of security.
The principles are:
Awareness: Participants should be aware of the need for security of information systems and networks and what they can do to enhance security, they also should be aware of the potential harm to others arising from interconnectivity and interdependency.
Responsibility: all participants, including policymakers and program designers, are responsible for the se
billion) by 2014
- Wiretapping, Infiltration, etc
2) software piracy
The copyright infringement of software (often referred to as software piracy) refers to several practices which involve the unauthorized copying ofcomputer software. Copyright infringement of this kind is extremely common. Most countries have copyright laws which apply to software, but the degree of enforcement varies.
On July 27, 1994, the U.S. Department of Justice, Antitrust Division filed a Competitive Impact Statement that said, in part: "Beginning in 1988, and continuing until July 15, 1994, Microsoft induced many OEMs to execute anticompetitive "per processor" licenses. Under a per processor license, an OEM pays Microsoft a royalty for each computer it sells containing a particular microprocessor, whethe
copyright protected) content. An example are personal music videos that combine own photos with chart music and sharing them in social communities on PCs, mobile phones and digital settop boxes.
Digital convergence also refers to the digitalization of traditional media. For example, during the advent of personal computers, text-only documents were the first to be digitized. Increasingly, graph
of dimensions.
Web 1.0 Division Web 2.0
Portal base Web Service Platform based Web
Information/Contents Lockout Information/Contents Information/Contents sharing
Technology: efficiency of sharing Value Sharing: seek diversity participation by using collective intelligence
Internet Explorer: High OS reliance Browser All programs of web connection
Expert, Programmer, related company Manufa