The Disruptive Power Of Networks

Cerf, Vinton G.
May 2007
Forbes Asia;5/7/2007, Vol. 3 Issue 8, p76
The article looks at the disadvantages of online networks. The author notes that the use of Internet exposes users to invasions of their privacy and identity theft, as well as misinformation. Aside from privacy intrusions, there may also be security holes in using the Internet. Computers may be hacked when they are connected to the Internet. He asserts that the devices attached to the Web will increase, which may include office technologies and household appliances.


Related Articles

  • Use Technology to Protect Personal Information. SKILES, DAN // Investment Advisor;Mar2013, Vol. 33 Issue 3, p63 

    The article discusses the importance of protecting personal information on the Internet through reducing the amount of personal information that are available. Several reasons as to why lessening the amount of information on the Internet is important were mentioned including to prevent fraud,...

  • Ontology Of Trusted Identity In Cyberspace. Katzan Jr., Harry // Journal of Service Science (19414722);2011, Vol. 4 Issue 1, p1 

    The nation's digital infrastructure is in jeopardy because of inadequate provisions for privacy, identity, and security. Recent Internet activity has resulted in an onslaught of identity theft, fraud, digital crime, and an increasing burden to responsible citizens. The computer security and...

  • THINK LIKE THE WOLF PROTECT YOUR CRITICAL INFORMATION WITH AN OPSEC PROGRAM. Larsen, Stephen // Army Communicator;Winter2003, Vol. 28 Issue 4, p52 

    The article offers information on operations security or OPSEC. The author stresses that people should not give other people or a stranger their social security number or home phone number simply because they do not need to know those information. Giving information to strangers could compromise...

  • Why trust is a big deal for UK companies and users. Tyrer, Andrew // Computer Weekly;11/22/2011, p9 

    The author discusses the important aspect of trust for companies and users in the information technology industry in Great Britain. He contends that a trust is a challenge of providing confidence and security in doing business or executing personal transactions. He stresses that the growth in...

  • U.S. Home of Spam and Hackers.  // Special Education Technology Practice;May/Jun2007, Vol. 9 Issue 3, p7 

    The article reports on the findings of the "Internet Security Threat Report" released by researchers at Symantec Corp. in the U.S. in 2007. The study found that the country develops more malicious computer activity than any other country. It notes that criminals can purchase a complete identity...

  • Report: Phishers Casting Wider Net.  // American Banker;11/30/2005, Vol. 170 Issue 228, p11 

    The article discusses a report released by the Anti-Phishing Working Group. The report indicates that while the number of phishing attacks has declined, the phishers are going after a wider variety of companies.

  • Online. Lindenmayer, Isabelle // American Banker;12/9/2005, Vol. 170 Issue 235, p5 

    The article reports that internet security remains a big concern for many companies. Roughly 1 in 4 Americans receive phishing e-mails designed to help fraudsters steal identities and 70% of consumers who received scam e-mail thought it came from legitimate companies. Areas of improvement...

  • Identity Crisis. Downes, Larry // CIO Insight;Jul2005, Issue 55, p33 

    The proliferation of identity theft in the United States revealed the insufficiency of federal laws to combat and prevent such crimes. Existing conditions reveal how easily identity thieves can get the data they need, either by fraud, hacking, or simply asking for it. Some of the revelations of...

  • The Newest Internet Scams. Bauknight, Trevor Zion // Business & Economic Review;Oct-Dec2005, Vol. 52 Issue 1, p19 

    Explains that "spear-phishing electronic mail" is an Internet scam that involves the use of social engineering to convince Internet users to surrender their personal information such as passwords. Targeting of a small, clearly defined group of potential victims; Implications for enterprise...


Read the Article


Sign out of this library

Other Topics