The Community for Technology Leaders
RSS Icon
Issue No.06 - Nov.-Dec. (2012 vol.16)
pp: 78-81
Drafting and passing federal laws aimed at curbing online copyright violations or discouraging hacking into private databases has proven difficult enough, but a greater challenge looms: top cybersecurity officials worry that major infrastructure elements such as financial, electrical, and water systems could be taken down if cybersecurity legislation continues to be deferred.
legislation, copyright, data privacy, cybersecurity legislation, federal laws, online copyright violations, hacking, private databases, cybersecurity officials, infrastructure elements, Copyright, Law, Legal aspects, Privacy, Database systems, Computer crime, Cybersecurity, Piracy, Computer hacking, Internet, hacktivism, cybersecurity legislation, online piracy, hacking
S. Ruth, S. Stone, "A Legislator's Dilemma", IEEE Internet Computing, vol.16, no. 6, pp. 78-81, Nov.-Dec. 2012, doi:10.1109/MIC.2012.127
1. S. Cowley, “NSA Wants to Hire Hackers,” CNN,29 July 2012; defcon-nsaindex.htm.
2. S. Musil, “Hackers Post 450K Credentials Pilfered from Yahoo,” CNET,11 July 2012; http://tinyurl.com9obbejh.
3. D. George-Cosh, “Online Group Declares War on Scientology,” Nat'l Post,26 Jan. 2008; http://tinyurl.com9yr2hrm.
4. “Anonymous Claims Responsibility for Taking Down Government Sites,” The Guardian,8 Apr. 2012; anonymous-taking-down-government-websites .
5. R. King, “Anonymous Hacks DOJ, RIAA, MPAA, and Universal Music Websites,” ZD Net,19 Jan. 2012; 67590 .
6. C. Connelly, “Anonymous Hackers Cripple Australian Government Websites,” Fox News,24 July 2012; /.
7. “Anonymous Hackers Target Energy Majors,” UPI,18 July 2012; http://tinyurl.com8vzsmm8.
8. “Syria File,” WikiLeaks,5 July 2012; www.wikileaks.orgsyria-files/.
9. N. Kozloff, “Condi and Hillary's 'Tug of War' with Chavez in Paraguay,” WikiLeaks Central,17 July 2012;
10. A. Fitzpatrick, “Obama Gives Thumbs-Up to New Cybersecurity Bill,” Mashable, 20 July 2012; /.
11. R. Reitman and L. Tien, “New Cybersecurity Proposal Patches Serious Privacy Vulnerabilities,” Electronic Frontier Foundation,19 July 2012; http://tinyurl.com84699tw.
12. C. Arthur, “The Right to Peer Inside Your iPod,” The Guardian,9 July 2008;
13. C. Arthur, “ACTA Down, But Not Out, as Europe Votes Against Controversial Treaty,” The Guardian,4 July 2012; acta-european-parliament-votes-against .
14. W. Oremus, “Judge Rules that Wikileaks Cables Are Still Secret,” Slate,24 July 2012; http://tinyurl.com9a6qd36.
15. C. Long, “Hackers Busted After 1 Becomes FBI Informant,” Seattle Pi,10 Mar. 2012; .
16. C. Albanesius, “Turkey Arrests 32 'Anonymous' Members,” PCMag,13 June 2011;,2817,2386803,00.asp .
17. G. Gross, “DOJ Files Additional Charges in MegaUpload Case,” PC World,17 Feb. 2012; http://tinyurl.com8nyfx7j.
18. W.M. Welch, “Defense Seeks to Toss Dotcom MegaUpload Piracy Case,” USA Today,29 July 2012; http://tinyurl.com8dqbheg.
19. S. Ruth, “Is There a Digital Divide? Check the Numbers,” IEEE Internet Computing, vol. 16, no. 4, 2012, pp. 80–83.
20. J. Smith, “House Unanimously Approves UN Internet Resolution,” Nat'l J.,2 Aug. 2012; 2012/08house-unanimously-approves-un.php .
21. A. Kilyakov, “Russia Passed Internet Blacklist Bill,” Russia Beyond the Headlines,12 July 2012; .
22. “Cyber War: Sabotaging the System,” 60 Minutes,10 June 2010; main6568387.shtml.
15 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool