SEARCH RESULTS

YOU WERE LOOKING FOR :Technology and Privacy Rights

Essays 541 - 570

Opposition to Regulating the Internet

Internet should remain unregulated by government. The marketplace should determine what safeguards individual companies should ha...

Individual Protections Offered by the US Constitution's 4th Amendment

when the worst impact of colonial times was taking place and people held no inherent human rights when it came to search and seizu...

Cybercrime, Privacy, and Security

(McCarthy, 2000). In 1995, there were 8,806 arrests for identity fraud, in 1997, that number rose to 9,455 (McCarthy, 2000). The t...

Reasons for Preemployment Testing in the Workplace

success in the marketplace. One employer put it this way: "Even if the candidate has all the skills and is uniquely compatible wit...

Personal Spece Distances

the sidewalk so as not to destroys someones property (Leig, 2011). One of the dangers of excessive territoriality is something t...

Privacy Concerns and Identity Management

place (Johnson & Goetz, 2007). That being said, when implementing an identity management system at Jacket-X, a number of critica...

Example of 1974's Privacy Act

hands of the wrong individuals. Out of the Report of the Secretarys Advisory Committee on Automated Data Systems (commissioned by ...

Online Shopping Analysis of Singapore's NTUC FairPrice Supermarket Website

unless the customer or his/her agent is there to sign for it and make payment (FairPrice, Terms 2002). Third, the Terms and Condi...

Online Retailers, Social and Legal Issues

and regulation (Ramin Communications, 1998). Along these lines, privacy still continues to be a huge social issue when it comes to...

Planning Strategy and Information Technology's Value

are dependent on the efficient use of the higher levels of corporate information available now. Astute organizations are cognizan...

Electronic Data Security and 1996's Health Insurance Portability and Accountability Act

late 1980s and early 1990s placed many in the position of not having health care coverage. Many faced long terms of unemployment,...

Occupational Drug Testing of Employees

have enacted certain laws on their own which sometimes provide for testing in a much wider arena. Consider Idaho as an example. ...

Sports Fans and Advanced Sports Technology's Negative Effects

Americas favorite pastime seen better days. The lure of money is the single most important lure that has allowed advanced t...

Issues of Privacy, Workers, and the Internet

monitored if they arent doing their jobs properly, or are using Internet resources for things other than work-related tasks. Downl...

Controlling Workplace Internet Usage Through Planning

and fundamentals go to balancing conflicting ideas about the use of information. Many employees feel that they should have the rig...

Information Technology's Pyramid Levels

for creating value for the larger organization, providing a "map" of precisely where the organization needs to be going next. ...

Privacy Issues and Email

A paper addressing common privacy issues faced by Internet users. The author discusses e-mail, hacking, and relevant laws. This f...

Daycare Centers and Surveillance Cameras

evolved simultaneously with opportunities for privately accessed public interaction. In general, daycare centers are not conside...

Internet and Privacy Issues

In ten pages this paper examines the Internet and the recent concerns over privacy issues. Fifteen sources are cited in the bibli...

Workplace and the Issue of Employee Privacy

In five pages electronic communication and its effects on employee privacy are discussed. Two sources are cited in the bibliograp...

Convicted Sex Offenders, Privacy Issues, and New Jersey's Megan's Law

In fourteen pages this paper examines Megan's Law in a case law assessment as well as its impact upon the privacy of convicted sex...

John J. Miller's Article 'Private Parts' and US Privacy Issues

In six pages this article is discussed within the context of lost citizen privacy as the result of government surveillance and inf...

Privacy Issues Concerning Intel's Pentium III Processor

In five pages this paper examines the privacy issues involving the Pentium III processor by Intel. Ten sources are cited in the b...

Office Equipment and Computer Misuses and Abuses by Employees

In six pages this research paper examines email and Internet misuses and abuses by employees in the workplace, discussing issues o...

Banking Sector and Technology's Impact

In eight pages the impact of technology on banking is examined in an overview of talking teller machines, biometrics, and issues i...

Case Analysis of Information Systems Management

In five pages this case analysis presents a problem definition regarding privacy invasion through data mining, problem justificati...

Issues of Privacy Associated with Web Browsers

Why are cookies used? Generally, for those of us that access the Internet through a public ISP, each request we make to a web site...

Arguing Against Industry or Business Use of Polygraph Testing

In three pages this paper argues against polygraph testing in the corporate sector as an invasion of employee privacy. Four sourc...

Supreme Court Case of Stenberg v. Carhart and Partial Birth Abortion

In eight pages this paper examines privacy issues with regards to partial birth abortion as addressed by this April 2000 Supreme C...

The Ownership of Information

This 9 page paper examines the question of who owns information, as well as the ethics of using information just because it is ava...