Ideals of Openness, transparency Vs confidentaility, secrecy
There is great effect of privacy / individual rights on true e-Government implementations. As always, the core goals of e-Governance initiatives are to bring about...
Is there a conflict between the support of individual rights and the use of e-government for transformational purposes? Why or why not?
Based on my reflection on E-Governance reference materials and experience, I am concluding that e-government initiatives cannot be truly transformational unless the socio-political environment is...
True Transformation – Is it ever possible in E-Government setup?
This is an interesting and very scholastic topic to share and discuss. The basic question being raised is – Are e-government initiatives capable to bring...
Will Rohr’s Secular Writings About Government Change In The Present?
If Rohr would have written his book in the present year, it would have a clear shift from the focus on defining what a perfect...
Effect of State of Technology Available on Open Government Authors
This reading materials as listed in the Bibliography, sets the stage for deeply analyzing the origins of the most long lasting government setup of the...
What measures need to be taken to make sure that offshore outsourcing does not adversely affect American jobs?
Offshore outsourcing is a highly debated topic. It would be nice if we reflect on the reasons that has lead to offshore outsourcing – 1....
Where should cyberlaw enforcement be centered?
I appreciate the study conducted by UCSD that it provides some striking insights into operation of scam engines and their origin stations. Based on this...
How Pervasive is Phishing?
Antiphishing.org links us to various useful means to counter phishing. skimming through the website, here are two things that interested me – 1. The phishing...
Should the US recognize criminal law sanctions from other countries when those countries accuse US citizens of violating the other country’s laws?
Cyber-Crime and its big brother – “Cyber-warfare”, have so conquered the ever expanding and versatile cyberspace that we need to establish new international polices and...
USA Patriot Act and Data mining
I think its the USA PATRIOT Act that gives the right to do this kind of data mining. This actually amended a handful of other...
What limitations should be imposed on datamining of email traffic patterns?
E-mail traffic is one of the main target of intelligence surveillance to detect terrorist and other malicious activities. Its rather easy and result oriented when...
Should wiretapping of US citizen internet usage require a warrant?
First of all, I don’t think a search warrant is surely required in such a case as it is against Fourth Amendment. Now after 9/11,...
Will intelligence add-ons to the internet make it easier for hackers to penetrate the internet for criminal purposes?
Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet...
Using Technology to combat terrorrism?
Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet...
Can federal legislation prohibit certain types of computer usage in schools without violating students’ free speech rights?
Children’s legitimate free speech as applicable to them should not be barred in any case. I have little support for the free speech advocates out...
Can filtering protect children from harmful material in chatrooms, blogs, and social networks?
I don’t think there is any explicit filtering technology available that can completely avoid harmful material from chartroom, social networking and blogs. There should be...
Should legislation focus just on spyware, on undesireable practices (with spyware being just one example), or should legislation focus on protecting privacy and security of personal information?
Spyware is an explicit program that is written with the intention of collecting and using personal info, illegally. Of course its one other way to...
Should spyware be allowed for digital rights management, as exemplified by Sony and Microsoft practices?
Not at all. Firstly there is no relation between the terminology (Spyware) and what the DRM is intended to do. Something which is Spyware is...
Should parents, employers, and government be allowed to use spyware to monitor for bad behavior?
Interesting topic isn’t it! Usage of Spyware by itself should be made illegal in any case, as it invades privacy. Should a software is used for...
What non-regulatory practices can users follow to reduce the incidence of spyware on their computers?
Some tips will be – 1. Make a point that one would not visit web sites such as mass advertising web sites as they are...
A revolutionary supposition – Advice for improved Education system
The educational system should revise the curriculum according to the current technology demands in the society and to build creativity of students. I think the...
Is there a more effective strategy for helping developing countries increase the computer and information literacy of their children?
Intel’s Maloney’s words – “It’s about the Web more than anything. I have young kids …….. doesn’t have access to the Web is overwhelming” –...
What can be learned from educational experiences where all students in certain school districts have been given computers?
The lesson learned should be lack of effective direction and control in implementing the plan. I remember from IST 601 that we should control technology,...
What implementation plans should countries make before entering into contracts to purchase low-cost computers?
Here is a nice article on what determines the usage of XO type laptops in developing countries – http://www.olpcnews.com/countries/india/ . The article can be used...
Should funding be available for social impacts research when it is not likely to lead to new innovations?
I think we should encourage funding on social impact research as it would lead us to explore and find answers to long disputed or rather...
Is there a need for languages (like Java/ActiveX) where a corporation controls the standard but can only modify it in public ?
Java (SunMicroSystems) and ActiveX (Microsoft) are two major technology platforms that has evolved itself a long way from years of R & D and support...
What protections should the public have regarding access to broadband networks for reception and/or transmission?
700 Mhz band is being developed and utilized with the intention of allowing entrepreneurs with less capital to establish broadband services, since it offers cheap...
Should carriers have the freedom through contracts and licenses to shape how their networks will be used?
Again this is an instance of protecting consumer rights and freedom in utilizing the digital medium. The carriers have a very important role in maintaining...
Should distributors be allowed to charge differently for different types of traffic?
This reminds me of the most common issue – when should government leave the publishing of information to the private?. Intended quality and convenience of...
Should broadband distributors be regulated as common carriers by the FCC?
From the literature and court cases, FCC is less obliged to regulate broadband distributors as common carriers, as “Computer network Information” services are not subject...
Modifying World Trade Organization’s TRIPS agreement?
Here is another analysis article on a widely asked question – “Should treaties like the World Trade Organization’s TRIPS agreement be modified so developing countries...
Should the US patent process be revised as suggested in S 1145 and HR 1908?
Here is an interesting analysis article (short and sweet as we say) on “Should the US patent process be revised as suggested in S 1145 and HR...
Should the Linux and Open Source communities be protected from software patent challenges?
Here is an short and to-the-point article on a most debated topic that I would want everyone to focus on now – “Should the Linux...
Impact of Software Patents on Innovation in the Software Industry
This article is a good resource for those who want to know more about the most raised question – What is the impact of software patents...
Need for Legal and Technological Protection Mechanisms
This article is a good resource for those who want to know more about the most raised question – Is there a need for legal and...
How can the intellectual property community protect their intellectual property without the DMCA safeguards?
This article is a good resource for those who want to know more about the most raised question – How can the intellectual property community...
Should the prohibition in the Digital Millennium Copyright Act against breaking intellectual property safeguards be modified?
This article is a good resource for those who want to know more about the most raised question – Should the prohibition in the Digital...
Can data quality regulations be used to keep agencies unbiased in their postings?
This is an interesting article that I would recommend which tries to find some conclusion as how agencies may be controlled on posting biased or...
Does making documents accessible over the web eliminate the need for printing documents?
The core idea of this article is to comtemplate on a most commonly discussed topic – Does making documents accessible over the web eliminate the...
Making Government documents transparent
There are so many articles about e-governance, but all these articles stress on what e-governance can do, with little thought on how and when e-governance...
Implementing E-Government Act
Article...
Should countries like the United States push for agenda items like freedom of expression, intellectual property protection, and cybercrime prevention?
The freedom of expression, being one of the firmly stated and affirmed right in the US constitution, I think the question refers to effecting in...