Printer Friendly

Browse Internet topic

Management subtopic

Articles

1-196 out of 196 article(s)
Title Author Type Date Words
Breaches are old news, but have we learned our lesson? Jul 14, 2020 1019
Information Security Issues Facing Higher Education. Lynch, Ken Jun 1, 2019 757
Beyond Social Media Safety: What Teens Need to Know about Online Privacy and Security Issues. Jim, Cary K.; Chang, Hsia-Ching Essay Feb 1, 2019 2796
Assessing resilience of inter-domain routing system under regional failures. Liu, Yujing; Peng, Wei; Su, Jinshu; Wang, Zhilin Report Apr 1, 2016 5342
Developing a cyberbreach strategy. Tuttle, Hilary Oct 1, 2015 3047
The rise of malvertising. Tuttle, Hilary Brief article Oct 1, 2015 193
India wants to become cybersecurity hub. Brief article Jul 1, 2015 239
Secure your data: best practices for keeping sensitive business and personal information out of the hands of computer hackers. Lesonsky, Rieva Jul 1, 2015 1790
Detection of URL based attacks using reduced feature set and modified C4.5 algorithm. Rakesh, R.; Muthurajkumar, S.; SaiRamesh, L.; Vijayalakshmi, M.; Kannan A. Report Jun 1, 2015 3702
Secure connectivity in the age of the teleworker. Walsh, Steve Apr 17, 2015 750
Internet security: three ways to stay safe from hackers. Brief article Apr 1, 2015 263
Implementing a digital family policy. Bair, Amy Lupold Mar 1, 2015 1885
Europe's biggest cybersecurity threat isn't hackers. Brief article Jan 1, 2015 187
A study on the effects of company features on the level of internet data disclosure (internet financial reportage). Sharifi, Akbar; Heyrani, Forough; Zadeh, Shahnaz Nayeb Report Oct 1, 2014 5863
An empirical study on dos attacks and DDoS defense mechanism. Mary, S. Angel Latha; Sabaridha, E.; Sivagami, A.N.; Rani, M. Usha Report Oct 1, 2014 6355
Too small for a cyber attack? Sep 1, 2014 443
Transition of rivalry between USA and China to new Internet-space. Yur'evich, Petukhov Alexander; Dmitrievich, Komarov Igor; Valer'evich, Starkin Sergey; Veniaminovna, Report Aug 1, 2014 2124
Information retrieval through communicative formulae within the internet interaction. Zavyalova, Natalya Report Aug 1, 2014 2820
Core questions for cyber attack guidance. Rice, Jonathan C. Essay Oct 1, 2013 6631
How To Keep The NSA Out Of Your Computer. Thompson, Clive Brief article Aug 21, 2013 229
Unpacking cyberwar: the sufficiency of the law of armed conflict in the cyber domain. Phillips, Kyle Genaro Report Jul 1, 2013 3585
Awaiting cyber 9/11. Magee, Clifford S. Report Jul 1, 2013 4648
Running a war by computer: cyber warfare and its dilemmas: Stuart McMillan discusses a growing international security problem. McMillan, Stuart Essay May 1, 2013 2456
Cyber security: the strategic challenge and New Zealand's response: Joe Burton discusses an emerging problem with major implications. Burton, Joe Essay May 1, 2013 3007
Young people face online safety 'timebomb'. Mar 1, 2013 454
Some aspects of voice user interfaces development for internet and computer control applications. Maskeliunas, R.; Ratkevicius, K.; Rudzionis, V. Report Feb 1, 2013 2831
Cybercrime: conceptual issues for Congress and U.S. law enforcement. Finklea, Kristin M.; Theohary, Catherine A. Report Jul 1, 2012 13624
Internet freedom: not a foreign-policy issue. Jun 22, 2012 1022
Computer network security--evolving risks. Schirick, Edward A. Mar 1, 2012 1646
Romanian E-commerce: a critical analysis and recommendations for improvement. Blythe, Stephen E. Report Mar 1, 2012 8775
Can peace prevail in cyberspace? Mar 1, 2012 614
New approach to cybersecurity. Jan 1, 2012 520
