vetejj33's CIS105 Blog 12pm
Thursday, November 15, 2007
GOF 2.5 Protecting Privacy
›
GOF 2.5 Sarah Baase explained privacy technologies and how companies and "techies" are trying to help the user protect him or hers...
GOF 2.4 More Privacy Risks
›
GOF 2.4 Sarah Baase stresses the issue of a national identification system. The potential national ID card would contain a smart-card memory...
GOF 2.31and 2.3.3 Consumer Information
›
In the two sections of chapter two, Sarah Baase explains how the individual's information can leak out and cause more ads that invade pr...
Monday, November 12, 2007
2.2 Big Brother Is Watching You
›
In chapter 2.2 Sarah Baase explains how government agencies are invading our privacy by not obeying the Forth Amendment. Both the IRS and th...
1 comment:
Saturday, November 10, 2007
From Virtual Communities to Smart Mobs
›
Lane Jennings article "From Virtual Communities to Smart Mobs" stated the good the bad and the ugly about information sharing. One...
1 comment:
Friday, November 2, 2007
GOF Chapter 7 Computer Crime
›
In this chapter, Sarah Baase explains the term hacking. In the early days of computer programming a hacker was a creative programmer who wro...
1 comment:
Sunday, October 28, 2007
Freedom of speech in cyberspace chapter five: GoF
›
In chapter five A Gift of Fire, Sarah Baase tells us how the First Amendment protects our right to express his or her views on any topic. Bu...
1 comment:
›
Home
View web version