Information Technology Reference
In-Depth Information
5
McMillan, Robert and Mullins, Robert, “United Flights Grounded by
Computer Glitch,” Computerworld, June 21, 2007.
41
“DirectRevenue LLC Settles FTC Charges,” Federal Trade Commis-
sion Web site, February 16, 2007, www.tfc.gov/opa/2007/02, accessed
July 1, 2008.
Colliver, Victoria and Muscat, Sabine, “Wells Fargo ATM, Other
Glitches Last Longer Than First Reported,” San Francisco Chroni-
cle, August 22, 2007.
6
Keizer, Gregg, “VA Loses Another Hard Drive, Vet Data At Risk,”
Information Week, February 5, 2007.
42
Barak, Sylvie, “Getting Fired for Using the Internet Becomes
Commonplace,” The Inquirer, March 3, 2008.
Vijayan, Jaikumar, “Another Day, Another Laptop Theft: Now, It's
Connecticut's Revenue Agency,” Computerworld, August 31, 2007.
7
43
8
Stackel, I.M., “Another Collier Employee Fired for Inappropriate
E-mails,” NaplesNews.com, July 2, 2008.
44
Fonseca, Brian, “Personal Data on 800,000 Gap Job Applicants
Exposed in Laptop Theft,” Computerworld, September 26, 2007.
9
Havenstein, Heather, “IT Officials Are Clearing BI Hurdles to Expand
Systems,” Computerworld, May 28, 2007.
45
Claburn, Thomas, “Record Number of Data Breaches Reported in
2007,” Information Week, December 31, 2007.
Gumbel, Peter, “4 Things I Learned from Societe Generale,” CNN
Money, February 1, 2008.
McGee, Marianne Kolbasuk, “Laptop Stolen with Personal Data on
300,000 Health Insurance Clients,” Information Week, January 30,
2008.
10
46
Schwartz, Nelson D. and Bennhold, Katrin, “Societe Generale Scan-
dal: 'A Suspicion That This Was Inevitable,'” International Herald
Tribune, February 5, 2008.
11
Puzzanghera, Jim, “Laptop Seizures at Customs Raise Outcry,” Los
Angeles Times, June 26, 2008.
47
Vance, Jeff, “Using Policy and Compliance Tools to Reduce Insider
Threats,” at www.cioupdate.com, accessed June 27, 2008.
“What is Software Piracy?” Business Software Alliance Web site,
www.bsa.org/country.aspx, accessed July 3, 2008.
12
48
13
Miller, Chuck, “ATM Hackers Net Millions Using Stolen Information,”
Secure Computing, June 20, 2008.
49
“Worldwide Software Piracy Rate Holds Steady at 35%; Global Losses
up 15%,” Business Software Alliance, www.bsa.org/country,
accessed July 3, 2008.
14
Barak, Sylvie, “Hacker Exposes Six Million Chilean's Data to Make a
Point,” Secure Computing, May 13, 2008.
50
US Code: Title 17 Copyrights, Cornell University Law School,
www.law.cornell.edu/uscode/17, accessed July 3, 2008.
Thomson, Iain, “Ukrainian Hacker May Get to Keep Profits,” Secure
Computing, February 19, 2008.
15
“Judgment Entered Against PA Company for Widespread Unautho-
rized Distribution of Software,” Business Software Alliance Web site,
April 24, 2008, www.bsa.org/country, accessed July 3, 2008.
51
Thurston, Richard, “U.S. School Network Falls Victim to Child
Hacker,” Secure Computing, May 27, 2008.
16
Carr, Jim, “Californian Indicted in US $50,000 Scam of E*Trade,
Schwab.com,” Secure Computing, May 30, 2008.
“Los Angeles-Area Engineering Company Pays $250,000 to The
Business Software Alliance,” April 14, 2008, www.bsa.org/country,
accessed July 3, 2008.
17
52
18
Regan, Keith, “Web Crime Spikes in 2007, Losses Near $240 M,”
Electronic Commerce Times, April 4, 2008.
53
Jones, K.C., “Music Piracy Costs U.S. Economy $12.5 Billion, Report
Reveals,” InformationWeek, August 22, 2007.
19
“CSI Survey 2007,” GoCSI.com, accessed June 27, 2008.
“Two Site Operators Receive Prison Terms for Criminal Copyright
Infringement,” United States Department of Justice Web site, May 14,
2008 accessed at www.usdoj.gov/usaso/can/press on July 3, 2008.
54
20
Greenemeier, Larry, “The Threat Within: Employees Pose the Biggest
Security Risk,” InformationWeek, July16, 2007.
Kaplan, Dan, “MTV Breach Impacts 5,000 Employees, Successful
Social-Engineering Blamed,” Secure Computing, March 11, 2008.
21
“Jones, K.C., “TorrentSpy Ordered to Pay $100 Million in Piracy
Case,” InformationWeek, May 8, 2008.
55
Ko, Carol, “Malaysia to Build Centre to Study Cyberterrorism,” IT
World Canada, June 12, 2008.
