Security: Difference between revisions
Content added Content deleted
No edit summary |
No edit summary |
||
Line 53: | Line 53: | ||
| |
| |
||
|} |
|} |
||
Line 78: | Line 80: | ||
===Select Blogs |
===Select Blogs=== |
||
Line 121: | Line 123: | ||
===Select Idea Competitions / Conversations / Dialogues=== |
===Select Idea Competitions / Conversations / Dialogues=== |
||
===Select Images, Infographics, etc.=== |
|||
Line 169: | Line 174: | ||
===Select Quotes, Quotations, etc.=== |
===Select Quotes, Quotations, etc.=== |
||
⚫ | |||
Line 176: | Line 184: | ||
===Select References=== |
===Select References=== |
||
Almiraat, Hisham. 2013. [http://advocacy.globalvoicesonline.org/2013/01/10/deletecontrol-campaign-against-digital-repression/ #DELETECONTROL/: Campaign Against Digital Repression]. January 10. Cambridge, MA: Global Voices Online. |
Almiraat, Hisham. 2013. [http://advocacy.globalvoicesonline.org/2013/01/10/deletecontrol-campaign-against-digital-repression/ #DELETECONTROL/: Campaign Against Digital Repression]. January 10. Cambridge, MA: Global Voices Online. |
||
Almiraat, Hisham. 2013. [http://advocacy.globalvoicesonline.org/2012/12/31/10-new-years-resolutions-to-browse-the-internet-safely-in-2013/ 10 New Year's Resolutions to Browse the Internet Safely in 2013]. Cambridge, MA: advocacy.globalvoicesonline.org. |
Almiraat, Hisham. 2013. [http://advocacy.globalvoicesonline.org/2012/12/31/10-new-years-resolutions-to-browse-the-internet-safely-in-2013/ 10 New Year's Resolutions to Browse the Internet Safely in 2013]. Cambridge, MA: advocacy.globalvoicesonline.org. |
||
Line 192: | Line 200: | ||
Dingledine, Roger. 2012. [http://www.freehaven.net/~arma/cv.htmlRoger Dingledine's Curriculum]. (If website is blocked, view through Tor/Vidalia enabled browser). Cambridge, MA: www.freehaven.net/~arma/cv.html |
Dingledine, Roger. 2012. [http://www.freehaven.net/~arma/cv.htmlRoger Dingledine's Curriculum]. (If website is blocked, view through Tor/Vidalia enabled browser). Cambridge, MA: www.freehaven.net/~arma/cv.html |
||
Felten, Ed. 2003. [https://freedom-to-tinker.com/blog/felten/drm-and-first-rule-security-analysis DRM, and the First Rule of Security Analysis]. March 19th. freedom-to-tinker.com |
Felten, Ed. 2003. [https://freedom-to-tinker.com/blog/felten/drm-and-first-rule-security-analysis DRM, and the First Rule of Security Analysis]. March 19th. freedom-to-tinker.com. |
||
Gjelten, Tom and Audie Cornish. 2013. [http://www.npr.org/2013/01/28/170494486/pentagon-to-dramatically-expand-cyber-warrior-force Pentagon To Dramatically Expand 'Cyber Warrior' Force]. January 28. Washington, DC: npr.org. |
|||
Guha, Auditi. 2011. [http://www.wickedlocal.com/cambridge/news/x1054483849/Harvard-fellow-could-face-35-years-in-prison-for-hacking-into-MIT-network Harvard fellow could face 35 years in prison for hacking into MIT network]. July 19. Boston, MA: wickedlocal.com. |
Guha, Auditi. 2011. [http://www.wickedlocal.com/cambridge/news/x1054483849/Harvard-fellow-could-face-35-years-in-prison-for-hacking-into-MIT-network Harvard fellow could face 35 years in prison for hacking into MIT network]. July 19. Boston, MA: wickedlocal.com. |
||
Line 206: | Line 216: | ||
Nachawati, Leila. 2011. [http://advocacy.globalvoicesonline.org/2011/10/10/bluecoat-us-technology-surveilling-syrian-citizens-online/ BlueCoat: US technology surveilling Syrian citizens online]. October 10. advocacy.globalvoicesonline.org. |
Nachawati, Leila. 2011. [http://advocacy.globalvoicesonline.org/2011/10/10/bluecoat-us-technology-surveilling-syrian-citizens-online/ BlueCoat: US technology surveilling Syrian citizens online]. October 10. advocacy.globalvoicesonline.org. |
||
