www.fgks.org   »   [go: up one dir, main page]

Content Security


Breaking News

Based on initial results with Ford Fiesta, Chiquita, Xbox, Salvation Army, United Way of Southeastern Michigan, Moosejaw, and Kabam, Are You a Human-- a Detroit start up that specializes in game-based verification systems -- has broadly launched PlayThru a verification ad unit that allows marketers to deliver a brand message while users play a quick game to prove they are, well, human. PlayThru can replace CAPTCHA, a series of distorted characters traditionally used by websites.
Posted Oct 29, 2013
Copyright Clearance Center, Inc. (CCC), a not-for-profit organization creating global licensing and content solutions for copyright, announced key findings from Outsell's 2013 study on Enterprise Information Access, Consumption and Use. According to the data, 48% of executives believe it's acceptable to share information as long as it's not used for commercial purposes, and 45% believe digital or print paid information is fine to share.
Posted Jul 22, 2013
A collaboration between different parts of the global creative industry, under the umbrella of the Linked Content Coalition (LCC), has resulted in the creation of a technical Framework to make it possible to manage and access online rights information across all types of media and content.
Posted Apr 08, 2013
John Wiley & Sons, Inc., announced that Journal of Cellular and Molecular Medicine and Microbial Biotechnology have joined the Wiley Open Access publishing program. All articles from these two journals are now open access and free to view, download, and share.
Posted Feb 19, 2013
Effective immediately De Gruyter and Versita will be publishing all Open Access content under the uniform application of Creative Commons license CC BY-NC-ND. This means that publications may be copied, disseminated, and otherwise made public with a few conditions.
Posted Feb 14, 2013

News Features

From encrypted passwords to firewalls, a company will expend immeasurable amounts of energy and money to protect its information. Just keeping data safe from outside assaults is an on going task, but company outsiders are no longer the only ones who pose a threat. Insiders with unlimited access to sensitive data can cause just as much damage to an organization as the average hacker. On July 13, 2010, Imperva, a data security company, aims to mitigate the problems that accompany securing sensitive information with the release of SecureSphere File Security.
By - Posted Jul 13, 2010
OnCopyright 2010, a 1-day event held at the Union League Club in New York City and sponsored by the Copyright Clearance Center (CCC), tackled the issue of copyright from four vantage points: art, society, technology, and law. The 19 experts from these four sectors provided insights into the changing parameters of remixing, mashups, collaboration, and disruptive technology.
By - May 2010 Issue, Posted Apr 23, 2010
For social network junkies-and companies that rely on sites such as Twitter and Facebook to interact with clients-Aug. 6 was a bleak day. A massive distributed denial-of-service (DDoS) attack targeting a single pro-Georgian blogger drastically slowed or stopped five major sites: Facebook, Twitter, YouTube, LiveJournal, and Fotki.
By - October 2009 Issue, Posted Sep 30, 2009
This year, when Proofpoint, Inc., an email security and data loss provider, conducted its annual study on outbound email and data loss prevention issues, it had an additional question in mind: Is the recession creating an increased risk? By the time "Outbound Email and Data Loss Prevention in Today's Enterprise, 2009" was released in July, Proofpoint had found the connection it was looking for.
By - October 2009 Issue, Posted Oct 05, 2009
Everybody is doing it: "tweeting," that is. Yet like so many other things that are all the rage, Twitter has a bit of a dark side. No, I'm not talking about users who detail their entire day via the microblogging site. Recently, concerns about hacking and "maltweets" have plagued users of the popular free social networking site and others.
By - September 2009 Issue, Posted Sep 01, 2009

Featured Stories

The recent proposal of the Commercial Felony Streaming Act, and the uproar over the potential it holds to send artists like Justin Bieber to jail for copyright violation, has put the subject of intellectual property and copyright on the front page. The following is an excerpt from a chapter in the book, Dancing with Digital Natives: Staying in Step with the Generation That's Transforming the Way Business is Done. The full chapter is titled: "Ethics, Technology, and the Net Generation: Rethinking Intellectual Property Law" and is written by Albert M. Erisman. The book is available on Amazon, Barnes & Noble, and other retailers in e-book and print format.
By - Posted Oct 27, 2011
In October, The Wall Street Journal reported that several popular Facebook applications had been transmitting users' personal identifying information to literally dozens of advertising and internet tracking companies. While Facebook maintains that there is "no evidence that any personal information was misused or even collected as a result of this issue," not all observers have been appeased.
The question bellows this year from every podium, in every digital media conference panel, and in reams of articles. Will users finally start paying for their online content when so many alternatives crowd a search-driven, user-generated, all-you-can eat buffet of free? Well, we'll spare you the suspense. The short answer is: Online, users already pay for content.
By - April 2010 Issue, Posted Apr 07, 2010
Social networking sites and online collaboration tools make it easier for employees to collaborate and share their knowledge. Add email and instant messaging (IM) to the mix and the result is a knowledge-sharing system that can bolster communication and productivity throughout an enterprise.
By - June 2009 Issue, Posted Jun 01, 2009
With so much enterprise information now residing online and in overlapping applications both inside and outside firewalls, with employees and contractors dispersed in offices around the globe, and with software as a service becoming an everyday part of enterprise architecture, the need for flexible and secure identity and access management has become of foremost importance for any organization.
By - April 2009 Issue, Posted Mar 27, 2009

Columns

In light of Edward Snowden's recent disclosure that the NSA is keeping tabs on our every electronic move, it's hard not to think about privacy (or the lack thereof). While I often try to ignore it, sometimes it feels like science fiction movies (starring Tom Cruise...of course) about the watchful eye of the government are slowly becoming reality. That's when I begin worrying about the fabric of society. Shouldn't we all be worried about our privacy (especially if Tom Cruise isn't going to fix this problem)? Not surprisingly though, some of us worry more than others.
Column/Dispatches from Digital Natives - By - Posted Jul 04, 2013
Tor/Forge Books, a Macmillan imprint, announced in April that it would remove DRM (digital rights management) from its books. Many readers and authors were ecstatic. They believe that DRM is too restrictive and hinders end users from using/storing/sharing/enjoying ebooks in perfectly legal ways. Naysayers were sure that removing DRM was like handing over the keys to the store to digital pirates and that sales would plummet.
Column/Ebookworm - By - Posted Aug 16, 2012
Lately, it seems that every other article about ebooks is news about a new lawsuit. Ebooks have a series of legal ramifications inherent to the format, problems that did not exist (or did but to a far lesser degree) in other book formats. Collusion, piracy, and who owns the right to publish what are just a few of the legal boondoggles that ebook publishers and authors are currently facing.
Column/Ebookworm - By - June 2012 Issue, Posted Jun 12, 2012
A recent PricewaterhouseCoopers report titled "Trial by Fire," found that in a global survey of 7,200 senior managers responsible for information security, not one reference to the problems arising from search security are to be found. Securing search should be a key concern in search implementations, however.
Column/Eureka - July/August 2010 Issue, Posted Jul 21, 2010
Dear Warner Music Group Executives:

The BBC reports that 20 million people wanted to purchase tickets to the historic Led Zeppelin show held at the O2 Arena on Dec. 10, 2007. Needless to say, with only 20,000 tickets available, there were many disappointed fans who couldn’t be there when the band took the stage for the first time in 19 years.

Column/After Thought - By - April 2007 Issue, Posted Mar 28, 2008