MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Searcher
June 2003
Miriam Drake
You Ain't Seen Nothin' Yet: Patriot II on the Way This article focuses on the government's data mining, information gathering, database building programs, and Radio Frequency Identification Chips. mark for My Articles similar articles
PC Magazine
July 13, 2004
Alan Cohen
No Where To Hide The average American is listed in at least 50 databases, and that's not counting government files. Do you know what's in your cyber dossier? mark for My Articles similar articles
Reason
December 2004
Brian Doherty
Privacy in the Skies A yearlong chorus of anguish from privacy activists killed the proposed Computer Assisted Passenger Prescreening System, better known as CAPPS II. Now enter Secure Flight. mark for My Articles similar articles
Reason
March 2009
Brian Doherty
Follow Up: ID and Surveillance The techniques and practices for a universally tracked and databased America using RFID technology are out there and could be just five years away. mark for My Articles similar articles
Reason
June 2004
Declan McCullagh
Database Nation The upside of zero privacy in the U.S.: The aim should be to retain the tremendous benefits of living in a database nation while preventing it from devolving into a police state. mark for My Articles similar articles
Wired
December 2001
Adam L. Penenberg
The Surveillance Society Cell phones that pinpoint your location. Cameras that track your every move. Subway cards that remember. We routinely sacrifice privacy for convenience and security. So stop worrying. And get ready for your close-up... mark for My Articles similar articles
Reason
March 2005
Poole & Harper
Transportation Security Aggravation Debating the balance between privacy and safety in a post-9/11 aviation industry. mark for My Articles similar articles
Searcher
August 2000
Josh Duberman & Michael Beaudet
Privacy Perspectives for Online Searchers: Confidentiality with Confidence This article presents some of the issues and questions involved in online privacy from the information professional's perspective. We offer it as a resource for making more informed decisions in this rapidly changing area. mark for My Articles similar articles
Reason
February 2004
James Bovard
"Dominate. Intimidate. Control." The sorry record of the Transportation Security Administration mark for My Articles similar articles
Reason
December 2001
Guarding the Home Front Will civil liberties be a casualty in the War on Terrorism? A panel of experts discuss which civil liberties they think are most at risk in what has been called America's first 21st century war... mark for My Articles similar articles
InternetNews
March 16, 2007
Roy Mark
Data-Mine Time in The Senate Want to know what the government is collecting on you and what it's doing with the information? Good luck. mark for My Articles similar articles
CIO
June 1, 2004
Susannah Patton
Privacy Is Your Business What's the payoff for CIOs becoming privacy champions? Better business, more secure IT and a higher corporate profile. mark for My Articles similar articles
PC World
June 1, 2000
Daniel Tynan
Privacy 2000: In Web We Trust? In the real world, nobody knows what TV commercials you watch or which sitcoms you surf. When you go strolling through the mall, no one's making note of the stores you visit or the clothes you try on. But on the Internet, Web sites are doing all of this and more. And that makes some people mad as hell. mark for My Articles similar articles
Information Today
July 16, 2013
Nancy K. Herther
PRISM and the First Amendment: A Critical Issue Once Edward Snowden lands in some friendly country or decides to return to the U.S., we can hope that attention is again focused on PRISM and surveillance. So far, the responses from government officials have been less than stellar. mark for My Articles similar articles
Information Today
May 9, 2011
Nancy Herther
Mobile Privacy Issues Come to Capitol Hill -- Apple's iOS4 to be Examined in Senate Hearing Apple's iOS4 operating system for the iPhone and 3G iPad included software that is regularly recording the position of your device into a hidden file. mark for My Articles similar articles
Reason
October 2008
David Weigel
Who Killed Real ID? An unlikely coalition wins a post-9/11 victory for civil liberties, signaling that the United States is rediscovering its civil libertarian roots after the momentous disruption of 9/11.. mark for My Articles similar articles
Search Engine Watch
April 2, 2003
Danny Sullivan
