MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Internet / Social Issues

Magazine articles on the internet's impact on society, privacy, spam, hacking, scams, regulation.
Old Articles: <Older 3411-3420 Newer>
Fast Company
Jul/Aug 2012
Dan Slater
How OneGoodLove Tailors Its Matching System For LGBT "LTRs" OneGoodLove's Frank Mastronuzzi says the gay online-dating space underserves relationship-minded folks. mark for My Articles 76 similar articles
CIO
June 11, 2012
Lauren Brousell
5 Things CIOs Need to Know About Privacy Policy Technology and government policies and regulations are constantly in flux. Here are 5 tips to help CIOs stay in compliance and avoid getting into hot water with the FTC like MySpace did. mark for My Articles 161 similar articles
National Defense
July 2012
Stew Magnuson
Stopping the Chinese Hacking Onslaught Cyber Command Commander Army Gen. Keith Alexander last year called the cyber-espionage being conducted against U.S. companies the largest transfer of intellectual property from one nation to another in the history of the world. mark for My Articles 83 similar articles
National Defense
July 2012
Stew Magnuson
U.S. Government Attempts to Thwart Chinese Network Intrusions If the might of the Chinese government -- as many believe -- is behind this massive operation, what can the might of the U.S. government do to help companies facing the onslaught? mark for My Articles 85 similar articles
National Defense
July 2012
Eric Beidel
iCollege Takes Nation's Cybersecurity Leaders Back to School The iCollege, also known as the Information Resources Management College, is working to fill the gap in knowledge that exists among the senior leadership trying to carve out policies and strategies under which the government's "cyberwarriors" must operate. mark for My Articles 189 similar articles
National Defense
July 2012
Stew Magnuson
Al-Qaida May Have Plans to Manipulate Anonymous Hacking Group Anonymous, a loosely organized group of hackers that has targeted big businesses and governments, could be co-opted by nation states and terrorist groups that want to use it for their own ends, cybersecurity experts said. mark for My Articles 27 similar articles
IEEE Spectrum
June 2012
Morgen E. Peck
Bitcoin: The Cryptoanarchists' Answer to Cash How Bitcoin brought privacy to electronic transactions mark for My Articles 14 similar articles
IEEE Spectrum
June 2012
Paul McFedries
Consumption 2.0 Ownership is being replaced by online tools to rent, share, and trade. Have you noticed that as we dematerialize consumer goods (that is, change their atoms to bits), we're less likely to own them? mark for My Articles 9 similar articles
CIO
May 3, 2012
Grant Gross
Mobile Experts Disagree on Who Should Protect Privacy A privacy consultant calls on app developers to be more responsible, while a developer points to app marketplace operators mark for My Articles 937 similar articles
Information Today
May 3, 2012
Paula J. Hane
Online Consumer Privacy in the Spotlight Choose Privacy Week is being held May 1-7, 2012. The theme is "Freedom from Surveillance." The American Library Association's Office for Intellectual Freedom established Choose Privacy Week to deepen public awareness about this issue. The event is timely with many privacy issues like CISPA in the news. mark for My Articles 512 similar articles
<Older 3411-3420 Newer>    Return to current articles.