Description: Quietly, a movement is taking shape within the technology industry to finally kill off the traditional password. Source: The Globe and Mail Date: April 9, 2014 For decades, researchers have worked on other means of authenticating users. But it’s only recently that the technology industry has started seriously considering alternatives to the text password. Read the full… Read more »
Posts Tagged: passwords
Young, in Love and Sharing Everything, Including a Password
Posted by Jim Clark & filed under exam2012A, hackers, IS ethics, Uncategorized.
Description: It has become fashionable for young people to express their affection for each other by sharing their passwords to e-mail, Facebook and other accounts. Source: nytimes .com Date: Jan 17, 2012 “It’s a sign of trust,” Tiffany Carandang, a high school senior in San Francisco, said of the decision she and her boyfriend made… Read more »
Leading Titles
Introduction to Information Systems, 3rd Canadian Binder Ready Version Update Edition
R. Kelly Rainer, Casey G. Cegielski, Ingrid Splettstoesser-Hogeterp, Cristobal Sanchez-Rodriguez
ISBN: 978-1-119-13385-8
August 2015, © 2016
CDN $98.95; CDN $114.95
Recent Posts
Categories
- 3D Printing (7)
- 5G (2)
- addiction (11)
- Advertisement (36)
- Amazon (49)
- Analytics (62)
- Android (7)
- Anonymous (1)
- app (90)
- App Economy (64)
- Apple (100)
- Artificial intelligence (113)
- Augmented Reality (15)
- Automation (23)
- Autonomous Vehicles (8)
- bandwidth (21)
- Banking (4)
- Big Data (17)
- Biometrics (31)
- Biomimicry (1)
- bitcoin (18)
- Blackberry (18)
- blockchain (12)
- blogging (7)
- Bluetooth (1)
- bots (8)
- brainwave technology (11)
- branding (65)
- browser (1)
- Business Analytics (1)
- Business Intelligence (107)
- business models (167)
- Careers (58)
- Censorship (9)
- Chatbots (1)
- China (18)
- Civil Liberties (38)
- Cloud Computing (58)
- cloud services (9)
- Collaborative filtering (10)
- Competitive advantage (72)
- Consumer Technology (71)
- Copyright (13)
- Crypto currency (13)
- Cuba (2)
- Cyber attack (7)
- cyber bullying (6)
- cyber terroism (15)
- cyber war (15)
- Cyberforensics (16)
- Cybersecurity (82)
- Dashboards (1)
- data analytics (57)
- Data center (3)
- data mining (23)
- Data storage (19)
- Database (1)
- Deepfake videos (1)
- Denial of service (7)
- Digital Detox (1)
- digital divide (17)
- Digital Policy (41)
- disintermediation (5)
- disruptive technology (36)
- domains (1)
- Drones (5)
- e-currency (1)
- e-payment (40)
- eathlete (1)
- ebook (1)
- Ecommerce (98)
- education (41)
- election (4)
- Electric vehicle (1)
- Electronic Surveillance (8)
- email (1)
- Emerging Economies (7)
- Emerging Technologies (85)
- emojis (4)
- encryption (3)
- Entertainment (14)
- Entrepreneurship (21)
- ERP (1)
- eSports (1)
- Ethereum (1)
- Ethical Issues (134)
- ethics (52)
- EXAM ARTICLE (28)
- exam2012A (23)
- FaceBook (91)
- Facial Recognition (1)
- Fake News (5)
- FBI (2)
- fibre optics (3)
- Firefox (1)
- Food delivery (1)
- Ford (2)
- Fortnite (1)
- foursquare (5)
- fraud (14)
- free speech (10)
- freemium (2)
- Functional Information Systems (13)
- Future of Work (3)
- Gaming (17)
- GDPR (General Data Protection Regulation) (1)
- global networking (4)
- godaddy (1)
- Google (71)
- google music (1)
- Google Play Store (1)
- Green Computing (2)
- Green Tech (11)
- hackers (24)
- Hardware (77)
- health (25)
- healthcare (16)
- History of IT and IS (1)
- Huawei (3)
- Human Resources (26)
- IBM (2)
- India (1)
- industry analysis (139)
- innovation (4)
- Innovator's Dilemma (3)
- Instagram (4)
- Intelligent Assistants (1)
- Internet (19)
- internet explorer (1)
- Internet of Things (10)
- internet protocols (2)
- IP addresses (1)
- iPad (26)
- iphone (23)
- IS ethics (29)
- ISPs (6)
- IT and History (8)
- IT and Politics (41)
- IT and Sport (1)
- IT and the law (24)
- IT Infrastructure (10)
- IT Trends (29)
- itunes (2)
- LinkedIn (1)
- M-commerce (47)
- malware (1)
- market intelligence (48)
- marketing (30)
- media (29)
- medicine (2)
- messenger (2)
- microsoft (20)
- millennials (2)
- MMO (1)
- money (5)
- music (8)
- MySpace (1)
- nano technology (1)
- NASA (1)
- national culture (51)
- Net Neutrality (3)
- Netflix (11)
- networking (5)
- newspapers on-line (3)
- Nike (1)
- Nintendo (1)
- Obama (3)
- obesity (2)
- online advertising (14)
- online business (10)
- online dating (6)
- online education (12)
- online gaming (3)
- Open Source (1)
- operating system (14)
- oracle (1)
- outsourcing (8)
- PaaS (Platform as a Service) (1)
- PayPal (2)
- peer file sharing (10)
- personal freedom (1)
- Personalization (20)
- Phablet (2)
- Pinterest (2)
- politics (12)
- pornography (4)
- Presidential Campaign 2012 (1)
- Presidential Debates (1)
- Privacy (63)
- programming (8)
- proxy (1)
- publishing (3)
- QR codes (1)
- Quantum Computing (1)
- ransomware (2)
- Reddit (2)
- Regulation (1)
- Remote working (1)
- Research (1)
- revenue model (42)
- rideshare (1)
- RIM (7)
- Risks and Controls (1)
- Robotic Process Automation (RPA) (1)
- robotics (28)
- Romney (2)
- SaaS (5)
- Samsung (7)
- satellites (2)
- Search (7)
- Security (48)
- self driving cars (19)
- Self driving vehicles (6)
- Sentiment Analysis (22)
- SEO (4)
- Shazam (1)
- siri (4)
- Skype (1)
- Smart Home (2)
- smartphones (74)
- smart phones (8)
- Snapchat (2)
- social impacts (60)
- Social Media (85)
- social tv (10)
- Software (30)
- Solar Energy (1)
- Sony (3)
- space (2)
- Space-based internet (1)
- spotify (1)
- SQL (1)
- squarespace (1)
- startup (1)
- STEM (1)
- streaming (2)
- streaming music (8)
- streaming video (34)
- Stripe (1)
- Super Bowl (2)
- Supply Chain Management (10)
- Sustainability (1)
- System development (27)
- T-mobile (1)
- Tableau (1)
- Tech Transfer (1)
- Tech-savvy (1)
- technology (47)
- technology-centric classroom (6)
- telecomunications (38)
- television (8)
- Tesla (1)
- texting (8)
- throttling (1)
- Tim Cook (3)
- Trump (1)
- Twitter (25)
- Uber (14)
- Uncategorized (50)
- User Experience (UX) (1)
- user habits (28)
- video (24)
- Virtual goods (2)
- Virtual Reality (4)
- virtualization (24)
- voice recognition (8)
- wearable technology (7)
- WhatsApp (1)
- white-collar (2)
- WI-Fi (17)
- wifi (2)
- wireless networks (24)
- Women in Tech (5)
- YouTube (16)