Google And The Big Brother Nomination This article explores allegations by Google Watch that Google is a threat to privacy and Big Brother like. mark for My Articles similar articles
PC World
May 2001
Brad Grimes
Privacy Matters Marketers would love to find out all about you and your online activities. But what personal data should you let them obtain? We report on recent developments in Net surveillance and their effect on you... mark for My Articles similar articles
Reason
June 2004
Brian Doherty
Will It Fly The Federal Transportation Security Administration's (TSA) Computer Assisted Passenger Prescreening System II (CAPPS II) is behind schedule accroding to the General Accounting Office. mark for My Articles similar articles
Searcher
November 2005
Carol Ebbinghouse
Another Phine Kettle of Phish: Identity Theft Prevention Ten things to do today to protect yourself against identity theft. mark for My Articles similar articles
InternetNews
February 13, 2004
Roy Mark
Airline Screening Program Gets Failing Marks A new Government Accounting Office report concludes that the Computer Assisted Passenger Prescreening System (CAPPS II) fails to meet funding criteria mandated by lawmakers. mark for My Articles similar articles
BusinessWeek
August 8, 2005
Surveillance Society: The Experts Speak Excerpts from those conversations with privacy and security experts about how much security monitoring is necessary and what can be done to prevent abuses. mark for My Articles similar articles
National Defense
July 2004
Joe Pappalardo
Security Beat Airport Security Programs A Summer Priority... Data Mining Not Yet Ready To Take on Terror Cells... Maritime Test Center Off to Rolling Start... U.S. and Europe Reach Data-Sharing Accord... etc. mark for My Articles similar articles
Salon.com
September 14, 2001
Katharine Mieszkowski
Send in the online spooks? In the aftermath of terrorism, civil libertarians are running for cover. But are they protesting too much? mark for My Articles similar articles
InternetNews
February 22, 2006
Roy Mark
Tech Inadvertently Helps Spy Game A new report claims that popular services such as Webmail are eroding U.S. privacy laws. mark for My Articles similar articles
InternetNews
May 12, 2006
Roy Mark
Americans Get Shaft Over Data Mining Finally - maybe - Congress is gaining courage in rolling back Bush's domestic spying program. mark for My Articles similar articles
Information Today
May 3, 2012
Paula J. Hane
Online Consumer Privacy in the Spotlight Choose Privacy Week is being held May 1-7, 2012. The theme is "Freedom from Surveillance." The American Library Association's Office for Intellectual Freedom established Choose Privacy Week to deepen public awareness about this issue. The event is timely with many privacy issues like CISPA in the news. mark for My Articles similar articles
CIO
April 15, 2003
Ben Worthen
What to Do When Uncle Sam Wants Your Data As the czars of data, CIOs better be prepared when the FBI knocks on their doors. mark for My Articles similar articles
Reason
April 2001
Jennifer DePalma
Surfing Secrets The meanings of online privacy are multiple, and few authors present the facts and lay out the issues in a way that lets laypeople develop an informed opinion. Charles Jennings and Lori Fena's The Hundredth Window is, for the most part, an exception... mark for My Articles similar articles
CIO
June 15, 2003
Sarah D. Scalet
Balancing Act Alan Westin, who's been studying information privacy for 40 years, talks about the CIO's tricky role in protecting corporate data. mark for My Articles similar articles
CIO
March 15, 2006
Allan Holmes
The Profits in Privacy Contrary to popular belief, protecting the privacy of customer data and making a profit are not mutually exclusive goals. Here are several leading companies who have accomplished both and how they pulled it off. mark for My Articles similar articles
T.H.E. Journal
November 2007
Justine Brown
Tag! You're It! Requiring students to wear RFID-enabled badges can ease administrative tasks and tighten security, but some parents and advocacy groups think it insults children's dignity - and may threaten their safety. mark for My Articles similar articles
Salon.com
November 2, 1999
Maura Kelly
Is the Net in your locker room? Privacy abuses abound on the Internet -- but so far, the government doesn't appear to care. mark for My Articles similar articles
Managed Care
January 2002
Michael S. Victoroff
