Chapter 3 Reference Articles

Chapter 3 Reference Articles - . Business Week (Online)....

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 3: Newspaper Articles: Companies ' gambling' with personal data . Privacy Report. Sarah Schmidt . National Post . Canwest News Service Published: Wednesday, June 04, 2008 Here iPhone is clever, but Not Smart: Analysts Thomas Fredrickson . International Business Times . January 25, 2007. Here Google told to give up YouTube user details Kevin Allison, Richard Waters . Financial Times . London (UK): Jul 4, 2008. p. 19 Here It's 11 P.M. Why Are People E-Mailing Me? Stephanie Whittaker . The Globe and Mail . Toronto, Ont.: Jul 2, 2008. pg. C.1 Here Ottawa brings copyright act into digital age Bruce Campion-Smith . The Star Ottawa: Jun 12, 2008 Here Senator's anti-spam bill is welcome news Michael Geist . Toronto Star. Toronto, Ont.: May 19, 2008. pg. B.2 Here Magazine Articles: Firms move security up the agenda, but slowly Simon Quicke . MicroScope. Sutton: Here
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
May 5, 2008. pg. 18, 1 pgs Viacom vs. YouTube: Beyond Privacy Catherine Holahan
Background image of page 2
Background image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: . Business Week (Online). New York: Jul 7, 2008. Here The New E-Spionage Threat; A BusinessWeek probe of rising attacks on America's most sensitive computer networks uncovers startling security gaps Brian Grow, Keith Epstein, , Chi-Chu Tschang . Business Week . New York: Apr 21, 2008. , Iss. 4080; pg. 32 Here Intel: Disasters only happen if you let them Briony Smith. ComputerWorld Canada . June 18, 2008. Here Journal Articles: The Insider Threat George R Aldhizer III . The Internal Auditor. Altamonte Springs: Apr 2008. Vol. 65, Iss. 2; pg. 71 Here Privacy and Public Health at Risk: Public Health Confidentiality in the Digital Age Julie Myers , Thomas R Frieden , Kamal M Bherwani , Kelly J Henning . American Journal of Public Health. Washington: May 2008. Vol. 98, Iss. 5; pg. 793, 8 pgs Here Ten Tips to Combat Cybercrime Here James F Leon . The CPA Journal . New York: May 2008. Vol. 78, Iss. 5; pg. 6, 5 pgs...
View Full Document

Page1 / 3

Chapter 3 Reference Articles - . Business Week (Online)....

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online