Title |
Author |
Type |
Date |
Words |
Breaches are old news, but have we learned our lesson? |
|
|
Jul 14, 2020 |
1019 |
Information Security Issues Facing Higher Education. |
Lynch, Ken |
|
Jun 1, 2019 |
757 |
Beyond Social Media Safety: What Teens Need to Know about Online Privacy and Security Issues. |
Jim, Cary K.; Chang, Hsia-Ching |
Essay |
Feb 1, 2019 |
2796 |
Assessing resilience of inter-domain routing system under regional failures. |
Liu, Yujing; Peng, Wei; Su, Jinshu; Wang, Zhilin |
Report |
Apr 1, 2016 |
5342 |
Developing a cyberbreach strategy. |
Tuttle, Hilary |
|
Oct 1, 2015 |
3047 |
The rise of malvertising. |
Tuttle, Hilary |
Brief article |
Oct 1, 2015 |
193 |
India wants to become cybersecurity hub. |
|
Brief article |
Jul 1, 2015 |
239 |
Secure your data: best practices for keeping sensitive business and personal information out of the hands of computer hackers. |
Lesonsky, Rieva |
|
Jul 1, 2015 |
1790 |
Detection of URL based attacks using reduced feature set and modified C4.5 algorithm. |
Rakesh, R.; Muthurajkumar, S.; SaiRamesh, L.; Vijayalakshmi, M.; Kannan A. |
Report |
Jun 1, 2015 |
3702 |
Secure connectivity in the age of the teleworker. |
Walsh, Steve |
|
Apr 17, 2015 |
750 |
Internet security: three ways to stay safe from hackers. |
|
Brief article |
Apr 1, 2015 |
263 |
Implementing a digital family policy. |
Bair, Amy Lupold |
|
Mar 1, 2015 |
1885 |
Europe's biggest cybersecurity threat isn't hackers. |
|
Brief article |
Jan 1, 2015 |
187 |
A study on the effects of company features on the level of internet data disclosure (internet financial reportage). |
Sharifi, Akbar; Heyrani, Forough; Zadeh, Shahnaz Nayeb |
Report |
Oct 1, 2014 |
5863 |
An empirical study on dos attacks and DDoS defense mechanism. |
Mary, S. Angel Latha; Sabaridha, E.; Sivagami, A.N.; Rani, M. Usha |
Report |
Oct 1, 2014 |
6355 |
Too small for a cyber attack? |
|
|
Sep 1, 2014 |
443 |
Transition of rivalry between USA and China to new Internet-space. |
Yur'evich, Petukhov Alexander; Dmitrievich, Komarov Igor; Valer'evich, Starkin Sergey; Veniaminovna, |
Report |
Aug 1, 2014 |
2124 |
Information retrieval through communicative formulae within the internet interaction. |
Zavyalova, Natalya |
Report |
Aug 1, 2014 |
2820 |
Core questions for cyber attack guidance. |
Rice, Jonathan C. |
Essay |
Oct 1, 2013 |
6631 |
How To Keep The NSA Out Of Your Computer. |
Thompson, Clive |
Brief article |
Aug 21, 2013 |
229 |
Unpacking cyberwar: the sufficiency of the law of armed conflict in the cyber domain. |
Phillips, Kyle Genaro |
Report |
Jul 1, 2013 |
3585 |
Awaiting cyber 9/11. |
Magee, Clifford S. |
Report |
Jul 1, 2013 |
4648 |
Running a war by computer: cyber warfare and its dilemmas: Stuart McMillan discusses a growing international security problem. |
McMillan, Stuart |
Essay |
May 1, 2013 |
2456 |
Cyber security: the strategic challenge and New Zealand's response: Joe Burton discusses an emerging problem with major implications. |
Burton, Joe |
Essay |
May 1, 2013 |
3007 |
Young people face online safety 'timebomb'. |
|
|
Mar 1, 2013 |
454 |
Some aspects of voice user interfaces development for internet and computer control applications. |
Maskeliunas, R.; Ratkevicius, K.; Rudzionis, V. |
Report |
Feb 1, 2013 |
2831 |
