Data Mining of Email Traffic Patterns D 6:08:00 AM Add Comment E-mail traffic is one of the main target of intelligence surveillance to detect terrorist and other malicious activities. Its rather easy a... Read More
Using Technology to Combat Terrorism D 5:58:00 AM Add Comment Here's a special report that analyzes how the Internet can facilitate terrorist operations - http://www.usip.org/pubs/specialreports/sr... Read More
Student's Free Speech Rights? D 5:51:00 AM Add Comment Children's legitimate free speech as applicable to them should not be barred in any case. I have little support for the free speech adv... Read More
Filtering Harmful Material in Chatrooms, Blogs and Social Networks D 5:11:00 AM Add Comment I don't think there is any explicit filtering technology available that can completely avoid harmful material from chartroom, social ne... Read More
Dealing With Legislation on Spyware D 5:07:00 AM Add Comment Spyware is an explicit program that is written with the intention of collecting and using personal info, illegally. Of course its one other... Read More