When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Big data ethics - Wikipedia

    en.wikipedia.org/wiki/Big_data_ethics

    This is of ethical significance in the big data ethics field because while many value privacy, the affordances of data sharing are also quite valuable, although they may contradict one's conception of privacy. Attitudes against data sharing may be based in a perceived loss of control over data and a fear of the exploitation of personal data ...

  3. Critical data studies - Wikipedia

    en.wikipedia.org/wiki/Critical_data_studies

    This framework also highlights the importance of various ethical considerations by advocating for informed consent, privacy, and the responsibility data collectors have to individuals data is being collected from. [8] Dataveillance is the monitoring of people on their online data. Unlike surveillance, dataveillance goes far beyond simply ...

  4. Information privacy - Wikipedia

    en.wikipedia.org/wiki/Information_privacy

    Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. [1] It is also known as data privacy [2] [3] or data protection.

  5. Information ethics - Wikipedia

    en.wikipedia.org/wiki/Information_ethics

    Ethical concerns regarding international security, surveillance, and the right to privacy are on the rise. [23] The issues of security and privacy commonly overlap in the field of information, due to the interconnectedness of online research and the development of Information Technology (IT). [24]

  6. Menlo Report - Wikipedia

    en.wikipedia.org/wiki/Menlo_Report

    This report proposes a framework for ethical guidelines for computer and information security research, based on the principles set forth in the 1979 Belmont Report, a seminal guide for ethical research in the biomedical and behavioral sciences. The Menlo Report describes how the three principles in the Belmont report can be applied in fields ...

  7. Ethics of technology - Wikipedia

    en.wikipedia.org/wiki/Ethics_of_technology

    The ethics of technology is a sub-field of ethics addressing ethical questions specific to the technology age, the transitional shift in society wherein personal computers and subsequent devices provide for the quick and easy transfer of information. Technology ethics is the application of ethical thinking to growing concerns as new ...

  8. Active users - Wikipedia

    en.wikipedia.org/wiki/Active_users

    There is yet to be a universally accepted form of industry standards and norms in terms of data-privacy, confidentiality and integrity, a critical ethics consideration, but there has been attempts to design a process to oversee the research activities and data collection to better meet the community and end-user's expectations. [43]

  9. General Data Protection Regulation - Wikipedia

    en.wikipedia.org/wiki/General_Data_Protection...

    Business processes that handle personal data must be designed and built with consideration of the principles and provide safeguards to protect data (for example, using pseudonymization or full anonymization where appropriate). [33] Data controllers must design information systems with privacy in mind.