TITLE

Security termed critical component of upcoming digital revolution

AUTHOR(S)
McGuire, Mike
PUB. DATE
July 1993
SOURCE
PC Week;7/19/93, Vol. 10 Issue 28, p135
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on the warning issued by a group of industry executives participating in a panel on security and copyright protection at Seybold Digital World Conference. Protection of intellectual property against pranksters and computer criminals; RSA Data Security Inc.'s encryption technology; Conflict between the government's responsibility to protect the public and the individual's right to privacy.
ACCESSION #
9309301143

 

Related Articles

  • Security funds close to being slashed. English, Erin // Australian Personal Computer;Jun95, Vol. 16 Issue 6, p20 

    Reports on the US Congress' plan to reduce funding for computer security research and development programs. Security research cuts' impact on advances in electronic commerce and the United States' success in the world market; Budget cuts in the area of cryptography and encryption.

  • Hackers of the world, unite! Schwartz, J. // Newsweek;7/2/1990, Vol. 116 Issue 1, p36 

    Reports on the government crackdown on computer tampering and the announcement due next week of a new foundation intended to combat computer phobia and provide legal aid from some people snared in the `hacker dragnet.' Investigation is out of proportion; Mitch Kapor, founder of Lotus...

  • Norm Proselytizers Create a Privacy Entitlement In Cyberspace. Hetcher, Steven A. // Berkeley Technology Law Journal;Summer2001 Supplement 1, Vol. 16, p877 

    Explores an important development in the informal regulation of online privacy. Significance of privacy norm proselytizers; Examination on the non-moral social meaning of the personal data collection practices; Emphasis on the support of other norm entrepreneurs.

  • Getting cybersecurity right. Johnson, Ron // Hill;3/27/2012, Vol. 19 Issue 39, p20 

    The article offers the author's insights regarding the move of the U.S. government to address the threat of cyberterrorism in the country's computer system through supporting proposals in U.S. Congress which allow the federal government to mandate regulations to the private sectors.

  • Computers and privacy: call for independent protection body.  // Accountancy;Nov77, Vol. 88 Issue 1011, p20 

    Reports on the joint statement issued by The British Computer Society, The Computing Services Association and The Data Processing Management Association on the establishment of a licensing body. Section of the government to counter the improper use personal data by computer users; Legal...

  • Threat posed by hackers largely imaginary. Steinberg, Steve G. // Inside Tucson Business;7/29/96, Vol. 6 Issue 18, p13 

    Comments on the perceived and actual risk posed by hackers. Use of hackers as a bogeyman to justify the `Manhattan Project'; Cyber threats cited by US Deputy Attorney General Jamie Gorelick at a government conference on `National Security in the Information Age'; Absolute security as outrageous.

  • PROMISE OF SECURITY. Coffee, Peter // eWeek;1/20/2003, Vol. 20 Issue 3, p37 

    Reports on the efforts of the U.S. government in implementing effective computer network security. Concern of private-sector information technology firms about the impact of government rules for network security; Problem threatening the effectiveness of all perimeter-focused security systems;...

  • Privacy in a Wired World. Munro, Neil // National Journal;10/24/98, Vol. 30 Issue 43, p2498 

    Addresses the issue of privacy of personal data in computers in the United States. Efforts being taken by the government to solve privacy issues; Privacy guidelines of some organizations; Restrictive legislation for the health care industry. INSET: Look who's allied with the ACLU.

  • Call Security!  // Multichannel News;4/2/2012, Vol. 33 Issue 14, p18 

    An interview with chief technology officer Robert Fleischman of Xerocole about cybersecurity is presented.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics