Cyberspace

Results: 2446



#Item
871Privacy of telecommunications / Computer law / Privacy law / Human rights / Cyberspace / Legal aspects of computing / Telecommunications data retention / Patriot Act / Internet privacy / Ethics / Law / National security

Uberveillance Ubiquitous online surveillance and computer science – ethical and legal issues David Vaile Co-convenor, Cyberspace Law and Policy Community

Add to Reading List

Source URL: cyberlawcentre.org

Language: English - Date: 2014-09-08 12:40:30
872Technology / Internet / Computing / Computer crimes / Cyberwarfare / Blog / Internet culture / Social information processing

For
Internal
Circulation
Only Issue
1
(January
2009) CRUSHNEWSflash Cyberspace Risks & where U Seek Help

Add to Reading List

Source URL: www.planetcrush.org

Language: English - Date: 2009-02-09 23:05:28
873Organized crime / War on Terror / State terrorism / Ethics / Definitions of terrorism / National security / Cyberterrorism / Electronic civil disobedience / Cyberspace / Terrorism / Abuse / Fear

page 28 has an image 2 The Mythology of Terrorism on the Net

Add to Reading List

Source URL: www.critical-art.net

Language: English - Date: 2014-04-08 12:17:15
874Library science / Computer law / Copyright law / Information / Data / Copyright / Intellectual property / Google Books / Orphan works / Law / Intellectual property law / Monopoly

Resources on Orphan Works   (Working draft – for comment)  Cyberspace Law and Policy Centre, UNSW  Please send comments to David Vaile*, [removed]   

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English - Date: 2013-12-09 02:24:20
875Security / Computer security / Identity assurance / Access control / National Strategy for Trusted Identities in Cyberspace / OpenID / Digital identity / Internet privacy / Authentication / Identity / Identity management / Federated identity

CTO Corner November 2012 Identity Ecosystem: Path to Payments and More Dan Schutzer, CTO, BITS

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-11-14 16:45:11
876OpenNet Initiative / Content-control software / Computer law / Jonathan Zittrain / Internet ethics / Harvard University / Internet censorship / Rafal Rohozinski / Great Firewall of China / Internet / Computing / Internet activism

Part I Access Contested: Theory and Analysis 1 Access Contested Toward the Fourth Phase of Cyberspace Controls Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain

Add to Reading List

Source URL: access.opennet.net

Language: English - Date: 2011-12-09 11:49:07
877Security / Technology / United States Cyber Command / Computer security / Chief information officer / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Military science / Grid computing / LandWarNet

UNCLASSIFIED Army Network Campaign Plan 2020 and Beyond February 2015

Add to Reading List

Source URL: ciog6.army.mil

Language: English - Date: 2015-02-06 13:21:27
878Intellectual property law / Plagiarism / Computer law / United Kingdom copyright law / Copyright / Monopoly / Public domain / Creative Commons / Moral rights / Law / Copyright law / Civil law

Beyond Creative Commons: Seeing copyright’s public domain as a whole (An Australian case study) Graham Greenleaf Professor of Law, University of New South Wales Co-Director, Cyberspace Law & Policy Centre 1.

Add to Reading List

Source URL: www.bakercyberlawcentre.org

Language: English - Date: 2013-12-09 02:36:05
879Computing / Internet privacy / Information privacy / Personally identifiable information / National Strategy for Trusted Identities in Cyberspace / Consumer privacy / Data breach / Medical privacy / FTC regulation of behavioral advertising / Privacy / Ethics / Security

CTO Corner September 2012 Striking a Balance between Privacy and Security Transformation Dan Schutzer, CTO, BITS

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-11-14 16:45:20
880Security / Federated identity / Identity assurance / OpenID / Authentication / Security Assertion Markup Language / National Strategy for Trusted Identities in Cyberspace / Daon /  Inc. / Anakam / Identity management / Identity / Computer security

Cloud-Based Identity Services TrustX Technologies, Inc[removed]  Random  Hills  Rd.,  Suite  650   Fairfax,  VA    22030

Add to Reading List

Source URL: www.trustx.com

Language: English - Date: 2014-08-27 17:43:58
UPDATE