Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: PC Security

WSJ Investigates Extensive Web Tracking of Children Online

“A Wall Street Journal investigation into online privacy has found that popular children’s websites install more tracking technologies on personal computers than do the top websites aimed at adults.” “Marketers are spying more on young Internet users than on their parents, building detailed profiles of their activities and interests. The Wall Street Journal’s What They… Continue Reading

The Impact of Competition on Technology Adoption: An Apples-to-PCs Analysis

The Impact of Competition on Technology Adoption: An Apples-to-PCs Analysis, Federal Reserve Bank of New York, July 2010, Number 462, by Adam Copeland and Adam Hale Shapiro “We study the effect of market structure on a personal computer manufacturer’s decision to adopt new technology. This industry is unusual because there exist two horizontally segmented retail… Continue Reading

DHS OIG: DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems

OIG-10-111 – DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems, September 8, 2010 “Our audit focused on the security of the systems that US-CERT uses to accomplish its cybersecurity mission. Overall, NCSD has implemented adequate physical security and logical access controls over the cybersecurity program systems used to collect, process, and… Continue Reading

Cisco 2010 Midyear Security Report

Cisco 2010 Midyear Security Report – The impact of global security threats and trends on the enterprise “Web 2.0, mobility, virtualization, and other dramatic shifts in how we communicate and collaborate are carving out a new landscape for business and for enterprise security. The Cisco® Midyear Security Report examines these changes and their impact on… Continue Reading

Commerce Dept. launches major inquiry into cyber challenges to the Internet economy

[Federal Register: July 28, 2010 (Volume 75, Number 144)] [Notices][Page 44216-44223]: “The Department of Commerce’s Internet Policy Task Force is conducting a comprehensive review of the nexus between cybersecurity challenges in the commercial sector and innovation in the Internet economy. The Department seeks comments from all stakeholders, including the commercial, academic and civil society sectors,… Continue Reading

FTC Testifies on Efforts to Protect Consumer Privacy

News release: “The Federal Trade Commission testified [July 22, 2010] about FTC efforts to protect consumer privacy and commented on legislative proposals to improve privacy protections before the U.S. House Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce. The testimony presented by David Vladeck, Director of the FTC’s Bureau… Continue Reading

Hearing: Planning for the Future of Cyber Attack Attribution

“EPIC Executive Director Marc Rotenberg testified [July 15, 2010]before the House Committee on Science and Technology regarding Planning for the Future of Cyber Attack Attribution. In his prepared statement, Mr. Rotenberg discussed “the risks and limitations of a mandatory Internet ID that may be favored by some as a way to address the risk of… Continue Reading

New GAO Reports: Overseas Contingency Operations, Cybersecurity

Overseas Contingency Operations: Comparison of the Department of Defense’s Overseas Contingency Operations Funding Requests for Fiscal Years 2010 and 2011, GAO-10-889R, July 06, 2010 Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development, GAO-10-466, June 03, 2010 Expeditionary Fighting Vehicle (EFV) Program Faces Cost, Schedule and Performance Risks, GAO-10-758R, July 02, 2010 Continue Reading

Pew Report: The future of cloud computing

The future of cloud computing, by Janna Anderson, Lee Rainie, June 11, 2010 “Technology experts and stakeholders say they expect they will ‘live mostly in the cloud’ in 2020 and not on the desktop, working mostly through cyberspace-based applications accessed through networked devices. This will substantially advance mobile connectivity through smartphones and other internet appliances.… Continue Reading