When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Privacy by design - Wikipedia

    en.wikipedia.org/wiki/Privacy_by_design

    The standard will aim to specify the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of data protection. The standard has the UK as secretariat with thirteen participating members [24] and twenty observing members. [24]

  3. Anonymity - Wikipedia

    en.wikipedia.org/wiki/Anonymity

    Anonymity is seen as a technique, or a way of realizing, a certain other values, such as privacy, or liberty. Over the past few years, anonymity tools used on the dark web by criminals and malicious users have drastically altered the ability of law enforcement to use conventional surveillance techniques. [2] [3]

  4. Research transparency - Wikipedia

    en.wikipedia.org/wiki/Research_transparency

    The concept of questionable research practices (or QRP) was first incepted in a 1992 report of the Committee on Science, Engineering, and Public Policy as a way to address potentially non-intentional research failures (such as inadequacies in the research data management process). [6] Questionable research practices uncover a large grey area of ...

  5. Data anonymization - Wikipedia

    en.wikipedia.org/wiki/Data_anonymization

    De-anonymization is the reverse process in which anonymous data is cross-referenced with other data sources to re-identify the anonymous data source. [3] Generalization and perturbation are the two popular anonymization approaches for relational data. [ 4 ]

  6. Research design - Wikipedia

    en.wikipedia.org/wiki/Research_design

    A research design typically outlines the theories and models underlying a project; the research question(s) of a project; a strategy for gathering data and information; and a strategy for producing answers from the data. [1] A strong research design yields valid answers to research questions while weak designs yield unreliable, imprecise or ...

  7. Internet research ethics - Wikipedia

    en.wikipedia.org/wiki/Internet_research_ethics

    [1] [4] In particular, it can be difficult for researchers to ensure participant anonymity. [5] One study of 112 published educational technology research papers was able to identify participant identities in 10 of those papers; the majority of these studies had gathered this data under conditions of anonymity. [5]

  8. De-identification - Wikipedia

    en.wikipedia.org/wiki/De-identification

    De-identification is the process used to prevent someone's personal identity from being revealed. For example, data produced during human subject research might be de-identified to preserve the privacy of research participants. Biological data may be de-identified in order to comply with HIPAA regulations that define and stipulate patient ...

  9. Social identity model of deindividuation effects - Wikipedia

    en.wikipedia.org/wiki/Social_identity_model_of...

    SIDE explains the effects of anonymity and identifiability on group behavior. It has become one of several theories of technology that describe social effects of computer-mediated communication . The SIDE model provides an alternative explanation for effects of anonymity and other "deindividuating" factors that classic deindividuation theory ...