Wong, 1997 - Google Patents
Caught in the Web: Privacy and the InternetWong, 1997
- Document ID
- 5056878743393616918
- Author
- Wong J
- Publication year
External Links
- 238000011160 research 0 abstract description 25
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Finn et al. | Victimization online: The down side of seeking human services for women on the Internet | |
De George | The ethics of information technology and business | |
Westin | Social and political dimensions of privacy | |
Determann et al. | Intrusive monitoring: Employee privacy expectations are reasonable in Europe, destroyed in the United States | |
Mills et al. | Cyberslacking! A liability issue for wired workplaces | |
Hutchings et al. | Interviewing cybercrime offenders | |
Kerr | The legal relationship between online service providers and users | |
Millier | Facebook Frontier: Responding to the Changing Face of Privacy on the Internet, The | |
Marcella Jr et al. | Privacy handbook: guidelines, exposures, policy implementation, and international issues | |
Zarwan | False Freedom: Online Censorship in the Middle East and North Africa | |
Shelton | The role of corporate and government surveillance in shifting journalistic information security practices | |
Bayens | The Search and Seizure of Computers: Are We Sacrificing Personal Privacy for the Advancement of Technology | |
Blanpain | On-line Rights for Employees in the Information Society | |
Greenawalt | Privacy and its legal protections | |
Spinapolice | Mitigating the risk of social engineering attacks | |
Wong | Caught in the Web: Privacy and the Internet | |
Geist | Computer and e-mail workplace surveillance in Canada: the shift from reasonable expectation of privacy to reasonable surveillance | |
Vanacker | “JUST DOING HIS JOB” Journalism defending its turf in a time of leak investigations | |
Mui et al. | In-Person and Remote Employees and Information Security Policy Compliance | |
Smith | Internet privacy: Overview and pending legislation | |
Tarar et al. | Cybercrimes Against Women in Pakistan: Feminist Narratives of Resistance, Resilience & Coping Strategies | |
Ebenger | The USA PATRIOT Act: Implications for private e-mail | |
Katz et al. | Privacy issues of a national research and education network | |
Gary | Think before You Post: Social Media Monitoring of Immigrants and Implications on Constitutional Rights and Discriminatory Denials | |
Webb Jr | A grounded theory study of the risks and benefits associated with the use of online social networking applications in a military organization |