1
by Lynn, Theo.
Published 2020
Format:
Table of Contents: ....2 An Overview of Ethics and Ethical Theories for Analysis of Cloud Computing -- 6.3 Ethics and Cloud Computing...
Click to View
2
by Knijnenburg, Bart P.
Published 2022
Format:
Table of Contents: ... -- 1.2 What Is Privacy? -- 1.3 Privacy Theory and Methods -- 1.4 Domains -- 1.5 Audiences -- 1.6 Moving...
Click to View
3
by Hüttl, Reinhard F.
Published 2015
Format:
Table of Contents: ... Governance: A Systemic Approach -- 6.1 Introduction -- 6.2 System Theory Revisited -- 6.3 The Governance...
Click to View
4
by Li, Hui.
Published 2021
Format:
Table of Contents: ....3.2 Opposing the Theory of Negating Sovereignty in Cyberspace -- 2.3.3 Peace and Stability in Cyberspace -- 2...
Click to View
5
by Christen, Markus.
Published 2020
Format:
Table of Contents: ...-Based Theories -- 4.5.4 Contractualism and Risk -- 4.6 Contextual Integrity -- 4.7 Conclusions...
Click to View
6
by Grösser, Stefan N.
Published 2017
Format:
Table of Contents: ... by Changes in Regulations -- 2.6 Challenge 6: Business Modelling Simulation and Innovation -- 2.7 Challenge 7...
Click to View