Nakashima, Ellen. 2013. [http://m.washingtonpost.com/world/national-security/pentagon-to-boost-cybersecurity-force/2013/01/19/d87d9dc2-5fec-11e2-b05a-605528f6b712_story.html Pentagon to boost cybersecurity force]. Washington, DC: m.washingtonpost.com. |
|||
⚫ | |||
⚫ | |||
Smith, Stacey Vanek. 2012. [http://www.marketplace.org/topics/tech/growing-art-data-dodging The growing art of data dodging]. November 29. Marketplace. |
Smith, Stacey Vanek. 2012. [http://www.marketplace.org/topics/tech/growing-art-data-dodging The growing art of data dodging]. November 29. Marketplace. |
||
Soulskill. 2013. http://mobile.slashdot.org/story/13/01/09/1910210/nokia-redirecting-traffic-on-some-of-its-phones-including-https Nokia Redirecting Traffic On Some of Its Phones, Including HTTPS]. January 09. mobile.slashdot.org. |
Soulskill. 2013. http://mobile.slashdot.org/story/13/01/09/1910210/nokia-redirecting-traffic-on-some-of-its-phones-including-https Nokia Redirecting Traffic On Some of Its Phones, Including HTTPS]. January 09. mobile.slashdot.org. |
||
Which VPN Providers Really Take Anonymity Seriously?. 2011. [https://torrentfreak.com/which-vpn-providers-really-take-anonymity-seriously-111007/ Which VPN Providers Really Take Anonymity Seriously?]. torrentfreak.com. |
Which VPN Providers Really Take Anonymity Seriously?. 2011. [https://torrentfreak.com/which-vpn-providers-really-take-anonymity-seriously-111007/ Which VPN Providers Really Take Anonymity Seriously?]. torrentfreak.com. |
||
Line 218: | Line 230: | ||
Gibbs-Duhem. 2011. [http://ask.slashdot.org/story/11/07/28/2153248/Ask-Slashdot-How-Do-You-Protect-Data-On-Android Ask Slashdot: How Do You Protect Data On Android?]. July 28. ask.slashdot.org. |
Gibbs-Duhem. 2011. [http://ask.slashdot.org/story/11/07/28/2153248/Ask-Slashdot-How-Do-You-Protect-Data-On-Android Ask Slashdot: How Do You Protect Data On Android?]. July 28. ask.slashdot.org. |
||
===Select Search Engines=== |
|||
Line 226: | Line 241: | ||
===Select Societies, Associations, etc.=== |
===Select Societies, Associations, Groups, Networks, etc.=== |
||
Line 248: | Line 263: | ||
===Select Timelines=== |
===Select Timelines=== |
||
===Select Twitters=== |
|||
Line 262: | Line 280: | ||
===Select Websites=== |
===Select Websites=== |
||
#DELETECONTROL/. 2013. [http://www.deletecontrol.nl/ Hivos People Unlimited]. (The Netherlands-based Humanist Institute for Cooperation, Hivos, in partnership with Global Voices Advocacy, Witness, Mideast Youth and Tactical Technology Collective, is launching a campaign called #DELETECONTROL/ ). Netherlands: Hivos People Unlimited. |
#DELETECONTROL/. 2013. [http://www.deletecontrol.nl/ Hivos People Unlimited]. (The Netherlands-based Humanist Institute for Cooperation, Hivos, in partnership with Global Voices Advocacy, Witness, Mideast Youth and Tactical Technology Collective, is launching a campaign called #DELETECONTROL/ ). Netherlands: Hivos People Unlimited. |
||
Google Accounts' Help - Getting started with 2-step verification. 2011. [http://www.google.com/support/accounts/bin/static.py?page=guide.cs&guide=1056283&topic=1056284 Getting started with 2-step verification]. Mountain View, CA: Google. |
Google Accounts' Help - Getting started with 2-step verification. 2011. [http://www.google.com/support/accounts/bin/static.py?page=guide.cs&guide=1056283&topic=1056284 Getting started with 2-step verification]. Mountain View, CA: Google. |
||
Line 289: | Line 307: | ||
Social Science: http://worlduniversity.wikia.com/wiki/Social_Science |
Social Science: http://worlduniversity.wikia.com/wiki/Social_Science |
||
Line 528: | Line 544: | ||
Yahoo Groups' World University and School: http://groups.yahoo.com/group/worlduniversityandschool/ |
Yahoo Groups' World University and School: http://groups.yahoo.com/group/worlduniversityandschool/ |
||
⚫ | |||