|
Implementing technological developments Difficulties protecting people from bits: |
|||||||||||||||
| Illegal e-cards spy on your lover | |||||||||||||||
| Protecting
kids privacy is tough balance Quicktime audio file |
|||||||||||||||
| Kid's site owners don't protect kids (or follow the law) | |||||||||||||||
| Credit/identity attacks can come from . . . wherever | |||||||||||||||
| Implementing standards requires author/owner/producer cooperation | |||||||||||||||
| Corporate cyber security is inadequate | |||||||||||||||