Cybercrime: conceptual issues for Congress and U.S. law enforcement. |
Finklea, Kristin M.; Theohary, Catherine A. |
Report |
Jul 1, 2012 |
13624 |
Internet freedom: not a foreign-policy issue. |
|
|
Jun 22, 2012 |
1022 |
Computer network security--evolving risks. |
Schirick, Edward A. |
|
Mar 1, 2012 |
1646 |
Romanian E-commerce: a critical analysis and recommendations for improvement. |
Blythe, Stephen E. |
Report |
Mar 1, 2012 |
8775 |
Can peace prevail in cyberspace? |
|
|
Mar 1, 2012 |
614 |
New approach to cybersecurity. |
|
|
Jan 1, 2012 |
520 |
Joint targeting in Cyberspace. |
Smart, Steven J. |
|
Dec 13, 2011 |
6005 |
Protect your kids from technology. |
Talbert, Marcia Wade |
Brief article |
Dec 1, 2011 |
174 |
Anonymous IRC Twitter Reaches 100k Followers After LulzSec Quits. |
|
Brief article |
Jun 27, 2011 |
251 |
Building a new command in cyberspace. |
Alexander, Keith B. |
Report |
Jun 22, 2011 |
3816 |
Deciphering cyberpower: strategic purpose in peace and war. |
Sheldon, John B. |
Report |
Jun 22, 2011 |
7832 |
International cyber security through co-operation. |
Ilie, Marian; Mutulescu, Antonio-Silviu; Artene, Diana Anca; Bratu, Sofia; Fainisi, Florin |
Report |
Jun 1, 2011 |
3973 |
9 Ways to stay safe online. |
|
|
May 1, 2011 |
430 |
US products help block Mideast web. |
Sonne, Paul; Stecklow, Steve |
|
Mar 31, 2011 |
2242 |
Online intrusion behaviors: sequences and time intervals. |
Chueh, Hao-En; Ho, Shun-Chuan; Chang, Shih-Peng; Hsu, Ping-Yu |
Report |
Nov 1, 2010 |
2554 |
Internet kill switch? Presidential power online. |
Suderman, Peter |
|
Sep 11, 2010 |
262 |
Internet infrastructure topology assessment/Interneto infrastrukturos topologijos tyrimas. |
Kajackas, A.; Rainys, R. |
Report |
Sep 1, 2010 |
2849 |
Are you protecting your privacy online? |
Goldsborough, Reid |
|
Jun 1, 2010 |
833 |
Cyber vision and cyber force development. |
Jabbour, Kamal |
Report |
Mar 22, 2010 |
4270 |
Possibilities of tourism market research via the Internet. |
Andrlic, Berislav; Budic, Hrvoje |
Report |
Jan 1, 2010 |
1627 |
Internet safety. |
Killeen, Erlene |
|
Dec 1, 2009 |
961 |
World war 3.0: ten critical trends for cybersecurity: technological advances and greater connectivity may be making our systems less rather than more secure. A special panel of military, intelligence, and forecasting experts analyzes the trends that may be leading the world to cyberwar. |
Cetron, Marvin J.; Davies, Owen |
Report |
Sep 1, 2009 |
4457 |
Data lockdown? How institutions are answering the national call for better cybersecurity. |
McClure, Ann |
Cover story |
Sep 1, 2009 |
1871 |
Cisco: Internet Criminals Imitates and Operates like successful businesses. |
|
Brief article |
Jul 14, 2009 |
246 |
Cyber attacks on U.S. government rise. |
|
|
Jul 1, 2009 |
375 |
The impact of Facebook on our students. |
Fodeman, Doug; Monroe, Marje |
|
Jun 1, 2009 |
2960 |
12 million 'zombie computers' hijacked since January. |
|
Brief article |
May 6, 2009 |
271 |
Cyber threats may be hazardous to your privacy. |
Raduege, Harry D., Jr. |
|
Apr 1, 2009 |
848 |
Cyber warfare--how secure are your communications? |
Simms, Mike |
|
Feb 1, 2009 |
716 |
UC: What you need to know: predeployment testing is critical to ensure network performance is not impacted by new technologies. |
Brown, Stephen |
