netwit 2.01

INTERNET WEB Cyberspace Policy Review

Cyberspace Policy Review
– Assuring a Trusted and Resilient Information and Communications Infrastructure

* 76 page draft paper

* Useful  timeline graphic on page 78, titled  ‘History Informs Our Future’ from 1900 to the present, which highlights key technological and legal milestones.

Open in another tab to read.

Kim Cameron’s Identity Blog post 27 June 2010 gives short review:

National Strategy for Trusted Identities in Cyberspace

January 10, 2011 - Posted by | Bradley Manning, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyberpunk, cyberspace, Cyberspace Policy Review, cypherpunk, data leakage, Department of Homeland Security, encryption, Government 2.0, hacker culture, Indentity Ecosystem Framework, info-war, insider security, insider threats, Internet, internet activism, internet-centrism, Julian Assange, Manning, National Center for Cybersecurity and Communications (NCCC), National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, Network security, network theory, NSA, NSTIC, Open data, open source, Protecting Cyberspace as a National Asset Act (PCNAA), Semantic Web, social media, social networks, social semantic web, social silos, techno-libertarianism, Tim Burners-Lee, Web 2.0, Web 3.0, WikiLeaks

No comments yet.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: