How to Control Personal Internet Usage at Workplace? D 6:42:00 PM Add Comment As a Director of Security for your organization, what policies or plans could you implement that might help control or diminish personal In... Read More
Information Architecture and Web Site Concept D 5:15:00 PM Add Comment XYZ Company Web Site Concept Draft “Becoming industry’s premier outsourcing solution for managed care services” Overview For the pas... Read More
Maintaining Open and Transparent Government D 6:13:00 PM Add Comment There is great effect of privacy / individual rights on true e-Government implementations. As always, the core goals of e-Governance initia... Read More
Cyberlaw Enforcement D 7:15:00 AM Add Comment I appreciate the study conducted by UCSD that it provides some striking insights into operation of scam engines and their origin stations.... Read More
Phishing D 7:11:00 AM Add Comment Antiphishing.org links us to various useful means to counter phishing. skimming through the website, here are two things that interested me... Read More
Importance of Global Cyber Crime Policies D 7:07:00 AM Add Comment Cyber-Crime and its big brother - "Cyber-warfare", have so conquered the ever expanding and versatile cyberspace that we need to ... Read More
Data Mining and USA Patriot Act D 6:19:00 AM Add Comment I think its the USA PATRIOT Act that gives the right to do this kind of data mining. This actually amended a handful of other Acts such as... Read More
Data Mining of Email Traffic Patterns D 6:08:00 AM Add Comment E-mail traffic is one of the main target of intelligence surveillance to detect terrorist and other malicious activities. Its rather easy a... Read More