All Articles

Should the United States increase the number of H-1B visas and green cards so international skilled workers can become permanent residents?

The basic point underlying the issues is that U.S. has an immense shortage of highly skilled labor ever year and the current percentage of fresh graduates from the STEM field is far less when compared to this huge requirement. Immigrants has always been a boost to U.S. economy. Providing more opportunities for highly skilled workforce…

All Articles

Where should cyberlaw enforcement be centered?

I appreciate the study conducted by UCSD that it provides some striking insights into operation of scam engines and their origin stations. Based on this research, policies should be devised to regulate ISPs not to provide services for hosting such websites. Enforcing this policy cannot be done from a centralized location. Why don’t we share…

All Articles

How Pervasive is Phishing?

Antiphishing.org links us to various useful means to counter phishing. skimming through the website, here are two things that interested me – 1. The phishing and crime-ware map, which shows world-wide distribution. 2. GAIN technology from InternetPerils which claims highly effective ways to monitor internet traffic using efficient data pattern analysis. Good tool that can…

All Articles

Should the US recognize criminal law sanctions from other countries when those countries accuse US citizens of violating the other country’s laws?

Cyber-Crime and its big brother – “Cyber-warfare”, have so conquered the ever expanding and versatile cyberspace that we need to establish new international polices and regulations which will enable easy coordinated crime-fighting between nations. Its not about questioning who is accusing who, rather the grave situation here to find am amicable solution for international peace…

All Articles

USA Patriot Act and Data mining

I think its the USA PATRIOT Act that gives the right to do this kind of data mining. This actually amended a handful of other Acts such as – Wiretap Statute (Title III): Electronic Communications Privacy Act Computer Fraud and Abuse Act Foreign Intelligence Surveillance Act Family Education Rights and Privacy Act Pen Register and…

All Articles

Will intelligence add-ons to the internet make it easier for hackers to penetrate the internet for criminal purposes?

Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet resources for various activities. It’s shocking to read how they have been so Internet savvy and have been utilizing it for psychological warfare to recruitment, networking to fundraising and data-mining…

All Articles

Using Technology to combat terrorrism?

Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet resources for various activities. It’s shocking to read how they have been so Internet savvy and have been utilizing it for psychological warfare to recruitment, networking to fundraising and data-mining…

All Articles

Can federal legislation prohibit certain types of computer usage in schools without violating students’ free speech rights?

Children’s legitimate free speech as applicable to them should not be barred in any case. I have little support for the free speech advocates out there in the current issues that we face in the case of minors. If MySpace leads to minors having being lead to unrestricted content and practices, then there should strictly…

All Articles

Can filtering protect children from harmful material in chatrooms, blogs, and social networks?

I don’t think there is any explicit filtering technology available that can completely avoid harmful material from chartroom, social networking and blogs. There should be manual and AI based monitoring available that checks for content periodically and raise alarms when it detect something bad going on. All such sites should be personalized services so that…

All Articles

Should legislation focus just on spyware, on undesireable practices (with spyware being just one example), or should legislation focus on protecting privacy and security of personal information?

Spyware is an explicit program that is written with the intention of collecting and using personal info, illegally. Of course its one other way to invade privacy. From the text, literature and real world experience, we know how vast is the world of privacy invasion and techniques that leads to it. Unless we have clear…

All Articles

Is there a more effective strategy for helping developing countries increase the computer and information literacy of their children?

Intel’s Maloney’s words – “It’s about the Web more than anything. I have young kids …….. doesn’t have access to the Web is overwhelming” – is very striking. OLPC efforts might be an answer to this concern. Strategy and plan alone doesn’t work when we are talking about reforming developing nations, cost effective infrastructure is…

All Articles

What protections should the public have regarding access to broadband networks for reception and/or transmission?

700 Mhz band is being developed and utilized with the intention of allowing entrepreneurs with less capital to establish broadband services, since it offers cheap means to setup service. This is the reason for the major players influencing Congress to gain an upper hand so that they kill competition and innovation. The term “public” means…

All Articles

Should carriers have the freedom through contracts and licenses to shape how their networks will be used?

Again this is an instance of protecting consumer rights and freedom in utilizing the digital medium. The carriers have a very important role in maintaining a healthy pipe that is effectively utilized. There should be efforts to setup regulation and standards to avoid piracy and unauthorized usage of network traffic. At the same time the…

All Articles

Should broadband distributors be regulated as common carriers by the FCC?

From the literature and court cases, FCC is less obliged to regulate broadband distributors as common carriers, as “Computer network Information” services are not subject to common carrier telecommunication service regulation under Title II of the federal Communications Act. (NCTA v. Brand X Internet Services et al., U.S. Supreme Court Nos. 04-277 and 04-281, June…

All Articles

Modifying World Trade Organization’s TRIPS agreement?

Here is another analysis article on a widely asked question – “Should treaties like the World Trade Organization’s TRIPS agreement be modified so developing countries can ignore software patents without facing WTO retaliatory measures?” Read along.. In my opinion, IPR should be preserved anywhere in the world. Making strict TRIP regulations has its major advantage…

All Articles

Should the prohibition in the Digital Millennium Copyright Act against breaking intellectual property safeguards be modified?

This article is a good resource for those who want to know more about the most raised question – Should the prohibition in the Digital Millennium Copyright Act against breaking intellectual property safeguards be modified? Read along .. I agree to the general consent that DMCA should be amended to shift its view from complete…