Mindblown: a blog about philosophy.

  • Knowledge Management

    Knowledge Management Knowledge Management Documents and Papers ManagementFirst, Knowledge Management: Rethinking Management for the New World of Uncertainty and Risk,, ManagementFirst, Knowledge Management Feature of the Month, April 2005, Emerald Publishing. How ‘real’ knowledge management can save not only the failing model of systems performance but also the failing model of management originally devised for the…

  • Privacy Law

    Privacy Law Articles about Privacy and Security Issues eCrime, Law & You (ZDNet) Privacy, Confidentiality, Security, and Control Issues Relating to the Wide-Spread Use of the Information Highway (Forcht) Intelligence-Based Threat Assessments for Information Networks and Infrastructures (White Paper) Personal Information Goes Public When it comes to the dissemination of personal information, the key question…

  • Stakeholders

    Stakeholders Articles about Stakeholders & Issues Intellectual Property & Legal Issues Organizational E-Mail Policy: Why Your Company Needs Written E-Mail Policy Samples of Company E-Mail Policy Sample E-Mail Policy (SHRM) AITP Model Electronic Mail (E-mail) Policy US Department of Commerce University of Kansas Medical Center Information Infrastructure Standards Panel (IISP) CPSR Publications National Information Infrastructure…

  • Mobile Forensics

    Mobile Forensics Mobile devices, such as Personal Digital Assistants (PDAs), Blackberry, and cell phones have become essential tools in our personal and professional lives. The capabilities of these devices are continually evolving, providing users with greater storage capacities, better Internet connectivity, and enhanced Personal Information Management (PIM) capabilities. Devices with cellular capabilities provide users with…

  • Hello world!

    Welcome to lawinorg. This is your first post. Edit or delete it, then start blogging!

  • Access Control Policy Tool

    Access Control Policy Tool (ACPT) Project Overview of this United States Project Access control mechanisms control which users or processes have access to which resources in a system. Access control policies are increasingly specified to facilitate managing and maintaining access control. However, the correct specification of access control policies is a very challenging problem. This…

  • Cyber Security

    Cyber Security The international situation for evaluating the adequacy of IT security was quite confused in the early 1990s. In the United States In December 2002, the U.S. Government passed the Federal Information Security Management Act (FISMA) and the Cybersecurity Research and Defense Act (CR&DA). FISMA requires the “development and maintenance of minimum controls required to protect…

  • E-Government Act

    E-Government Act The E-Government Act (Public Law 107-347) passed by the 107th Congress and signed into law by the President in December 2002 recognized the importance of information security to the economic and national security interests of the United States. Title III of the E-Government Act, entitled the Federal Information Security Management Act (FISMA) requires…

  • Information Security and Privacy Advisory Board

    Information Security and Privacy Advisory Board (ISPAB) The Information Security and Privacy Advisory Board (ISPAB) was originally created by the Computer Security Act of 1987 (P.L. 100-235) as the Computer System Security and Privacy Advisory Board. As a result of Public Law 107-347, The E-Government Act of 2002, Title III, The Federal Information Security Management…

Got any book recommendations?