McGraw-Hill OnlineMcGraw-Hill Higher EducationLearning Center
Student Center | Instructor Center | Information Center | Home
Glossary
Acronyms
Exercise Files
Link to Jerry Post
Additional Appendixes
Discussion Issues
Rolling Thunder
End of Text Cases
Additional Models
Chapter Objectives
PowerPoint Presentations
Chapter Outline
Chapter Summary
Multiple Choice Quiz
True or False
Fill in the Blanks
Chapter Exercises
Internet Links/References
Chapter Review Questions
Feedback
Help Center


Management Information Systems: Solving Business Problems with Information Technology, 3/e
Gerald V. Post, University of the Pacific
David L. Anderson, DePaul U/McGowan Center

Security, Privacy, and Anonymity

Chapter 4 Internet Links


Computer Crime
CERT http://www.cert.org
Computer Security Institute http://www.gocsi.com
FBI: Internet Fraud Complaint Center http://www.ifccfbi.gov
Hackers http://www.hackers.com
Interpol http://www.interpol.int/Public/TechnologyCrime
National Fraud Information http://www.fraud.org
National Infrastructure Protection Center http://www.nipc.gov
National Security Agency http://www.nsa.gov
National White Collar Crime Center http://www.cybercrime.org
SEC Internet enforcement http://www.sec.gov/divisions/enforce/internetenforce.htm
Virtual Librarian crime links http://www.virtuallibrarian.com/legal/org.html
Privacy
Electronic Frontier Foundation http://www.eff.com
Electronic Privacy Information Center http://www.epic.org
FTC advisory committee http://www.ftc.gov/acoas
Kidz privacy http://www.ftc.gov/bcp/conline/edcams/kidzprivacy
Platform for privacy preferences http://www.w3.org/p3p
Privacy, ACM http://www.acm.org/usacm/privacy
Privacy International http://www.privacyinternational.org
Privacy Rights http://www.privacyrights.org




McGraw-Hill/Irwin