Joint targeting in Cyberspace. Smart, Steven J. Dec 13, 2011 6005
Protect your kids from technology. Talbert, Marcia Wade Brief article Dec 1, 2011 174
Anonymous IRC Twitter Reaches 100k Followers After LulzSec Quits. Brief article Jun 27, 2011 251
Building a new command in cyberspace. Alexander, Keith B. Report Jun 22, 2011 3816
Deciphering cyberpower: strategic purpose in peace and war. Sheldon, John B. Report Jun 22, 2011 7832
International cyber security through co-operation. Ilie, Marian; Mutulescu, Antonio-Silviu; Artene, Diana Anca; Bratu, Sofia; Fainisi, Florin Report Jun 1, 2011 3973
9 Ways to stay safe online. May 1, 2011 430
US products help block Mideast web. Sonne, Paul; Stecklow, Steve Mar 31, 2011 2242
Online intrusion behaviors: sequences and time intervals. Chueh, Hao-En; Ho, Shun-Chuan; Chang, Shih-Peng; Hsu, Ping-Yu Report Nov 1, 2010 2554
Internet kill switch? Presidential power online. Suderman, Peter Sep 11, 2010 262
Internet infrastructure topology assessment/Interneto infrastrukturos topologijos tyrimas. Kajackas, A.; Rainys, R. Report Sep 1, 2010 2849
Are you protecting your privacy online? Goldsborough, Reid Jun 1, 2010 833
Cyber vision and cyber force development. Jabbour, Kamal Report Mar 22, 2010 4270
Possibilities of tourism market research via the Internet. Andrlic, Berislav; Budic, Hrvoje Report Jan 1, 2010 1627
Internet safety. Killeen, Erlene Dec 1, 2009 961
World war 3.0: ten critical trends for cybersecurity: technological advances and greater connectivity may be making our systems less rather than more secure. A special panel of military, intelligence, and forecasting experts analyzes the trends that may be leading the world to cyberwar. Cetron, Marvin J.; Davies, Owen Report Sep 1, 2009 4457
Data lockdown? How institutions are answering the national call for better cybersecurity. McClure, Ann Cover story Sep 1, 2009 1871
Cisco: Internet Criminals Imitates and Operates like successful businesses. Brief article Jul 14, 2009 246
Cyber attacks on U.S. government rise. Jul 1, 2009 375
The impact of Facebook on our students. Fodeman, Doug; Monroe, Marje Jun 1, 2009 2960
12 million 'zombie computers' hijacked since January. Brief article May 6, 2009 271
Cyber threats may be hazardous to your privacy. Raduege, Harry D., Jr. Apr 1, 2009 848
Cyber warfare--how secure are your communications? Simms, Mike Feb 1, 2009 716
UC: What you need to know: predeployment testing is critical to ensure network performance is not impacted by new technologies. Brown, Stephen Dec 1, 2008 564
The tangled Web(s) we weave: Internet2 and the net neutrality debate. Putz, Matthew Dec 1, 2008 2965
Network Box analysis shows main sources of Internet threats come from outside EU. Brief article Oct 31, 2008 183
Web Threats increase in the Middle East. Aug 13, 2008 381
Loose wires: U.S. at risk of losing global lead in information technology. Gropman, Alan L. Aug 1, 2008 1558
Mobile device security is a concern. Jul 1, 2008 422
Soundbites ... where PE readers offer their views on issues of the day. Survey Apr 9, 2008 914
The myths of e-mail governance. Jan 1, 2008 351
The value of fair use. Pike, George H. Dec 1, 2007 1018
Crooks zero in on vulnerable data. Wagley, John Aug 1, 2007 440
AT&T introduces My Internet Protect security service. Brief article Jul 24, 2007 194
Reliability, availability and security of wireless networks in the community. Maple, Carsten; Williams, Geraint; Yue, Yong Report Jun 1, 2007 7084
A model and framework for online security benchmarking. Pye, Graeme; Warren, Matthew J. Report Jun 1, 2007 4648
