The UN's ten-year review of World Summit on Information Society (WSIS) concluded successfully with the adoption of the WSIS+10 Resolution on 16 Decemb...
Google and Facebook would love to operate in China, especially now that it has an officially confirmed netizen population of 668 million. One man stands in their way: China's all-powerful Internet czar, Lu Wei, whose official title is Minister of Cyberspace Administration. But standing behind Lu is 3000 years of Chinese political culture that is diametrically opposed to the libertarian ethos of Silicon Valley. The ideology encoded in the technological innovations of California's software engineers -- to empower the individual and dispense with governing intermediaries -- contrasts sharply with the long history of China's "institutional civilization" that, for centuries, has empowered state authorities to rule on behalf of the people. Chinese President Xi Jinping is surely right when he told the World Internet Conference in Wuzhen this week that "freedom and order are both necessary in cyberspace." But where that line is drawn makes all the difference. (continued)
These Questions originally appeared on Quora - the knowledge sharing network where compelling questions are answered by people with unique insights. ...
China may be more explicit about "Internet sovereignty," but the U.S. and other Western nations themselves have encouraged the emergence of virtual borders as both a prudent response to the demands of civil society and as a means to promote their preferred modes of governance. China simply represents an extreme example of a much wider phenomena.
What Anonymous is engaged in is nothing short of intimidation. If you truly value free speech and an open, discourse, this kind of action should scare you. To see self-proclaimed liberals carrying torches and cheering as someone's website is defaced for the merely content of their speech, is profoundly disappointing, especially because there are so many legitimate ways to handle people like Trump or the Westboro Baptists.
One of the best ways to protect your tax return information is to file your tax return as early as possible, and for most people that starts around mid-January. If you file your return first, an identity thief won't be able to.
Growing up in a cyber world, young adults and youth are bombarded with social media statistics that define their online usage using numbers and values.
Why aren't smart phone users paying at stores with their phones? The short answer to this complex question is user loyalty incentives that integrate with a centralized mobile payment hubs and education on the security standards of mobile payment systems.
Jacob Appelbaum's opening remarks at the World Forum for Democracy 2015, posted November 20th, should be required viewing on the internet today as the power brokers of the world meet in Paris to discuss climate catastrophe shadowed by terrorism.
I did not want to be so dramatic, but I could not help but be completely honest as well. The end possibility is that your entire organization may suffer the fate of Sony Pictures, target, Anthem and others who have been shaken by hacks and vulnerabilities in their networks.
It is difficult to think of two issues with a greater potential to negatively impact both our environment and the global economy than climate change a...
Every day criminals are finding new ways to compromise devices and steal identities. While consumers understand this, many still don't take the necessary precautions to stay safe. Next time you think about casting security aside and sharing your password with a friend, imagine what you could do with an extra $300.
The November 13 attacks in Paris were tragic, and our hearts and thoughts are with the people of Paris. We stand ready to work with law enforcement to prevent future such horrific incidents.
A couple of years ago when some 40 million credit cards were breached at Target's brick-and-mortar stores, I frantically tried to recall if I had done any holiday shopping at my neighborhood store. Thankfully I hadn't, but my relief was short-lived.
Encryption, a process that scrambles communications, allows only those with the decryption key to read one's messages. An encrypted message looks like random alphanumeric gibberish to the human eye. The longer the key, the more time and computer power it requires to unscramble.
In 2015, somewhere in the neighborhood of 1 billion Internet of Things (IoT) devices will be purchased, an increase of 60 percent over the previous year. There will be 10 billion IoT devices connected to the Internet this year.