-
3
-
-
0000320829
-
The right to privacy
-
Samuel Warren and Louis Brandeis, “The Right To Privacy,” Harvard Law Review, 4, no. 193 (1890). www.english.illinois.edu/-people-/faculty/debaron/582/582%20readings/right%20to%20privacy.pdf
-
(1890)
Harvard Law Review
, vol.193
, pp. 4
-
-
Warren, S.1
Brandeis, L.2
-
4
-
-
84954577171
-
-
David Golinkin, Schechter Institute of Jewish Studies
-
David Golinkin, “The Right to Privacy in Judaism,” David Golinkin, Schechter Institute of Jewish Studies, http://www.myjewishlearning.com/practices/Ethics/Business_Ethics/Contemporary_Issues/Privacy/A_Responsum.shtml.
-
The Right to Privacy in Judaism
-
-
Golinkin, D.1
-
6
-
-
84954599369
-
Information privacy and data protection a proposed model for the kingdom of saudi arabia
-
Abdul Raman Saad
-
Abdul Raman Saad, “Information Privacy and Data Protection A Proposed Model for the Kingdom Of Saudi Arabia,” Abdul Raman Saad, Abdul Raman Saad & Associates, Malaysia, 1981, page 29.
-
(1981)
Abdul Raman Saad & Associates, Malaysia
-
-
Saad, A.R.1
-
7
-
-
85025599614
-
-
Libreria Editrice Vaticana, Citta del Vaticano
-
Abdul Raman Saad, Catechism of the Catholic Church, Libreria Editrice Vaticana, Citta del Vaticano, http://www.vatican.va/archive/ENG0015/_INDEX.HTM, 1993.
-
(1993)
-
-
Saad, A.R.1
-
8
-
-
84954574394
-
-
September
-
Organisation for Economic Cooperation and Development (OECD), “OECD Guidelines on theProtection of Privacy and Transborder Flows of Personal Data” (September 23, 1980). www.oecd.org/internet/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm.
-
(1980)
OECD Guidelines on The
, vol.23
-
-
-
12
-
-
85025602448
-
-
“DAMA-DMBOK Guide (Data Management Body of Knowledge) Introduction & Project Status.” www.dama.org/files/public/DI_DAMA_DMBOK_Guide_Presentation_2007.pdf.
-
-
-
-
14
-
-
84954617197
-
-
32nd International Conference of Data Protection and Privacy
-
Resolution on Privacy by Design, 32nd International Conference of Data Protection and Privacy Commissioners, Jerusalem, Israel. www.justice.gov.il/NR/rdonlyres/F8A79347-170C-4EEFA0AD-155554558A5F/26502/ResolutiononPrivacybyDesign.pdf.
-
-
-
-
15
-
-
85025641537
-
-
Privacy by Design
-
Foundational Principles, Privacy by Design. www.privacybydesign.ca/index.php/about-pbd/7-foundational-principles/.
-
-
-
-
16
-
-
84954612043
-
-
Guidelines on the Protection of Privacy and Transborder Flows of Personal Data
-
OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data are available at www.oecd.org/document/18/0,3343, en_2649_201185_1815186_1_1_1_1,00.html.
-
-
-
-
17
-
-
84954596920
-
-
along with additional information about the development and additional privacy resources
-
Generally Accepted Privacy Principles (GAPP), along with additional information about the development and additional privacy resources, can be found at www.aicpa.org/privacy.
-
-
-
-
18
-
-
85025673819
-
-
European Union’s Directive on Data Protection is available at http://ec.europa.eu/justice_home/fsj/privacy/index_en.htm.
-
-
-
-
19
-
-
85025628244
-
-
Fluxx is a product from Looney Labs, at local retailers
-
Looney Labs, Fluxx is a product from Looney Labs, available online at www.looneylabs.com/games/fluxx. or at local retailers.
-
-
-
-
22
-
-
85025642219
-
-
“Manifesto for Agile Software Development” at Agilemanifesto.org.
-
-
-
-
23
-
-
85025628937
-
-
“Use Cases vs. User Stories in Agile Development” and the links within this article at www.boost.co.nz/blog/agile/use-cases-or-user-stories/.
-
-
-
-
25
-
-
85025681363
-
-
“Agile Model Driven Development: The Key to Scaling Agile Software Development” at www.agilemodeling.com/essays/amdd.htm.
-
-
-
-
26
-
-
85025664184
-
-
“Is Design Dead?” at http://martinfowler.com/articles/designDead.html.
-
-
-
-
27
-
-
85025585551
-
-
“Modeling in an Agile World” at www.nyu.edu/classes/jcf/CSCI-GA.2440-001/handouts/modellinginanagileworld.pdf.
-
-
-
-
29
-
-
0042515237
-
-
F. McFadden and J. Hoffer, Benjamin Cummings Publishing
-
F. McFadden and J. Hoffer, Data Base Managementby F. McFadden and J. Hoffer (Benjamin Cummings Publishing, 1985), pp 272-299.
-
(1985)
Data Base Management
, pp. 272-299
-
-
McFadden, F.1
Hoffer, J.2
-
30
-
-
85025589023
-
The bottom line: Data-oriented deliverables
-
T. R. Finneran, Auerbach Press
-
T. R. Finneran, “The Bottom Line: Data-oriented Deliverables,” by T. R. Finneran, in Handbook of Data Management(Auerbach Press, 1993), pp 289-298.