22
Claburn, Thomas, “Acer, Apple, Dell and HP Sued for Patent Infringe-
ment,” Information Week, June 30, 2008.
56
Associated Press, “Stung by Cyber Warfare, Estonia, NATO Allies to
Sign Deal on Cyber Defense Center,” International Herald Tribune,
May 14, 2008.
23
57
“Tellabs Sues Fujitsu Claiming Patent Infringement,” PC World,
June 12, 2008.
58
Kanaracus, Chris, “Red Hat Settles Patent Suits with Firestar,
DataTern,” PC World, June 11, 2008.
24
McMillan, Robert, “CNN Cyberattack Called Off,” CIO, April 19, 2008.
25
“2007 Identity Fraud Survey Report: Identity Fraud is Dropping, Con-
tinued Vigilance Necessary,” Javelin Strategy & Research, February
2007.
Rogers, John, “Gartner: US $3.2 Billion Lost to Phishing Attacks in
One Year,” SC Magazine, December 19, 2007.
59
Carr, Jim, “Phishing Scam Uses AOL Address to Target eBay Users,”
SC Magazine, November 13, 2007.
60
Varrone, Carl, “What Nobody Else is Saying About Online Poker,” Dog
Ear Publishing, 2007, p. 126.
26
“Jet Flash 210 Fingerprint USB Flash Drive,” Transcend Web site at
www.transcendusa.com/Products/ModDetail.asp?
ModNo=108&SpNo=2&LangNo=0, accessed July 4, 2008.
61
Chiang, Jennifer W., “Don't Bet On It: How Complying with Federal
Internet Gambling Law is Not Enough,” Shidler Journal for Law,
Commerce + Technology, June 6, 2007.
27
62
“Customer Success Stories: Associated Newspapers,” accessed at
Computer Associates Web site, http://ca.com/us/success/
Collateral.aspx?CID=147880 on June 28,2008.
28
Havenstein, Heather, “Report: FBI Looks into Facebook March
Madness Betting Pools,” Computerworld, March 17, 2008.
29
James, Clement, “US House Committee Votes on Web Gambling
Ban,” vnunet.com, June 23, 2008.
Children's Internet Protections Act, Pub. L. 106-552, accessed at
http://ifea.net/cipa.html on June 22, 2008.
63
30
Sowa, Tom, “A Hacker's Wrong Turn,” SpokesmanReview.com,
August 20, 2007.
Welch, Erin, “Child-Proofing Internet Access,” The Orange County
Register, January 29, 2008.
64
“Newly Discovered Malware,” McAfee Web site http://vil.nai.com/vil/
newly_discovered_viruses.aspx, accessed July 4, 2008.
31
Houser, Mark, “UPMC Admits Privacy Violation,” Pittsburgh Tribune-
Review, April 13, 2007.
65
Hulme, George, “New Ransom-Ware Virus Resurfaces,” Information
Week, June 9, 2008.
32
66
Jones, K.C., “Obama, Clinton, McCain Passport Breaches Expose
Human, Not Tech Weakness,” InformationWeek, March 21, 2008.
33
Keizer, Gregg, “Best Buy Sold Infected Digital Picture Frames,
Computerworld, January 2, 2008.
67
“3/4 of Companies Monitor Employee Web Browsing,” Yahoo! Tech,
May 9, 2007.
34
Nichols, Shaun, “Twin Trojans Attack Macs,” Secure Computing,
June 23, 2008.
Singel, Ryan, “Nearly Ten Percent of Companies Have Fired Bloggers,
Survey Claims,” Wired, July 19, 2007.
68
Kirk, Jeremy, “'Mebroot' Proves to be a Tough Rootkit to Crack,”
Computerworld, March 4, 2008.
35
Lewan, Todd, “Microchips Everywhere: A Future Vision,” The Seattle
Times, January 29, 2008.
69
Leyden, John, “Dodgy Drug Sales Underpin Storm Worm,” The Reg-
ister, June 12, 2008.
36
“Children's Online Privacy Protection Act - 15 USC 6501 - 6506,”
www.softforyou.com/add/COPPA.pdf, accessed June 23, 2008.
70
“About McAfee,” McAfee Web site, http://us.mcafee.com/root/
aboutUs.asp, accessed on June 28, 2008.
37
71
Bean, Linda, “CARU Reviews Site Operated by Lions Gate Entertain-
ment,” CARU News, October 24, 2007.
38
“Antivirus Software and Disk Defragmentation,” Tech Republic,
June 23, 2008.
72
Simon, Ellen, “How Are Your Wrists Feeling?” Cincinnati Enquirer,
May 28, 2008, p. E1.
39
“Anti-Spyware Software Reviews for 2008,” Top Ten Reviews, http://
anti-spyware-review.toptenreviews.com, accessed July 1, 2008.
Gross, Grant, “E-Waste Recycling Faces Challenges, Critics Say,”
Computerworld, April 20, 2008.
73
40
Lemos, Robert, “Spyware Purveyor DirectRevenue Closes Down,”
SecurityFocus, October 25, 2007.
 
Search WWH ::




Custom Search