Data Ethical Use and Storage /
With the advent of the Internet, data has become available worldwide at the click of a button-including sensitive personal data. What is the potential for misuse of this information, and can users be sure that sites visited for online shopping, banking, and social networking are storing it safely? T...
Saved in:
Other Authors: | Films for the Humanities & Sciences (Firm), Infobase., Video Education Australasia. |
---|---|
Format: | Video |
Language: | English |
Published: |
New York, N.Y. :
Infobase,
[2012], c2011.
|
Physical Description: |
1 streaming video file (22 min.) : sd., col., digital file.+ instructional materials (online) |
Subjects: |
In Prospector
Similar Items
-
Privacy-preserving data mining : models and algorithms
Published: (2008) -
The state of online consumer privacy hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Twelfth Congress, first session, March 16, 2011
by: United States. Congress. Senate. Committee on Commerce, Science, and Transportation.
Published: (2012) -
Cyber-risk management
by: Refsdal, Atle,
Published: (2015) -
Protecting consumer information : can data breaches be prevented? : hearing before the Subcommittee on Commerce, Manufacturing, and Trade of the Committee on Energy and Commerce, House of Representatives, One Hundred Thirteenth Congress, second session, February 5, 2014
by: United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Manufacturing, and Trade,
Published: (2015) -
Digital forensics and cyber crime : 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings
Published: (2018)