Software monitoring and blocking tools have become commonplace within the work environment and have been used in order to protect company intellectual assets from employees who either deliberately or accidentely become the cause of security issues. In addition to this, one of the main arguments for such tools is the idea that they increase employee productivity.
Workplace Monitoring and Blocking Software
Software Piracy on an International Scale
Copyright has become a huge issue and talking point recently with continual legal challenges, the introduction and defeat of the Stop Online Piracy Act (SOPA) and considerations for future legislation, challenges and controversy. The United States leads the world in having some of the toughest copyright laws on the books.
3D Printing, Copyright and Legal Matters
During the 1980s the role playing games like Dungeons and Dragons saw the rise in popularity of model or figurine molds, which essentially allowed players to create character’s using casting kits. These were in effect a very early day version of 3D printing, which has introduced the production of physical objects in the home. 3D printing has become more sophisticated in recent years...
Regulation vs Innovation
One of the ongoing discussions in the United States focuses on the need for regulation versus the need to free business from restrictive laws that would hinder innovation. There are many sources that provide strong arguments for both sides. You only have to look as far as the current state of patent regulations and recent lawsuits involving tech giants Samsung and Apple to see the impact these...
Identity Theft and Inexperienced Internet Users
Identity theft has been a growing concern over the last decade. In recent years it has become a major problem for many as the Internet has taken over much of the day to day banking many traditionally did at their physical located branches. Is there however a bigger concern with less knowledgeable and inexperienced Internet users, and are these users at a higher risk of becoming...
Online Anonymity: Good or Bad?
Anonymity on the Internet provides an important layer of protection for people to express themselves online, while keeping their real life identity private. It has led to both positive as well as negative implications over the years and there has been much discussion on the benefits and drawbacks on both sides.
Financial Sector Cybersecurity Regulations
(Bidgoli, 2006) describes the statutory approach in the United States as being sectorial in nature “because the laws are drawn along industry lines.” This contrasts other parts of the world, such as the European Union, which has a non-sectorial approach where, for example a comprehensive privacy law applies to all organizations regardless of their industry.
Hacktivism, Anonymous, and the Bureau of Justice Statistics
In recent years news stories have highlighted the increasing rate of cybercriminal activity targeting both private organizations and government entities. Cases from mischievous amateur hackers managing to exploit basic vulnerabilities, to more advanced security breaches carried out by expert criminal hackers and cybercrime organizations overseas, have grabbed the attention of the media.
Mobile Cybersecurity Policies in the Private and Public Sector
“We are moving into a new era of mobile computing, one that promises greater variety in applications highly improved usability, and speedier networking.” Godwin-Jones (2008). This statement rings true for the past five years where mobile computing has seen a massive explosion in growth.
Philosophical Assumptions for Qualitative Research
This post contains affiliate links. If you click through and make a purchase, I may receive a commission (at no additional cost to you). As an Amazon Associate I earn from qualifying purchases. This helps support the blog and allows me to continue to make free content. Thank you for your support! In any kind of work or study, we always bring a certain set of beliefs as well as philosophical...
Hacking as an Addiction
Hacking can be broken into several categories, including criminal hacking where the perpetrator is motivated by some tangible gain, usually monetary. There are other forms of hacking which are driven by other factors such as political reasons.
Motivation and Intent of Hackers
Just over a decade ago I began learning about web technologies and found myself learning basic HTML. I was excited when I managed to publish my first website, which was no more than a basic homepage with some external links.
Online Teaching and Learning Experiences in Higher Education
In 2007 I graduated from the University of Ulster’s new E-Learning masters program. For my thesis, I developed a research study on collaborative learning and more specifically the adoption of Adobe Connect at the University of Maryland University College.
Ethical vs Non-Ethical Hackers
In their paper on understanding risks associated with hackers/crackers, (Smith, & Rupp 2002) discuss the various types of classification hackers have been placed into by different authors over the years.
Drupal Ladder
Last week I attended my first Drupal ‘learn sprint’. For anyone interested in contributing to the Drupal community, learn sprints are a great way to network with other professionals in the area while learning how you can contribute to Drupal.
Health Services and Challenges facing the Low-Literacy Population
In the United States, a large proportion of the population falls into the category of having low literacy skills. “A long-awaited federal study finds that an estimated 32 million adults in the USA — about one in seven — are saddled with such low literacy skills that it would be tough for them to read anything more challenging than a children’s picture book or to understand a...
Will the Mandiant Report Raise Public Awareness?
The Mandiant report: APT1: Exposing One of China’s Cyber Espionage Units, has stirred up a lot of media attention over the past few weeks. The report was originally released to show evidence that a specific Chinese military unit has been behind many major Advanced Persistent Threats (APTs) within the United States.
Mobile Security
Underlying vulnerabilities in mobile device software has also opened up the door to potential security breaches. In an article describing mobile application security flaws, (Westervelt, 2010) wrote that it was discovered that many mobile application security vulnerabilities were similar to those found in early web applications.
One audit standard fits all?
Computer applications are constantly evolving; while web based systems continue to grow in complexity. It is essential that these systems are properly secured both at the server level as well as at the code or application level, therefore Information Systems audit standards, more specifically focused on application and development measures provide some of the most useful valuable...