Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is GCF Computing

Encyclopedia of Information Science and Technology, Fourth Edition
Slow Tech is not a technology that is slow but a movement that parallels with the same concept of the Slow Food movement. Slow Food International claimed in 1989 that the Slow Food Movement was set up to “counter the rises of fast food and fast life”: to strive for good food (food that tastes good, is a pleasure to eat and selected according to its quality), clean food (food that is produced by such a process that respects the environment and should promote biodiversity and sustainability), and fair food (food that is cultivated and produced by ways that must respect the farmers). GCF Computing (Good Computing, Clean Computing, Fair Computing) was proposed and defined following the Slow Tech concept (Patrignani & Whitehouse, 2014).
Published in Chapter:
Hexa-Dimension Code of Practice for Data Privacy Protection
Wanbil William Lee (The Computer Ethics Society, Hong Kong & Wanbil & Associates, Hong Kong)
Copyright: © 2018 |Pages: 11
DOI: 10.4018/978-1-5225-2255-3.ch425
Abstract
Cyberspace inhabitants live under threat of a complex data privacy protection problem in a technology-dependent information-intensive phenomenon grown out of a vicious circle. The front-line Information security professionals are among the first to bear the brunt and are in dire need of guidance for enforcing effectively the policies and standards and mitigating the adverse consequences of data privacy breaches since the policy statements are invariably dated due to the rapid advances of the technology, limited to cope with techno-socio threats, inadequate to deal with the well-equipped and cunning cybercriminals, and vague and less than user-friendly, or simply difficult to absorb and follow. A framework that comprises the newly developed hexa-dimension code of practice based on the 6-dimension metric (represented by the LESTEF model) and an operationalization scheme are proposed, where the code in which the gist of the adopted policies is incorporated promises to be a handy reference or a quick guide capable of alleviating the information security staff's burden.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR