SEARCH RESULTS

YOU WERE LOOKING FOR :Privacy and Technology

Essays 331 - 360

Internet Information Basics

In a paper consisting of ten pages the ways in which the Internet can be used are examined with its historical development first c...

Historical Perspectives on the Right to Privacy Concept

This paper examines the 'right to privacy' concept from an historical perspective with contemporary techniques of surveillance and...

Arizona, the U.S., and Privacy Issues

In five pages this paper examines the U.S. as a whole and then focuses on Arizona in a consideration of such privacy issues as pri...

Privacy and Ethical Issues Associated with the Internet

In six pages this paper discusses the various issues of ethics and privacy that are associated with the advent of the Internet. T...

Differences Between Privacy, Identity, and Status in China and England

In twelve pages these nations are compared and contrasted in terms of the status, identity, and privacy issues of each along with ...

Case Analysis of Information Systems Management

In five pages this case analysis presents a problem definition regarding privacy invasion through data mining, problem justificati...

Issues of Privacy Associated with Web Browsers

Why are cookies used? Generally, for those of us that access the Internet through a public ISP, each request we make to a web site...

Supreme Court Case of Stenberg v. Carhart and Partial Birth Abortion

In eight pages this paper examines privacy issues with regards to partial birth abortion as addressed by this April 2000 Supreme C...

Arguing Against Industry or Business Use of Polygraph Testing

In three pages this paper argues against polygraph testing in the corporate sector as an invasion of employee privacy. Four sourc...

Advantages and Disadvantages of Online Pharmacies

In eight pages this paper discusses Internet pharmacies in a consideration of advantages and disadvantages which includes privacy ...

Constitutional Rights v. Internet Privacy

Current Issues & The Conflicts Involved In terms of time, the Internet is basically still in its infancy. Its origin can be trac...

The Ownership of Information

This 9 page paper examines the question of who owns information, as well as the ethics of using information just because it is ava...

THE WORKPLACE AND BREASTFEEDING

of choice and need are pitted against each other in the debate over breastfeeding in the workplace, the winner has historically fa...

Why Surveillance Is Good

that suitable frameworks to prevent, or detect and stop abuses cannot be put into place, just as they have in the past with older ...

Electronic Medical Records - Business Incentives and Ethical Concerns

information flows between healthcare facilities; the bottom line is that legislation will have to be concerned not simply with pro...

Electronic Medical Records: An Overview of Benefits

records, highlighting the capacity for such a change to have a sweeping impact throughout the industry. For example, in the 2009 "...

Privacy Concerns and Information System Usage

them out, which is not conducive to a desirable outcome. With such a policy in place, the issue is less personal. If no properly w...

Healthcare Information Systems and Privacy Concerns

patients prior medical data no matter where that patient was treated. This way a doctor will be able to get a comprehensive view o...

Health Agencies and Regulation

and enforcer, taking on issues that are deemed to be in the public interest, but are not provided through other market mechanisms....

Cyber-Crime Prevention: The Ethical Considerations

consumers or clients, or even contractually confidential information in some cases) is compromised, then it could mean the total d...

Criminal Surveillance: Pros and Cons

casual downtown shopping trip; they feel this constitutes an invasion of their privacy. For instance, the House Majority Leader at...

Employee Rights and Organizational Security

be addressed, such that best practices can be established in order to balance the needs of employers with the rights of employees,...

Personal Privacy Issue and Data Processing

also whether or not he or she has ever been cited for any speeding or traffic violations (The Feds are Following You, 2000). Any ...

Hiring Process and Why Transcripts from High School Should Not be Used

they are minors, unaware of the ramifications of their actions and are likely to make mistakes. Most children at one time or anot...

Basic Human Rights Undermined by the Human Rights Act of 1998's Margin of Appreciation

may be seen as conflicting. However, the effectiveness of the Act given by the margin of appreciation may be argued to undermine t...

American Privacy and its Post 911 Erosion

drugs, there are other reasons that this is occurring. Since the terrorist attacks on September 11, 2001, many citizens have willi...

Internet and Ethical Issues

In eight pages the Internet and the ethical concerns associated with it including 'cyberslacking,' identity theft, and privacy iss...

Privacy Protection and Labor Relations

as the information was already in the public domain from other readily usable sources (AFT, 2002). Therefore, here, although the e...

Privacy Bill and Sen. Jackie Speier

bill would enact the Financial Information Privacy Act of 2002, which would require a financial institution , as defined, to provi...

Workplace Communication and E-Mail

23). Because there is a blurring of the boundaries that exist between that which is personal and that which is totally related to ...