Online data privacy - 12 views
I think another question has to be brought up: Is the information meant to be public or private? If the information is public, then users should know they are risking identity theft by putting in...
I think another question has to be brought up: Is the information meant to be public or private? If the information is public, then users should know they are risking identity theft by putting in...
The link : http://www.channelnewsasia.com/stories/singaporelocalnews/view/448207/1/.html Case Summary: Red Nano is a people-search engine which allows others to find you in the public int...
Article Summary: http://www.wired.com/threatlevel/2009/03/wireds-top-inte/ The article talks about several Internet threats comprising government surveillance and the loss of users' privacy throu...
http://www.techradar.com/news/internet/blur-and-radiohead-fight-for-digital-rights-580364 Musicians and bands are coming together to fight for their digital rights. The artistes are trying to figh...
http://unpan1.un.org/intradoc/groups/public/documents/APCITY/UNPAN002553.pdf There is no general data protection or privacy law in Singapore. The government has been aggressive in using surveill...
http://www.technewsworld.com/story/67888.html This article discusses the violation of privacy laws as well as misinformation with regards to users' personal information. It was reported that Face...
http://news.bbc.co.uk/2/hi/uk_news/politics/7872425.stm The article effectively speaks of how CCTV cameras and DNA database are threats to privacy. Though many states have reasoned them for being...
We all know that Google revealed the blogger who called model Liskula Cohen a skank, and everyone in the web community was up in arms because it seems that Google has breached its duty to protect i...
Article Summary: http://news.yahoo.com/s/afp/20091002/pl_afp/usitmilitaryintelligencesecurityinternet_20091002130920 The article talks about the US Navy's announcement about it consolidating inte...
Big Blue will supply its analytics know-how to a key U.S. military force in the battle against terrorism October 13, 2009 By Stephen Baker TECHNOLOGY Can the analytic science that powers operati...
URL: http://www.informationweek.com/blog/main/archives/2009/10/rand_us_should.html;jsessionid=SMFM5O2F4DCNBQE1GHOSKH4ATMY32JVN The article talks about the common cyber warfare tools: denia...
The following websites relate to "Cyber Warfare" that is conducted over cyberspace. 1) http://english.people.com.cn/90001/90780/91343/6699021.html (China) The above article first starts off by de...