-
(1993)
Handbook of Data Management
, pp. 289-298
-
-
Finneran, T.R.1
-
31
-
-
84954594495
-
-
November
-
“What They Know” (November 25, 2013). Wall Street Journal. Retrieved from http://blogs.wsj.com/wtk/.
-
(2013)
, vol.25
-
-
-
32
-
-
84954620643
-
Why mobile apps need to have privacy policies
-
August
-
I. Mosquera (August 27, 2011). “Why Mobile Apps Need to Have Privacy Policies.” VentureBeat. Retrieved from http://venturebeat.com/2011/08/27/why-mobile-apps-need-to-haveprivacy-policies/.
-
(2011)
Venturebeat
, vol.27
-
-
Mosquera, I.1
-
33
-
-
84954594905
-
-
Ver. 1.0, March, OASIS Committee Specification Draft
-
Privacy Management Reference Model and Methodology (PMRM), Ver. 1.0, March 2012, OASIS Committee Specification Draft. Retrieved from http://docs.oasis-open.org/pmrm/PMRM/v1.0/csd01/PMRM-v1.0-csd01.pdf.
-
(2012)
-
-
-
34
-
-
85025641594
-
-
OASIS Privacy by Design Documentation Technical Committee (PbD-SE) Charter. Retrieved from www.oasis-open.org/committees/pbd-se/charter.php.
-
-
-
-
35
-
-
85025614912
-
-
1621-1695, Fables as quoted in L. D Eigen and J. P Siegel, AMACOM
-
Jean de La Fontaine, 1621-1695, Fables as quoted in L. D Eigen and J. P Siegel, The Manager’s Book of Quotations(AMACOM, 1991).
-
(1991)
The Manager’s Book of Quotations
-
-
De La Fontaine, J.1
-
36
-
-
0003407933
-
-
Addison-Wesley Publishing Company
-
F. B. Brooks, Jr., The Mythical Man-Month(Addison-Wesley Publishing Company, 1975), p. 14.
-
(1975)
The Mythical Man-Month
-
-
Brooks, F.B.1
-
37
-
-
0001134191
-
A framework for information systems architecture
-
Boston: Auerbach Publications, Warren Gorham Lamont
-
J. A. Zachman, “A Framework for Information Systems Architecture,” in Handbook of Data Management(Boston: Auerbach Publications, Warren Gorham Lamont, 1993), pp 3-22.
-
(1993)
Handbook of Data Management
, pp. 3-22
-
-
Zachman, J.A.1
-
39
-
-
84954586479
-
-
Steve Kenny–Privacy Advisors
-
Steve Kenny–Privacy Advisors, “An Introduction to Privacy Enabling Technology” by Steve Kenny–Privacy Advisors, at https://www.privacyassociation.org/publications/2008_05_introduction_to_privacy_enhancing_technologies.
-
An Introduction to Privacy Enabling Technology
-
-
-
46
-
-
84954619526
-
-
Version 3.2
-
Microsoft Corporation. Microsoft Security Development Lifecycle (SDL), Version 3.2. 2012. www.microsoft.com/en-us/download/details.aspx?id=24308.
-
(2012)
-
-
-
47
-
-
85025671466
-
-
InfoWorld report on Vision Critical study, “Young employees say BYOD a ‘right’ not ‘privilege.’” www.infoworld.com/d/consumerization-of-it/young-employees-say-byod-right-notprivilege-195901.
-
Young Employees Say BYOD a ‘right’ Not ‘privilege
-
-
-
50
-
-
84954617834
-
-
July
-
FFIEC Information Security IT Examination Standards; July, 2006, page 4.
-
(2006)
-
-
-
52
-
-
85025668176
-
-
“Ponemon study shows the cost of a data breach continues to increase.” www.ponemon.org/news-2/23.
-
-
-
-
53
-
-
85025614512
-
-
“Predicting the unpredictable: Detecting chaos in mathematical equations.” www.mit.edu/newsoffice/1998/chaos.html.
-
-
-
-
55
-
-
77955132180
-
-
Commencement Speech to Kenyon College class of 2005 written by David Foster Wallace
-
David Foster Wallace, “This is Water”, Commencement Speech to Kenyon College class of 2005 written by David Foster Wallace.
-
This is Water
-
-
Wallace, D.F.1
-
56
-
-
84954573394
-
-
Case Summary 2009-008
-
Canadian PIPEDA Case Summary 2009-008 at www.priv.gc.ca/cf-dc/2009/2009_008_0716_e.asp.
-
-
-
-
57
-
-
84954579136
-
-
Julie Layton, May
-
Julie Layton, “How Pandora Radio Works,” Julie Layton, May 23, 2006. http://computer.howstuffworks.com/internet/basics/pandora.htm.
-
(2006)
How Pandora Radio Works
, vol.23
-
-
Layton, J.1
-
58
-
-
84861981327
-
-
Danah Boyd and Alice Marwick, September
-
Danah Boyd and Alice Marwick, “Social Privacy in Networked Publics: Teens’ Attitudes, Practices, and Strategies,” Danah Boyd and Alice Marwick, September 2011. www.danah.org/papers/2011/SocialPrivacyPLSC-Draft.pdf.
-
(2011)
Social Privacy in Networked Publics: Teens’ Attitudes, Practices, and Strategies
-
-
Boyd, D.1
Marwick, A.2
|