Part 3

Table of Contents:

  1. Introduction
  2. Specific Aims
  3. Background
  4. Smart Phones & Tablet Computers
  5. Social Media
  6. The Digital Threat
  7. Cyber Warfare
  8. USA Patriot Act
  9. Case Studies
  10. What is Intelligent Multi-Factor Authentication Technology?
  11. The Limitations of Single Factor Authentication
  12. The Core Challenges to Security: Cost & Complexity
  13. Conclusion
  14. What’s next?
  15. The Future of Civic Engagement
  16. The Future of Change
  17. Economic Convergence
  18. Acknowledgements (Coming Soon)

One Response to Part 3

  1. Pingback: Part 3 – Conclusion | @The Heart of Big Brother

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s