The Internet and global governance: principles and norms for a new regime. Mueller, Milton; Mathiason, John; Klein, Hans Apr 1, 2007 7277
"Writeprinting" America. Mar 22, 2007 531
Spam wars: the battle of the formbots. Breeding, Marshall Jan 1, 2007 2335
TELECOMMUNICATIONS COUNCIL : MEMBER STATES ATTEMPT TO REINFORCE ONLINE NETWORK SECURITY. Brief article Dec 12, 2006 239
Public and private codes in living systems theory. Bailey, Kenneth D. Nov 1, 2006 6814
Who owns the net? Piazza, Peter Oct 1, 2006 456
Cyber-snitching. Brief article Sep 4, 2006 154
Viewpoint--networks first. Viewpoint essay Sep 1, 2006 764
NTA monitor warns companies of new security threats. Sep 1, 2006 371
Four out of five firms fear security breach. Brief article Sep 1, 2006 160
Cybersecurity checklist for business managers. Piazza, Peter Aug 1, 2006 501
Cybersecurity framework. Brief article Aug 1, 2006 91
CAPTCHA ... if you can. Pescatore, Brittney Brief article Aug 1, 2006 187
EUROPE DIRECT ADVISES ON INTERNET SECURITY. Brief article May 5, 2006 139
A site to see. Piazza, Peter Brief article May 1, 2006 179
US simulates cyber attack during security exercise. Brief Article Feb 13, 2006 163
Microsoft unveils plans for OneCare Live security service. Brief Article Feb 8, 2006 252
Growing respect for IT security professionals. Piazza, Peter Feb 1, 2006 314
BlackSpider reports new Trojan sent to UK businesses. Brief Article Jan 30, 2006 196
Network security is manageable. Roberts, Gary Jan 1, 2006 1816
Utimaco advises increased security for mobile device use in the workplace. Brief Article Dec 20, 2005 244
Network inoculation: antivirus shield would outrace cyber infections. Weiss, Peter Dec 3, 2005 486
Is your network safe? Why educators should care about cybersecurity--and what they should do about it. Williams, Cheryl S.; Krueger, Keith R. Nov 1, 2005 2139
IP contact center technology: eliminating the risks (Part X). Hayden, Kevin Nov 1, 2005 1679
Citizens Advice publishes online fact sheets for Internet safety. Brief Article Oct 31, 2005 194
Citizens Advice publishes online fact sheets for Internet safety. Brief Article Oct 31, 2005 207
Organisations fear network security threats from Instant Messaging - report. Brief Article Oct 3, 2005 194
Ethical hackers: testing the security waters. Britt, Phillip Sep 1, 2005 1528
RSA survey reveals online security concerns. Brief Article Aug 22, 2005 238
eema announces cyber crime workshop. Brief Article Aug 17, 2005 156
eema announces cyber crime workshop. Brief Article Aug 17, 2005 165
Bolstering a University's campus security: Smartcard technology helps Delaware State University develop a plan to build a comprehensive identity management system. Fletcher, Charles D., Jr. Aug 1, 2005 854
Five steps to cybersecurity. Brief Article Aug 1, 2005 108
ICRA reveals new labelling system for safer Internet use. Brief Article Jul 12, 2005 192
ICRA reveals new labelling system for safer Internet use. Brief Article Jul 12, 2005 205
Sophos emphasises importance of computer security as confidential nuclear information is leaked by a virus. Brief Article Jun 24, 2005 159
Sophos emphasises importance of computer security as confidential nuclear information is leaked by a virus. Brief Article Jun 24, 2005 178
The security conundrum. Jun 10, 2005 369
Security: Risk and reward. Jun 10, 2005 468
The rise of spyware. Jun 10, 2005 414
The enemy within. Jun 10, 2005 1001
Sophos reports update of Firefox web browser. Brief Article Apr 21, 2005 109
Symantec releases new Internet security threat report. Brief Article Mar 21, 2005 162
