Sciweavers

1663 search results - page 257 / 333
» Privacy and Identity Management
Sort
View
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
15 years 11 months ago
Virtual Networks and Ethics: An Empirical Research in a Non-Governmental Organization
– This paper analyzes the opportunities offered by information and communication technologies (ICTs) and the related ethical issues they raise within the transparency practices of...
Antonino Vaccaro, Peter Madsen
POLICY
2009
Springer
15 years 10 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
HICSS
2007
IEEE
195views Biometrics» more  HICSS 2007»
15 years 10 months ago
Digital Relationships in the "MySpace" Generation: Results From a Qualitative Study
A qualitative study was conducted to explore how subjects use social networking sites and instant messenger to engage in interpersonal relationships. The results were used to deve...
Catherine Dwyer
OOPSLA
2007
Springer
15 years 10 months ago
DigitalAssets discoverer: automatic identification of reusable software components
DigitalAssets Discoverer is a tool that implements a group of indicators for automatic identification of software components that can be reused in the development of new applicati...
Eduardo Machado Gonçalves, Marcilio Silva O...
SIGCSE
2006
ACM
144views Education» more  SIGCSE 2006»
15 years 10 months ago
Case-based analysis: a practical tool for teaching computer ethics
Case-based analysis is a bottom-up methodology for ethical reasoning. In a teaching environment, it can be a useful alternative to top-down methods, such as Kantianism, utilitaria...
Michael J. Quinn