ETPRO

      Educational Technology Policy, Research, & Outreach

 



















What's New

Cyberethics/Cybersecurity

  Department of Homeland Security and NCSA’s 2006 Emerging Internet Threat List: Helping Consumers Prepare to Avoid Potential Threats - Released February 15, 2006
  ACM TechNews - Volume 5, Number 534 - August 18, 2003
  • "Cybersecurity Chairman: Infosec Mandates May Be Needed"House Subcommittee on Cybersecurity, Science, Research and Development Chairman Rep. William Thornberry (R-Texas) says he is considering legislation that would require private industry to improve cybersecurity. His influence over federal cybersecurity ...http://www.acm.org/technews/articles/2003-5/0818m.html#item2 and http://www.infoworld.com/article/03/08/15/HNcybersecurity_1.html
  • "A Spray-on Computer Is Way to Do IT" Edinburgh University researchers have received a grant of 1.3 million pounds from the Scottish Higher Education Funding Council to develop ubiquitous computing technology in which mote-sized computers can be sprayed on objects and communicate their ...http://www.acm.org/technews/articles/2003-5/0818m.html#item5
  • "DNS Inventor Says Cure to Net Identity Problems Is Right UnderOur Nose" Paul Mockapetris, chairman of Nominum and the writer of the DNS protocol, is focused on addressing the problem of identity theft on the Internet. Considering possible solutions to identity issues on the Internet, Mockapetris declares, "We can use ...http://www.acm.org/technews/articles/2003-5/0818m.html#item7
  • "Keeping the Net Neutral" The so-called "Net neutrality" proposal the Coalition of Broadband Users and Innovators submitted to the FCC in July wants the federal government to regulate the broadband Internet in order to ensure that cable companies do not discriminate between ...http://www.acm.org/technews/articles/2003-5/0818m.html#item9
  • "Data Search Stirs Concern" The war on terrorism and the homeland security push have made citizen cross-checking and profiling a government priority, which is in turn fostering the creation of companies that wish to sell private and public data to federal agencies. There is, however, ...http://www.acm.org/technews/articles/2003-5/0818m.html#item12
  ACM TechNews - Volume 5, Number 532 - August 13, 2003
  • "U.S. Tech Workers Training Their Replacements" American tech workers are frustrated and disgusted that they are being forced to train replacements from India and other foreign lands brought in on visas such as the L-1. The L-1 classification permits companies with U.S. branches to send ... http://www.acm.org/technews/articles/2003-5/0813w.html#item6
  • Display Is All Smoke and Mirrors" University of Finland researchers demonstrated the feasibility Of "Fog Screen" technology at ACM SIGGRAPH's recent EmergingTechnologies event. The Fog Screen prototype consists of a non-turbulent, laminar airflow within which a thin layer of dry, ...http://www.acm.org/technews/articles/2003-5/0813w.html#item12
  • "Wireless Network Attacks Get a Public Airing" The USENIX Association's recent Security Symposium in Washington was a showcase for federally funded academic research focusing on security threats to wired and wireless networks. Stanford University researchers demonstrated a timing attack, in which a ... http://www.acm.org/technews/articles/2003-5/0813w.html#item13
  eSchool News

Computer worm exploits Windows flaw, snarls networks Educators who use Windows-based computers at school or at home have an urgent new reason to patch a serious flaw that was discovered in nearly all versions of Windows last month: An internet-borne infection incapacitated tens of thousands of computers Aug. 12, snarling company networks and frustrating home users as it spread across the globe.... other links related: Links:

  ENC August 19, 2003
  ACM - May 2003
  • "Take Tech Threats Seriously, Feds Say" - Charles McQueary of the Homeland Security Department told the House Select Committee on Homeland Security's Subcommittee on Cybersecurity, Science, and Research and Development on Wednesday that the department's budget for biological and nuclear attack ... http://www.acm.org/technews/articles/2003-5/0523f.html#item5
  • "Canadian Security Conference Features Weird and Woeful Predictions" - The 15th annual Canadian IT Security Symposium was characterized by predictions of both positive and negative developments. In the former category, John Heidenreich of IBM Research forecasted that machines built from nanotechnology will start appearing by ... http://www.acm.org/technews/articles/2003-5/0523f.html#item12
  • "Proof of Concept" - Net Effect columnist Simson Garfinkel suggests that the some of the computer virus outbreaks that have plagued the Internet in recent years are merely proof-of-concept tests for a truly devastating online assault organized by a secret ... http://www.acm.org/technews/articles/2003-5/0523f.html#item18



Educational Technology Policy,
Research, & Outreach
http://www.edtechpolicy.org//
dpruitt@umd.edu
  Copyright © 2009 ETPRO