Freedom of expression, Intellectual Property Protection, and Cyber Crime Prevention D 12:50:00 AM Add Comment The freedom of expression, being one of the firmly stated and affirmed right in the US constitution, I think the question refers to effecti... Read More
Maintaining Open and Transparent Government D 6:13:00 PM Add Comment There is great effect of privacy / individual rights on true e-Government implementations. As always, the core goals of e-Governance initia... Read More
Individual Rights and E-Governance Transformation D 6:06:00 PM Add Comment Based on my reflection on E-Governance reference materials and experience, I am concluding that e-government initiatives cannot be truly tr... Read More
Can E-Governance Bring True Transformation? D 6:02:00 PM Add Comment This is an interesting and very scholastic topic to share and discuss. The basic question being raised is – Are e-government initiatives ca... Read More
Time Testing Rohr’s Secular Writings About Government D 5:56:00 PM Add Comment If Rohr would have written his book in the present year, it would have a clear shift from the focus on defining what a perfect public admin... Read More
Influence of Available Technology on What Authors Write D 5:52:00 PM Add Comment The reading materials as listed in the Bibliography, sets the stage for deeply analyzing the origins of the most long lasting government se... Read More
How to Ensure That Outsourcing Does Not Adversely Affect US Jobs D 7:19:00 AM Add Comment Offshore outsourcing is a highly debated topic. It would be nice if we reflect on the reasons that has lead to offshore outsourcing - 1. ... Read More
Cyberlaw Enforcement D 7:15:00 AM Add Comment I appreciate the study conducted by UCSD that it provides some striking insights into operation of scam engines and their origin stations.... Read More
Phishing D 7:11:00 AM Add Comment Antiphishing.org links us to various useful means to counter phishing. skimming through the website, here are two things that interested me... Read More
Importance of Global Cyber Crime Policies D 7:07:00 AM Add Comment Cyber-Crime and its big brother - "Cyber-warfare", have so conquered the ever expanding and versatile cyberspace that we need to ... Read More
Data Mining and USA Patriot Act D 6:19:00 AM Add Comment I think its the USA PATRIOT Act that gives the right to do this kind of data mining. This actually amended a handful of other Acts such as... Read More
Data Mining of Email Traffic Patterns D 6:08:00 AM Add Comment E-mail traffic is one of the main target of intelligence surveillance to detect terrorist and other malicious activities. Its rather easy a... Read More
Wiretapping of US Citizen Internet Usage D 6:04:00 AM Add Comment First of all, I don't think a search warrant is surely required in such a case as it is against Fourth Amendment. Now after 9/11, the i... Read More
Internet Intelligence Add-ons and Hackers D 6:00:00 AM Add Comment Here's a special report that analyzes how the Internet can facilitate terrorist operations - http://www.usip.org/pubs/specialreports/sr... Read More
Using Technology to Combat Terrorism D 5:58:00 AM Add Comment Here's a special report that analyzes how the Internet can facilitate terrorist operations - http://www.usip.org/pubs/specialreports/sr... Read More
Student's Free Speech Rights? D 5:51:00 AM Add Comment Children's legitimate free speech as applicable to them should not be barred in any case. I have little support for the free speech adv... Read More
Filtering Harmful Material in Chatrooms, Blogs and Social Networks D 5:11:00 AM Add Comment I don't think there is any explicit filtering technology available that can completely avoid harmful material from chartroom, social ne... Read More
Dealing With Legislation on Spyware D 5:07:00 AM Add Comment Spyware is an explicit program that is written with the intention of collecting and using personal info, illegally. Of course its one other... Read More
Using Spyware for Digital Rights Management D 5:06:00 AM Add Comment Not at all. Firstly there is no relation between the terminology (Spyware) and what the DRM is intended to do. Something which is Spyware i... Read More
Using Spyware To Monitor Bad Behavior D 5:00:00 AM Add Comment Interesting topic isn't it! Usage of Spyware by itself should be made illegal in any case, as it invades privacy. Should a software is ... Read More