![](images/graphics/blank.gif)
Privacy on the internet
-
The study has used qualitative exploratory case study through semi-structured interviews. The interviews were conducted by the project manager, coordination officer, and supply manager from humanitarian NGOs providing educational services for Syrian refugees in their offices in Amman. The results were analysed based on the interviews, conducted among employees.
9p
longtimenosee10
26-04-2024
2
1
Download
-
Continued part 1, part 2 of ebook "The internet supply chain: Impact on accounting and logistics" provides readers with contents including: the changing responsibilities of senior management in a modern firm; one of the big challenges with electronic commerce; getting our company ready for shifts in market power; the real revolution in computers and communications is in logistics; operational risk with supply chain: privacy and security;...
150p
mocthanhdao0210
19-11-2023
10
2
Download
-
includes contents: Chapter 1 introduction: when poop goes primetime; chapter 2 how the free flow of information liberates and constrains us; chapter 3 gossip and the virtues of knowing less; chapter 4 shaming and the digital scarlet letter; chapter 5 the role of law; chapter 6 free speech, anonymity, and accountability; chapter 7 privacy in an overexposed world; chapter 8 conclusion: the future of reputation.
306p
haojiubujain03
24-07-2023
7
3
Download
-
Ebook The library’s legal answer book present the following contents: Chapter 1 libraries and copyright ; chapter 2 designing the library web page; chapter 3 filters and other restrictions on internet access; chapter 4 digital library resources and patrons with disabilities; chapter 5 library records and privacy; chapter 6 meeting rooms and displays: the public soapbox inside the library; chapter 7 professional liability: reference, collection, book reviews, latchkey children; chapter 8 issues in library employment; chapter 9 friends, the internet, and lobbying.
373p
runthenight08
12-04-2023
3
2
Download
-
This book is about learning to protect data with encryption. It’s a combination primer, story, guide, and handbook on how to use Gnu Privacy Guard (GnuPG) encryption software to protect data in motion (messages or files being sent over the Internet), followed by a brief discussion of how to protect data at rest by using full disk encryption (FDE) on modern operating systems (OSes).
114p
runthenight08
12-04-2023
6
5
Download
-
Lecture Electronic Commerce (E-Commerce) - Chapter 14: E-Commerce: Regulatory, Ethical, and Social Environments provide students with knowledge about understand the foundations for legal and ethical issues in EC; describe intellectual property law and understand its adjudication; explain privacy and free speech issues and their challenges; describe types of fraud on the Internet and how to protect against them;...
31p
bachnhuocdong
23-12-2021
20
3
Download
-
Lecture Electronic commerce - Chapter 17: Legal, Ethical, and Compliance Issues in EC learning objectives: Understand the foundations for legal and ethical issues in EC. Describe civil, intellectual property, and common law. Understand legal and ethical challenges and how to contain them. Explain privacy, free speech, and defamation and their challenges. Discuss the challenges caused by spam, splogs, and pop-ups. Describe types of fraud on the Internet and how to protect against it.
42p
caphesuadathemtac
09-11-2021
14
4
Download
-
This paper proposes a security framework for Internet of Things (IoT) based on blockchain. The solution provides the two features: (1) Access control for IoT devices, which allows users to pay a fee to the device’s owner to access the device for a certain period of time.
9p
viaespa2711
31-07-2021
26
3
Download
-
Purpose of the study is to analyze security issues which have an impact on the online shopping buying behavior of the customer. Also highlights the factors which helps in retaining the online customer.
8p
guineverehuynh
17-06-2020
24
5
Download
-
The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the ‘‘Internet of Things.’’ Standards are evolving for all of these potentially connected systems.
7p
kethamoi1
17-11-2019
51
4
Download
-
Chapter 2 - Accounting on the internet. Chapter 2 provides a basic overview of Internet concepts, discusses financial reporting on the Internet including an expanded section on XBRL, explores the accounting components of e-business, and covers the issues of privacy and security.
52p
shiwo_ding1
30-03-2019
23
1
Download
-
Chapter 11 - Legal and ethical issues; internet taxation. This chapter includes contents: Right to privacy, internet and the right to privacy, network advertising initiative, employer and employee, protecting yourself as a user, protecting your business: privacy issues, defamation, sexually explicit speech, children and the internet, alternative methods of regulation.
44p
nhanmotchut_3
19-10-2016
48
1
Download
-
In this chapter, students will be able to understand: How e-commerce benefits consumers and businesses? To compare ways of doing business on the Web? To identify elements of a successful e-commerce Web site? To evaluate privacy and security on the Internet?
42p
tangtuy18
12-07-2016
39
1
Download
-
After studying this chapter you will be able to: Summarize the guidelines for creating an information privacy policy, identify the differences between an ethical computer use policy and an acceptable computer use policy, describe the relationship between an email privacy policy and an internet use policy, explain the effects of spam on an organization, summarize the different monitoring technologies and explain the importance of an employee monitoring policy.
29p
tangtuy11
20-05-2016
36
2
Download
-
Buying advertising on the Mobile Web is similar to buying display advertising on the Internet. Graphical, interactive display ads are the predominant ad unit. In most cases, Mobile Web banner ad impressions can be purchased on a cost per thousand (CPM) or a cost per click (CPC) basis. Mobile offers targeting possibilities beyond that of traditional media. As this develops further, we would expect to see a range of targeting options made available covering context, demographic and behavioral attributes.
16p
doiroimavanchuadc
06-02-2013
55
5
Download
-
A Threat to Employee Privacy in the Wired Workplace Annotation. Opening sentences provide background for thesis. As the Internet has become an integral tool of businesses,company policies on Internet usage have become as common aspolicies regarding vacation days or sexual harassment. A 2005study by the American Management Association and ePolicy Institute found that 76% of companies monitor employees’ use ofthe Web, and the number of companies that block employees’ access to certain Web sites has increased 27% since 2001 (1).
8p
doiroimavanchuadc
06-02-2013
45
3
Download
-
On-line privacy has emerged as one of the key—and most contentious—issues surrounding the continued evolution of the Internet. The World Wide Web requires the collection of certain data from individuals who visit web sites—such as Internet address—in order for the site to operate properly. However, collection of even this most basic data can be controversial because of the public's apprehension about what information is collected and how it could be used.
26p
doiroimavanchuadc
06-02-2013
63
3
Download
-
In addition, the survey looked at the use of third-party cookies1 by commercial web sites. Although FTC noted improvement over previous surveys, it nonetheless concluded that the on-line industry’s self-regulatory initiatives were falling short. As a result, a majority of the FTC commissioners, based on a 3 to 2 vote, recommended legislation to require commercial web sites not already covered by the Children's Online Privacy Protection Act (COPPA)2 to implement the four fair information principles.
16p
doiroimavanchuadc
06-02-2013
28
2
Download
-
The rapid erosion of privacy poses numerous puzzles. Why is it occurring, and why do people care about it? This paper proposes an explanation for many of these puzzles in terms of the increasing importance of price discrimination. Privacy appears to be declining largely in order to facilitate di®erential pricing, which o®ers greater social and economic gains than auctions or shopping agents.
16p
doiroimavanchuadc
06-02-2013
49
3
Download
-
Navigating the Internet requires using addresses and corresponding names that identify the location of individual computers. The Domain Name System (DNS) is the distributed set of databases residing in computers around the world that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information from computers anywhere on the Internet.
24p
doiroimavanchuadc
06-02-2013
52
2
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)