May I Please See Some Identification? Out of the darkness of terrorism, America's focus on homeland security casts new light on national ID cards. Conceivably, this could reanimate the stagnant debate over Universal Medical Record Identifiers... mark for My Articles similar articles
PC World
October 7, 2002
Michelle Madigan
Privacy Concerns Pushed to Front Lines Feds must explore, explain any effect on privacy by new policies or practices, under pending legislation. mark for My Articles similar articles
PC World
September 11, 2002
Andrew Brandt
A Year Later, Online Privacy and Security Still Weak Guarding both virtual and physical shores remains a challenge of checks and balances. mark for My Articles similar articles
IEEE Spectrum
January 2006
Erico Guizzo
Loser: Britain's Identity Crisis Proposed biometric ID cards won't prevent fraud or terrorism mark for My Articles similar articles
National Defense
October 2007
Grace Jean
TSA Prepares to Take Over Responsibility for Checking No-Fly Lists The Transportation Security Administration will compare passenger data to federal watch lists and transmit any matches to aircraft operators. mark for My Articles similar articles
Popular Mechanics
January 2009
Brian Krebs
When Hackers Attack: Practicing Cybersecurity at Home If your data isn't located on any one machine, it can never be lost or corrupted. But when your personal data isn't on your personal computer, it's out of your control. mark for My Articles similar articles
CIO
November 1, 2001
Alison Bass
Miller's Privacy Warning Information security lapses present one front of a looming courtroom battle. Legal Expert Arthur Miller says CIOs and corporate America also have to protect people's privacy -- or risk a jury's wrath... mark for My Articles similar articles
InternetNews
March 2, 2007
Roy Mark
REAL ID Deadline Evaporates Under Pressure The Department of Homeland Security postpones implementation of controversial law mandating standardized state driver's licenses linked in databases. mark for My Articles similar articles
PC World
October 5, 2001
Frank Thorsberg
PC World Poll Highlights Privacy Concerns Our online poll shows most readers are concerned about giving the government more power for online surveillance... mark for My Articles similar articles
Reason
April 2009
Katherine Mangu-Ward
State of Insecurity Interview with Bruce Schneier, the go-to guy for fresh ideas about all kinds of digital and physical security issues. mark for My Articles similar articles
Wall Street & Technology
March 2, 2004
Brendon Lynch
Web-Privacy Management Increases in Importance An organization's reputation is increasingly at risk online. Financial-services firms, in particular, are constantly updating their Web sites to provide readily accessible information, services and products to their customers and provide a high degree of visibility for the company and its brands.. mark for My Articles similar articles
CIO
January 1, 2002
Stephanie Viscasillas
Privacy Versus the FBI The antiterrorism law President Bush signed in late October makes it easier for officials investigating potential terrorist activity to get court orders to search companies' business records. It is important to take that into account in your privacy policy. mark for My Articles similar articles
CIO
January 15, 2004
Where the Candidates Stand - position of 2004 US presidential candidates regarding information technology The president of the United States should understand IT and why it's important to running the country. Let's see if these men and women do. The positions of 2004 US presidential candidates regarding information technology mark for My Articles similar articles
IEEE Spectrum
July 2008
Robert W. Lucky
Zero Privacy Almost a decade ago Scott McNealy, chairman and cofounder of Sun Microsystems, famously told reporters, "you have zero privacy anyway. Get over it." mark for My Articles similar articles
PC World
June 2006
Erik Larkin
New Privacy Threats As you guard your privacy against standard threats like spyware and phishing, your data is leaking out via legit firms you do business with. mark for My Articles similar articles
Salon.com
October 6, 2000
Simson Garfinkel
Mano a mano with John McCain At a committee hearing on online privacy, the senator asks me some tough questions and doesn't like what he hears... mark for My Articles similar articles
InternetNews
January 14, 2009
Kenneth Corbin
Web Firms, Advocates Draw Lines in Privacy Fight With reforms to the Privacy Act looming on the congressional agenda, how will Internet companies be affected? mark for My Articles similar articles