngo:

IT Security Culture Transition Process. 319-325 - Amanda Third:

ICT Leapfrogging Policy and Development in the Third World. 326-334 - Ramaswamy Palaniappan, Lalit M. Patnaik:

Identity Verification using Resting State Brain Signals. 335-341 - Carmel McNaught:

Individual and Institutional Responses to Staff Plagiarism. 342-347 - Bernd Carsten Stahl:

Information Ethics as Ideology. 348-354 - Salam Abdallah:

Information Ethics from an Islamic Perspective. 355-361 - Michael Douma, Eduard J. Gamito:

Information Security and the "Privacy Broker". 362-369 - Julia Kotlarsky, Ilan Oshri, Corey Hirsch:

Information Security Policies for Networkable Devices. 370-376 - Heather Fulford, Neil F. Doherty:

Information Security Policy Research Agenda. 377-383 - Dianne Currier:

Internet and Suicide. 384-390 - Paul Sugden:

Internet Piracy and Copyright Debates. 391-396 - Elizabeth Buchanan:

Internet Research Ethics Questions and Considerations. 397-402 - Elza Dunkels, AnnBritt Enochsson:

Interviews with Young People using Online Chat. 403-410 - Terry T. Kidd, Robert K. Hiltbrand:

Intrusion Detection and Information Security Audits. 411-417 - Gianluigi Me:

Investigation Strategy for the Small Pedophiles World. 418-425 - Alan Sixsmithm:

Managed Services and Changing Workplace Ethics. 426-432 - Laurel Evelyn Dyson:

Managing the Environmental Impact of Information Technology. 433-439 - Mohammad Abdolmohammadi:

Measuring Ethical Reasoning of IT Professionals and Students. 440-444 - Charles R. Crowell:

Meta View of Information Ethics. 445-450 - Reggie Becker, Mark B. Schmidt, Allen C. Johnston:

Mitigation of Identity Theft in the Information Age. 451-456 - Fei Xue:

Mobile Agents and Security. 457-462 - Pravin Shetty, Seng Wai Loke:

Modelling Context-Aware Security for Electronic Health Records. 463-469 - Lynley Hocking:

Moral Rights in the Australian Public Sector. 470-477 - Ajita Rattani:

Multimodal Biometric System. 478-485 - John R. Drake:

Objective Ethics for Managing InformationTechnology. 486-491 - Benjamin J. Halpert:

Parental Rights to Monitor Internet Usage. 492-497 - Nilmini Wickramasinghe:

Patient Centric Healthcare InformationSystems in the U.S. 498-506 - Melissa Dark, Richard G. Epstein, Linda Morales, Terry A. Countermine, Qing Yuan:

Pedagogical Framework for EthicalDevelopment. 507-512 - Sabah S. Al-Fedaghi:

Personal Information Ethics. 513-519 - Manish Gupta:

Pharming Attack Designs. 520-526 - Jalal Kawash:

Port Scans. 527-533 - Dick Whiddett:

Privacy and Access to Electronic Health Records. 534-541 - Calin Gurau:

Privacy and Online Data Collection. 542-548 - James P. Lawler:

Privacy in Data Mining Textbooks. 549-555 - Sheng-Uei Guan:

Protection of Mobile Agent Data. 556-562 - Pravin Shetty, Seng Wai Loke:

Rule-Based Policies for Secured Defense Meetings. 563-570 - Sheng-Uei Guan:

Secure Agent Roaming under M-Commerce. 571-578 - Jan Skalicky Hanson:

Secure Automated Clearing House Transactions. 579-584 - Jeffrey Roy:

Security Dilemmas for Canada's New Government. 585-593 - Sanjay Jasola:

Security Model for Educational Satellite Networks. 594-601 - Gregory Paperin:

Security of Communication and Quantum Technology. 602-608 - M. J. Warren:

Security Protection for Critical Infrastructure. 609-615 - Thomas F. Stafford:

Spyware. 616-621 - Ralf Isenmann:

Sustainable Information Society. 622-630 - Sabah S. Al-Fedaghi:

Taxonomy of Computer and Information Ethics. 631-637 - Ephraim Nissan:

Tools for Representing and Processing Narratives. 638-644 - Ulia Popova-Gosart:

Traditional Knowledge and Intellectual Property. 645-654 - Alessandro Arbore:

Universal Internet Access under an Ethical Lens. 655-661

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














