Descriptor
Computer Networks | 3 |
Information Networks | 3 |
Privacy | 3 |
Ethics | 2 |
Access to Computers | 1 |
Algorithms | 1 |
Civil Liberties | 1 |
Coding | 1 |
Computer Mediated… | 1 |
Computer Software | 1 |
Definitions | 1 |
More ▼ |
Source
Internet Research | 3 |
Author
Claessens, Joris | 1 |
Diamond, Ted | 1 |
Diaz, Claudia | 1 |
Dumortier, Jos | 1 |
Goemans, Caroline | 1 |
Jones, Robert Alun | 1 |
Preneel, Bart | 1 |
Vandewalle, Joos | 1 |
Publication Type
Journal Articles | 3 |
Opinion Papers | 2 |
Reports - Descriptive | 2 |
Reports - Research | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Jones, Robert Alun – Internet Research, 1994
Notes that research on the use of networked information resources, like any kind of social science involving the study of human subjects, raises ethical questions. The tension between traditional research guidelines and new technologies is discussed; public/private distinctions and informed consent are addressed; and possible solutions are…
Descriptors: Computer Networks, Definitions, Ethics, Guidelines

Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos – Internet Research, 2003
Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…
Descriptors: Access to Computers, Computer Mediated Communication, Computer Networks, Information Networks

Diamond, Ted – Internet Research, 1994
The federal Escrowed Encryption Standard (EES) has been opposed by civil liberties advocates and the computer industry. The author argues that the standard does not threaten privacy as long as its use remains voluntary, alternative forms of encryption are allowed, and the power of government to intercept transmission is kept in check. (20…
Descriptors: Algorithms, Civil Liberties, Coding, Computer Networks