|
Dec 1, 2008 |
564 |
The tangled Web(s) we weave: Internet2 and the net neutrality debate. |
Putz, Matthew |
|
Dec 1, 2008 |
2965 |
Network Box analysis shows main sources of Internet threats come from outside EU. |
|
Brief article |
Oct 31, 2008 |
183 |
Web Threats increase in the Middle East. |
|
|
Aug 13, 2008 |
381 |
Loose wires: U.S. at risk of losing global lead in information technology. |
Gropman, Alan L. |
|
Aug 1, 2008 |
1558 |
Mobile device security is a concern. |
|
|
Jul 1, 2008 |
422 |
Soundbites ... where PE readers offer their views on issues of the day. |
|
Survey |
Apr 9, 2008 |
914 |
The myths of e-mail governance. |
|
|
Jan 1, 2008 |
351 |
The value of fair use. |
Pike, George H. |
|
Dec 1, 2007 |
1018 |
Crooks zero in on vulnerable data. |
Wagley, John |
|
Aug 1, 2007 |
440 |
AT&T introduces My Internet Protect security service. |
|
Brief article |
Jul 24, 2007 |
194 |
Reliability, availability and security of wireless networks in the community. |
Maple, Carsten; Williams, Geraint; Yue, Yong |
Report |
Jun 1, 2007 |
7084 |
A model and framework for online security benchmarking. |
Pye, Graeme; Warren, Matthew J. |
Report |
Jun 1, 2007 |
4648 |
The Internet and global governance: principles and norms for a new regime. |
Mueller, Milton; Mathiason, John; Klein, Hans |
|
Apr 1, 2007 |
7277 |
"Writeprinting" America. |
|
|
Mar 22, 2007 |
531 |
Spam wars: the battle of the formbots. |
Breeding, Marshall |
|
Jan 1, 2007 |
2335 |
TELECOMMUNICATIONS COUNCIL : MEMBER STATES ATTEMPT TO REINFORCE ONLINE NETWORK SECURITY. |
|
Brief article |
Dec 12, 2006 |
239 |
Public and private codes in living systems theory. |
Bailey, Kenneth D. |
|
Nov 1, 2006 |
6814 |
Who owns the net? |
Piazza, Peter |
|
Oct 1, 2006 |
456 |
Cyber-snitching. |
|
Brief article |
Sep 4, 2006 |
154 |
Viewpoint--networks first. |
|
Viewpoint essay |
Sep 1, 2006 |
764 |
NTA monitor warns companies of new security threats. |
|
|
Sep 1, 2006 |
371 |
Four out of five firms fear security breach. |
|
Brief article |
Sep 1, 2006 |
160 |
Cybersecurity checklist for business managers. |
Piazza, Peter |
|
Aug 1, 2006 |
501 |
Cybersecurity framework. |
|
Brief article |
Aug 1, 2006 |
91 |
CAPTCHA ... if you can. |
Pescatore, Brittney |
Brief article |
Aug 1, 2006 |
187 |
EUROPE DIRECT ADVISES ON INTERNET SECURITY. |
|
Brief article |
May 5, 2006 |
139 |
A site to see. |
Piazza, Peter |
Brief article |
May 1, 2006 |
179 |
US simulates cyber attack during security exercise. |
|
Brief Article |
Feb 13, 2006 |
163 |
Microsoft unveils plans for OneCare Live security service. |
|
Brief Article |
Feb 8, 2006 |
252 |
Growing respect for IT security professionals. |
Piazza, Peter |
|
Feb 1, 2006 |
314 |
BlackSpider reports new Trojan sent to UK businesses. |
|
Brief Article |
Jan 30, 2006 |
196 |
Network security is manageable. |
Roberts, Gary |
|
Jan 1, 2006 |
1816 |
Utimaco advises increased security for mobile device use in the workplace. |
|
Brief Article |
Dec 20, 2005 |
244 |
Network inoculation: antivirus shield would outrace cyber infections. |
Weiss, Peter |
|
Dec 3, 2005 |
486 |
Is your network safe? Why educators should care about cybersecurity--and what they should do about it. |
Williams, Cheryl S.; Krueger, Keith R. |
|
Nov 1, 2005 |
2139 |
