Stock market network reveals investor clustering

(PhysOrg.com) -- The stock price of a company continuously changes, going up or down depending on the collective activity of a large number of investors. Although this process seems fairly straightforward, no one fully understands ...

Quantum eavesdropper steals quantum keys

(PhysOrg.com) -- In quantum cryptography, scientists use quantum mechanical effects to encrypt and then communicate confidential information. Although quantum cryptography codes are unbreakable in principle, even the best ...

Google asks to publish more US gov't information (Update)

Google is asking the Obama administration for permission to disclose more details about the U.S. government's demands for email and other personal information transmitted online in an effort to distance itself from an Internet ...

Interpol swoop nets 25 suspected 'Anonymous' hackers

Interpol has arrested 25 suspected members of the 'Anonymous' hackers group in a swoop covering more than a dozen cities in Europe and Latin America, the global police body said Tuesday.

Flaw found in securing online transactions

Researchers on Wednesday revealed a flaw in the way data is scrambled to protect the privacy of online banking, shopping and other kinds of sensitive exchanges.

Protecting confidential data with math

Statistical databases (SDBs) are collections of data that are used to gather and analyze information from a variety of sources. The data may be derived from sales transactions, customer files, voter registrations, medical ...

page 1 from 10

Confidentiality

Confidentiality is an ethical principle associated with several professions (e.g., medicine, law). In ethics, and (in some places) in law and alternative forms of legal resolution such as mediation, some types of communication between a person and one of these professionals are "privileged" and may not be discussed or divulged to third parties.

Confidentiality of information, enforced in an adaptation of the military's classic "need to know" principle, forms the cornerstone of information security in today's corporations. The so called 'confidentiality bubble' restricts information flows, with both positive and negative consequences.

This text uses material from Wikipedia, licensed under CC BY-SA