Welcome to the Globethics.net Library!
Comunidades no DSpace
Selecione uma comunidade para navegar nas coleções.
Broadband Wireless Access in EgyptThis paper discusses current and future
developments in wireless technology and infastructure in
Egypt. One of the important regulatory decisions made in
Egypt is that policy related to broadband wireless will be
technology neutral. Consequently, the regulator cannot
decide about which operators should use specific
technologies. This approach is beneficial for the overall
development of the market and deployment of networks
because: It allows operators and service providers to decide
on which technology or mix of technologies is best for given
service and market requirements, budget outlays, and
deployment scenarios. Such an approach promotes technical
and economic efficiency since each service
providerwill attempt to maximize revenues and
their subscriber base. The flexibility allows the regulator
to ensure that the market can deploy the latest technology
with the least regulatory overhead. Allowing only one
technology into the market place will restrict the range of
choices available to consumers.
Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for CongressIncreasing focus on current cyber threats to federal information technology systems, nonfederal critical information infrastructure, and other nonfederal systems has led to numerous legislative cybersecurity proposals and executive branch initiatives. The proposed National Defense Authorization Act for Fiscal Year 2010 and the Intelligence Authorization Act for Fiscal Year 2010 both contain provisions that would affect programs and funding for current and future cybersecurity-related programs. In May 2009, the Obama Administration issued its 60-day review of cybersecurity policy, declaring that U.S. information networks would be treated as a strategic national asset. There is no single congressional committee or executive agency with primary responsibility over all aspects of cybersecurity; each entity involved pursues cybersecurity from a limited vantage point dictated by committee jurisdiction. Many different initiatives exist, but because of fragmentation of missions and responsibilities, "stove-piping," and a lack of mutual awareness between stakeholders, it is difficult to ascertain where there may be programmatic overlap or gaps in cybersecurity policy. Drawing from common themes found in the Comprehensive National Cybersecurity Initiative (CNCI), a study by the Center for Strategic and International Studies (CSIS) Commission for the 44th Presidency, and the proposed near-term action plan from the President's recent Cyberspace Policy Review, this report identifies priority areas in cybersecurity for policy consideration. The report then lists and synopsizes current legislation that has been developed to address various aspects of the cybersecurity problem. It then lists the current status of the legislation and compares legislation with existing executive branch initiatives. Finally, analysis of information contained in executive branch initiatives and congressional legislation is used to offer cybersecurity-related considerations for Congress.
Social Networking, Internet Safety and Cyberbullying, An Update For EducatorsIn today’s technological age, school faculty faces a daunting task of teaching and mentoring children free of constant negative influence. Access to undesirable people and information is prevalent and extremely difficult to monitor. This is exacerbated by the fact that most kids are more proficient and comfortable with technology than adults. Consequently, faculty members need to educate themselves on the danger today’s children face from this constantly connected online world.