IP contact center technology: eliminating the risks (Part X). |
Hayden, Kevin |
|
Nov 1, 2005 |
1679 |
Citizens Advice publishes online fact sheets for Internet safety. |
|
Brief Article |
Oct 31, 2005 |
194 |
Citizens Advice publishes online fact sheets for Internet safety. |
|
Brief Article |
Oct 31, 2005 |
207 |
Organisations fear network security threats from Instant Messaging - report. |
|
Brief Article |
Oct 3, 2005 |
194 |
Ethical hackers: testing the security waters. |
Britt, Phillip |
|
Sep 1, 2005 |
1528 |
RSA survey reveals online security concerns. |
|
Brief Article |
Aug 22, 2005 |
238 |
eema announces cyber crime workshop. |
|
Brief Article |
Aug 17, 2005 |
156 |
eema announces cyber crime workshop. |
|
Brief Article |
Aug 17, 2005 |
165 |
Bolstering a University's campus security: Smartcard technology helps Delaware State University develop a plan to build a comprehensive identity management system. |
Fletcher, Charles D., Jr. |
|
Aug 1, 2005 |
854 |
Five steps to cybersecurity. |
|
Brief Article |
Aug 1, 2005 |
108 |
ICRA reveals new labelling system for safer Internet use. |
|
Brief Article |
Jul 12, 2005 |
192 |
ICRA reveals new labelling system for safer Internet use. |
|
Brief Article |
Jul 12, 2005 |
205 |
Sophos emphasises importance of computer security as confidential nuclear information is leaked by a virus. |
|
Brief Article |
Jun 24, 2005 |
159 |
Sophos emphasises importance of computer security as confidential nuclear information is leaked by a virus. |
|
Brief Article |
Jun 24, 2005 |
178 |
The security conundrum. |
|
|
Jun 10, 2005 |
369 |
Security: Risk and reward. |
|
|
Jun 10, 2005 |
468 |
The rise of spyware. |
|
|
Jun 10, 2005 |
414 |
The enemy within. |
|
|
Jun 10, 2005 |
1001 |
Sophos reports update of Firefox web browser. |
|
Brief Article |
Apr 21, 2005 |
109 |
Symantec releases new Internet security threat report. |
|
Brief Article |
Mar 21, 2005 |
162 |
UN Working Group on Internet Governance to discuss security and access. |
|
Brief Article |
Feb 11, 2005 |
143 |
UN Working Group on Internet Governance to discuss security and access. |
|
Brief Article |
Feb 11, 2005 |
128 |
DHS cybersecurity. |
Piazza, Peter |
Brief Article |
Feb 1, 2005 |
157 |
Phishing and the threat to corporate networks. |
|
|
Feb 1, 2005 |
2431 |
New computer virus 'bot' spreading. |
|
Brief Article |
Jan 31, 2005 |
178 |
mi2g Intelligence warns of wireless security risks. |
|
Brief Article |
Jan 28, 2005 |
185 |
mi2g Intelligence warns of wireless security risks. |
|
Brief Article |
Jan 28, 2005 |
174 |
IT security: tips for preparing and protecting your business from an attack. |
Gough, Reid |
|
Jan 1, 2005 |
638 |
FTC fights spam with carrot and stick. |
Piazza, Peter |
|
Dec 1, 2004 |
562 |
New in plaintext. |
Piazza, Peter |
Brief Article |
Dec 1, 2004 |
196 |
Defending the network. |
Perry, Simon |
|
Dec 1, 2004 |
1320 |
Why current generation intrusion prevention systems fail: Infosecurity Manchester 17th Nov 2004. |
|
|
Dec 1, 2004 |
644 |
Beating the cyber threat: CEOs must invest in a new generation of IT. |
Khosla, Pradeep K. |
|
Dec 1, 2004 |
1235 |
Security threats, internal and external. |
|
Brief Article |
Nov 1, 2004 |
109 |
Preparing for the perils of wireless access: wireless PDAs provide organizations with a huge productivity boost by giving mobile employees instant access to email and other corporate information sources. They also present a security threat that many organizations are not prepared for. |
Stoller, Jacob |
|
Nov 1, 2004 |
1171 |
E-mail authentication slams spam. |
Fisher, Joseph |
|
Nov 1, 2004 |
1653 |
In-house security teams do not cope with new threats and vulnerabilities - report. |
|
Brief Article |
Oct 29, 2004 |
178 |
Enterprises get smart about wireless security. |
|
Brief Article |
Oct 1, 2004 |
175 |
In-the-cloud filtering. |
Kagan, Rick |
|
Oct 1, 2004 |
646 |
No more band-aid fixes. |
|
|
Sep 22, 2004 |
1002 |
INFORMATION SOCIETY: COMMISSION CONTRIBUTION TO SECOND PHASE OF WORLD SUMMIT. |
|
|
Jul 21, 2004 |
588 |
US and EU Together on Internet Governance. |
|
|
Dec 12, 2003 |
406 |
Trouble Grows at the Internet's Root. |
|
|
Oct 20, 2003 |
1074 |
Wired for thought. (From the Editor). |
|
Brief Article |
Sep 22, 2002 |
187 |
Controlling your brand in an electronic age: when planned for and used properly, new technologies can help to protect and strengthen a franchise system and brand integrity. (Legal). |
Mullin, Cheryl L.; Marks, Anthony |
|
Jul 1, 2002 |
1073 |
Libraries & the Internet Toolkit. (And Furthermore). |
|
Reprint |
Jun 1, 2002 |
1075 |
Two names are better than one: trademarks don't make good Internet domains, and vice versa. Why not pick a new name for the Web? (Special Advertising Section). |
Datta, Manjari |
Brief Article |
Apr 1, 2002 |
896 |
Internet Consumer Confidence Index shows first decline. |
|
Brief Article |
Mar 27, 2002 |
116 |
INFORMATION SOCIETY: COMMISSION TURNS THE SPOTLIGHT ON BROADBAND INTERNET ACCESS. |
|
Brief Article |
Feb 13, 2002 |
558 |
LLRX.com introduces new indices. (Internet Today). |
|
|
Feb 1, 2002 |
313 |
Internet security guide released in Hong Kong. |
|
Brief Article |
Jan 15, 2002 |
81 |
Putting a face on HAL. (Tech Forum). |
Castelluccic, Michael |
Brief Article |
Dec 1, 2001 |
1016 |
The Civil Internet. |
Freund, Charles Paul |
Brief Article |
Nov 1, 2001 |
337 |
Can the Internet Be Trusted? |
GOLDSBOROUGH, REID |
Brief Article |
Oct 15, 2001 |
724 |
Will the Internet E-Volutionize Trade Finance? |
Striano, Riceardo |
|
Oct 1, 2001 |
2292 |
Credit and Collections Finds a Home Online. |
Schmidt, David |
|
Oct 1, 2001 |
2867 |
The B-to-B Virtual Bazaar. |
Banham, Russ |
|
Oct 1, 2001 |
2522 |
A DIGITAL REFERENCE LIBRARY EMERGES AT STANTON LIBRARY. |
Taylor, Marilyn |
Statistical Data Included |
Sep 1, 2001 |
2224 |
Create an effective home page. |
|
|
Jul 1, 2001 |
268 |
Knowledge Portals. |
Staab, Steffen; Maedche, Alexander |
|
Jun 22, 2001 |
7293 |
A CPA's guide to the top issues in technology. |
Tie, Robert |
|
May 1, 2001 |
2881 |
Cache me if you can. |
|
|
Mar 1, 2001 |
826 |
A Simple Plan for Success on the Net. |
|
Brief Article |
Feb 1, 2001 |
782 |
The next big hurdle for the Internet. |
Wolf, Jonathan |
|
Feb 1, 2001 |
809 |
The Internet Filter Farce. |
NUNBERG, GEOFFREY |
|
Jan 1, 2001 |
5252 |
WORLD INTERNETWORKS INC. |
Cole, Kelleigh |
Brief Article |
Jan 1, 2001 |
89 |
REPUTATION SYSTEMS. |
RESNICK, PAUL; ZECKHAUSER, RICHARD; FRIEDMAN, ERIC; KUWABARA, KO |
|
Dec 1, 2000 |
2463 |
SOCIAL CAPITAL AND THE NET. |
USLANER, ERIC M. |
|
Dec 1, 2000 |
2953 |
