Videos

Published on December 5th, 2019 📆 | 3854 Views ⚑

0

Privacy and Security Ethics


iSpeech


Jonathan Almanza
Florida International University
CGS 3095 RVC Online – Spring 2019

References;
[1] Sadowski, J. (2016, August 31). Companies are making money from our personal data – but at what cost? Retrieved from https://www.theguardian.com/technology/2016/aug/31/personal-data-corporate-use-google-amazon.

[2] Kerry, C. F. (2019, October 25). Why protecting privacy is a losing game today-and how to change the game. Retrieved from https://www.brookings.edu/research/why-protecting-privacy-is-a-losing-game-today-and-how-to-change-the-game/.

[3] Vodhanel, Michael Thomas. (2011). Problems in GPS Accuracy. CGU Theses & Dissertations, 22. https://scholarship.claremont.edu/cgu_etd/22. doi: 10.5642/cguetd/22

[4] Osborne, C. (2019, September 12). Most consumers will refuse to work with enterprises that won't keep their data secure. Retrieved from https://www.zdnet.com/article/majority-of-consumers-will-not-work-with-an-enterprise-firm-that-wont-keep-their-data-secure/.

[5] Kagan, J. (2019, April 20). PCI Compliance. Retrieved from https://www.investopedia.com/terms/p/pci-compliance.asp.

[6] Guerin, L., & J.d. (2012, March 12). Email Monitoring: Can Your Employer Read Your Messages? Retrieved from https://www.nolo.com/legal-encyclopedia/email-monitoring-can-employer-read-30088.html.





[7] What is the Relationship Between HITECH, HIPAA, and Electronic Health and Medical Records? (2018, April 2). Retrieved from https://www.hipaajournal.com/relationship-between-hitech-hipaa-electronic-health-medical-records/.

[8] Chabinsky, S., & Pittman, F. P. (2019, March 7). Data Protection 2019: Laws and Regulations: USA: ICLG. Retrieved from https://iclg.com/practice-areas/data-protection-laws-and-regulations/usa.

[9] What is a Privacy Policy & Why it's Important to Have it on Your Site. (2017, March 9). Retrieved from https://www.websitepolicies.com/blog/what-is-privacy-policy.

[10] Mushtaq, A. (2019, April 16). We Need More Than Employee Training Against Phishing - ITSPmagazine ITSPmagazine: At the Intersection of Technology, Cybersecurity, and Society. Retrieved from https://www.itspmagazine.com/from-the-newsroom/we-need-more-than-employee-training-against-phishing.

[11] Standards to Facilitate Data Sharing and Use of Surveillance Data for Public Health Action. (2014, March 5). Retrieved from https://www.cdc.gov/nchhstp/programintegration/sc-standards.htm.

[12] Morris, T. (2019, April 25). Maintaining Control of Your Social Media Profiles: A Guide for Small Business Owners. Retrieved from https://www.mpdventures.com/maintaining-control-of-your-social-media-profiles-a-guide-for-small-business-owners/.
source

Tagged with:



Comments are closed.