Lotus Marketplace
__NOTOC__ Lotus Marketplace was a database program developed jointly by Lotus Development Corporation (as the software developer) and Equifax (as the information provider), announced on April 10, 1990, but cancelled shortly after on January 23, 1991, mainly due to massive protests and lawsuit threats, citing invasion of privacy. This program was rather large (even by today's standards), as it was supposed to be released on several CD-ROMs. ''Lotus Marketplace'' was to be released in two editions, ''Lotus Marketplace: Business'' (containing information about businesses) and ''Lotus Marketplace: Households'' (containing information about peoples and households). The ''Business'' edition of this program contained information about 7 million businesses in the United States, just like Yellow Pages, but could quickly and flexibly be searched. Unlike the ''Households'' edition, this edition was not so controversial and was released in October 1990, but was cancelled along with the ''Hou ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Database
In computing, a database is an organized collection of data stored and accessed electronically. Small databases can be stored on a file system, while large databases are hosted on computer clusters or cloud storage. The design of databases spans formal techniques and practical considerations, including data modeling, efficient data representation and storage, query languages, security and privacy of sensitive data, and distributed computing issues, including supporting concurrent access and fault tolerance. A database management system (DBMS) is the software that interacts with end users, applications, and the database itself to capture and analyze the data. The DBMS software additionally encompasses the core facilities provided to administer the database. The sum total of the database, the DBMS and the associated applications can be referred to as a database system. Often the term "database" is also used loosely to refer to any of the DBMS, the database system or an appli ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Customer Privacy
Consumer privacy is information privacy as it relates to the consumers of products and services. A variety of social, legal and political issues arise from the interaction of the public's potential expectation of privacy and the collection and dissemination of data by businesses or merchants. Consumer privacy concerns date back to the first commercial couriers and bankers who enforced strong measures to protect customer privacy. In modern times, the ethical codes of various professions specify measures to protect customer privacy, including medical privacy and client confidentiality. State interests include matters of national security. Consumer concerned about the invasion of individual information, thus doubtful when thinking about using certain services. Many organizations have a competitive incentive to collect, retain, and use customer data for various purposes, and many companies adopt security engineering measures to control this data and manage customer expectations ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Lance Hoffman
Lance J. Hoffman is Emeritus Professor of Computer Science at The George Washington University (GW) in Washington, DC. He initiated and taught the first course on computer security in a regular accredited degree program in the United States at the University of California, Berkeley in 1970 and established the computer security program there and at GW and led GW’s to national recognition as a Center of Academic Excellence in Information Assurance Education. He is the author or editor of numerous articles and five books on computer security and privacy. His teaching innovations also include multidisciplinary courses on electronic commerce and network security and the development of a portable educational network for teaching computer security. He also directed the National Science Foundation computer security scholarship programs ("CyberCorps") at GW. A Fellow of the Association for Computing Machinery, Dr. Hoffman has served on a number of Advisory Committees including tho ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Technology Review
''MIT Technology Review'' is a bimonthly magazine wholly owned by the Massachusetts Institute of Technology, and editorially independent of the university. It was founded in 1899 as ''The Technology Review'', and was re-launched without "The" in its name on April 23, 1998 under then publisher R. Bruce Journey. In September 2005, it was changed, under its then editor-in-chief and publisher, Jason Pontin, to a form resembling the historical magazine. Before the 1998 re-launch, the editor stated that "nothing will be left of the old magazine except the name." It was therefore necessary to distinguish between the modern and the historical ''Technology Review''. The historical magazine had been published by the MIT Alumni Association, was more closely aligned with the interests of MIT alumni, and had a more intellectual tone and much smaller public circulation. The magazine, billed from 1998 to 2005 as "MIT's Magazine of Innovation," and from 2005 onwards as simply "published by MIT ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Telemarketing
Telemarketing (sometimes known as inside sales, or telesales in the UK and Ireland) is a method of direct marketing in which a salesperson solicits prospective customers to buy products or services, either over the phone or through a subsequent face to face or web conferencing appointment scheduled during the call. Telemarketing can also include recorded sales pitches programmed to be played over the phone via automatic dialing. Telemarketing is defined as contacting, qualifying, and canvassing prospective customers using telecommunications devices such as telephone, fax, and internet. It does not include direct mail marketing. History The term ''telemarketing'' was first used extensively in the late 1970s to describe Bell System communications which related to new uses for the outbound WATS and inbound Toll-free services. Telephonists The rise of telemarketing can be traced back to the 19th century telephonists, or switchboard operators. Trans-cultural hiring of swi ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Computer Ethics
Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct. Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into three primary influences: # The individual's own personal code">thical/nowiki> code. # Any informal code of ethical conduct that exists in the work place. # Exposure to formal codes of ethics. Foundation Computer ethics was first coined by Walter Maner, a professor at Bowling Green State University. Maner noticed ethical concerns that were brought up during his Medical Ethics course at Old Dominion University became more complex and difficult when the use of technology and computers became involved. The conceptual foundations of computer ethics are investigated by information ethics, a branch of philosophical ethics promoted, a ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Data Privacy
Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data privacy or data protection. Data privacy is challenging since attempts to use data while protecting an individual's privacy preferences and personally identifiable information. The fields of computer security, data security, and information security all design and use software, hardware, and human resources to address this issue. Authorities Laws Authorities by country Information types Various types of personal information often come under privacy concerns. Cable television This describes the ability to control what information one reveals about oneself over cable television, and who can access that information. For example, third parties can track IP TV programs someone has watched at any given time. "The addition of any infor ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Customer Privacy
Consumer privacy is information privacy as it relates to the consumers of products and services. A variety of social, legal and political issues arise from the interaction of the public's potential expectation of privacy and the collection and dissemination of data by businesses or merchants. Consumer privacy concerns date back to the first commercial couriers and bankers who enforced strong measures to protect customer privacy. In modern times, the ethical codes of various professions specify measures to protect customer privacy, including medical privacy and client confidentiality. State interests include matters of national security. Consumer concerned about the invasion of individual information, thus doubtful when thinking about using certain services. Many organizations have a competitive incentive to collect, retain, and use customer data for various purposes, and many companies adopt security engineering measures to control this data and manage customer expectations ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of appropriate use and protection of information. Privacy may also take the form of bodily integrity. The right not to be subjected to unsanctioned invasions of privacy by the government, corporations, or individuals is part of many countries' privacy laws, and in some cases, constitutions. The concept of universal individual privacy is a modern concept primarily associated with Western culture, particularly British and North American, and remained virtually unknown in some cultures until recent times. Now, most cultures recognize the ability of individuals to withhold certain parts of personal information from wider society. With the rise of technology, the debate regarding privacy has shifted from a bodily sense to a digital sense. As the ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Internet Activism
Internet activism is the use of electronic communication technologies such as social media, e-mail, and podcasts for various forms of activism to enable faster and more effective communication by citizen movements, the delivery of particular information to large and specific audiences as well as coordination. Internet technologies are used for cause-related fundraising, community building, lobbying, and organizing. A digital activism campaign is "an organized public effort, making collective claims on a target authority, in which civic initiators or supporters use digital media." Research has started to address specifically how activist/advocacy groups in the U.S. and Canada are using social media to achieve digital activism objectives. Types Within online activism Sandor Vegh distinguished three principal categories: active/reactive, mobilizing and awareness raising-based. There are other ways of classifying Internet activism, such as by the degree of reliance on the Interne ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Usenet Newsgroup
A Usenet newsgroup is a repository usually within the Usenet system, for messages posted from users in different locations using the Internet. They are discussion groups and are not devoted to publishing news. Newsgroups are technically distinct from, but functionally similar to, discussion forums on the World Wide Web. Newsreader software is used to read the content of newsgroups. Before the adoption of the World Wide Web, Usenet newsgroups were among the most popular Internet services, and have retained their noncommercial nature in contrast to the increasingly ad-laden web. In recent years, this form of open discussion on the Internet has lost considerable ground to individually-operated browser-accessible forums and big media social networks such as Facebook and Twitter. Communication is facilitated by the Network News Transfer Protocol (NNTP) which allows connection to Usenet servers and data transfer over the internet. Similar to another early (yet still used) pro ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Distribution List
A distribution list is an application of email client programs that allows a user to maintain a list of email addresses and send messages to all of them at once. This can be referred to as an ''electronic mailshot''. Sending mail using a distribution list differs from an electronic mailing list or the email option found in an Internet forum as it is usually for one-way traffic and not for coordinating a discussion. A distribution list is an email equivalent of a postal mailing list A mailing list is a collection of names and addresses used by an individual or an organization to send material to multiple recipients. The term is often extended to include the people subscribed to such a list, so the group of subscribers is re .... Can also be called "Distro" Email {{Computing-stub ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |