MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Internet / Social Issues

Magazine articles on the internet's impact on society, privacy, spam, hacking, scams, regulation.
Old Articles: <Older 3441-3450 Newer>
Fast Company
April 2013
Baratunde Thurston
Our Take On Terms Of Service: The Terms Of Servitude Following terms of service controversies at Instagram, Skype, and others, it is important to clarify your relationship with this column. mark for My Articles
Information Today
March 14, 2013
George H. Pike
Copyright Alert System to Warn, Then Punish, Peer-to-Peer File Sharing After months of delays, a coalition of content providers and Internet Service Providers launched the Copyright Alert System, a "six strikes" structure that will notify, then potentially punish users for illegal file sharing. mark for My Articles 222 similar articles
IEEE Spectrum
March 2013
David Kushner
The Real Story of Stuxnet How Kaspersky Lab tracked down the malware that stymied Iran's nuclear-fuel enrichment program mark for My Articles 72 similar articles
CIO
February 27, 2013
Zach Miners
Who owns that Twitter account? Social networking accounts used for both personal and work purposes raise all sorts of legal questions mark for My Articles 153 similar articles
National Defense
March 2013
Stew Magnuson
Defense, Intel Communities Wrestle With the Promise and Problems of 'Big Data' For some intelligence analysts, the glut of data coming from multiple sources is an overwhelming problem. There just aren't enough hours in the day to sift through all the potentially valuable information. mark for My Articles 67 similar articles
National Defense
March 2013
Stew Magnuson
Iran's Ability to Carry Out Attacks in Cyberspace May Be Improving The ability to carry out attacks from across the world that can do real physical or economic damage without ever launching a jet fighter or sending in suicide squads is tempting for adversaries such as Iran, U.S. officials and cybersecurity experts have pointed out. mark for My Articles 97 similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles 253 similar articles
IEEE Spectrum
February 2013
Paul McFedries
Workweek Creep Is Turning Leisure Into Weisure Social media is just the latest technological assault on our free time, and on our language mark for My Articles
AskMen.com
January 13, 2013
Ryan Nadel
Fitness Photos Fitness is defined by the belief that you can be better than yesterday, that things can change, you can be faster, fitter and stronger. It is the networked individual who sees those workout pics and thinks, "I can do that, too." mark for My Articles 22 similar articles
National Defense
January 2013
Stew Magnuson
Time for Nation to Create Cyberspace Doctrine, Military Thinkers Say A group of retired military and intelligence officials believe that now is the time for the nation to write a "cyber doctrine," which is needed to deter network attacks on the homeland. mark for My Articles 32 similar articles
<Older 3441-3450 Newer>    Return to current articles.