Bitter living through technology. |
|
Brief Article |
Oct 1, 2000 |
587 |
TURNING TRADITIONAL ASSOCIATION BUSINESS MODELS. |
RHEA, MARSHA |
Brief Article |
Aug 1, 2000 |
638 |
CLEAR AND PRESENT DANGERS. |
LEE, HUGH K. |
|
Aug 1, 2000 |
1163 |
GOODBYE TO BUSINESS AS USUAL. |
LEVIN, MARK |
Brief Article |
Aug 1, 2000 |
916 |
Deliberating on ICANN. |
Kornfeld, Dori |
|
Jul 1, 2000 |
1037 |
Customizing the World on the Web. |
Peek, Robin |
|
May 1, 2000 |
1259 |
Bet on the Tortoise.com. |
RUNDLES, JEFF |
Brief Article |
May 1, 2000 |
697 |
Websites 101. |
|
Brief Article |
Dec 1, 1999 |
270 |
Working the Web. |
Uttenweiler, William L. |
|
Oct 1, 1999 |
2582 |
Providing Solutions for the Growing Trend Toward Home Healthcare. |
Nugent, Dempsey |
|
Sep 1, 1999 |
2208 |
The Economics of NETWORK MANAGEMENT. |
GUPTA, ALOK; STAHL, DALE O.; WHINSTON, ANDREW B. |
|
Sep 1, 1999 |
4591 |
ICANN AND INTERNET REGULATION. |
MUELLER, MILTON |
|
Jun 1, 1999 |
1739 |
A historical, economic, and legal analysis of municipal ownership of the information highway. |
Carlson, Steven C. |
|
Mar 22, 1999 |
20807 |
Tomorrow.net: don't think about the Internet as technology. Think about it as the future of your business. |
Ferrell, Keith |
|
Mar 15, 1999 |
3859 |
Diagnosing the Internet's ills. |
Peterson, Ivars |
Brief Article |
Jan 16, 1999 |
316 |
The Year the Information Industry Hit Bottom. |
Miller, Tim |
|
Dec 1, 1998 |
2262 |
Web measurement companies merge. |
Noack, David |
|
Oct 17, 1998 |
525 |
The civilization of cyberspace. |
Gerstner, John |
Interview |
Jun 1, 1998 |
2827 |
The future of Internet domain names: as the U.S. government pulls out, a breach in responsibility may result. |
Kennedy, Shirley Duglin |
|
Mar 1, 1998 |
2254 |
Connection to risk? Managing the exposures of cyberspace. |
Jorgensen, Lori |
|
Feb 1, 1998 |
2014 |
A formula for the future. |
Atkinson, Lloyd |
|
Dec 1, 1997 |
884 |
Who governs the Internet? |
Foster, Will A.; Rutkowski, Anthony M.; Goodman, Seymour E. |
|
Aug 1, 1997 |
3394 |
Internet congestion stirs up data storms. |
Peterson, Ivars |
|
Jul 26, 1997 |
747 |
Toward an access rights policy. |
Press, Larry |
|
Jul 1, 1997 |
2914 |
Internet 2: an overview of the next generation of the Internet. |
Saunders-McMaster, Laverna |
|
Mar 1, 1997 |
1991 |
The balkanization of the Internet. |
Sagawa, Paul I. |
|
Jan 1, 1997 |
4922 |
Hooking up to the Big-I Internet. |
Schuyler, Michael |
|
Sep 1, 1996 |
3952 |
Circumventing traffic jams on the Internet. |
Peterson, Ivars |
Brief Article |
Mar 23, 1996 |
453 |
Why catalog Internet resources. |
Jul, Erik |
|
Jan 1, 1996 |
1377 |
Internet facts, frivolity, and festivity. |
Kennedy, Shirley Duglin |
|
Dec 1, 1995 |
2226 |
Going inside with the Internet. |
Miller, Roy |
|
Nov 1, 1995 |
1401 |
CAS to offer scientists access to electronic-only documents. |
|
|
May 1, 1995 |
367 |
Changing lanes on the infobahn. |
Fitzgerald, Mark |
|
Feb 11, 1995 |
817 |
Privatizing Internet. |
Doherty, Brian |
|
Jan 1, 1995 |
347 |
Performance power from online services; here's how to ride the information superhighway and boost your business. |
Perozo, Hugo |
|
Jul 1, 1994 |
2213 |
Building foundations for the future. |
Quint, Barbara |
|
Feb 1, 1994 |
1476 |
The Internet. |
Nickerson, Gord |
column |
Sep 1, 1991 |
1913 |