Welcome to the Globethics.net Library!

 

  • The Internet: "Full and Unfettered Access" to Law -- Some Implications

    Martin, Peter W. (Scholarship@Cornell Law: A Digital Repository, 1999-07-01)
  • Broadband Wireless Access in Egypt

    World Bank (Washington, DC, 2013-03-26)
    This paper discusses current and future
 developments in wireless technology and infastructure in
 Egypt. One of the important regulatory decisions made in
 Egypt is that policy related to broadband wireless will be
 technology neutral. Consequently, the regulator cannot
 decide about which operators should use specific
 technologies. This approach is beneficial for the overall
 development of the market and deployment of networks
 because: It allows operators and service providers to decide
 on which technology or mix of technologies is best for given
 service and market requirements, budget outlays, and
 deployment scenarios. Such an approach promotes technical
 and economic efficiency since each service
 providerwill attempt to maximize revenues and
 their subscriber base. The flexibility allows the regulator
 to ensure that the market can deploy the latest technology
 with the least regulatory overhead. Allowing only one
 technology into the market place will restrict the range of
 choices available to consumers.
  • Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress

    LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE; Theohary, Catherine A.; Rollins, John (2009-09-30)
    Increasing focus on current cyber threats to federal information technology systems, nonfederal critical information infrastructure, and other nonfederal systems has led to numerous legislative cybersecurity proposals and executive branch initiatives. The proposed National Defense Authorization Act for Fiscal Year 2010 and the Intelligence Authorization Act for Fiscal Year 2010 both contain provisions that would affect programs and funding for current and future cybersecurity-related programs. In May 2009, the Obama Administration issued its 60-day review of cybersecurity policy, declaring that U.S. information networks would be treated as a strategic national asset. There is no single congressional committee or executive agency with primary responsibility over all aspects of cybersecurity; each entity involved pursues cybersecurity from a limited vantage point dictated by committee jurisdiction. Many different initiatives exist, but because of fragmentation of missions and responsibilities, "stove-piping," and a lack of mutual awareness between stakeholders, it is difficult to ascertain where there may be programmatic overlap or gaps in cybersecurity policy. Drawing from common themes found in the Comprehensive National Cybersecurity Initiative (CNCI), a study by the Center for Strategic and International Studies (CSIS) Commission for the 44th Presidency, and the proposed near-term action plan from the President's recent Cyberspace Policy Review, this report identifies priority areas in cybersecurity for policy consideration. The report then lists and synopsizes current legislation that has been developed to address various aspects of the cybersecurity problem. It then lists the current status of the legislation and compares legislation with existing executive branch initiatives. Finally, analysis of information contained in executive branch initiatives and congressional legislation is used to offer cybersecurity-related considerations for Congress.
  • Countering Islamic State Exploitation of the Internet

    Fidler, David P. (Digital Repository @ Maurer Law, 2015-01-01)
  • Social Networking, Internet Safety and Cyberbullying, An Update For Educators

    Straub, Melissa J (Digital Commons@Georgia Southern, 2020-03-04)
    In today’s technological age, school faculty faces a daunting task of teaching and mentoring children free of constant negative influence. Access to undesirable people and information is prevalent and extremely difficult to monitor. This is exacerbated by the fact that most kids are more proficient and comfortable with technology than adults. Consequently, faculty members need to educate themselves on the danger today’s children face from this constantly connected online world.

Ver mais