Government looks to grants for online boost

November 2001
Engineer (00137758);11/30/2001, Vol. 290 Issue 7580, p10
No abstract available.


Related Articles

  • Welcome to the new e-commerce minister. Holyer, Jamie // New Media Age;7/4/2002, p22 

    Provides information on electronic commerce (e-commerce) in Great Britain. Details on the resignation of e-commerce minister Douglas Alexander; Career background of Alexander; Details on his tenure as e-commerce minister.

  • Who can stop cybervandals? Koerner, Brendan I.; Glasser, Jeff // U.S. News & World Report;02/28/2000, Vol. 128 Issue 8, p54 

    Reports on efforts by the United States government to tighten Internet security to prevent computer hackers from breaking into web sites. Response to early February attacks which temporarily disabled several high-profile electronic commerce sites, such as Yahoo! and eBay; Estimated amount that...

  • Security funds close to being slashed. English, Erin // Australian Personal Computer;Jun95, Vol. 16 Issue 6, p20 

    Reports on the US Congress' plan to reduce funding for computer security research and development programs. Security research cuts' impact on advances in electronic commerce and the United States' success in the world market; Budget cuts in the area of cryptography and encryption.

  • Hackers of the world, unite! Schwartz, J. // Newsweek;7/2/1990, Vol. 116 Issue 1, p36 

    Reports on the government crackdown on computer tampering and the announcement due next week of a new foundation intended to combat computer phobia and provide legal aid from some people snared in the `hacker dragnet.' Investigation is out of proportion; Mitch Kapor, founder of Lotus...

  • Security termed critical component of upcoming digital revolution. McGuire, Mike // PC Week;7/19/93, Vol. 10 Issue 28, p135 

    Reports on the warning issued by a group of industry executives participating in a panel on security and copyright protection at Seybold Digital World Conference. Protection of intellectual property against pranksters and computer criminals; RSA Data Security Inc.'s encryption technology;...

  • Norm Proselytizers Create a Privacy Entitlement In Cyberspace. Hetcher, Steven A. // Berkeley Technology Law Journal;Summer2001 Supplement 1, Vol. 16, p877 

    Explores an important development in the informal regulation of online privacy. Significance of privacy norm proselytizers; Examination on the non-moral social meaning of the personal data collection practices; Emphasis on the support of other norm entrepreneurs.

  • Getting cybersecurity right. Johnson, Ron // Hill;3/27/2012, Vol. 19 Issue 39, p20 

    The article offers the author's insights regarding the move of the U.S. government to address the threat of cyberterrorism in the country's computer system through supporting proposals in U.S. Congress which allow the federal government to mandate regulations to the private sectors.

  • Computers and privacy: call for independent protection body.  // Accountancy;Nov77, Vol. 88 Issue 1011, p20 

    Reports on the joint statement issued by The British Computer Society, The Computing Services Association and The Data Processing Management Association on the establishment of a licensing body. Section of the government to counter the improper use personal data by computer users; Legal...

  • Threat posed by hackers largely imaginary. Steinberg, Steve G. // Inside Tucson Business;7/29/96, Vol. 6 Issue 18, p13 

    Comments on the perceived and actual risk posed by hackers. Use of hackers as a bogeyman to justify the `Manhattan Project'; Cyber threats cited by US Deputy Attorney General Jamie Gorelick at a government conference on `National Security in the Information Age'; Absolute security as outrageous.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics