When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Contextual integrity - Wikipedia

    en.wikipedia.org/wiki/Contextual_Integrity

    The privacy concerns induced by the collection, dissemination and use of personal data via smartphones have received a large amount of attention from different stakeholders. A large body of computer science research aims to efficiently and accurately analyze how sensitive personal data (e.g. geolocation, user accounts) flows across the app and ...

  3. Privacy - Wikipedia

    en.wikipedia.org/wiki/Privacy

    In the 1960s, people began to consider how changes in technology were bringing changes in the concept of privacy. [17] Vance Packard's The Naked Society was a popular book on privacy from that era and led US discourse on privacy at that time. [17]

  4. Understanding Privacy - Wikipedia

    en.wikipedia.org/wiki/Understanding_Privacy

    The book gives a modern history of the concept of privacy particularly as it is discussed by philosophers and legal theorists. It provides a framework of many people's concept of privacy and the author's own theory of the outline of what privacy covers.

  5. Internet privacy - Wikipedia

    en.wikipedia.org/wiki/Internet_privacy

    On the other hand, some people desire much stronger privacy. In that case, they may try to achieve Internet anonymity to ensure privacyuse of the Internet without giving any third parties the ability to link Internet activities to personally-identifiable information of the Internet user. In order to keep their information private, people ...

  6. List of computer books - Wikipedia

    en.wikipedia.org/wiki/List_of_Computer_books

    Donald Knuth - The Art of Computer Programming; Ellen Ullman - Close to the Machine; Ellis Horowitz - Fundamentals of Computer Algorithms; Eric Raymond - The Art of Unix Programming; Gerald M. Weinberg - The Psychology of Computer Programming; James Gosling - The Java Programming Language; Joel Spolsky - The Best Software Writing I

  7. Stay updated on ways to protect your privacy, speed up your computer, keep your devices safe while traveling and much more on the AOL Product Blog. Main Security Identity Tech Support Utilities ...

  8. Reasonable expectation of privacy (United States) - Wikipedia

    en.wikipedia.org/wiki/Reasonable_expectation_of...

    There is a reasonable expectation of privacy for the contents of a cellphone. [23] Cellphones receive Fourth Amendment protection because they no longer contain just phone logs and address books; they contain a person's most sensitive information that they believe will be kept private. [23]

  9. Security and Privacy in Computer Systems - Wikipedia

    en.wikipedia.org/wiki/Security_and_Privacy_in...

    Ware's presentation was the first public conference session about information security and privacy in respect of computer systems, especially networked or remotely-accessed ones.