As a Director of Security for your organization, what policies or plans could you implement that might help control or diminish personal In...
Read More
Translate
Showing posts with label Internet Usage. Show all posts
Information Architecture and Web Site Concept
XYZ Company Web Site Concept Draft “Becoming industry’s premier outsourcing solution for managed care services” Overview For the pas...
Read More
Maintaining Open and Transparent Government
There is great effect of privacy / individual rights on true e-Government implementations. As always, the core goals of e-Governance initia...
Read More
Cyberlaw Enforcement
I appreciate the study conducted by UCSD that it provides some striking insights into operation of scam engines and their origin stations....
Read More
Phishing
Antiphishing.org links us to various useful means to counter phishing. skimming through the website, here are two things that interested me...
Read More
Importance of Global Cyber Crime Policies
Cyber-Crime and its big brother - "Cyber-warfare", have so conquered the ever expanding and versatile cyberspace that we need to ...
Read More
Data Mining and USA Patriot Act
I think its the USA PATRIOT Act that gives the right to do this kind of data mining. This actually amended a handful of other Acts such as...
Read More
Data Mining of Email Traffic Patterns
E-mail traffic is one of the main target of intelligence surveillance to detect terrorist and other malicious activities. Its rather easy a...
Read More
Wiretapping of US Citizen Internet Usage
First of all, I don't think a search warrant is surely required in such a case as it is against Fourth Amendment. Now after 9/11, the i...
Read More
Internet Intelligence Add-ons and Hackers
Here's a special report that analyzes how the Internet can facilitate terrorist operations - http://www.usip.org/pubs/specialreports/sr...
Read More
Using Technology to Combat Terrorism
Here's a special report that analyzes how the Internet can facilitate terrorist operations - http://www.usip.org/pubs/specialreports/sr...
Read More
Student's Free Speech Rights?
Children's legitimate free speech as applicable to them should not be barred in any case. I have little support for the free speech adv...
Read More
Filtering Harmful Material in Chatrooms, Blogs and Social Networks
I don't think there is any explicit filtering technology available that can completely avoid harmful material from chartroom, social ne...
Read More
Dealing With Legislation on Spyware
Spyware is an explicit program that is written with the intention of collecting and using personal info, illegally. Of course its one other...
Read More
Using Spyware for Digital Rights Management
Not at all. Firstly there is no relation between the terminology (Spyware) and what the DRM is intended to do. Something which is Spyware i...
Read More
Using Spyware To Monitor Bad Behavior
Interesting topic isn't it! Usage of Spyware by itself should be made illegal in any case, as it invades privacy. Should a software is ...
Read More
How to Avoid Spyware On The Computer?
Some tips will be - 1. Make a point that one would not visit web sites such as mass advertising web sites as they are usually infectious ...
Read More
Advice For Improved Education System
The educational system should revise the curriculum according to the current technology demands in the society and to build creativity of s...
Read More
OLPC
Is there a more effective strategy for helping developing countries increase the computer and information literacy of their children? Int...
Read More
XO Type Laptops
Here is a nice article on what determines the usage of XO type laptops in developing countries - http://www.olpcnews.com/countries/india/ ...
Read More
Subscribe to:
Posts (Atom)