Information privacy and security — A regulator's priorities
✍ Scribed by John Woulds
- Publisher
- Elsevier Science
- Year
- 1997
- Tongue
- English
- Weight
- 649 KB
- Volume
- 2
- Category
- Article
- ISSN
- 1363-4127
No coin nor oath required. For personal study only.
📜 SIMILAR VOLUMES
a privileged relationship that existed between IBM Corporation and the Third Reich during World War II. The relationship has come to light recently as a result of the publication of a book by Edwin Black. According to the book, the Third Reich employed IBM Hollerith punch-card machines, to perform c
Currently, there are about eighty-nine million wireless subscribers in North America and 162 million in Europe. 1 By 2004, the numbers of wireless subscribers in North America and Europe are expected to surpass 190 million and 375 million, respectively. As consumers demand more mobility and connect
This is an important and timely anthology of articles "on the normative issues surrounding information control " (p. 11). Using an interdisciplinary approach, Moore's work takes a broad look at the relatively new field of information ethics. Covering a variety of disciplines including applied ethics
## Abstract In response to international terrorism, the United States government has actively sought to reorganize information flows to and from individuals, the media, and other nations. These government actions lead to information asymmetry, with certain realms becoming relatively ‘information po