Should The United States Increase The Number of H-1B Visas And Greencards? D 7:21:00 AM Add Comment The basic point underlying the issues is that U.S. has an immense shortage of highly skilled labor ever year and the current percentage of ... Read More
Cyberlaw Enforcement D 7:15:00 AM Add Comment I appreciate the study conducted by UCSD that it provides some striking insights into operation of scam engines and their origin stations.... Read More
Phishing D 7:11:00 AM Add Comment Antiphishing.org links us to various useful means to counter phishing. skimming through the website, here are two things that interested me... Read More
Importance of Global Cyber Crime Policies D 7:07:00 AM Add Comment Cyber-Crime and its big brother - "Cyber-warfare", have so conquered the ever expanding and versatile cyberspace that we need to ... Read More
Data Mining and USA Patriot Act D 6:19:00 AM Add Comment I think its the USA PATRIOT Act that gives the right to do this kind of data mining. This actually amended a handful of other Acts such as... Read More
Data Mining of Email Traffic Patterns D 6:08:00 AM Add Comment E-mail traffic is one of the main target of intelligence surveillance to detect terrorist and other malicious activities. Its rather easy a... Read More
Using Technology to Combat Terrorism D 5:58:00 AM Add Comment Here's a special report that analyzes how the Internet can facilitate terrorist operations - http://www.usip.org/pubs/specialreports/sr... Read More
Student's Free Speech Rights? D 5:51:00 AM Add Comment Children's legitimate free speech as applicable to them should not be barred in any case. I have little support for the free speech adv... Read More
Filtering Harmful Material in Chatrooms, Blogs and Social Networks D 5:11:00 AM Add Comment I don't think there is any explicit filtering technology available that can completely avoid harmful material from chartroom, social ne... Read More
Dealing With Legislation on Spyware D 5:07:00 AM Add Comment Spyware is an explicit program that is written with the intention of collecting and using personal info, illegally. Of course its one other... Read More
Using Spyware for Digital Rights Management D 5:06:00 AM Add Comment Not at all. Firstly there is no relation between the terminology (Spyware) and what the DRM is intended to do. Something which is Spyware i... Read More
Using Spyware To Monitor Bad Behavior D 5:00:00 AM Add Comment Interesting topic isn't it! Usage of Spyware by itself should be made illegal in any case, as it invades privacy. Should a software is ... Read More
How to Avoid Spyware On The Computer? D 5:48:00 PM Add Comment Some tips will be - 1. Make a point that one would not visit web sites such as mass advertising web sites as they are usually infectious ... Read More
Advice For Improved Education System D 5:44:00 PM Add Comment The educational system should revise the curriculum according to the current technology demands in the society and to build creativity of s... Read More
Effective Direction of Technology in Schools D 5:38:00 PM Add Comment What can be learned from educational experiences where all students in certain school districts have been given computers? The lesson lea... Read More
Reducing Digital Divide D 6:43:00 PM Add Comment I think OLPC program is making a sincere effort with a clear vision from Negroponte. The idea is that it is not the only means to get rid o... Read More
Funding a Social Impacts Research D 6:30:00 PM Add Comment Should funding be available for social impacts research when it is not likely to lead to new innovations? I think we should encourage fun... Read More
Controlling but Being Open Source D 6:28:00 PM Add Comment Is there a need for languages (like Java/ActiveX) where a corporation controls the standard but can only modify it in public? Java (SunMi... Read More
The Free Open Band Spectrum D 6:27:00 PM Add Comment What protections should the public have regarding access to broadband networks for reception and/or transmission? 700 Mhz band is being d... Read More
Controlling The Network D 6:25:00 PM Add Comment Should carriers have the freedom through contracts and licenses to shape how their networks will be used? Again this is an instance of pr... Read More