UN Working Group on Internet Governance to discuss security and access. Brief Article Feb 11, 2005 143
UN Working Group on Internet Governance to discuss security and access. Brief Article Feb 11, 2005 128
DHS cybersecurity. Piazza, Peter Brief Article Feb 1, 2005 157
Phishing and the threat to corporate networks. Feb 1, 2005 2431
New computer virus 'bot' spreading. Brief Article Jan 31, 2005 178
mi2g Intelligence warns of wireless security risks. Brief Article Jan 28, 2005 185
mi2g Intelligence warns of wireless security risks. Brief Article Jan 28, 2005 174
IT security: tips for preparing and protecting your business from an attack. Gough, Reid Jan 1, 2005 638
FTC fights spam with carrot and stick. Piazza, Peter Dec 1, 2004 562
New in plaintext. Piazza, Peter Brief Article Dec 1, 2004 196
Defending the network. Perry, Simon Dec 1, 2004 1320
Why current generation intrusion prevention systems fail: Infosecurity Manchester 17th Nov 2004. Dec 1, 2004 644
Beating the cyber threat: CEOs must invest in a new generation of IT. Khosla, Pradeep K. Dec 1, 2004 1235
Security threats, internal and external. Brief Article Nov 1, 2004 109
Preparing for the perils of wireless access: wireless PDAs provide organizations with a huge productivity boost by giving mobile employees instant access to email and other corporate information sources. They also present a security threat that many organizations are not prepared for. Stoller, Jacob Nov 1, 2004 1171
E-mail authentication slams spam. Fisher, Joseph Nov 1, 2004 1653
In-house security teams do not cope with new threats and vulnerabilities - report. Brief Article Oct 29, 2004 178
Enterprises get smart about wireless security. Brief Article Oct 1, 2004 175
In-the-cloud filtering. Kagan, Rick Oct 1, 2004 646
No more band-aid fixes. Sep 22, 2004 1002
INFORMATION SOCIETY: COMMISSION CONTRIBUTION TO SECOND PHASE OF WORLD SUMMIT. Jul 21, 2004 588
US and EU Together on Internet Governance. Dec 12, 2003 406
Trouble Grows at the Internet's Root. Oct 20, 2003 1074
Wired for thought. (From the Editor). Brief Article Sep 22, 2002 187
Controlling your brand in an electronic age: when planned for and used properly, new technologies can help to protect and strengthen a franchise system and brand integrity. (Legal). Mullin, Cheryl L.; Marks, Anthony Jul 1, 2002 1073
Libraries & the Internet Toolkit. (And Furthermore). Reprint Jun 1, 2002 1075
Two names are better than one: trademarks don't make good Internet domains, and vice versa. Why not pick a new name for the Web? (Special Advertising Section). Datta, Manjari Brief Article Apr 1, 2002 896
Internet Consumer Confidence Index shows first decline. Brief Article Mar 27, 2002 116
INFORMATION SOCIETY: COMMISSION TURNS THE SPOTLIGHT ON BROADBAND INTERNET ACCESS. Brief Article Feb 13, 2002 558
LLRX.com introduces new indices. (Internet Today). Feb 1, 2002 313
Internet security guide released in Hong Kong. Brief Article Jan 15, 2002 81
Putting a face on HAL. (Tech Forum). Castelluccic, Michael Brief Article Dec 1, 2001 1016
The Civil Internet. Freund, Charles Paul Brief Article Nov 1, 2001 337
Can the Internet Be Trusted? GOLDSBOROUGH, REID Brief Article Oct 15, 2001 724
Will the Internet E-Volutionize Trade Finance? Striano, Riceardo Oct 1, 2001 2292
Credit and Collections Finds a Home Online. Schmidt, David Oct 1, 2001 2867
The B-to-B Virtual Bazaar. Banham, Russ Oct 1, 2001 2522
A DIGITAL REFERENCE LIBRARY EMERGES AT STANTON LIBRARY. Taylor, Marilyn Statistical Data Included Sep 1, 2001 2224
Create an effective home page. Jul 1, 2001 268
Knowledge Portals. Staab, Steffen; Maedche, Alexander Jun 22, 2001 7293
A CPA's guide to the top issues in technology. Tie, Robert May 1, 2001 2881
Cache me if you can. Mar 1, 2001 826
A Simple Plan for Success on the Net. Brief Article Feb 1, 2001 782
The next big hurdle for the Internet. Wolf, Jonathan Feb 1, 2001 809
The Internet Filter Farce. NUNBERG, GEOFFREY Jan 1, 2001 5252
WORLD INTERNETWORKS INC. Cole, Kelleigh Brief Article Jan 1, 2001 89
REPUTATION SYSTEMS. RESNICK, PAUL; ZECKHAUSER, RICHARD; FRIEDMAN, ERIC; KUWABARA, KO Dec 1, 2000 2463
SOCIAL CAPITAL AND THE NET. USLANER, ERIC M. Dec 1, 2000 2953
Bitter living through technology. Brief Article Oct 1, 2000 587
TURNING TRADITIONAL ASSOCIATION BUSINESS MODELS. RHEA, MARSHA Brief Article Aug 1, 2000 638
CLEAR AND PRESENT DANGERS. LEE, HUGH K. Aug 1, 2000 1163
GOODBYE TO BUSINESS AS USUAL. LEVIN, MARK Brief Article Aug 1, 2000 916
Deliberating on ICANN. Kornfeld, Dori Jul 1, 2000 1037
Customizing the World on the Web. Peek, Robin May 1, 2000 1259
Bet on the Tortoise.com. RUNDLES, JEFF Brief Article May 1, 2000 697
Websites 101. Brief Article Dec 1, 1999 270
Working the Web. Uttenweiler, William L. Oct 1, 1999 2582
Providing Solutions for the Growing Trend Toward Home Healthcare. Nugent, Dempsey Sep 1, 1999 2208
The Economics of NETWORK MANAGEMENT. GUPTA, ALOK; STAHL, DALE O.; WHINSTON, ANDREW B. Sep 1, 1999 4591
ICANN AND INTERNET REGULATION. MUELLER, MILTON Jun 1, 1999 1739
A historical, economic, and legal analysis of municipal ownership of the information highway. Carlson, Steven C. Mar 22, 1999 20807
Tomorrow.net: don't think about the Internet as technology. Think about it as the future of your business. Ferrell, Keith Mar 15, 1999 3859
Diagnosing the Internet's ills. Peterson, Ivars Brief Article Jan 16, 1999 316
The Year the Information Industry Hit Bottom. Miller, Tim Dec 1, 1998 2262
Web measurement companies merge. Noack, David Oct 17, 1998 525
The civilization of cyberspace. Gerstner, John Interview Jun 1, 1998 2827
The future of Internet domain names: as the U.S. government pulls out, a breach in responsibility may result. Kennedy, Shirley Duglin Mar 1, 1998 2254
Connection to risk? Managing the exposures of cyberspace. Jorgensen, Lori Feb 1, 1998 2014
A formula for the future. Atkinson, Lloyd Dec 1, 1997 884
Who governs the Internet? Foster, Will A.; Rutkowski, Anthony M.; Goodman, Seymour E. Aug 1, 1997 3394
Internet congestion stirs up data storms. Peterson, Ivars Jul 26, 1997 747
Toward an access rights policy. Press, Larry Jul 1, 1997 2914
Internet 2: an overview of the next generation of the Internet. Saunders-McMaster, Laverna Mar 1, 1997 1991
The balkanization of the Internet. Sagawa, Paul I. Jan 1, 1997 4922
Hooking up to the Big-I Internet. Schuyler, Michael Sep 1, 1996 3952
Circumventing traffic jams on the Internet. Peterson, Ivars Brief Article Mar 23, 1996 453
Why catalog Internet resources. Jul, Erik Jan 1, 1996 1377
Internet facts, frivolity, and festivity. Kennedy, Shirley Duglin Dec 1, 1995 2226
Going inside with the Internet. Miller, Roy Nov 1, 1995 1401
CAS to offer scientists access to electronic-only documents. May 1, 1995 367
Changing lanes on the infobahn. Fitzgerald, Mark Feb 11, 1995 817
Privatizing Internet. Doherty, Brian Jan 1, 1995 347
Performance power from online services; here's how to ride the information superhighway and boost your business. Perozo, Hugo Jul 1, 1994 2213
Building foundations for the future. Quint, Barbara Feb 1, 1994 1476
The Internet. Nickerson, Gord column Sep 1, 1991 1913

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters