When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Privacy by design - Wikipedia

    en.wikipedia.org/wiki/Privacy_by_design

    The principles of privacy by design "remain vague and leave many open questions about their application when engineering systems". The authors argue that "starting from data minimization is a necessary and foundational first step to engineer systems in line with the principles of privacy by design".

  3. Communication privacy management theory - Wikipedia

    en.wikipedia.org/wiki/Communication_privacy...

    Communication privacy management (CPM), originally known as communication boundary management, is a systematic research theory developed by Sandra Petronio in 1991. CPM theory aims to develop an evidence-based understanding of the way people make decisions about revealing and concealing private information.

  4. Menlo Report - Wikipedia

    en.wikipedia.org/wiki/Menlo_Report

    Appropriate application of the four principles requires that Stakeholder analysis must first be performed. Thorough stakeholder analysis is important to identify: the correct entity(s) from whom to seek informed consent; the party(s) who bear the burdens or face risks of research; the party(s) who will benefit from research activity; and, the party(s) who are critical to mitigation in the ...

  5. Scientific integrity - Wikipedia

    en.wikipedia.org/wiki/Scientific_integrity

    The European Code of Conduct for Research Integrity 2023 states, for example, the principles that, "Researchers, research institutions, and organisations ensure that access to data is as open as possible, as closed as necessary, and where appropriate in line with the FAIR Principles (Findable, Accessible, Interoperable and Reusable) for data ...

  6. Belmont Report - Wikipedia

    en.wikipedia.org/wiki/Belmont_Report

    The Belmont Report is a 1978 report created by the National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research.Its full title is the Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research, Report of the National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research.

  7. Contextual integrity - Wikipedia

    en.wikipedia.org/wiki/Contextual_Integrity

    The concept of contextual integrity have also influenced the norms of ethics for research work using social media data. Fiesler et al. studied Twitter users' awareness and perception of research work that analyzed Twitter data, reported results in a paper, or even quoted the actual tweets. It turned out that users' concerns were largely ...

  8. Privacy for research participants - Wikipedia

    en.wikipedia.org/wiki/Privacy_for_research...

    Since privacy for research participants is a priority, though, various proposals for protecting participants have been made for different purposes. [2] Replacing the real data with synthetic data allows the researchers to show data which gives a conclusion equivalent to the one drawn by the researchers, but the data may have problems such as ...

  9. FTC fair information practice - Wikipedia

    en.wikipedia.org/wiki/FTC_fair_information_practice

    The core principles of privacy addressed by these principles are: 1. Notice/Awareness [12] Consumers should be given notice of an entity's information practices before any personal information is collected from them. [12] This requires that companies explicitly notify some or all of the following: identification of the entity collecting the data;