Should the United States increase the number of H-1B visas and green cards so international skilled workers can become permanent residents?
The basic point underlying the issues is that U.S. has an immense shortage of highly skilled labor ever year and the current percentage of fresh...
What measures need to be taken to make sure that offshore outsourcing does not adversely affect American jobs?
Offshore outsourcing is a highly debated topic. It would be nice if we reflect on the reasons that has lead to offshore outsourcing – 1....
Where should cyberlaw enforcement be centered?
I appreciate the study conducted by UCSD that it provides some striking insights into operation of scam engines and their origin stations. Based on this...
How Pervasive is Phishing?
Antiphishing.org links us to various useful means to counter phishing. skimming through the website, here are two things that interested me – 1. The phishing...
Should the US recognize criminal law sanctions from other countries when those countries accuse US citizens of violating the other country’s laws?
Cyber-Crime and its big brother – “Cyber-warfare”, have so conquered the ever expanding and versatile cyberspace that we need to establish new international polices and...
USA Patriot Act and Data mining
I think its the USA PATRIOT Act that gives the right to do this kind of data mining. This actually amended a handful of other...
What limitations should be imposed on datamining of email traffic patterns?
E-mail traffic is one of the main target of intelligence surveillance to detect terrorist and other malicious activities. Its rather easy and result oriented when...
Should wiretapping of US citizen internet usage require a warrant?
First of all, I don’t think a search warrant is surely required in such a case as it is against Fourth Amendment. Now after 9/11,...
Will intelligence add-ons to the internet make it easier for hackers to penetrate the internet for criminal purposes?
Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet...
Using Technology to combat terrorrism?
Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet...
Can federal legislation prohibit certain types of computer usage in schools without violating students’ free speech rights?
Children’s legitimate free speech as applicable to them should not be barred in any case. I have little support for the free speech advocates out...
Can filtering protect children from harmful material in chatrooms, blogs, and social networks?
I don’t think there is any explicit filtering technology available that can completely avoid harmful material from chartroom, social networking and blogs. There should be...
Should legislation focus just on spyware, on undesireable practices (with spyware being just one example), or should legislation focus on protecting privacy and security of personal information?
Spyware is an explicit program that is written with the intention of collecting and using personal info, illegally. Of course its one other way to...
Should spyware be allowed for digital rights management, as exemplified by Sony and Microsoft practices?
Not at all. Firstly there is no relation between the terminology (Spyware) and what the DRM is intended to do. Something which is Spyware is...
Should parents, employers, and government be allowed to use spyware to monitor for bad behavior?
Interesting topic isn’t it! Usage of Spyware by itself should be made illegal in any case, as it invades privacy. Should a software is used for...