Showing 1 - 10 of 27
Commercially available military-themed virtual simulations have been developed and sold for entertainment since the beginning of the personal computing era. There exists an intense interest by various branches of the military to leverage the technological advances of the personal computing and...
Persistent link: https://www.econbiz.de/10009431063
Purpose: Information Privacy is becoming an increasingly important field of research with many new definitions and terminologies. Along similar rates of increase are the use, uptake and expansion of Collaborative Environments. There is a need for a better understanding and classification of...
Persistent link: https://www.econbiz.de/10009434998
A City Council administration in Victoria, Australia developed a vision for a Corporate Information Management Strategy (CIMS), and envisaged that CIMS would provide the foundation for the organization to make better use of its knowledge. This would be achieved by implementing better management...
Persistent link: https://www.econbiz.de/10009437480
There are numerous information privacy approaches based on the four major models of privacy protection. That is, Comprehensive Privacy Laws, Sectoral Privacy Laws, Privacy Self-Regulation, and Technologies of Privacy. These solutions, used individually or without proper system privacy design...
Persistent link: https://www.econbiz.de/10009434834
There are numerous information privacy approaches based on the four major models of privacy protection. That is, Comprehensive Privacy Laws, Sectoral Privacy Laws, Privacy Self-Regulation, and Technologies of Privacy. These solutions, used individually or without proper system privacy design...
Persistent link: https://www.econbiz.de/10009434994
The Silvered Leaf & Co. project addresses a potential on-line web solution and e-business for marketing, selling and distributing specialized and contemporary theme-based gift baskets featuring products produced and manufactured on the Western Slope of Colorado. Currently, there are many...
Persistent link: https://www.econbiz.de/10009467460
Software security and privacy issues regularly grab headlines amid fears of identity theft, data breaches, and threats to security. Policymakers have responded with a variety of approaches to combat such risk. Suggested measures include promulgation of strict rules, enactment of open-ended...
Persistent link: https://www.econbiz.de/10009471565
As data collection and information networks expand (and stories of security breaches and the misuse of personal information abound), data security and privacy issues are increasingly central parts of the information policy landscape. Legislators, regulators, businesses, and other institutions of...
Persistent link: https://www.econbiz.de/10009476752
There are numerous information privacy approaches based on the four major models of privacy protection. That is, Comprehensive Privacy Laws, Sectoral Privacy Laws, Privacy Self-Regulation, and Technologies of Privacy. These solutions, used individually or without proper system privacy design...
Persistent link: https://www.econbiz.de/10009479423
With the increasing number of proposals and approaches to privacy protection, it has become very difficult to build information systems that provide comprehensive protection for a very broad range of information privacy issues. Proposals to information privacy are normally based on one or a...
Persistent link: https://www.econbiz.de/10009479425