Skip to main content

The WiKID Blog

Viewing posts from January, 2009

risk-and-effectiveness-for-project-evaluation

Gunnar Peterson has a post from Metricon about Bryan Ware's presentation about combining the effectiveness of a solution and the risk involved. I couldn't find the link to the actualy presentation. (I didn't have the time to go through them all.)

I think I would tie the effectiveness of the proposed security solution to the cost of capital of the overall project. It would be interesting to tie Bryan's work with my "work" on estimating the cost of capital for an information security project.

spy-coins-from-canada-collect-all-6

From Yahoo::

In a U.S. government warning high on the creepiness scale, the Defense Department cautioned its American contractors over what it described as a new espionage threat: Canadian coins with tiny radio frequency transmitters hidden inside.
It is very strange. The article points out what a poor mechanism it is for tracking: short distance only, likely to be used to buy something, etc. I would think they must have been looking for a very limited amount of information. The location of a safe house, for example. While the distance is limited, you could compensate for that with an 'rfid rifle'.

the-choicepoint-of-johns

Of course, it makes complete sense. From the Freakonomics blog, an interview with an "escort":

Q. Do you typically know the true identity of your clients, and if so, how?

the-problems-at-palm-and-some-suggestions

BusinessWeek points out the struggles at Palm, how their operating system is 5 years old, the last Treo was released in 2003 and they've canceled the Foleo. They announced a new Treo for Europe, which looks interesting.

identity-theft-the-nanny-state-and-ambulance

Mordaxus at Emergent Choas has an inciteful post on how the government can protect people from identity theft.

I can think of a situation we need protection from. Here is a scenario. Let us take the case of a lender, Larry. We need a law to make it so that if Larry lends money to Alice, he cannot try to collect it from Bob. That's all we need. If we have that, we'll have all the legal protection we need to solve identity theft.
This is an interesting idea, but I fear that it is too simplistic. I suspect that this is the current law. The problem is really the burden of proof. Currently, Bob has to prove to Larry that he did not borrow the money. Larry gets to put all sorts of nastiness onto Bob's credit report that Bob will never be able to get off. Bob can sue Larry, butas mordaxus points out, the way to change the business practice is to make it not worthwhile, which means a class-action lawsuit.

Recent Posts

Archive

2024
2022
2021
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008

Categories

Tags

Authors

Feeds

RSS / Atom