Encryption
Study Guide
What is Encryption?
Different Kinds of Encryption
Ethical Considerations
Links
These will be sorted later on.
- Ethical Considerations of Privacy and Cyber-Medical Information by Jonathan Klemens
- http://www.nysscpa.org/cpajournal/2008/508/essentials/p62.htm
- http://searchsecurity.techtarget.com/news/column/0,294698,sid14_gci1238490,00.html
- http://securityblog.typepad.com/technology_security/2007/06/government_buys.html
- http://blogs.computerworld.com/federal_encryption_standardization
- http://www.dslreports.com/shownews/Your-Encryption-Key-a-Fifth-Amendment-Right-90282
- http://www.wired.com/news/technology/0,70524-0.html?tw=wn_index_1
- http://www.nytimes.com/2006/05/22/technology/22privacy.html
- http://www.usatoday.com/money/industries/technology/2006-02-16-skype-wiretap
- http://www.technewsworld.com/story/60102.html
- http://www.infoworld.com/archives/emailPrint.jsp?R=printThis&A=/article/07/12/19/Unlocking-encryption-management_1.html